<?xml version='1.0' encoding='ascii'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>
<rfc ipr="trust200902" docName="draft-jia-intarea-internet-addressing-gap-analysis-00" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en">

  <front>
    <title abbrev="Gap Analysis in Internet Addressing">Gap Analysis in Internet Addressing</title>

    <author initials="Y." surname="Jia" fullname="Yihao Jia">
      <organization abbrev="Huawei">Huawei Technologies Co., Ltd</organization>
      <address>
        <postal>
          <street>156 Beiqing Rd.</street>
          <city>Beijing</city>
          <code>100095</code>
          <country>P.R. China</country>
        </postal>
        <email>jiayihao@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization abbrev="Huawei">Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25C</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>dirk.trossen@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization abbrev="Huawei">Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>luigi.iannone@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Shenoy" fullname="Nirmala Shenoy">
      <organization abbrev="R.I.T.">Rochester Institute of Technology</organization>
      <address>
        <postal>
          <street/>
          <city>New-York</city>
          <code>14623</code>
          <country>USA</country>
        </postal>
        <email>nxsvks@rit.edu</email>
      </address>
    </author>
    <author initials="P." surname="Mendes" fullname="Paulo Mendes">
      <organization abbrev="Airbus">Airbus</organization>
      <address>
        <postal>
          <street>Willy-Messerschmitt Strasse 1</street>
          <city>Munich</city>
          <code>81663</code>
          <country>Germany</country>
        </postal>
        <email>paulo.mendes@airbus.com</email>
      </address>
    </author>

    <date/>

    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>There exist many extensions to Internet addressing, as it is defined in <xref target="RFC0791" pageno="false" format="default"/> for IPv4 and <xref target="RFC8200" pageno="false" format="default"/> for IPv6, respectively. Those extensions have been developed to fill gaps in capabilities beyond the basic properties of Internet addressing. This document outlines those properties as a baseline against which the extensions are categorized in terms of methodology used to fill the gap together with examples of solutions doing so.</t>

<t>While introducing such extensions, we outline the issues we see with those extensions. This ultimately leads to consider whether or not a more consistent approach to tackling the identified gaps, beyond point-wise extensions as done so far, would be beneficial. The benefits are the ones detailed in the companion document <xref target="I-D.jia-intarea-scenarios-problems-addressing" pageno="false" format="default"/>, where, leveraging on the gaps identified in this memo and scenarios provided in <xref target="I-D.jia-intarea-scenarios-problems-addressing" pageno="false" format="default"/>, a clear problem statement is provided.</t>



    </abstract>


  </front>

  <middle>


<section anchor="SEC:intro" title="Introduction" numbered="true" toc="default">

<t><xref target="I-D.jia-intarea-scenarios-problems-addressing" pageno="false" format="default"/> outlines scenarios and problems in Internet addressing through presenting a number of cases of communication that have emerged over the many years of utilizing the Internet and for which various extensions to the network interface-centric addressing of IPv6 have been developed. In order to continue the discussion on the emerging needs for addressing, initiated with <xref target="I-D.jia-intarea-scenarios-problems-addressing" pageno="false" format="default"/>, this memo aims at identifying gaps between the Internet addressing model and desirable features that have been added by various extensions, in various contexts.</t>

<t>Our approach to identifying the gaps is guided by key properties of Internet addressing, outlined in <xref target="SEC:properties" pageno="false" format="default"/>, namely (i) the fixed length of the IP addresses, (ii) the ambiguity of IP addresses semantic, while still (iii) providing limited IP address semantic support only. We derive those properties directly as a consequence of the respective standards that provide the basis for Internet addressing, most notably <xref target="RFC0791" pageno="false" format="default"/> for IPv4 and <xref target="RFC8200" pageno="false" format="default"/> for IPv6, respectively.</t>

<t>Those basic properties, and the potential issues that arise from those properties, give way to extensions that have been proposed over the course of deploying new Internet technologies. <xref target="SEC:extensions" pageno="false" format="default"/> discusses those extensions, summarized as gaps against the basic properties in <xref target="SEC:overview" pageno="false" format="default"/>.</t>

<t>Finally, we outline issues that arise with the extension-driven approach to the basic Internet addressing, discussed in <xref target="SEC:issues" pageno="false" format="default"/>. We argue that any requirements for solutions that would revise the basic Internet addressing would require to address those issues.</t>

</section>
<section anchor="SEC:properties" title="Properties of Internet Addressing" numbered="true" toc="default">

<t>As the Internet Protocol adoption has grown towards the global communication system we know today, its characteristics have evolved subtly, with <xref target="RFC6250" pageno="false" format="default"/> documenting various aspects of the IP service model and its frequent misconceptions, including Internet addressing. In this section, we articulate the three most acknowledged properties related to <spanx style="emph" xml:space="preserve">Internet addressing</spanx>. Those are (i) fixed IP address length, (ii) ambiguous IP address semantic, and (iii) limited IP address semantic support.</t>

<t>In <xref target="SEC:extensions" pageno="false" format="default"/>, we elaborate on various extensions that aim to expand Internet addressing beyond those properties; we position those extensions as intentions to close perceived gaps against those key properties.</t>

<section anchor="SEC:properties:1" title="Property 1: Fixed Address Length" numbered="true" toc="default">

<t>The fixed IP address length is specified as a key property of the design of Internet addressing, with 32 bits for IPv4 (<xref target="RFC0791" pageno="false" format="default"/>), and 128 bits for IPv6 (<xref target="RFC8200" pageno="false" format="default"/>), respectively. Given the capability of the hardware at the time of IPv4 design, a fixed length address was considered as a more appropriate choice for efficient packet forwarding. Although the address length was once considered to be variable during the design of Internet Protocol Next Generation (&#8220;IPng&#8221;, cf., <xref target="RFC1752" pageno="false" format="default"/>) in 1990s, it finally inherited the design of IPv4 and adopted a fixed length address towards the current IPv6. As a consequence, the 128-bit fixed address length of IPv6 is regarded as a balance between fast forwarding (i.e., fixed length) and practically boundless cyberspace (128-bit length).</t>

</section>
<section anchor="SEC:properties:2" title="Property 2: Ambiguous Address Semantic" numbered="true" toc="default">

<t>Initially, the meaning of an IP address has been to identify an interface on a network device, although, when <xref target="RFC0791" pageno="false" format="default"/> was written, there were no explicit definitions of the IP address semantic.</t>

<t>With the global expansion of the Internet protocol, the semantic of the IP address is commonly believed to contain at least two notions, i.e., the explicit &#8220;locator&#8221;, and the implicit &#8220;identifier&#8221;. Because of the increasing use of IP addresses to both identify a node and to indicate the physical or virtual location of the node, the intertwined address semantics of identifier and locator was then gradually observed and first documented in <xref target="RFC2101" pageno="false" format="default"/> as &#8220;locator/identifier overload&#8221; property. With this, the IP address is used as an identification for host and server, very often directly used, e.g., for remote access or maintenance.</t>

</section>
<section anchor="SEC:properties:3" title="Property 3: Limited Address Semantic Support" numbered="true" toc="default">

<t>Although IPv4 <xref target="RFC0791" pageno="false" format="default"/> did not add any semantic to IP addresses beyond interface identification (and location), time has proven that additional semantics are desirable (c.f., the history of 127/8 <xref target="HISTORY127" pageno="false" format="default"/> or the introduction of private addresses <xref target="RFC1918" pageno="false" format="default"/>), hence, IPv6 <xref target="RFC4291" pageno="false" format="default"/> introduced some form of additional semantics based on specific prefix values, for instance link-local addresses or a more structured multicast addressing. Nevertheless, systematic support for rich address semantics remains limited and basically prefix-based.</t>

</section>
</section>
<section anchor="SEC:extensions" title="Filling Gaps through Extensions to Internet Addressing Properties" numbered="true" toc="default">

<t>Over the years, a plethora of extensions has been proposed in order to move beyond the native properties of IP addresses. We interpret the development of those extensions as filling gaps between the original properties of Internet addressing, outlined in the previous section, and desired new capabilities that those developing the extensions identified as being needed and desirable.</t>

<section anchor="length-extensions" title="Length Extensions" numbered="true" toc="default">

<t>Extensions in this subsection aim at extending the property described in <xref target="SEC:properties:1" pageno="false" format="default"/>, i.e., fixed IP address length.</t>

<t>When IPv6 was designed, the main objective was to create an address space that would not lead to the same situation as IPv4, namely to address exhaustion. To this end, while keeping the same addressing model like IPv4, IPv6 adopted a 128-bit address length with the aim of providing a sufficient and future-proof address space. The choice was also founded on the assumption that advances in hardware and Moore&#8217;s law would still allow to make routing and forwarding faster, and IPv6 routing table manageable.</t>

<t>We observe, however, that the rise of new use cases but also the number of new, e.g., industrial/home or small footprint devices, was possibly unforeseen. Sensor networks and more generally the Internet of Things (IoT) emerged after the core body of work in IPv6. Nevertheless, it was clear from the beginning that differently from IPv6 assumptions, 128-bit addresses were costly in certain scenarios.</t>

<t>At the same time, new use cases emerged, where addresses even bigger than 128-bit are useful, like in the context of content centric networks, structured addresses, or cryptographically generated addresses.</t>

<section anchor="shorter-address-length" title="Shorter Address Length" numbered="true" toc="default">

<section anchor="description" title="Description:" numbered="true" toc="default">

<t>In the context of IoT <xref target="RFC7228" pageno="false" format="default"/>, where bandwidth and energy are very scarce resources, the static length of 128-bit for an IP address is more a hindrance than a benefit since 128-bit for an IP address may occupy a lot of space, even to the point of being the dominant part of a packet. In order to use bandwidth more efficiently and use less energy in end-to-end communication, solutions have been proposed that allow for very small network layer headers instead.</t>

