<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wkumari-intarea-safe-limited-domains-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="safer-limited-domains">Safe(r) Limited Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-00"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="A." surname="Alston" fullname="Andrew Alston">
      <organization>Liquid Intelligent Technologies</organization>
      <address>
        <email>andrew-ietf@liquid.tech</email>
      </address>
    </author>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization>Cisco</organization>
      <address>
        <email>suresh.krishnan@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="January" day="19"/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 63?>

<t>There is a trend towards documents describing protocols that are only intended
to be used within "limited domains". Unfortunately, these drafts often do not
clearly define how the boundary of the limited domain is established and
enforced, or require that operators of these limited domains //perfectly//
implement filters to protect the rest of the Internet from these protocols.</t>
      <t>In addition, these protocols sometimes require that networks that are outside
of (and unaffiliated with) the limited domain explicitly implement filters in
order to protect their networks if these protocols leak outside of the limited
domain.</t>
      <t>This document discusses the concepts of "fail-open" versus "fail-closed"
protocols and limited domains, and provides a mechanism for designing limited
domain protocols that are safer to deploy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Internet Area Working Group Working Group mailing list (int-area@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/wkumari/draft-wkumari-intarea-safe-limited-domains"/>.</t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8799"/> discusses the concept of "limited domains", provides examples of
limited domains, as well as Examples of Limited Domain Solutions, including
Service Function Chaining (SFC), Segment Routing, "Creative uses of IPv6
features" (including Extension headers, e.g., for segment routing <xref target="RFC8754"/>)</t>
      <t>In order to provide context, this document will quote extensively from
<xref target="RFC8799"/>, but it is expected (well, hoped!) that the reader will actually
read <xref target="RFC8799"/> in its entirety. It's relatively short, and it is a very good
read!</t>
      <t><xref target="RFC8799"/> Section 3, notes:</t>
      <ul empty="true">
        <li>
          <t>A common argument is that if a protocol is intended for limited use, the
chances are very high that it will in fact be used (or misused) in other
scenarios including the so-called open Internet. This is undoubtedly true and
means that limited use is not an excuse for bad design or poor security. In
fact, a limited use requirement potentially adds complexity to both the
protocol and its security design, as discussed later.</t>
        </li>
      </ul>
      <t>Notably, in <xref target="RFC8799"/> Section 2, states:</t>
      <ul empty="true">
        <li>
          <t>Domain boundaries that are defined administratively (e.g., by address
filtering rules in routers) are prone to leakage caused by human error,
especially if the limited domain traffic appears otherwise normal to the
boundary routers. In this case, the network operator needs to take active
steps to protect the boundary. This form of leakage is much less likely if
nodes must be explicitly configured to handle a given limited-domain
protocol, for example, by installing a specific protocol handler.</t>
        </li>
      </ul>
      <t>This document addresses the problem of "leakage" of limited domain protocols by
providing a mechanism so that nodes must be explicitly configured to handle the
given limited-domain protocol ("fail-closed"), rather than relying on the
network operator to take active steps to protect the boundary ("fail-open").</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="fail-open-versus-fail-closed">
      <name>Fail-open versus Fail-closed</name>
      <t>Protocols can be broadly classified as either "fail-open" or "fail-closed".
