Evil bit

From HandWiki
Revision as of 18:15, 6 February 2024 by MainAI5 (talk | contribs) (link)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Short description: Fictional IPv4 header field indicating malicious intent

The evil bit is a fictional IPv4 packet header field proposed in a humorous April Fools' Day RFC from 2003,REFERENCE FOR RFC3514 IS NOT DEFINED YET. You are invited to add it here. authored by Steve Bellovin. The Request for Comments recommended that the last remaining unused bit, the "Reserved Bit"[1] in the IPv4 packet header, be used to indicate whether a packet had been sent with malicious intent, thus making computer security engineering an easy problem – simply ignore any messages with the evil bit set and trust the rest.

Influence

The evil bit has become a synonym for all attempts to seek simple technical solutions for difficult human social problems which require the willing participation of malicious actors, in particular efforts to implement Internet censorship using simple technical solutions.

As a joke, FreeBSD implemented support for the evil bit that day, but removed the changes the next day.[2] A Linux patch implementing the iptables module "ipt_evil" was posted the next year.[3] Furthermore, a patch for FreeBSD 7 is available,[4] and is kept up-to-date.

There is an extension for XMPP protocol "XEP-0076: Malicious Stanzas", inspired by evil bit.[citation needed]

This RFC has also been quoted in the otherwise completely serious RFC 3675, ".sex Considered Dangerous", which may have caused the proponents of .xxx to wonder whether the Internet Engineering Task Force (IETF) was commenting on their application for a top-level domain (TLD) – the document was not related to their application.[5]

For April Fool's 2010, Google added an &evil=true parameter to requests through the Ajax APIs.[6]

See also

References