</section>
<section anchor="methodology" title="Methodology:" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">Header Compression/Translation</spanx>:
One of the main approaches to reduce header size in the IoT context is by header compression. Such technique is based on a stateful approach, utilizing what is usually called a &#8220;context&#8221; on the IoT sensor and the gateway for communications between an IoT device and a server placed somewhere in the Internet - from the edge to the cloud.</t>

<t>The role of the &#8220;context&#8221; is to provide a way to &#8220;compress&#8221; the original IP header in a smaller one, by using shorter address information and/or dropping some field, using the context as a kind of dictionary.</t>

<t><spanx style="strong" xml:space="preserve">Separate device from locator identifier</spanx>:
Approaches that can offer customized address length that is adequate for use in such constrained domains are preferred. Using different namespaces for the &#8216;device identifier&#8217; and the &#8216;routing&#8217; or &#8216;locator identifier&#8217; is one such approach.</t>

</section>
<section anchor="examples" title="Examples" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">Header Compression/Translation</spanx>:
Considering one base station is supposed to serve hundreds of user devices, maximizing the effectiveness for specific spectrum directly improve user quality of experience. To achieve the optimal utilization of the spectrum resource in wireless area, the RObust Header Compression (ROHC) <xref target="RFC5795" pageno="false" format="default"/> mechanism, which has been widely adopted in cellar network like WCDMA, LTE, and 5G, utilizes header compression to shrink existing IPv6 headers onto shorter ones.</t>

<t>Similarly, header compression techniques for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) have been around for several years now, constituting a main example of using the notion of a shared context in order to reduce the size of the network layer header (<xref target="RFC6282" pageno="false" format="default"/>, <xref target="RFC7400" pageno="false" format="default"/>, <xref target="ITU9959" pageno="false" format="default"/>). More recently, other compression solution have been proposed for Low Power Wide Area Networks (LPWAN - <xref target="RFC8376" pageno="false" format="default"/>), but they basically rely on the same &#8220;context&#8221; approach (<xref target="RFC8724" pageno="false" format="default"/>).</t>

<t>Also, constraints coming from either devices or carrier links would lead to mixed scenarios and compound requirements for extraordinary header compression. For native IPv6 communications on DECT ULE and MS/TP Networks <xref target="RFC6282" pageno="false" format="default"/>, dedicated compression mechanisms are specified in <xref target="RFC8105" pageno="false" format="default"/> and <xref target="RFC8163" pageno="false" format="default"/>, while the transmission of IPv6 packets over NFC and PLC, specifications are being developed in <xref target="I-D.ietf-6lo-nfc" pageno="false" format="default"/> and <xref target="I-D.ietf-6lo-plc" pageno="false" format="default"/>.</t>

<t><spanx style="strong" xml:space="preserve">Separate device from locator identifier</spanx>:
Solutions such as proposed in <xref target="EIBP" pageno="false" format="default"/> and <xref target="I-D.ietf-lisp-rfc6830bis" pageno="false" format="default"/> can utilize a separation of device from locator, where only the latter is used for routing between the different domains using the same technology, therefore enabling the use of shorter addresses in the (possibly constrained) local environment. Device IDs used within such domains are carried as part of the payload by EIBP and hence can be of shorter size suited to the domain, while, for instance, in LISP a flexible address encoding <xref target="RFC8060" pageno="false" format="default"/> allows shorter addresses to be supported in the LISP control plane <xref target="I-D.ietf-lisp-rfc6833bis" pageno="false" format="default"/>.</t>

</section>
</section>
<section anchor="SEC:longer-addr" title="Longer Address Length" numbered="true" toc="default">

<section anchor="description-1" title="Description" numbered="true" toc="default">

<t>To address current networking demands it may be preferred to use variable and longer address lengths. For example in content delivery networks, longer addresses such as URLs are required to fetch content, an approach that information-centric networking (ICN) applied for any data packet sent in the network, using information-based addressing. Further, as an approach to address the routing challenges faced in the Internet, structured addresses may be used, avoiding the need for routing protocols.</t>

<t>Further, as an approach to address the routing challenges such as scalability, stability and the complex interworking between OSPF, eBGP and iBGP faced in the Internet, structured addresses may be used, avoiding the need for routing protocols overall.</t>

</section>
<section anchor="methodology-1" title="Methodology" numbered="true" toc="default">

<t>The crucial need for longer address lengths comes from <spanx style="emph" xml:space="preserve">semantic extensions</spanx> to IP addresses, where the extensions themselves do not fit within the length limitation of the IP address. <xref target="SEC:semantic_extensions" pageno="false" format="default"/> discusses those extensions, divided into those where limitations stemming from the IP address lengths are considered and those where information is either represented through a longer address and/or additional header information.</t>

</section>
<section anchor="examples-1" title="Examples" numbered="true" toc="default">

<t>See <xref target="SEC:semantic_extensions" pageno="false" format="default"/> for examples of solutions that consider extended address and header information to represent extended semantics that are not limited by the IP address length.</t>

</section>
</section>
<section anchor="summary" title="Summary" numbered="true" toc="default">

<t><xref target="table:length" pageno="false" format="default"/>, summarize the methodologies and the examples towards filling the gaps on length extensions.</t>

<texttable title="Summary Length Extensions" anchor="table:length" suppress-title="false" align="center" style="full">
      <ttcol align="left">&#160;</ttcol>
      <ttcol align="left">Methodology</ttcol>
      <ttcol align="left">Examples</ttcol>
      <c>Shorter Address Length</c>
      <c>Header compression/translation</c>
      <c>6LoWPAN, ROHC</c>
      <c>&#160;</c>
      <c>Separate device from locator identifier</c>
      <c>EIBP, LISP, ILNP, HIP</c>
      <c>Longer Address Length</c>
      <c>Same as Semantic Extension <xref target="table:semantic" pageno="false" format="default"/></c>
      <c>/</c>
</texttable>

</section>
</section>
<section anchor="identity-extensions" title="Identity Extensions" numbered="true" toc="default">

<t>Extensions in this subsection try extending the property described in <xref target="SEC:properties:2" pageno="false" format="default"/>, i.e., &#8220;locator/identifier overload&#8221; of the ambiguous address semantic.</t>

<t>From the perspective of Internet users, on the one hand, the implicit identifier semantic result in the privacy issue of network behavior tracking and association.
Despite that IP address assignment may be dynamic, they are nowadays considered as a personal data and as such undergoes privacy protection regulations like General Data Protection Regulation (&#8220;GDPR&#8221;, cf. <xref target="GDPR" pageno="false" format="default"/>). Hence, additional mechanism are necessary in order to protect end user privacy.</t>

<t>For network regulation of sensitive information, on the other hand, dynamically allocated IP addresses are not sufficient to guarantee device or user identification. As such, different address allocation systems, with stronger identification properties are necessary where security and authentication are at highest priority.
Hence, in order to protect information security within a network, additional mechanism are necessary to identify the users or the devices attached to the network.</t>

<section anchor="anonymous-address-identity" title="Anonymous Address Identity" numbered="true" toc="default">

<section anchor="description-2" title="Description" numbered="true" toc="default">

<t>As discussed in <xref target="SEC:properties:2" pageno="false" format="default"/>, IP addresses reveal both &#8216;network locations&#8217; as well as implicit &#8216;identifier&#8217; information to both traversed network elements and destination nodes alike. This enables recording, correlation, and profiling of user behaviors and historical network traces, possibly down to individual real user identity. The IETF, e.g., in <xref target="RFC7258" pageno="false" format="default"/>, has taken a clear stand on preventing any such pervasive monitoring means by classifying them as an attack on end users&#8217; right to be left along (i.e., privacy). Regulations such as the EU&#8217;s General Data Protection Regulation (GDPR) classifies, for instance, the &#8216;online identifier&#8217; as personal data which must be carefully protected; this includes end users&#8217; IP addresses <xref target="GDPR" pageno="false" format="default"/>.</t>

<t>Even before pervasive monitoring <xref target="RFC7258" pageno="false" format="default"/>, IP addresses have been seen as something that some organizational owners of networked system may not want to reveal at the individual level towards any non-member of the same organization.</t>

</section>
<section anchor="methodology-2" title="Methodology:" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">Traffic Proxy</spanx>:
Detouring the traffic to a trusted proxy is a heuristic solution. Since nodes between trusted proxy and destination (including the destination per se) can only observe the source address of the proxy, the &#8220;identification&#8221; of the origin source can thereby be hidden. To confuse the nodes between origin and the proxy, the traffic on such route would be encrypted via a key negotiated either in-band or off-band. Considering that all applications&#8217; traffic in such route can be seen as a unique flow directed to the same &#8220;unknown&#8221; node, i.e., the trusted proxy, eavesdroppers in such route have to make more efforts to correlate user behavior through statistical analysis even if they are capable of identifying the users via their source addresses. The protection lays in the inability to isolate single application specific flows. According to the methodology, such approach is IP version independent and works for both IPv4 and IPv6.</t>

<t><spanx style="strong" xml:space="preserve">Source Address Rollover</spanx>:
Privacy issues related to address &#8220;identifier&#8221; semantic can be mitigated through regular change (beyond the typical 24 hours lease of DHCP).
Built on the inevitabilities of &#8220;identifier&#8221; that IP address carries, such approach promote to change the source IP address at certain frequency. Under such methodology, refresh cycling window may reach to a balance between privacy protection and address update cost.
Due to the limited space that IPv4 contains, such approach usually works for IPv6 only.</t>

<t><spanx style="strong" xml:space="preserve">Private Address Spaces</spanx>:
Their introduction in <xref target="RFC1918" pageno="false" format="default"/> foresaw private addresses (assigned to specific address spaces by the IANA) as a means to communicate purely locally, e.g., within an enterprise, by separating private from public IP addresses. Considering that private addresses are never directly reachable from the Internet, hosts adopting private addresses are invisible and thus &#8220;anonymous&#8221; for the Internet. Besides, hosts for purely local communication used the latter while hosts requiring public Internet service access would still use public IP addresses.</t>

