<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wkumari-intarea-safe-limited-domains-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="safer-limited-domains">Safe(r) Limited Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-03"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="A." surname="Alston" fullname="Andrew Alston">
      <organization>Liquid Intelligent Technologies</organization>
      <address>
        <email>andrew-ietf@liquid.tech</email>
      </address>
    </author>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization>Cisco</organization>
      <address>
        <email>suresh.krishnan@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Eastlake" fullname="Donald Eastlake">
      <organization>Independent</organization>
      <address>
        <email>d3e3e3@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="20"/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 69?>

<t>There is a trend towards documents describing protocols that are only intended
to be used within "limited domains".  These documents often do not clearly
define how the boundary of the limited domain is implemented and enforced,
or require that operators of these limited domains //perfectly// add filters
at all of the boundary nodes of the domain to protect the rest of the global
Internet from these protocols and vice-versa.</t>
      <t>This document discusses the concepts of "fail-open" versus "fail-closed"
protocols for limited domains. It further specifies how to use layer-2
protocol identification mechanisms for designing limited domain protocols
that are safer to deploy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Internet Area Working Group Working Group mailing list (int-area@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/wkumari/draft-wkumari-intarea-safe-limited-domains"/>.</t>
    </note>
  </front>
  <middle>
    <?line 84?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8799"/> discusses the concept of "limited domains", provides
examples of limited domains, as well as Examples of Limited Domain
Solutions, including Service Function Chaining (SFC <xref target="RFC7665"/> ), Segment
Routing, "Creative uses of IPv6 features" (including Extension
headers, e.g., for in situ Operations, Administration, and
maintenance <xref target="RFC9378"/>).</t>
      <t>In order to provide context, this document will quote extensively
from <xref target="RFC8799"/>, but it is assumed that the reader will actually read
<xref target="RFC8799"/> in its entirety.</t>
      <t><xref target="RFC8799"/> Section 3, notes:</t>
      <ul empty="true">
        <li>
          <t>A common argument is that if a protocol is intended for limited use, the
chances are very high that it will in fact be used (or misused) in other
scenarios including the so-called open Internet. This is undoubtedly true and
means that limited use is not an excuse for bad design or poor security. In
fact, a limited use requirement potentially adds complexity to both the
protocol and its security design, as discussed later.</t>
        </li>
      </ul>
      <t>Notably, in <xref target="RFC8799"/> Section 2, states:</t>
      <ul empty="true">
        <li>
          <t>Domain boundaries that are defined administratively (e.g., by address
filtering rules in routers) are prone to leakage caused by human error,
especially if the limited domain traffic appears otherwise normal to the
boundary routers. In this case, the network operator needs to take active
steps to protect the boundary. This form of leakage is much less likely if
nodes must be explicitly configured to handle a given limited-domain
protocol, for example, by installing a specific protocol handler.</t>
        </li>
      </ul>
      <t>This document addresses the problem of "leakage" of limited domain
protocols by providing a mechanism so that nodes must be explicitly
configured to handle the given limited-domain protocol ("fail-
closed"), rather than relying on the network operator to take active
steps to protect the boundary ("fail-open").</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="fail-open-versus-fail-closed">
      <name>Fail-open versus Fail-closed</name>
      <t>Protocols can be broadly classified as either "fail-open" or "fail-
closed".  Fail-closed protocols are those that require explicit
interface or device-wide configuration to enable them to be accepted
or processed when received on an interface.  A classic example of a
fail-closed protocol is MPLS (<xref target="RFC3031"/>): In order to allow MPLS to
transit an interface, the operator must enable the MPLS protocol on
that interface and on the device itself.  This ensures that outside
MPLS traffic does not leak in.</t>
      <t>Fail-open protocols are those that require explicit configuration in
order to ensure that they do not leak out of a domain, for example,
through the application of filters.  An example of a fail-open
protocol is SRv6 - in order to ensure that SRv6 traffic does not leak
out of a network, the operator must explicitly filter this traffic,
and, in order to ensure that SRv6 traffic does not leak in, the
operator must explicitly filter SRv6 traffic.</t>
      <t>Fail-open protocols are inherently riskier than fail-closed
protocols, as they rely on perfect configuration of filters on all
interfaces at the boundary of a domain, and, if the filters are
removed for any reason (for example, during troubleshooting), there
is a risk of inbound or outbound leaks.  In addition, some devices or
interfaces may have limitations in the size and complexity of filters
that can be applied, and so adding new filter entries to limit leaks
of a new protocol may not be possible.</t>
      <t>Fail-closed protocols, on the other hand, do not require any explicit
filtering.  In order for the protocol to be accepted and processed
when received on an interface, the operator must explicitly enable
the protocol on that interface and on the device itself.  In
addition, there is less risk of operational mistakes, as it does not
rely on filters that may be limited in number and complexity.