Fail-closed protocols are those that require explicit configuration to enable
them to transit an interface. A classic example of a fail-closed protocol is
MPLS (<xref target="RFC3031"/>): In order to allow MPLS to transit an interface, the
operator must enable the MPLS protocol on that interface. This helps ensure
that MPLS traffic does not leak out of the network, while also ensuring that
outside MPLS traffic does not leak in.</t>
      <t>Fail-open protocols are those that require explicit configuration in order
to ensure that they do not leak out of a domain, for example, through the
application of filters. An example of a fail-open protocol is SRv6 - in order
to ensure that SRv6 traffic does not leak out of a network, the operator must
explicitly filter this traffic, and, in order to ensure that SRv6 traffic does
not leak in, the operator must explicitly filter SRv6 traffic.</t>
      <t>Fail-open protocols are inherently more risky than fail-closed protocols, as
they may ignore operational realities; they rely on perfect configuration of
filters on all interfaces at the boundary of a domain, and, if the filters are
removed for any reason (for example, during troubleshooting), the network is at
risk. In addition, devices (especially those using TCAM based filter
mechanisms) may have limitations in the number and complexity of filters that
can be applied, and so adding new filter entries to protect against new
protocols may not be possible.</t>
      <t>Fail-closed protocols, on the other hand, do not require any explicit
filtering. In order for the protocol to transit an interface, the operator must
explicitly enable the protocol on that interface. In addition, the protocol is
inherently more robust, as it does not rely on filters that may be limited in
number and complexity. Finally, fail-closed protocols are inherently more
secure, as they do not require that operators of networks outside of the
limited domain implement filters to protect their networks from the limited
domain protocols.</t>
    </section>
    <section anchor="making-a-transport-type-limited-domain-protocol-fail-closed">
      <name>Making a transport type limited-domain protocol fail-closed</name>
      <t>One way to make a limited-domain protocol fail-closed is to assign it a unique
EtherType (this is the mechanism used by MPLS). In modern router and hosts, if
the protocol (and so its associated EtherType) is not enabled on an interface,
then the Ethernet chipset will drop the frame, and the host will not see it.
This is a very simple and effective mechanism to ensure that the protocol does
not leak out of the limited domain.</t>
      <t>Note that this only works for transport-type limited domain protocols (e.g.,
SRv6). Higher layer protocols cannot necessarily be protected in this way, and so cryptographically enforced mechanisms may need to be used instead (e.g as  done used by ANIMA in <xref target="RFC8994"/> and <xref target="RFC8995"/>).</t>
      <t>The EtherType is a 16-bit field in an Ethernet frame, and so it is a somewhat
limited resource.</t>
      <t>Note that "Since EtherTypes are a fairly scarce resource, the IEEE RAC has let
   us know that they will not assign a new EtherType to a new IETF protocol
   specification until the IESG has approved the protocol specification for
   publication as an RFC.  In exceptional cases, the IEEE RA is willing to
   consider "early allocation" of an EtherType for an IETF protocol that is
   still under development as long as the request comes from and has been
   vetted by the IESG." (<xref target="I-D.ietf-intarea-rfc7042bis"/> Appendix B.1, citing
   <xref target="IESG_EtherType"/>)</t>
      <t>During development and testing, the protocol can use a "Local Experimental
Ethertype" (0x88B5 and 0x88B6 - <xref target="IANA_EtherType"/>). Once the protocol is
approved for publication, the IESG can request an EtherType from the IEEE.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the architecture for Multiprotocol Label Switching (MPLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="I-D.ietf-intarea-rfc7042bis">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="Donald E. Eastlake 3rd" initials="D. E." surname="Eastlake">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Joe Abley" initials="J." surname="Abley">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Yizhou Li" initials="Y." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="6" month="November" year="2023"/>
            <abstract>
              <t>   Some IETF protocols make use of Ethernet frame formats and IEEE 802
   parameters.  This document discusses several aspects of such
   parameters and their use in IETF protocols, specifies IANA
   considerations for assignment of points under the IANA OUI
   (Organizationally Unique Identifier), and provides some values for
   use in documentation.  This document obsoletes RFC 7042.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-rfc7042bis-11"/>
        </reference>
        <reference anchor="IESG_EtherType">
          <front>
            <title>IESG Statement on EtherTypes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.ietf.org/about/groups/iesg/statements/ethertypes&gt;"/>
        </reference>
        <reference anchor="IANA_EtherType">
          <front>
            <title>IANA EtherType Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml#ieee-802-numbers-1&gt;"/>
        </reference>
      </references>
    </references>
    <?line 213?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We've been trying to reach you about your car's extended warranty.
Please call us back at 1-800-555-1212.</t>
      <t>Much thanks to Brian Carpenter, for his review and comments.</t>
      <t>Also much thanks to everyone else with whom we have discussed this topic; I've had numerous discussions with many many people on this, and I'm sure that I've forgotten some of them. Apologies if you were one of them.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