<t><spanx style="strong" xml:space="preserve">Address Translation</spanx>:
The aforementioned original intention for using private IP addresses, namely for purely local communication, resulted in a lack of flexibility in changing from local to public Internet access on the basis of what application would require which type of service.</t>

<t>If eventually every end-system in an organization would require some form of public Internet access in addition to local one, an adequate number of public Internet addresses would be required for providing to all end systems. Instead, address translation enables to utilize many private IP addresses within an organization, while only relying on one (or few) public IP addresses for the overall organization.</t>

<t>In principle, address translation can be applied recursively. This can be seen in modern broadband access where Internet providers may rely on carrier-grade address translation for all their broadband customers, who in turn employ address translation of their internal home or office addresses to those (private again) IP addresses assigned to them by their network provider.</t>

<t>Two benefits arise from the use of (private to public IP) address translation, namely (i) the hiding of local end systems at the level of the (address) assigned organization, and (ii) the reduction of public IP addresses necessary for communication across the Internet. While the latter has been seen for long as a driver for address translation, we focus on the first issue in this section, also since we see such privacy benefit as well as objective as still being valid in addressing systems like IPv6 where address scarcity is all but gone <xref target="GNATCATCHER" pageno="false" format="default"/>.</t>

<t><spanx style="strong" xml:space="preserve">Separate device from locator identifier</spanx>:
Solutions that make a clear separation between the routing locator and the identifier, can allow for a device ID of any size, which in turn can be encrypted by a network element deployed at the border of routing domain (e.g.,  a router). Both source and end domain addresses can be encrypted and transported, as in the routing domain, only the routing locator is used.</t>

</section>
<section anchor="examples-2" title="Examples:" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">Traffic Proxy</spanx>:
Although not initially designed for traffic proxy, Virtual Private Network (VPN, cf. <xref target="VPN" pageno="false" format="default"/>) is widely utilized for packets origin hiding as a traffic detouring methodology. As it evolved, VPN derivatives like WireGuard <xref target="WireGuard" pageno="false" format="default"/> become a mainstream instance for user privacy and security enhancement.</t>

<t>With such methodology in mind, onion routing <xref target="ONION" pageno="false" format="default"/>, instantiated in the  TOR Project <xref target="TOR" pageno="false" format="default"/>, achieves high anonymity through traffic hand over via intermediates before reaching the destination.
Since the architecture of TOR requires at least three proxies in traffic, none of them is aware of the entire route. Given that the proxies themselves can be deployed all over the cyberspace, trust will not be the prerequisite if proxies are randomly selected.</t>

<t>In addition, dedicated protocols are also expected to be customized for privacy improvement via traffic proxy. For example, Oblivious DNS over HTTPS (ODoH, cf. <xref target="ODoH" pageno="false" format="default"/>) use a third-part proxy to obscure identifications of user source addresses during DNS over HTTPS (DoH, cf. <xref target="RFC8484" pageno="false" format="default"/>) resolution. Similarly, Oblivious HTTP <xref target="OHTTP" pageno="false" format="default"/> involve proxy alike in the HTTP environment.</t>

<t><spanx style="strong" xml:space="preserve">Source Address Rollover</spanx>:
As for source address rollover, it has been standardized that IP addresses for Internet users should be dynamic and temporary every time they are being generated <xref target="RFC8981" pageno="false" format="default"/>. This benefits from the available address space in the case of IPv6, through which address generation or assignment should be unpredictable and stochastic for outside observers.</t>

<t>More radically, <xref target="EPHEMERALv6" pageno="false" format="default"/> advocates an &#8216;ephemeral address&#8217; for each process that change over time. Through this, correlating user behaviors conducted by different identifiers (i.e., source address) becomes hard, if not impossible, based on the IP packet header alone.</t>

<t><spanx style="strong" xml:space="preserve">Private Addresses</spanx>:
The use and assignment of private address for IPv4 is laid out in <xref target="RFC1918" pageno="false" format="default"/>, while unique local addresses (ULAs) in IPv6 <xref target="RFC4193" pageno="false" format="default"/> take over the role of private address spaces in IPv4.</t>

<t><spanx style="strong" xml:space="preserve">Network Address Translation</spanx>:
The translation from one IP address realm into another is laid out in <xref target="RFC2663" pageno="false" format="default"/>, using a stateful address binding to translate between the realms, e.g., from a private into a public address space. As outlined in <xref target="RFC2663" pageno="false" format="default"/>, basic address translation is usually extended to include port information in the translation process, support bidirectional or simple outbound traffic only. Given address translation can be performed several times in cascade, NATs may exist as part of existing customer premise equipment (CPE), such as a cable or an Ethernet router, with private wired/wireless connectivity, or may be provided in a carrier environment to further translate ISP-internal private addresses to a pool of (assigned) public IP addresses. The latter is often dynamically assigned to CPEs upon bootstrapping of the CPE.</t>

<t><spanx style="strong" xml:space="preserve">Separate device from locator identifier</spanx>:
EIBP <xref target="EIBP" pageno="false" format="default"/> utilizes a structured approach to addressing. It separates the routing ID from the device ID, where only the routing ID is used for routing. Hence the device IDs can be encrypted. Similarly, LISP uses separate namespaces for routing and identification allowing to &#8220;hide&#8221; identifiers in encrypted LISP packets that expose only known routing information <xref target="RFC8061" pageno="false" format="default"/>.</t>

</section>
</section>
<section anchor="authenticated-address-identity" title="Authenticated Address Identity" numbered="true" toc="default">

<section anchor="description-3" title="Description" numbered="true" toc="default">

<t>In some scenarios (e.g., corporate networks) it desirable to being able authenticate IP addresses so to prevent malicious attackers to spoof IP addresses. This is usually achieved by using a mechanism that allows to prove ownership of the IP address.</t>

</section>
<section anchor="methodology-3" title="Methodology" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">Self-certified addresses</spanx>: This method is usually based on the use of nodes&#8217; public/private keys. A node creates its own interface ID (IID) by using a cryptographic hash of its public key (with some additional parameters). Messages are then signed using the nodes&#8217; private key. The destination of the message will verify the signature through the information in the IP address.
Self-certification has the advantage that no third party or additional security infrastructure is needed. Any node can generate its own address locally and then only the address and the public key are needed to verify the binding between the public key and the address.</t>

<t><spanx style="strong" xml:space="preserve">Third party granted addresses</spanx>: DHCP (Dynamic Host Configuration Protocol) is widely used to provide IP addresses, however, in its basic form, it does not perform any check and even an unauthorized user without the right to use the network can obtain an IP address.
To solve this problem, a trusted third party has to grant access to the network before generating an address (via DHCP or other) that identifies the user. User authentication done securely either based on physical parameters like MAC addresses or based on an explicit login/password mechanism.</t>

</section>
<section anchor="examples-3" title="Examples" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">Self-certified Addresses</spanx>:
Major example of this methodology is <xref target="RFC3972" pageno="false" format="default"/>, where IPv6 cryptographically Generated Addresses (CGA) are defined. The original specs have been already amended (cf., <xref target="RFC4581" pageno="false" format="default"/> and <xref target="RFC4982" pageno="false" format="default"/>) in order to support multiple (stronger) cryptographic algorithms.</t>

<t><spanx style="strong" xml:space="preserve">Third party granted addresses</spanx>:
<xref target="RFC3118" pageno="false" format="default"/> defines a DHCP option through which authorization tickets can be generated and newly attached hosts with proper authorization can be automatically configured from an authenticated DHCP server. Solutions exists where separate servers are used for user authentication (<xref target="UA-DHCP" pageno="false" format="default"/>, <xref target="RFC4014" pageno="false" format="default"/>)</t>

</section>
</section>
<section anchor="summary-1" title="Summary" numbered="true" toc="default">

<t><xref target="table:identity" pageno="false" format="default"/>, summarize the methodologies and the examples towards filling the gaps on identity extensions.</t>

<texttable title="Summary Identity Extensions" anchor="table:identity" suppress-title="false" align="center" style="full">
      <ttcol align="left">&#160;</ttcol>
      <ttcol align="left">Methodology</ttcol>
      <ttcol align="left">Examples</ttcol>
      <c>Anonymous Address Identity</c>
      <c>Traffic Proxy</c>
      <c>VPN, TOR, ODoH</c>
      <c>&#160;</c>
      <c>Source Address Rollover</c>
      <c>SLAAC</c>
      <c>&#160;</c>
      <c>Private Address Spaces</c>
      <c>ULA</c>
      <c>&#160;</c>
      <c>Address Translation</c>
      <c>NAT</c>
      <c>&#160;</c>
      <c>Separate device from locator identifier</c>
      <c>EIBP, LISP</c>
      <c>Authenticated Address Identity</c>
      <c>Self-certified Addresses</c>
      <c>CGA</c>
      <c>&#160;</c>
      <c>Third party granted addresses</c>
      <c>DHCP-Option</c>
</texttable>

</section>
</section>
<section anchor="SEC:semantic_extensions" title="Semantic Extensions" numbered="true" toc="default">

<t>Extensions in this subsection try extending the property described in <xref target="SEC:properties:3" pageno="false" format="default"/>, i.e., limited address semantic support.</t>

<t>As explained in <xref target="SEC:properties:2" pageno="false" format="default"/>, IP addresses carry both locator and interface identification semantic. Some efforts exists in trying to separate these semantics either in different address spaces or through different address format. Beyond just identification, location, and the fixed address size, other efforts extended the semantic through existing or additional header fields (or header options) outside the Internet address.</t>

<section anchor="utilizing-extended-address-semantics" title="Utilizing Extended Address Semantics" numbered="true" toc="default">

<section anchor="description-4" title="Description" numbered="true" toc="default">