Finally, fail-closed protocols do not require that operators of
networks outside of the limited domain implement filters to protect
their networks from the limited domain traffic.</t>
    </section>
    <section anchor="making-a-layer-3-type-limited-domain-protocol-fail-closed">
      <name>Making a layer-3 type limited-domain protocol fail-closed</name>
      <t>One way to make a limited-domain protocol fail-closed is to assign it a unique
layer-2 protocol identifier, usually an EtherType. This mechanism is used by
MPLS.  In modern router and hosts, if such a protocol identifier is not enabled
on an interface, then the Ethernet chipset will ignore the frame, and the node
will not see or process it. Thus, it is necessary to specifically enable the
layer-2 protocol identifier on all relevant interfaces inside the limited
domain, and the protocol will be blocked at the domain boundary where the
protocol has not been so enabled. This is a simple and effective mechanism to
ensure that the protocol does not leak out of the limited domain if and when an
operator makes a mistake in configuring filters based on identifiers appearing
deeper in the frame such as IP addresses or IP protocol or header options.</t>
      <t>This layer-2 protocol identifier technique only works for transport-type
limited domain protocols (i.e., protocols running at layer 3).  Higher layer
protocols cannot necessarily be protected in this way, and so cryptographically
enforced mechanisms may need to be used instead (e.g., as done used by ANIMA in
<xref target="RFC8994"/> and <xref target="RFC8995"/>).</t>
    </section>
    <section anchor="ethernet-protocol-identification">
      <name>Ethernet Protocol Identification</name>
      <t>Figure 1 shows the general format of Ethernet frames. The relevant protocol
identification field occurs after the destination and source MAC addresses and
any tags (such a VLAN tags). The alternatives for protocol identification are
discussed in Section 3 of <xref target="RFC9542"/>.</t>
      <figure anchor="fig1">
        <name>Ethernet Frame Format</name>
        <artwork><![CDATA[
+-----------+-----------+- - - - +----------+--------- - - -+-------+
|Destination|  Source   |Optional| Protocol |  Body of      |Trailer|
|MAC Address|MAC Address|  Tags  |Identifier|   Frame        |       |
+-----------+-----------+ - - - -+----------+--------- - - -+-------|
]]></artwork>
      </figure>
      <t>This document considers EtherType protocol identification. An EtherType is an
unsigned 16-bit field in an Ethernet frame with a value in the range of 0x0600
to 0xFFFF, and so it is a somewhat limited resource; however, there exists a
special Extended EtherType (0x88B7) that can be suffixed by an Organizationally
Unique Identifier (OUI) followed by a further 16-bits identifying the protocol
relative to that OUI as discussed in Section 3 of <xref target="RFC9542"/>. These alternatives
of a direct EtherType or use of the Extended EtherType for the case of the IANA
OUI are illustrated in Figure 2. The following subsections discuss the factors
which may influence the choice between these alternatives when use of such
layer 2 protocol identification, to make the isolation of a limited domain more
robust, is warranted.</t>
      <figure anchor="fig2">
        <name>EtherType Based Protocol Identification</name>
        <artwork><![CDATA[
  01234567 01234567
+--------+--------+
|    EtherType    |
+--------+--------+
Specific EtherType

  01234567 01234567 01234567 01234567 01234567 01234567 01234567
+--------+--------+--------+--------+--------+--------+--------+
|  0x88  |  0xB7  |  0x00  |  0x00  |  0x5E  | Protocol Number |
+--------+--------+--------+--------+--------+--------+--------+
Extended EtherType|         IANA OUI         |IANA Protocol Number
]]></artwork>
      </figure>
      <t>Because specific EtherTypes are a limited resource, an Extended EtherType
<bcp14>SHOULD</bcp14> be used unless there is a strong reason why it will not work
satisfactorily and a specific EtherType is required.</t>
      <section anchor="extended-ethertype-protocol-identification">
        <name>Extended EtherType Protocol Identification</name>
        <t>The main advantage of using an Extended EtherType with an IANA Protocol Number,
as shown in Figure 2, is that such a number can be allocated by IANA with
Expert Review based on an Internet Draft and is thus relatively easy to
obtain. The main disadvantage is that the protocol identification is 5 bytes
longer than a specific dedicated EtherType.</t>
      </section>
      <section anchor="specific-ethertype-protocol-identification">
        <name>Specific EtherType Protocol Identification</name>
        <t>The primary disadvantage of using a specific EtherType, as opposed to an
Extended EtherType, is that assignment of such an EtherType is significantly
more difficult than assignment of an Extended EtherType IANA protocol number.
