| < draft-ietf-intarea-server-logging-recommendations-03.txt | draft-ietf-intarea-server-logging-recommendations-04.txt > | |||
|---|---|---|---|---|
| Internet Engineering Task Force A. Durand | Internet Engineering Task Force A. Durand | |||
| Internet-Draft Juniper Networks | Internet-Draft Juniper Networks | |||
| Intended status: BCP I. Gashinsky | Intended status: BCP I. Gashinsky | |||
| Expires: August 29, 2011 Yahoo! Inc. | Expires: October 21, 2011 Yahoo! Inc. | |||
| D. Lee | D. Lee | |||
| Facebook, Inc. | Facebook, Inc. | |||
| S. Sheppard | S. Sheppard | |||
| ATT Labs | ATT Labs | |||
| February 25, 2011 | April 19, 2011 | |||
| Logging recommendations for Internet facing servers | Logging recommendations for Internet facing servers | |||
| draft-ietf-intarea-server-logging-recommendations-03 | draft-ietf-intarea-server-logging-recommendations-04 | |||
| Abstract | Abstract | |||
| In the wake of IPv4 exhaustion and deployment of IP address sharing | In the wake of IPv4 exhaustion and deployment of IP address sharing | |||
| techniques, this document recommends that Internet facing servers log | techniques, this document recommends that Internet facing servers log | |||
| port number and accurate timestamps in addition to the incoming IP | port number and accurate timestamps in addition to the incoming IP | |||
| address. | address. | |||
| Status of this Memo | Status of this Memo | |||
| skipping to change at page 1, line 38 ¶ | skipping to change at page 1, line 38 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on August 29, 2011. | This Internet-Draft will expire on October 21, 2011. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2011 IETF Trust and the persons identified as the | Copyright (c) 2011 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 14 ¶ | skipping to change at page 2, line 14 ¶ | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. ISP Considerations . . . . . . . . . . . . . . . . . . . . . . 4 | 3. ISP Considerations . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 4 | 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . . 5 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . . 5 | |||
| 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 6.1. Normative references . . . . . . . . . . . . . . . . . . . 5 | 6.1. Normative references . . . . . . . . . . . . . . . . . . . 5 | |||
| 6.2. Informative references . . . . . . . . . . . . . . . . . . 5 | 6.2. Informative references . . . . . . . . . . . . . . . . . . 5 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 5 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 1. Introduction | 1. Introduction | |||
| The global IPv4 address free pool at IANA has exhausted in February | The global IPv4 address free pool at IANA was exhausted in February | |||
| 2011. Service providers will now have a hard time finding enough | 2011. Service providers will now have a hard time finding enough | |||
| IPv4 global addresses to sustain product and subscriber growth. Due | IPv4 global addresses to sustain product and subscriber growth. Due | |||
| to the huge global existing infrastructure, both hardware and | to the huge global existing infrastructure, both hardware and | |||
| software, vendors and service providers must continue to support IPv4 | software, vendors and service providers must continue to support IPv4 | |||
| technologies for the foreseeable future. As legacy applications and | technologies for the foreseeable future. As legacy applications and | |||
| hardware are retired the reliance on IPv4 will diminish but this is a | hardware are retired the reliance on IPv4 will diminish but this is a | |||
| years long perhaps decades long process. | years long perhaps decades long process. | |||
| To maintain legacy IPv4 address support, service providers will have | To maintain legacy IPv4 address support, service providers will have | |||
| little choice but to share IPv4 global addresses among multiple | little choice but to share IPv4 global addresses among multiple | |||
| customers. Techniques to do so are outside of the scope of this | customers. Techniques to do so are outside of the scope of this | |||
| documents. All include some form of address translation/address | document. All include some form of address translation/address | |||
| sharing, being NAT44, NAT64 or DS-Lite. | sharing, being NAT44 [RFC3022], NAT64 | |||
| [I-D.ietf-behave-v6v4-xlate-stateful] or DS-Lite | ||||
| [I-D.ietf-softwire-dual-stack-lite]. | ||||
| The effects on the Internet of the introduction of those address | The effects on the Internet of the introduction of those address | |||
| sharing techniques have been documented in | sharing techniques have been documented in | |||
| [I-D.ietf-intarea-shared-addressing-issues]. | [I-D.ietf-intarea-shared-addressing-issues]. | |||
| Address sharing techniques come with their own logging infrastructure | Address sharing techniques come with their own logging infrastructure | |||
| to track the relation between which original IP address and source | to track the relation between which original IP address and source | |||
| port(s) were associated with which user and external IPv4 address at | port(s) were associated with which user and external IPv4 address at | |||
| any given point in time. In the past to support abuse mitigation or | any given point in time. In the past to support abuse mitigation or | |||
| public safety requests, the knowledge of the external global IP | public safety requests, the knowledge of the external global IP | |||
| skipping to change at page 3, line 49 ¶ | skipping to change at page 3, line 51 ¶ | |||
| recommendations about logging on carrier-grade NAT or other address | recommendations about logging on carrier-grade NAT or other address | |||
| sharing tools. | sharing tools. | |||
| 2. Recommendations | 2. Recommendations | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119 [RFC2119]. | document are to be interpreted as described in RFC 2119 [RFC2119]. | |||
| It is RECOMMENDED as best current practice that Internet facing | It is RECOMMENDED as best current practice that Internet facing | |||
| servers logging incoming IP addresses also log: | servers logging incoming IP addresses from inbound IP traffic also | |||
| log: | ||||
| o The source port number. | o The source port number. | |||