<t>Several extensions have been developed to extend beyond the limited IPv6 semantics. Those approaches may include to apply structure to the address, utilize specific prefixes or entirely utilize the IPv6 address for different semantics while re-encapsulating the original packet to restore the semantics in another part of the network. For instance, structured addresses have the capability to introduce delimiters to identify semantic information in the header, therefore not constraining any semantic by size limitations of the address fields.
<!-- Key to the following extensions, however, is to apply the extended semantic within the limitations of the IP address length.-->
We note here that extensions often start out as being proposed as an extended header semantic, while standardization may drive the solution to adopt an approach to accommodate their semantic within the limitations of an IP address. This section does include examples of this kind.</t>

</section>
<section anchor="methodology-4" title="Methodology" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">Semantic prefixes</spanx>:
Semantic prefixes are used to separate the IPv6 address space. Through this, new address families, such as for information-centric networking <xref target="HICN" pageno="false" format="default"/>, service routing or other semantically rich addressing, can be defined, albeit limited by the prefix length and structure as well as the overall length limitation of the IPv6 address.</t>

<t><spanx style="strong" xml:space="preserve">Separate device from locator identifier</spanx>:
The option to use separate namespaces for the device address (w.r.t. the router locator),  would  offer more freedom for the use of different semantics.</t>

<t><spanx style="strong" xml:space="preserve">Structured addressing</spanx>:
One approach to address the routing challenges faced in the internet proposes the use of structured addresses, to void the need for routing protocols. Benefits of this approach can be significant, with the structured addresses capturing the relative physical or virtual position of routers in the network, and being variable in length. Key to the approach, however, is that the structured addresses capturing the relative physical or virtual position of routers in the network, or networks in an internetwork may not fit within the fixed and limited IP address length (cf., <xref target="SEC:longer-addr" pageno="false" format="default"/>). Other approaches to structured approaches may be the definition of application-specific structured binary components as a generalization of the URL schema used for HTTP-level communication.</t>

<t><spanx style="strong" xml:space="preserve">Localized forwarding semantics</spanx>:
Layer 2 hardware, such as SDN switches, are limited to the use of specific header fields for forwarding decisions. Hence, devising new localized forwarding mechanisms may make use of existing header fields such as the IPv6 source/destination field to achieve the desired forwarding behavior, while encapsulating the original IPv6 packets into the payload in order to be restored at the local forwarding network boundary. Network sizes in those solutions are limited by the size of the utilized address field, e.g., 256 bits for IPv6, thereby limiting the size of networks where such techniques could be used. The IPv6 address information provided in the encapsulated packet purely serves identifying the network endpoint, not its location.</t>

</section>
<section anchor="examples-4" title="Examples" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">Semantic prefixes</spanx>:
Newer approaches to IP anycast suggest the use of service identification in combination with a binding IP address model <xref target="SFCANYCAST" pageno="false" format="default"/> as a way to allow for metric-based traffic steering decisions; approaches for Service Function Chaining (SFC) <xref target="RFC7665" pageno="false" format="default"/> utilize the next service header (NSH) information and packet classification to determine the destination of the next packet hop.</t>

<t>Another example of the usage of different packet header extensions based in IP addressing is Segment Routing. In this case the source chooses a path and encodes it in the packet header as an ordered list of segments. Segments are coded at header of IPv6 Packet, based on the definition of a new Routing Extensions Header type, the Segment Routing Header (SRH), which contains Segment List. This is similar to what is already specified in RFC2460. Packets are then transmitted from source node with a list of segment ID (SID) inserted at header List dictates the path to follow in the network. Such segment ID are coded as 128 bit IPv6 addresses.</t>

<t>Approaches such as <xref target="HICN" pageno="false" format="default"/> utilize semantic prefixing to allow for ICN forwarding behavior within an IPv6 network. In this case an HICN name is the hierarchical concatenation of a name prefix and a name suffix, in which the name prefix is encoded as an IPv6 128 bits word and carried in IPv6 header fields, while the name suffix is encoded in transport headers fields such as TCP. However, it is a challenge to determine which IPv6 prefixes should be used as name prefixes. In order to know which IPv6 packets should be interpreted based on an ICN semantic, it is desirable to be able to recognize that an IPv6 prefix is a name prefix, e.g. to define a specific address family (AF_HICN, b0001::/16). This establishment of a specific address family allows the management and control plane to locally configure HICN prefixes and announce them to neighbors for interconnection.</t>

<t><spanx style="strong" xml:space="preserve">Separate device from locator identifier</spanx>:
EIBP <xref target="EIBP" pageno="false" format="default"/> separates the routing locator from the device identifier, relaxing therefore any semantic constraints on the device identifier. Similarly, LISP uses a flexible encoding named LISP Canonical Address Format (LCAF <xref target="RFC8061" pageno="false" format="default"/>), which allows to associate to routing locators any possible form (and length) of identifier. ILNP <xref target="RFC6740" pageno="false" format="default"/> introduces as well a different semantic of IP addresses, while aligning to the IPv6 address format (128 bits). Basically, ILNP introduces a sharper logical separation between the 64 most significant bits and the 64 least significant bits of an IPv6 address. The former being a global locator, while the latter being an identifier that can have different semantic (rather than just being an interface identifier).</t>

<t><spanx style="strong" xml:space="preserve">Structured addressing</spanx>:
Network topology captures the physical connectivity among devices in the network. There is a structure associated with the topology. Examples are the core-distribution-access router structure commonly used in enterprise networks and clos topologies that are used to provide multiple connections between Top of Rack (ToR) devices and multiple layers of spine devices. Internet service providers use a tier structure that defines their business relationships. A clear structure of connected networks can be noticed in the internet. EIBP <xref target="EIBP" pageno="false" format="default"/> proposes to leverage the physical structure (or a virtual structure overlaid on the physical structure) to auto assign addresses to  routers in a network or networks in an internetwork to capture their relative position in the physical/virtual topology. EIBP proposes to administratively identify routers/networks  with a tier value based on the structure.</t>

<t><spanx style="strong" xml:space="preserve">Localized forwarding semantics</spanx>:
Approaches such as those outlined in <xref target="REED" pageno="false" format="default"/> suggest using a novel forwarding semantic based on path information carried in the packet itself, said path information consists in a fixed size bitfield (see <xref target="REED" pageno="false" format="default"/> for more information on how to represent the path information in said bitfield). In order to utilize existing, e.g., SDN-based, forwarding switches, the direct use of the IPv6 source/destination address is suggested for building appropriate match-action rules (over the suitable binary information representing the local output ports), while preserving the original IPv6 information in the encapsulated packet. As mentioned above, such use of the existing IPv6 address fields limits the size of the network to a maximum of 256 bits (therefore paths in the network over which such packets can be forwarded). <xref target="ICNIP" pageno="false" format="default"/>, however, goes a step further by suggesting to use the local forwarding as direct network layer mechanism, removing the IP packet and only leaving the transport/application layer, with the path identifier constituting the network-level identifier albeit limited by using the existing IP header for backward compatibility reason (the next section outlines the removal of this limitation).</t>

</section>
</section>
<section anchor="utilizing-existing-or-extended-header-semantics" title="Utilizing Existing or Extended Header Semantics" numbered="true" toc="default">

<section anchor="description-5" title="Description:" numbered="true" toc="default">

<t>While the former sub-section explored extended address semantic, thereby limiting any such extended semantic with that of the existing IPv6 semantic and length, additional semantics may also be placed into the header of the packet or the packet itself, utilized for the forwarding decision to the appropriate endpoint according to the extended semantic.</t>

<t>Reasons for embedding such new semantics may be related to traffic engineering since it has long been shown that the IP address itself is not enough to steer traffic properly since the IP address itself is not semantically rich enough to adequately describe the forwarding decision to be taken in the network, not only impacting WHERE the packet will need to go but also HOW it will need to be sent.</t>

</section>
<section anchor="methodology-5" title="Methodology:" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">In-Header extensions</spanx>:
One way to add additional semantic besides the address fields is to use other fields already present in the header.</t>

<t><spanx style="strong" xml:space="preserve">Headers option extensions</spanx>:
Another mechanism to add additional semantic is to actually add additional fields, e.g., through Header Options in IPv4 or through Extension Headers in IPv6.</t>

<t><spanx style="strong" xml:space="preserve">Re-encapsulation extension</spanx>:
A more radical approach for additional semantic is the use of a complete new header that is designed so to carry the desired semantic in an efficient way (often as a shim header).</t>

<t><spanx style="strong" xml:space="preserve">Structured addressing</spanx>:
Similar to the methodology that structures addresses within the limitations of the IPv6 address length, outlined in the previous sub-sections, structured addressing can also be applied within existing or extended header semantics, e.g., utilizing a dedicated (extension) header to carry the structured address information.</t>

<t><spanx style="strong" xml:space="preserve">Localized forwarding semantics</spanx>:
This set of solutions apply capabilities of newer (programmable) forwarding technology, such as <xref target="P4" pageno="false" format="default"/>, to utilize any header information for a localized forwarding decision. This removes any limitation to use existing header or address information for embedding a new address semantic into the transferred packet.</t>

</section>
<section anchor="examples-5" title="Examples:" numbered="true" toc="default">

<t><spanx style="strong" xml:space="preserve">In-Header extensions:</spanx>
In order to allow additional semantic with respect to the pure Internet addressing, the original design of IPv4 included the field &#8220;Type of Service&#8221; <xref target="RFC2474" pageno="false" format="default"/>, while IPv6 introduced the &#8220;Flow label&#8221; and the &#8220;Traffic Class&#8221; <xref target="RFC8200" pageno="false" format="default"/>. In a certain way, those fields can be considered &#8220;semantic extensions&#8221; of IP addresses, and they are &#8220;in-header&#8221; because natively present in the IP header (differently from options and extension headers). However, they proved not to be sufficient. Very often a variety of network operation are performed on the well-known 5-tuple (source and destination addresses; source and destination port number; and protocol number). In some contexts all of the above mentioned fields are used in order to have a very fine grained solution (<xref target="RFC8939" pageno="false" format="default"/>).</t>

