<?xml version="1.0" encoding="iso-8859-1" ?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">

<rfc ipr="trust200902"
     docName="draft-ietf-grow-no-more-unallocated-slash8s-04"
     category="bcp">

<?rfc toc="yes"?> 
<?rfc symrefs="yes"?> 
<?rfc autobreaks="yes"?>
<?rfc tocindent="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<front>

<title abbrev="Remove /8 Filters">Time to Remove Filters for Previously Unallocated IPv4 /8s</title>

    <author initials="L." surname="Vegoda" fullname="Leo Vegoda">
           <organization abbrev="ICANN">
                        Internet Corporation for Assigned Names and Numbers
                </organization>
                <address>
                        <postal>
                                <street>4676 Admiralty Way, Suite 330</street>
                                <code>90292</code> <city>Marina del Rey, CA</city>
                                <country>United States of America</country>
                        </postal>
                        <phone>+1-310-823-9358</phone>
                        <email>leo.vegoda@icann.org</email>
                        <uri>
                                http://www.iana.org/
                        </uri>
                </address>
        </author>

<date month="October" year="2011" />

<keyword>bogons</keyword>
<keyword>IPv4</keyword>
<keyword>martians</keyword>
<keyword>filters</keyword>

<abstract>

<t>
   
It has been common for network administrators to filter IP traffic from 
and BGP prefixes of unallocated IPv4 address space. Now that there are no 
longer any unallocated IPv4 /8s, this practise is more complicated, fragile 
and expensive. Network administrators are advised to remove filters 
based on the registration status of the address space.

</t>

<t>

This document explains why any remaining packet and BGP prefix filters for 
unallocated IPv4 /8s should now be removed on border routers and documents 
those IPv4 unicast prefixes that should not be routed across the public Internet.
   
</t>

</abstract>

</front>

<middle>

<section anchor="intro" title="Introduction">

<t>
      
It has been common for network administrators to filter IP traffic from 
and BGP prefixes of unallocated IPv4 address space. Now that there are no 
longer any unallocated IPv4 /8s, this practise is more complicated, fragile 
and expensive. Network administrators are advised to remove filters 
based on the registration status of the address space.
      
      
</t>
   
<t>
      
This document explains why any remaining packet and BGP prefix filters for 
unallocated IPv4 /8s should now be removed on border routers and documents 
those IPv4 unicast prefixes that should not be routed across the public Internet.
      
</t>

</section>

<section title="Terminology">
      
<t>
         
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", 
"SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be 
interpreted as described in BCP 14, RFC 2119 <xref target="RFC2119"/>.

</t>

<t>

Martians <xref target="RFC1208"/> is a humorous term applied to packets that turn up 
unexpectedly on the wrong network because of bogus routing entries.  
It is also used as a name for a packet which has an altogether bogus
(non-registered or ill-formed) Internet address.  Bogons <xref target="RFC3871"/> are 
packets sourced from addresses that have not yet been allocated by IANA 
or the Regional Internet Registries (RIRs), or addresses reserved for 
private or special use by RFCs <xref target="RFC5735"/>.Bogons are referred to as "Dark IP" 
in some circles.
. 

</t>

</section>

<section title="Traffic Filtering Options">

<section title="No Longer Filtering Based on Address Registration Status">

<t>

Network administrators who implemented filters for unallocated IPv4 /8s
did so in the knowledge that those /8s were not a legitimate source of 
traffic on the Internet and that there was a small number of bogon filters
to implement. Now that there are no longer any unallocated unicast IPv4 
/8s, there will be legitimate Internet traffic coming from all unicast /8s 
that are not reserved for special purposes in an RFC.

</t>

<t>

Removing packet and prefix filters based on the registration status of the 
IPv4 address is a simple approach that will avoid blocking legitimate Internet
traffic.  Network operators SHOULD remove both ingress and egress packet filters 
as well as BGP prefix filters for previously unallocated IPv4 /8s.
   
</t>
   
</section>

<section title="Continuing to Filter Traffic from Unallocated IPv4 Space">

<t>
      
Some network administrators might want to continue filtering unallocated IPv4 
addresses managed by the RIRs. This requires significantly more granular 
ingress filters and the highly dynamic nature of the RIRs' address pools means 
that filters need to be updated on a daily basis to avoid blocking legitimate 
incoming traffic.
      
</t>
 
</section>
</section>
   
<section title="Prefixes That Should Not be Routed Across the Internet">

<t> 
   
Network operators who only wish to filter traffic originating from addresses that
should never be routed across the Internet, Martians, can deploy a set of packet and 
prefix filters designed to block traffic from address blocks reserved for special 
purposes. These are:

   <list>
      
      <t> - 0.0.0.0/8 (Local identification) <xref target="RFC1122"/>;</t>
      <t> - 10.0.0.0/8 (Private use) <xref target="RFC1918"/>;</t>
      <t> - 127.0.0.0/8 (Loopback) <xref target="RFC1122"/>; </t>
      <t> - 169.254.0.0/16 (Link local) <xref target="RFC3927"/>; </t>
      <t> - 172.16.0.0/12 (Private use) <xref target="RFC1918"/>;</t>
      <t> - 192.0.2.0/24 (TEST-NET-1) <xref target="RFC5737"/>; </t>
      <t> - 192.168.0.0/16 (Private use) <xref target="RFC1918"/>; </t>
      <t> - 198.18.0.0/15 (Benchmark testing) <xref target="RFC2544"/>;</t>
      <t> - 198.51.100.0/24 (TEST-NET-2) <xref target="RFC5737"/>;</t>
      <t> - 203.0.113.0/24 (TEST-NET-3) <xref target="RFC5737"/>;</t>
      <t> - 224.0.0.0/4 (Multicast) <xref target="RFC5771"/>; and</t>
      <t> - 240.0.0.0/4 (Future use) <xref target="RFC1112"/>.</t>
   </list>
   
</t>

<t>
   
A full set of special use IPv4 addresses can be found in <xref target="RFC5735"/>. It
includes prefixes that are intended for Internet use.
   
</t>

</section>
   
<section title='Security Considerations'>

   <t>
      
The cessation of filters based on unallocated IPv4 /8 allocations is an
evolutionary step towards reasonable security filters.  While these
filters are no longer necessary, and in fact harmful, this does not
obviate the need to continue other security solutions.  These other
solutions are as necessary today as they ever were.
   
   </t>

</section>

<section title="IANA Considerations">

   <t>
   
This document makes no request of IANA.   
   
   </t>

</section>

</middle>
   
<back>

<references title="Normative References">

   <?rfc include="reference.RFC.1112.xml"?>
   <?rfc include="reference.RFC.1122.xml"?>
   <?rfc include="reference.RFC.1918.xml"?>
   <?rfc include="reference.RFC.2119.xml"?>
   <?rfc include="reference.RFC.3927.xml"?>
   <?rfc include="reference.RFC.5735.xml"?>
   <?rfc include="reference.RFC.5771.xml"?>

</references>
   
<references title="Informative References">
      
      <?rfc include="reference.RFC.1208.xml"?>
      <?rfc include="reference.RFC.2544.xml"?>
      <?rfc include="reference.RFC.3871.xml"?>   
      <?rfc include="reference.RFC.5737.xml"?>
      
</references>   

<section title="Acknowledgments">

<t>
   
Thanks are owed to Kim Davies, Terry Manderson, Dave Piscitello and Joe
Abley for helpful advice on how to focus this document. Thanks also go
to Andy Davidson, Philip Smith and Rob Thomas for early reviews and
suggestions for improvements to the text and Carlos Pignataro for his
support and comments.

</t>

</section>

</back>
</rfc>