| o A timestamp, RECOMMENDED in UTC, accurate to the second, from a | o A timestamp, RECOMMENDED in UTC, accurate to the second, from a | |||
| traceable time source (e.g. NTP). | traceable time source (e.g., NTP [RFC5905]). | |||
| o The transport protocol (usually TCP or UDP) and destination port | o The transport protocol (usually TCP or UDP) and destination port | |||
| number, when the server application is defined to use multiple | number, when the server application is defined to use multiple | |||
| transports or multiple ports. | transports or multiple ports. | |||
| Discussion: Carrier-grade NATs may have different policies to recycle | Discussion: Carrier-grade NATs may have different policies to recycle | |||
| ports, some implementations may decide to reuse ports almost | ports, some implementations may decide to reuse ports almost | |||
| immediately, some may wait several minutes before marking the port | immediately, some may wait several minutes before marking the port | |||
| ready for reuse. As a result, servers have no idea how fast the | ready for reuse. As a result, servers have no idea how fast the | |||
| ports will be reused and, thus, should log timestamps using a | ports will be reused and, thus, should log timestamps using a | |||
| reasonably accurate clock. At this point the RECOMMENDED accuracy | reasonably accurate clock. At this point the RECOMMENDED accuracy | |||
| for timestamps is to the second or better. Representation of | for timestamps is to the second or better. Representation of | |||
| timestamps in UTC is preffered to localtime with UTC-offset or time | timestamps in UTC is prefered to localtime with UTC-offset or time | |||
| zone as this extra information can be lost in the reporting chain. | zone as this extra information can be lost in the reporting chain. | |||
| Examples of Internet facing servers include, but are not limited to, | Examples of Internet facing servers include, but are not limited to, | |||
| web servers and email servers. | web servers and email servers. | |||
| Although the deployment of address sharing techniques is not foreseen | Although the deployment of address sharing techniques is not foreseen | |||
| in IPv6, the above recommendations apply to both IPv4 and IPv6, if | in IPv6, the above recommendations apply to both IPv4 and IPv6, if | |||
| only for consistency and code simplification reasons. | only for consistency and code simplification reasons. | |||
| Discussions about data retention policies are out of scope for this | Discussions about data retention policies are out of scope for this | |||
| document. | document. Server security and transport security is important for | |||
| the protection of logs for Internet facing systems. The operator of | ||||
| the Internet facing server must consider the risks, including the | ||||
| data and services on the server to determine the appropriate | ||||
| measures. The protection of logs is critical in incident | ||||
| investigations. If logs are tampered with, evidence could be | ||||
| destroyed. | ||||
| The above recommendations also applies to devices such as load- | The above recommendations also apply to devices such as load- | |||
| balancers logging incoming connections on behalf of actual servers. | balancers logging incoming connections on behalf of actual servers. | |||
| The above recommendations apply to current logging practices. They | ||||
| do not require any changes in the way logging is performed; e.g., | ||||
| which packets are examined and logged. | ||||
| 3. ISP Considerations | 3. ISP Considerations | |||
| ISP deploying IP address sharing techniques should also deploy a | ISP deploying IP address sharing techniques should also deploy a | |||
| corresponding logging architecture to maintain records of the | corresponding logging architecture to maintain records of the | |||
| relation between a customer's identity and IP/port resources | relation between a customer's identity and IP/port resources | |||
| utilized. However, recommendations on this topic are out of scope | utilized. However, recommendations on this topic are out of scope | |||
| for this document. | for this document. | |||
| 4. IANA Considerations | 4. IANA Considerations | |||
| skipping to change at page 5, line 21 ¶ | skipping to change at page 5, line 29 ¶ | |||
| 6. References | 6. References | |||
| 6.1. Normative references | 6.1. Normative references | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| 6.2. Informative references | 6.2. Informative references | |||
| [I-D.ietf-behave-v6v4-xlate-stateful] | ||||
| Bagnulo, M., Matthews, P., and I. Beijnum, "Stateful | ||||
| NAT64: Network Address and Protocol Translation from IPv6 | ||||
| Clients to IPv4 Servers", | ||||
| draft-ietf-behave-v6v4-xlate-stateful-12 (work in | ||||
| progress), July 2010. | ||||
| [I-D.ietf-intarea-shared-addressing-issues] | [I-D.ietf-intarea-shared-addressing-issues] | |||
| Ford, M., Boucadair, M., Durand, A., Levis, P., and P. | Ford, M., Boucadair, M., Durand, A., Levis, P., and P. | |||
| Roberts, "Issues with IP Address Sharing", | Roberts, "Issues with IP Address Sharing", | |||
| draft-ietf-intarea-shared-addressing-issues-04 (work in | draft-ietf-intarea-shared-addressing-issues-05 (work in | |||
| progress), February 2011. | progress), March 2011. | |||
| [I-D.ietf-softwire-dual-stack-lite] | ||||
| Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Dual- | ||||
| Stack Lite Broadband Deployments Following IPv4 | ||||
| Exhaustion", draft-ietf-softwire-dual-stack-lite-07 (work | ||||
| in progress), March 2011. | ||||
| [RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network | ||||
| Address Translator (Traditional NAT)", RFC 3022, | ||||
| January 2001. | ||||
| [RFC5905] Mills, D., Martin, J., Burbank, J., and W. Kasch, "Network | ||||
| Time Protocol Version 4: Protocol and Algorithms | ||||
| Specification", RFC 5905, June 2010. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Alain Durand | Alain Durand | |||
| Juniper Networks | Juniper Networks | |||
| 1194 North Mathilda Avenue | 1194 North Mathilda Avenue | |||
| Sunnyvale, CA 94089-1206 | Sunnyvale, CA 94089-1206 | |||
| USA | USA | |||
| Email: adurand@juniper.net | Email: adurand@juniper.net | |||
| End of changes. 16 change blocks. | ||||
| 16 lines changed or deleted | 50 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||