<t><spanx style="strong" xml:space="preserve">Headers option extensions:</spanx>
Header options have been largely under exploited in IPv4. However, the introduction of the more efficient extension header model in IPv6 along with technology progress made the use of header extensions more widespread in IPv6. Segment Routing re-introduced the possibility to add path semantic to the packet by encoding a loosely defined source routing (<xref target="RFC8402" pageno="false" format="default"/>). Similarly, in the aim to overcome the inherent shortcoming of the multi-homing in the IP context, SHIM6 (<xref target="RFC5533" pageno="false" format="default"/>) also proposed the use of an extension header able to carry multi-homing information which cannot be accommodated natively in the IPv6 header.</t>

<t>To serve a moving endpoint, mechanisms like Mobile IPv6 <xref target="RFC6275" pageno="false" format="default"/> are used for the maintenance of connection continuity by a dedicated IPv6 extension header. In such a case, the IP address of the home agent in Mobile IPv6 is basically an identification of the on-going communication.
In order to go beyond the interface identification model of IP, the Host Identity Protocol (HIP) tries to introduce an identification layer to provide (as the name says) host identification. The whole architecture relies on the use of another type of extension header <xref target="RFC7401" pageno="false" format="default"/>.</t>

<t><spanx style="strong" xml:space="preserve">Re-encapsulation extension:</spanx>
Differently from the previous approach, re-encapsulation prepends complete new IP headers to the original packet introducing a completely custom shim header between the outer and inner header. This is the case for LISP, adding a LISP specific header right after an IP+UDP header (<xref target="I-D.ietf-lisp-rfc6830bis" pageno="false" format="default"/>). A similar design is used by VxLAN (<xref target="RFC7348" pageno="false" format="default"/>) and GENEVE (<xref target="RFC8926" pageno="false" format="default"/>), even if they are designed for a data center context. IP packets can also be wrapped with headers using more generic and semantically rich names, for instance with ICN <xref target="ICNIP" pageno="false" format="default"/>.</t>

<t><spanx style="strong" xml:space="preserve">Structured addressing:</spanx>
Solutions such as those described in the previous sub-section, e.g., EIBP <xref target="EIBP" pageno="false" format="default"/>, can provide structured addresses that are not limited to the IPv6 address length but instead carry the information in an extension header to remove such limitation.</t>

<t>Also information-centric networking (ICN) naming approaches usually introduce structures in the (information) names without limiting themselves to the IP address length; more so, ICN proposes its own header format and therefore radically breaks with not only IP addressing semantic but the format of the packet header overall. For this, approaches such as those described in <xref target="RFC8609" pageno="false" format="default"/> define a TLV-based binary application component structure that is carried as a &#8216;name&#8217; part of the CCN messages. Such a name is a hierarchical structure for identifying and locating a data object, which contains a sequence of name components. Names are coded based on 2-level nested Type-Length-Value (TLV) encodings, where the name-type field in the outer TLV indicates this is a name, while the inner TLVs are name components including a generic name component, an implicit SHA-256 digest component and a SHA-256 digest of Interest parameters. For textual representation, URIs are normally used to represent names, as defined in <xref target="RFC3986" pageno="false" format="default"/>.</t>

<t>In geographic addressing, position based routing protocols use the geographic location of nodes as their addresses, and packets are forwarded when possible in a greedy manner towards the destination. For this purpose the packet header includes a field coding the geographic coordinates (x, y, z) of the destination node, as defined in <xref target="RFC2009" pageno="false" format="default"/>. Some proposals also rely on extra fields in the packet header to code the distance towards the destination, in which case only the geographic coordinates of neighbors are exchanged. This way the location of the destination is protected even if routing packets are eavesdropped.</t>

<t><spanx style="strong" xml:space="preserve">Localized forwarding semantics:</spanx>
Unlike the original suggestion in <xref target="REED" pageno="false" format="default"/> to use existing SDN switches, the proliferation of P4 <xref target="P4" pageno="false" format="default"/> opens up the possibility to utilize a locally limited address semantic, expressed through the path identifier, as an entirely new header (including its new address) with an encapsulation of the IP packet for E2E delivery (including further delivery outside the localized forwarding network or positioning the limited address semantic directly as the network address semantic for the packet, i.e., removing any IP packet encapsulation from the forwarded packet, as done in <xref target="ICNIP" pageno="false" format="default"/>. Removing the IPv6 address size limitation by not utilizing the existing IP header for the forwarding decision also allows for extensible length approaches for building the path identifier with the potential for increasing the supported network size. On the downside, this approach requires to encapsulate the original IP packet header for communication beyond the local domain in which the new header is being used, such as discussed in the previous point above on &#8216;re-encapsulation extension&#8217;.</t>

</section>
</section>
<section anchor="summary-2" title="Summary" numbered="true" toc="default">

<t><xref target="table:semantic" pageno="false" format="default"/>, summarize the methodologies and the examples towards filling the gaps on semantic extensions.</t>

<texttable title="Summary Semantic Extensions" anchor="table:semantic" suppress-title="false" align="center" style="full">
      <ttcol align="left">&#160;</ttcol>
      <ttcol align="left">Methodology</ttcol>
      <ttcol align="left">Examples</ttcol>
      <c>Utilizing Extended Address Semantics</c>
      <c>Semantic prefixes</c>
      <c>HICN</c>
      <c>&#160;</c>
      <c>Separate device from locator identifier</c>
      <c>EIBP, ILNP, LISP, HIP</c>
      <c>&#160;</c>
      <c>Structured addressing</c>
      <c>EIBP, ILNP</c>
      <c>&#160;</c>
      <c>Localized forwarding semantics</c>
      <c>REED</c>
      <c>Utilizing Existing or Extended Header Semantics</c>
      <c>In-Header extensions</c>
      <c>DetNet</c>
      <c>&#160;</c>
      <c>Headers option extensions</c>
      <c>SHIM6, SRv6, HIP</c>
      <c>&#160;</c>
      <c>Re-encapsulation extension</c>
      <c>VxLAN, ICNIP</c>
      <c>&#160;</c>
      <c>Structured addressing</c>
      <c>EIBP</c>
      <c>&#160;</c>
      <c>Localized forwarding semantics</c>
      <c>REED</c>
</texttable>

</section>
</section>
</section>
<section anchor="SEC:overview" title="Overview of Approaches to Extend Internet Addressing" numbered="true" toc="default">

<t>From the view of the extensions, <xref target="table:extension" pageno="false" format="default"/> describes the objectives these extensions in extending the properties of Internet addressing. As summarized, extensions may aim to extend one property of the Internet addressing, or extend other properties at the same time.</t>

<texttable title="Relationship between Extensions and Internet Addressing" anchor="table:extension" suppress-title="false" align="center" style="full">
      <ttcol align="left">&#160;</ttcol>
      <ttcol align="left">Length Extension</ttcol>
      <ttcol align="left">Identity Extension</ttcol>
      <ttcol align="left">Semantic Extension</ttcol>
      <c>6LoWPAN</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>ROHC</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>TOR</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>ODoH</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>SLAAC</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>CGA</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>NAT</c>
      <c>x</c>
      <c>x</c>
      <c>&#160;</c>
      <c>HICN</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>ICNIP</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>CCNx names</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>EIBP</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Geo addressing</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>REED</c>
      <c>x (with P4)</c>
      <c>&#160;</c>
      <c>x</c>
      <c>DetNet</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>Mobile IP</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SHIM6</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SRv6</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>HIP</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>VxLAN</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>LISP</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>SFC</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
</texttable>

</section>
<section anchor="SEC:issues" title="Issues in Extensions to Internet Addressing" numbered="true" toc="default">

<t>While the extensions to the original Internet properties discussed in <xref target="SEC:extensions" pageno="false" format="default"/> demonstrate the flexibility of the basic proposed mechanisms, they also bring with them a number of issues, which we discuss in the following section. For this, we outline the problems caused, linking those to the approaches to extensions summarized in <xref target="SEC:overview" pageno="false" format="default"/>.</t>

<section anchor="SEC:issues:limiting" title="Limiting Address Semantics" numbered="true" toc="default">

<t>Many approaches changing the semantics of communication, e.g., through separating host identification from network node identification <xref target="RFC7401" pageno="false" format="default"/>, separating the device identifier from the routing locator (<xref target="EIBP" pageno="false" format="default"/>, <xref target="I-D.ietf-lisp-introduction" pageno="false" format="default"/>), or through identifying content and services directly <xref target="HICN" pageno="false" format="default"/>, are limited by the existing packet size and semantic constraints of IPv6, e.g., in the form of its source and destination network addresses.</t>

<t>While approaches such as <xref target="ICNIP" pageno="false" format="default"/> may override the addressing semantics, e.g., by replacing IPv6 source and destination information with path identification, a possible unawareness of endpoints still requires the carrying of other address information as part of the payload.</t>

<t>Also, the expressible service or content semantic may be limited, as in <xref target="HICN" pageno="false" format="default"/> or the size of supported networks <xref target="REED" pageno="false" format="default"/> due to relying on the limited bit positions usable in IPv6 addresses.</t>

</section>
<section anchor="SEC:issues:efficiency" title="Complexity and Efficiency" numbered="true" toc="default">

<t>A crucial issue is the additional complexity introduced for realizing the additional addressing semantics. This is particularly an issue since we see those additional semantics particularly at the edge of the Internet, utilizing the existing addressing semantic of the Internet to interconnect the domains that require those additional semantics.</t>

<t>Furthermore, any additional complexity can often come with an efficiency and cost penalty, particularly at the edge of the network, where resource constraints may play a significant role. Compression processes, taking ROHC as an example, require additional resources both for the sender generating the compressed header but also the gateway linking to the general Internet by re-establishing the full IP header (cf., <xref target="ROHC" pageno="false" format="default"/>).</t>

