Nytro Posted February 18, 2013 Report Posted February 18, 2013 Security Assessmentof the Internet ProtocolTable of Contents1. Preface ...................................................................................................................................... 31 .1 Introduction ...................................................................................................................... 31 .2 Scope of this document ................................................................................................... 41 .3 Organization of this document .......................................................................................... 41 .4 Typographical conventions ............................................................................................... 51 .5 Getting the latest version of this document........................................................................ 51 .6 Advice and guidance to vendors....................................................................................... 51 .5 Acknowledgements .......................................................................................................... 52. The Internet Protocol ............................................................................................................... 63. Internet Protocol header fields ............................................................................................... 73.1 Version.............................................................................................................................. 73.2 IHL (Internet Header Length)............................................................................................. 83.3 TOS.................................................................................................................................. 83.4 Total Length...................................................................................................................... 93.5 Identification (ID).............................................................................................................. 103.5.1 Some workarounds implemented by the industry......................................................... 103.5.2 Possible security improvements................................................................................... 113.6 Flags............................................................................................................................... 133.7 Fragment Offset.............................................................................................................. 143.8 Time to Live (TTL)............................................................................................................ 153.9 Protocol.......................................................................................................................... 193.10 Header Checksum........................................................................................................ 193.11 Source Address............................................................................................................ 193.12 Destination Address...................................................................................................... 203.13 Options......................................................................................................................... 203.13.1 General issues with IP options.................................................................................... 213.13.1.1 Processing requirements......................................................................................... 213.13.1.2 Processing of the options by the upper layer protocol............................................. 223.13.1.3 General sanity checks on IP options........................................................................ 223.13.2 Issues with specific options........................................................................................ 233.13.2.1 End of Option List (Type = 0)................................................................................... 233.13.2.2 No Operation (Type = 1).......................................................................................... 243.13.2.3 Loose Source Record Route (LSRR) (Type = 131)................................................... 24Security Assessment of the Internet Protocol3.13.2.4 Strict Source and Record Route (SSRR) (Type = 137).............................................. 263.13.2.5 Record Route (Type = 7).......................................................................................... 293.13.2.6 Stream Identifier (Type = 136).................................................................................. 313.13.2.7 Internet Timestamp (Type = 68)............................................................................... 313.13.2.8 Router Alert (Type = 148)......................................................................................... 343.13.2.9 Probe MTU (Type =11)............................................................................................ 343.13.2.10 Reply MTU (Type = 12).......................................................................................... 343.13.2.11 Traceroute (Type = 82)........................................................................................... 353.13.2.12 DoD Basic Security Option (Type = 130)................................................................ 353.13.2.13 DoD Extended Security Option (Type = 133).......................................................... 363.13.2.14 Commercial IP Security Option (CIPSO)................................................................. 363.13.2.15 Sender Directed Multi-Destination Delivery (Type = 149)........................................ 373.14 Differentiated Services field ........................................................................................... 373.15 Explicit Congestion Notification (ECN) .......................................................................... 384. Internet Protocol Mechanisms .............................................................................................. 404.1 Fragment reassembly ..................................................................................................... 404.1.1 Problems related with memory allocation ..................................................................... 414.1.2 Problems that arise from the length of the IP Identification field .................................... 424.1.3 Problems that arise from the complexity of the reassembly algorithm .......................... 434.1.4 Problems that arise from the ambiguity of the reassembly process .............................. 434.1.5 Problems that arise from the size of the IP fragments .................................................. 444.1.6 Possible security improvements .................................................................................. 454.2 Forwarding ..................................................................................................................... 494.2.1 Precedence-ordered queue service ............................................................................. 494.2.2 Weak Type of Service .................................................................................................. 504.2.3 Address Resolution ..................................................................................................... 514.2.4 Dropping packets ........................................................................................................ 514.3 Addressing ..................................................................................................................... 524.3.1 Unreachable addresses ............................................................................................... 524.3.2 Private address space ................................................................................................. 524.3.3 Class D addresses (224/4 address block) .................................................................... 524.3.4 Class E addresses (240/4 address block) .................................................................... 524.3.5 Broadcast and multicast addresses, and connection-oriented protocols ..................... 534.3.6 Broadcast and network addresses .............................................................................. 534.3.7 Special Internet addresses .......................................................................................... 535. References .............................................................................................................................. 56Download:http://www.si6networks.com/publications/InternetProtocol.pdf Quote