As discussed in <xref target="RFC9542"/>, a specific EtherType can only be assigned by the
IEEE Registration Authority under the following policy: "Since EtherTypes are a
fairly scarce resource, the IEEE RAC has let us know that they will not assign
a new EtherType to a new IETF protocol specification until the IESG has
approved the protocol specification for publication as an RFC.  In exceptional
cases, the IEEE RA is willing to consider "early allocation" of an EtherType
for an IETF protocol that is still under development as long as the request
comes from and has been vetted by the IESG." (<xref target="RFC9542"/> Appendix B.1, citing
<xref target="IESG_EtherType"/>)</t>
        <t>During development and testing, a protocol can use a "Local Experimental
Ethertype" (0x88b5 and 0x88b6 - <xref target="IANA_EtherType"/>).  Once the protocol is
approved for publication, the IESG can request an EtherType from the IEEE.
However, there is always a risk of some implementation using a Local
Experimental EtherType not getting updated causing conflicts with a later
different use of that experimental EtherType.</t>
        <t>The primary advantage of using a specific EtherType is the saving of 5 bytes
relative to the use of the Extended EtherType with a protocol number under the
IANA OUI.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Protocols are designated as "limited domain" because something unexpected might
happen if they leak outside of a domain with unified management. For example,
VLAN or VPN or overlay identifiers may be misinterpreted resulting in the
delivery of data to or the acceptance of data from unauthorized network nodes
violating intended security constraints. The use of a layer-2 protocol
identifier to provide a "fail closed" barrier at the domain border can
significantly improve security by eliminating the opportunity for such
misinterpretation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the architecture for Multiprotocol Label Switching (MPLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="RFC9378">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Deployment</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="D. Bernier" initials="D." surname="Bernier"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document provides a framework for IOAM deployment and provides IOAM deployment considerations and guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9378"/>
          <seriesInfo name="DOI" value="10.17487/RFC9378"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="IESG_EtherType">
          <front>
            <title>IESG Statement on EtherTypes</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="May" day="01"/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.ietf.org/about/groups/iesg/statements/ethertypes&gt;"/>
        </reference>
        <reference anchor="IANA_EtherType">
          <front>
            <title>IANA EtherType Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml#ieee-802-numbers-1&gt;"/>
        </reference>
      </references>
    </references>
    <?line 301?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much thanks to Brian Carpenter, for his review and comments.</t>
      <t>Also much thanks to Deborah Brungard, for her review and comments.</t>
      <t>Also much thanks to everyone else with whom we have discussed this topic; I've
had numerous discussions with many many people on this, and I'm sure that I've
forgotten some of them. Apologies if you were one of them.</t>
    </section>
    <section numbered="false" anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>01-02:
          </t>
          <ul spacing="normal">
            <li>
              <t>Add Donald Eastlake as an author.</t>
            </li>
            <li>
              <t>Substantial re-write and expansion of material concerning specific and Extended EtherType protocol identification.</t>
            </li>
            <li>
              <t>Add initial Security Considerations text.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>00-01:
          </t>
          <ul spacing="normal">
            <li>
              <t>Deborah pointed out that "this only works for transport-type limited domain
protocols (e.g., SRv6)" could be read as SRv6 fails-closed.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