<t>Conversely, the performance requirements of core networks, in terms of packet processing speed, make the accommodation of extensions to addressing often prohibitive. This is not only due to the necessary extra processing that is specific to the extension, but also due to the complexity that will need to be managed in doing so at significantly higher speeds than at the edge of the network. The observations on the dropping of packets with IPv6 extension headers in the real world is (partially) due to such a implementation complexity <xref target="RFC7872" pageno="false" format="default"/>.</t>

<t>Another example for lowering the efficiency of packet forwarding is the routing in systems like TOR <xref target="TOR" pageno="false" format="default"/>. As detailed before, traffic in TOR, for anonymity purposes, should be handed over by at least three intermediates before reaching the destination. Thus, frequent relaying enhances the privacy, however, because such kind of solutions have to be implemented at application level, which comes at the cost of lower communication efficiency. May be a different privacy enhanced address semantic would enable efficient implementation of TOR-like solutions at network layer.</t>

<section anchor="repetitive-encapsulation" title="Repetitive encapsulation" numbered="true" toc="default">

<t>Repetitive encapsulation is an issue &#8216;bloating&#8217; packet sizes with additional encapsulation headers. Addressing proposals such as those in <xref target="ICNIP" pageno="false" format="default"/> utilize path identification within an alternative forwarding architecture that acts upon the provided path identification. However, due to the limitation of existing flow-based architectures with respect to the supported header structures (in the form of IPv4 or IPv6 headers), the new routing semantics are being inserted into the existing header structure, while repeating the original, sender-generated header structure, in the payload of the packet as it traverses the local domain, effectively doubling the header overhead per packet.</t>

<t>The problem is also present in a number of solutions tackling different issues, e.g., mobility <xref target="I-D.ietf-lisp-mn" pageno="false" format="default"/>, DC networking (<xref target="RFC8926" pageno="false" format="default"/>, <xref target="RFC7348" pageno="false" format="default"/>, <xref target="I-D.ietf-intarea-gue" pageno="false" format="default"/>), traffic engineering <xref target="RFC8986" pageno="false" format="default"/>, and privacy (<xref target="TOR" pageno="false" format="default"/>, <xref target="SPHINX" pageno="false" format="default"/>). Certainly these solutions are able to avoid other issues, like path lengthening or privacy issues, as described later, but they come at the price of multiple encapsulations that reduce the effective payload. This not only hampers efficiency in terms of header-to-payload ratio but also introduces &#8220;encapsulation points&#8221;, which in turn add complexity to the (often edge) network as well as fragility due to introducing possible failure points; we discuss this aspect more in <xref target="SEC:issues:fragility" pageno="false" format="default"/>.</t>

</section>
<section anchor="compounding-issues-with-header-compression" title="Compounding issues with header compression" numbered="true" toc="default">

<t>IP header overhead requires header compression in constrained environments, such as wireless sensor networks and IoT in general. Together with fragmentation, both tasks constitute significant energy consumption, as shown in <xref target="HEADER_COMP_ISSUES1" pageno="false" format="default"/>, negatively impacting reduced function devices that often rely on battery for operation. Further, the reliance on the compression/decompression points creates a dependence on such gateways, which may be a problem for intermittent scenarios.</t>

<t>According to implementation of <spanx style="emph" xml:space="preserve">contiki-ng</spanx> <xref target="CONTIKI" pageno="false" format="default"/>, an example of operating system for IoT devices, the source codes for 6LowPan requires at least 600kb to include a header compression process. In certain use cases, such requirement can be an obstacle for extremely constrained devices, especially for the RAM and energy consumption.</t>

</section>
<section anchor="introducing-path-stretch" title="Introducing Path Stretch" numbered="true" toc="default">

<t>Mobile IP <xref target="RFC6275" pageno="false" format="default"/>, which was designed for connection continuity in the face of moving endpoints, is a typical case for path stretch. Since traffic must follow a triangular route before arriving at the destination, such detour routing inevitably impacts transmission efficiency as well as latency.</t>

</section>
<section anchor="SEC:issues:traffic" title="Complicating Traffic Engineering" numbered="true" toc="default">

<t>While many extensions to the original IP address semantic target to enrich the decisions that can be taken to steer traffic according to requirements for, e.g., QoS, mobility, chaining, compute/network metrics, flow treatment, path usage, etc., the realization of the mechanisms as individual solutions likely complicates the original goal of traffic engineering when individual solutions are being used in combination. Ultimately, this may even prevent the combined use of more than one mechanism and/or policies with a need to identify and prevent incompatibilities of mechanisms. Key here is not the issue arising from using conflicting traffic engineering polices but conflicting realizations of policies that may well generally work well alongside (<xref target="ROBUSTSDN" pageno="false" format="default"/>, <xref target="TRANSACTIONSDN" pageno="false" format="default"/>).</t>

<t>This not only increases fragility, as we will discuss separately in <xref target="SEC:issues:fragility" pageno="false" format="default"/>, but also requires careful planning for which mechanisms to use and in which combination, likely needing human-in-the-loop approaches alongside possible automation approaches for the individual solutions.</t>

</section>
</section>
<section anchor="SEC:issues:security" title="Security" numbered="true" toc="default">

<t>The properties described in <xref target="SEC:properties" pageno="false" format="default"/> have, obviously, also consequences in terms of security and privacy related issues, as already mentioned in other parts of this document.</t>

<t>For instance, in the effort of being somehow backward compatible, HIP <xref target="RFC7401" pageno="false" format="default"/> uses 128-bit Host Identity, which may be not sufficiently  cryptographically strong in the future because of the limited size (future computational power may erode 128-bit security). Similarly, CGA <xref target="RFC3972" pageno="false" format="default"/> also align to the 128-bit limit but may use only 59 bits of them, hence, the packet signature may not be sufficiently robust to attacks <xref target="I-D.rafiee-6man-cga-attack" pageno="false" format="default"/>.</t>

<t>IP addresses, even temporary ones meant to protect privacy, have been long recognized as a &#8220;Personal Identification Information&#8221; that allows even to geolocate the communicating endpoints <xref target="RFC8280" pageno="false" format="default"/>. The use of temporary addresses provides sufficient privacy protection only if the renewal rate is high <xref target="EPHEMERALv6" pageno="false" format="default"/>. However, this causes additional issues, like the large overhead due to the Duplicate Address Detection, the impact on the Neighbor Discovery mechanism, in particular the cache, which can even lead to communication disruption. With such drawbacks, the extensions may even lead to defeat the target actually lowering security rather than increasing it.</t>

<t>The introduction of alternative addressing semantics has also been used to help in (D)DoS attacks mitigation. This leverages on changing the service identification model so to avoid topological information exposure, making the potential disruptions likely remain limited <xref target="ADDRLESS" pageno="false" format="default"/>. However, this increased robustness to DDoS comes at the price of important communication setup latency and fragility, as discussed next.</t>

</section>
<section anchor="SEC:issues:fragility" title="Fragility" numbered="true" toc="default">

<t>From the extensions discussed in <xref target="SEC:extensions" pageno="false" format="default"/>, it is evident that having alternative or additional address semantic and formats available for making routing as well as forwarding decisions dependent on these, is common place in the Internet. This, however, adds many extension-specific translation/adaptation points, mapping the semantic and format in one context into what is meaningful in another context, but also, more importantly, creating a dependency towards an additional component, often without explicit exposure to the endpoints that originally intended to communicate.</t>

<t>For instance, the re-writing of IP addresses to facilitate the use of private address spaces throughout the public Internet, realized through network address translators (NATs), conflicts with the end-to-end nature of communication between two endpoints. Additional (flow) state is required at the NAT middlebox to smoothly allow communication, which in turn creates a dependency between the NAT and the end-to-end communication between those endpoints, thus increasing the fragility of the communication relation.</t>

<t>A similar situation arises when supporting constrained environments through a header compression mechanism, adding the need for, e.g., a ROHC <xref target="RFC5795" pageno="false" format="default"/> element in the communication path, with communication-related compression state being held outside the communicating endpoints. Failure will introduce some inefficiencies due to context regeneration, which  may affects the communicating endpoints, increasing fragility of the system overall.</t>

<t>Such translation/adaptation between semantic extensions to the original &#8216;semantic&#8217; of an IP address is generally not avoidable when accommodating more than a single universal semantic. However, the solution-specific nature of every single extension is likely to noticeably increase the fragility of the overall system, since individual extensions will need to interact with other extensions that may be deployed in parallel, but were not designed taking into account such deployment scenario (cf., <xref target="I-D.ietf-intarea-tunnels" pageno="false" format="default"/>). Considering that extensions to traditional per-hop-behavior (based on IP addresses) can essentially be realized over almost &#8216;any&#8217; packet field, the possible number of conflicting behaviors or diverging interpretation of the semantic and/or content of such fields, among different extensions, may soon become an issue, requiring careful testing and delineation at the boundaries of the network within which the specific extension has been realized.</t>

</section>
</section>
<section anchor="SEC:overview-issue" title="Summary of issues in Extensions to Internet Addressing" numbered="true" toc="default">

<t><xref target="table:issue" pageno="false" format="default"/>, derived from <xref target="SEC:issues" pageno="false" format="default"/>, summarize the issues related to each of the extension.
As summarized, each extension involves at least one issue. For extension like ICNIP, several issues may be involved at the same time. Further, as explained in <xref target="SEC:issues:fragility" pageno="false" format="default"/>, &#8220;fragility&#8221; does not mean that the extensions are fragile per-se, they are robust for the task they have been designed for, rather we refer to the existence of additional components that may fail (as Murphy&#8217;s law teach us), hence, making the overall system more fragile.</t>

<texttable title="Issues in Extensions to Internet Addressing" anchor="table:issue" suppress-title="false" align="center" style="full">
      <ttcol align="left">&#160;</ttcol>
      <ttcol align="left">Limiting Address Semantics</ttcol>
      <ttcol align="left">Complexity and Efficiency</ttcol>
      <ttcol align="left">Security</ttcol>
      <ttcol align="left">Fragility</ttcol>
      <c>6LoWPAN</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>ROHC</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>TOR</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>ODoH</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>SLAAC</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>CGA</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>NAT</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>HICN</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>ICNIP</c>
      <c>x</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>CCNx name</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>EIBP</c>
      <c>x</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>Geo addressing</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>REED</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>DetNet</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>Mobile IP</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SHIM6</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SRv6</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>HIP</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>VxLAN</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>LISP</c>
      <c>x</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>SFC</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
</texttable>

</section>
<section anchor="SEC:conclusion" title="Conclusions" numbered="true" toc="default">

<t>The examples of extensions discussed in <xref target="SEC:extensions" pageno="false" format="default"/> to the original Internet addressing scheme show that extensibility beyond the original model (and its underlying per-hop behavior) is a desired capability for networking technologies and has been so for a long time. Generally, we can observe that those extensions are driven by the requirements of stakeholders, expecting a desirable extended functionality from the introduction of the specific extension. If interoperability is required, those extensions require standardization of possibly new fields, new semantics as well as (network and/or end system) operations alike.</t>

<t>One could argue that the power of the packet header (and the entire packet for that matter) lies in its potential to be used for extensions that satisfy the various requirements of those developing the extensions with given deployments and use cases in mind. The author in <xref target="EXPRESSIVE-POWER" pageno="false" format="default"/> argues that this capability represents the &#8216;expressive power of the Internet design&#8217;, with developments such as Software-Defined Networking (SDN) enabling per-hop operations (to be specified in dedicated match-action rules) that take more than just the IP address as input, even beyond the strict IP header, albeit still limited to certain packet header(s) fields, as in the OpenFlow specification <xref target="OPENFLOW" pageno="false" format="default"/>.</t>

<t>Beyond the fragility, discussed in this document, caused by adding, overriding, amending semantics and behaviors (and deploying them in a running system), such approach to extensibility that opens up other header fields may, however, also be limiting the realization of per-hop operations. As an example, although the authors in <xref target="REED" pageno="false" format="default"/> utilize the power of SDN to enable extension-specific per-hop behaviors that follow path-based rather than endpoint locator semantics, they do so within the limitation of currently supported header fields in SDN. The result is the overriding of the IPv6 source/destination address with the semantic input (here the path forwarding identifier) for the desired per-hop behavior, which in turn creates the need for border translation to avoid &#8216;leaking&#8217; such (malformed) IPv6-like packet into a standard IPv6 network. Leaving the IPv6 address information intact albeit unused is not possible due to the lack of accommodating the extended per-hop behavior information needed for the proposed solution.</t>

<t>Since the publication of <xref target="REED" pageno="false" format="default"/> (and its realization in existing real world trials), the newer P4 technology has removed this limitation, therefore positioning the entire packet content as input into per-hop behavior and removing the need for overriding existing packet fields and restoring their semantics at the borders of the network.</t>

<t>We see such evolution of per-hop behavior implementation as closing the loop to approaches to addressing considered in early days of the packet-based networking <xref target="RFC0757" pageno="false" format="default"/><xref target="POSTEL" pageno="false" format="default"/>, based on structured and flexible addresses, similar to the heap or stack model suggestions found in <xref target="EXPRESSIVE-POWER" pageno="false" format="default"/>. We believe that approaching addressing from such desire to enable extensions by design rather than through a pure extension engineering approach would also address possible fragility and security issues due to unwanted interactions between possibly incompatible extensions, while also enabling more efficient realization of the extensions through a common execution point in the forwarding element.</t>

<t>The issues we identified with the extension-specific solution approach, point to the need for a discussion on Internet addressing, as formulated in the companion document <xref target="I-D.jia-intarea-scenarios-problems-addressing" pageno="false" format="default"/> that formalizes the problem statement through scenarios that highlight the shortcomings of the Internet addressing model.</t>

<t>It is our conclusion that the existence of the many extensions to the original Internet addressing is clear evidence for gaps that have been identified over time by the wider Internet community: it is time to develop an architectural but more importantly a sustainable approach to make Internet addressing extensible in order to capture the many new uses we will still identify for the Internet to come. Any inaction on our side in that regard will only compound the issues we identified, eventually hampering the future Internet&#8217;s readiness for those new uses.</t>

</section>
<section anchor="SEC:sec" title="Security Considerations" numbered="true" toc="default">

<t>The present memo does not introduce any new technology and/or mechanism and as such does not introduce any security threat to the TCP/IP protocol suite.</t>

<t>As an additional note, and as we discussed in this document, security and privacy aspects were not considered as part of the key properties for Internet addressing, which led to the introduction of a number of extensions intending to fix those gaps. The analysis presented in this memo (non-exhaustively) shows those issues are either solved in an ad-hoc manner at application level, or at transport layer, while at network level only few extensions tackling specific aspects exist albeit often with limitations due to the adherence to the Internet addressing model and its properties.</t>

</section>
<section anchor="SEC:iana" title="IANA Considerations" numbered="true" toc="default">

<t>This document does not include any IANA request.</t>

</section>


  </middle>

  <back>


    <references title="Informative References">




<reference anchor="I-D.ietf-lisp-introduction" quote-title="true">
   <front>
      <title>An Architectural Introduction to the Locator/ID Separation Protocol (LISP)</title>
      <author fullname="Albert Cabellos">
	 </author>
      <author fullname="Damien Saucez">
	 </author>
      <date month="April" day="2" year="2015"/>
      <abstract>
	 <t>   This document describes the architecture of the Locator/ID Separation
   Protocol (LISP), making it easier to read the rest of the LISP
   specifications and providing a basis for discussion about the details
   of the LISP protocols.  This document is used for introductory
   purposes, more details can be found in RFC6830, the protocol
   specification.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-introduction-13"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lisp-introduction-13.txt"/>
</reference>


<reference anchor="I-D.ietf-lisp-mn" quote-title="true">
   <front>
      <title>LISP Mobile Node</title>
      <author fullname="Dino Farinacci">
	 <organization>lispers.net</organization>
      </author>
      <author fullname="Darrel Lewis">
	 <organization>cisco Systems</organization>
      </author>
      <author fullname="David Meyer">
	 <organization>1-4-5.net</organization>
      </author>
      <author fullname="Chris White">
	 <organization>Logical Elegance</organization>
      </author>
      <date month="February" day="14" year="2021"/>
      <abstract>
	 <t>   This document describes how a lightweight version of LISP's ITR/ETR
   functionality can be used to provide seamless mobility to a mobile
   node.  The LISP Mobile Node design described in this document uses
   standard LISP functionality to provide scalable mobility for LISP
   mobile nodes.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-mn-09"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lisp-mn-09.txt"/>
</reference>


<reference anchor="I-D.ietf-intarea-gue" quote-title="true">
   <front>
      <title>Generic UDP Encapsulation</title>
      <author fullname="Tom Herbert">
	 <organization>Quantonium</organization>
      </author>
      <author fullname="Lucy Yong">
	 <organization>Independent</organization>
      </author>
      <author fullname="Osama Zia">
	 <organization>Microsoft</organization>
      </author>
      <date month="October" day="26" year="2019"/>
      <abstract>
	 <t>   This specification describes Generic UDP Encapsulation (GUE), which
   is a scheme for using UDP to encapsulate packets of different IP
   protocols for transport across layer 3 networks. By encapsulating
   packets in UDP, specialized capabilities in networking hardware for
   efficient handling of UDP packets can be leveraged. GUE specifies
   basic encapsulation methods upon which higher level constructs, such
   as tunnels and overlay networks for network virtualization, can be
   constructed. GUE is extensible by allowing optional data fields as
   part of the encapsulation, and is generic in that it can encapsulate
   packets of various IP protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-gue-09"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-intarea-gue-09.txt"/>
</reference>


<reference anchor="EPHEMERALv6" quote-title="true">
   <front>
      <title>IPv6 Addressing Considerations</title>
      <author fullname="Fernando Gont">
	 <organization>SI6 Networks</organization>
      </author>
      <author fullname="Guillermo Gont">
	 <organization>SI6 Networks</organization>
      </author>
      <date month="February" day="21" year="2021"/>
      <abstract>
	 <t>   IPv6 addresses can differ in a number of properties, such as scope,
   stability, and intended usage type.  This document analyzes the
   impact of these properties on aspects such as security, privacy,
   interoperability, and network operations.  Additionally, it
   identifies challenges and gaps that currently prevent systems and
   applications from leveraging the increased flexibility and
   availability of IPv6 addresses.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-gont-v6ops-ipv6-addressing-considerations-01"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-gont-v6ops-ipv6-addressing-considerations-01.txt"/>
</reference>


<reference anchor="ODoH" quote-title="true">
   <front>
      <title>Oblivious DNS Over HTTPS</title>
      <author fullname="Eric Kinnear">
	 <organization>Apple Inc.</organization>
      </author>
      <author fullname="Patrick McManus">
	 <organization>Fastly</organization>
      </author>
      <author fullname="Tommy Pauly">
	 <organization>Apple Inc.</organization>
      </author>
      <author fullname="Tanya Verma">
	 <organization>Cloudflare</organization>
      </author>
      <author fullname="Christopher A. Wood">
	 <organization>Cloudflare</organization>
      </author>
      <date month="March" day="8" year="2021"/>
      <abstract>
	 <t>   This document describes an extension to DNS Over HTTPS (DoH) that
   allows hiding client IP addresses via proxying encrypted DNS
   transactions.  This improves privacy of DNS operations by not
   allowing any one server entity to be aware of both the client IP
   address and the content of DNS queries and answers.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-06"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-pauly-dprive-oblivious-doh-06.txt"/>
</reference>


<reference anchor="OHTTP" quote-title="true">
   <front>
      <title>Oblivious HTTP</title>
      <author fullname="Martin Thomson">
	 <organization>Mozilla</organization>
      </author>
      <author fullname="Christopher A. Wood">
	 <organization>Cloudflare</organization>
      </author>
      <date month="February" day="21" year="2021"/>
      <abstract>
	 <t>   This document describes a system for the forwarding of encrypted HTTP
   messages.  This allows a client to make multiple requests of a server
   without the server being able to link those requests to the client or
   to identify the requests as having come from the same client.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-thomson-http-oblivious-01"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-thomson-http-oblivious-01.txt"/>
</reference>


<reference anchor="ICNIP" quote-title="true">
   <front>
      <title>Internet Services over ICN in 5G LAN Environments</title>
      <author fullname="Dirk Trossen">
	 <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Sebastian Robitzsch">
	 <organization>InterDigital Inc.</organization>
      </author>
      <author fullname="Martin Reed">
	 <organization>Essex University</organization>
      </author>
      <author fullname="Mays Al-Naday">
	 <organization>Essex University</organization>
      </author>
      <author fullname="Janne Riihijarvi">
	 <organization>RWTH Aachen</organization>
      </author>
      <date month="October" day="1" year="2020"/>
      <abstract>
	 <t>   In this draft, we provide architecture and operations for enabling
   Internet services over ICN over (5G-enabled) LAN environments.
   Operations include ICN API to upper layers, HTTP over ICN, Service
   Proxy Operations, ICN Flow Management, Name Resolution, Mobility
   Handling, and Dual Stack Device Support.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-trossen-icnrg-internet-icn-5glan-04"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-trossen-icnrg-internet-icn-5glan-04.txt"/>
</reference>

<reference anchor="GDPR" quote-title="true">
  <front>
    <title>The EU General Data Protection Regulation (GDPR)</title>
    <author initials="P." surname="Voigt" fullname="Paul Voigt">
      <organization/>
    </author>
    <author initials="A." surname="von dem Bussche" fullname="Axel von dem Bussche">
      <organization/>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Springer International Publishing" value="book"/>
  <seriesInfo name="DOI" value="10.1007/978-3-319-57959-7"/>
</reference>

<reference anchor="ONION" quote-title="true">
  <front>
    <title>Onion routing</title>
    <author initials="D." surname="Goldschlag" fullname="David Goldschlag">
      <organization/>
    </author>
    <author initials="M." surname="Reed" fullname="Michael Reed">
      <organization/>
    </author>
    <author initials="P." surname="Syverson" fullname="Paul Syverson">
      <organization/>
    </author>
    <date year="1999" month="February"/>
  </front>
  <seriesInfo name="Communications of the ACM" value="Vol. 42, pp. 39-41"/>
  <seriesInfo name="DOI" value="10.1145/293411.293443"/>
</reference>

<reference anchor="VPN" quote-title="true">
  <front>
    <title>Virtual private networks: an overview with performance evaluation</title>
    <author initials="S." surname="Khanvilkar" fullname="S. Khanvilkar">
      <organization/>
    </author>
    <author initials="A." surname="Khokhar" fullname="A. Khokhar">
      <organization/>
    </author>
    <date year="2004" month="October"/>
  </front>
  <seriesInfo name="IEEE Communications Magazine" value="Vol. 42, pp. 146-154"/>
  <seriesInfo name="DOI" value="10.1109/mcom.2004.1341273"/>
</reference>

<reference anchor="WireGuard" quote-title="true">
  <front>
    <title>WireGuard: Next Generation Kernel Network Tunnel</title>
    <author initials="J." surname="Donenfeld" fullname="Jason A. Donenfeld">
      <organization/>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proceedings 2017 Network and Distributed System Security" value="Symposium"/>
  <seriesInfo name="DOI" value="10.14722/ndss.2017.23160"/>
</reference>

<reference anchor="ROHC" quote-title="true">
  <front>
    <title>RObust Header Compression (ROHC) Performance for Multimedia Transmission over 3G/4G Wireless Networks</title>
    <author initials="F." surname="Fitzek" fullname="Frank H. P. Fitzek">
      <organization/>
    </author>
    <author initials="S." surname="Rein" fullname="Stephan Rein">
      <organization/>
    </author>
    <author initials="P." surname="Seeling" fullname="Patrick Seeling">
      <organization/>
    </author>
    <author initials="M." surname="Reisslein" fullname="Martin Reisslein">
      <organization/>
    </author>
    <date year="2005" month="January"/>
  </front>
  <seriesInfo name="Wireless Personal Communications" value="Vol. 32, pp. 23-41"/>
  <seriesInfo name="DOI" value="10.1007/s11277-005-7733-2"/>
</reference>

<reference anchor="ITU9959" quote-title="true">
  <front>
    <title>Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets</title>
    <author initials="C." surname="Badenhop" fullname="Christopher Badenhop">
      <organization/>
    </author>
    <author initials="J." surname="Fuller" fullname="Jonathan Fuller">
      <organization/>
    </author>
    <author initials="J." surname="Hall" fullname="Joseph Hall">
      <organization/>
    </author>
    <author initials="B." surname="Ramsey" fullname="Benjamin Ramsey">
      <organization/>
    </author>
    <author initials="M." surname="Rice" fullname="Mason Rice">
      <organization/>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="IFIP Advances in Information and Communication Technology" value="pp. 209-227"/>
  <seriesInfo name="DOI" value="10.1007/978-3-319-26567-4_13"/>
</reference>

<reference anchor="UA-DHCP" quote-title="true">
  <front>
    <title>The secure DHCP system with user authentication</title>
    <author initials="T." surname="Komori" fullname="T. Komori">
      <organization/>
    </author>
    <author initials="T." surname="Saito" fullname="T. Saito">
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
  <seriesInfo name="27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN" value="2002."/>
  <seriesInfo name="DOI" value="10.1109/lcn.2002.1181774"/>
</reference>

<reference anchor="ADDRLESS" quote-title="true">
  <front>
    <title>Addressless: A new internet server model to prevent network scanning</title>
    <author initials="S." surname="Hao" fullname="Shanshan Hao">
      <organization/>
    </author>
    <author initials="R." surname="Liu" fullname="Renjie Liu">
      <organization/>
    </author>
    <author initials="Z." surname="Weng" fullname="Zhe Weng">
      <organization/>
    </author>
    <author initials="D." surname="Chang" fullname="Deliang Chang">
      <organization/>
    </author>
    <author initials="C." surname="Bao" fullname="Congxiao Bao">
      <organization/>
    </author>
    <author initials="X." surname="Li" fullname="Xing Li">
      <organization/>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="PLOS ONE" value="Vol. 16, pp. e0246293"/>
  <seriesInfo name="DOI" value="10.1371/journal.pone.0246293"/>
</reference>

<reference anchor="SFCANYCAST" quote-title="true">
  <front>
    <title>Distributed Function Chaining with Anycast Routing</title>
    <author initials="A." surname="Wion" fullname="Adrien Wion">
      <organization/>
    </author>
    <author initials="M." surname="Bouet" fullname="Mathieu Bouet">
      <organization/>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization/>
    </author>
    <author initials="V." surname="Conan" fullname="Vania Conan">
      <organization/>
    </author>
    <date year="2019" month="April"/>
  </front>
  <seriesInfo name="Proceedings of the 2019 ACM Symposium on SDN" value="Research"/>
  <seriesInfo name="DOI" value="10.1145/3314148.3314355"/>
</reference>

<reference anchor="REED" quote-title="true">
  <front>
    <title>Stateless multicast switching in software defined networks</title>
    <author initials="M." surname="Reed" fullname="Martin J. Reed">
      <organization/>
    </author>
    <author initials="M." surname="Al-Naday" fullname="Mays Al-Naday">
      <organization/>
    </author>
    <author initials="N." surname="Thomos" fullname="Nikolaos Thomos">
      <organization/>
    </author>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization/>
    </author>
    <author initials="G." surname="Petropoulos" fullname="George Petropoulos">
      <organization/>
    </author>
    <author initials="S." surname="Spirou" fullname="Spiros Spirou">
      <organization/>
    </author>
    <date year="2016" month="May"/>
  </front>
  <seriesInfo name="2016 IEEE International Conference on Communications" value="(ICC)"/>
  <seriesInfo name="DOI" value="10.1109/icc.2016.7511036"/>
</reference>

<reference anchor="SPHINX" quote-title="true">
  <front>
    <title>Sphinx: A Compact and Provably Secure Mix Format</title>
    <author initials="G." surname="Danezis" fullname="George Danezis">
      <organization/>
    </author>
    <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
      <organization/>
    </author>
    <date year="2009" month="May"/>
  </front>
  <seriesInfo name="2009 30th IEEE Symposium on Security and" value="Privacy"/>
  <seriesInfo name="DOI" value="10.1109/sp.2009.15"/>
</reference>

<reference anchor="OPENFLOW" quote-title="true">
  <front>
    <title>OpenFlow: enabling innovation in campus networks</title>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization/>
    </author>
    <author initials="T." surname="Anderson" fullname="Tom Anderson">
      <organization/>
    </author>
    <author initials="H." surname="Balakrishnan" fullname="Hari Balakrishnan">
      <organization/>
    </author>
    <author initials="G." surname="Parulkar" fullname="Guru Parulkar">
      <organization/>
    </author>
    <author initials="L." surname="Peterson" fullname="Larry Peterson">
      <organization/>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization/>
    </author>
    <author initials="S." surname="Shenker" fullname="Scott Shenker">
      <organization/>
    </author>
    <author initials="J." surname="Turner" fullname="Jonathan Turner">
      <organization/>
    </author>
    <date year="2008" month="March"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 38, pp. 69-74"/>
  <seriesInfo name="DOI" value="10.1145/1355734.1355746"/>
</reference>

<reference anchor="POSTEL" quote-title="true">
  <front>
    <title>Internetwork Protocol Approaches</title>
    <author initials="J." surname="Postel" fullname="J. Postel">
      <organization/>
    </author>
    <date year="1980" month="April"/>
  </front>
  <seriesInfo name="IEEE Transactions on Communications" value="Vol. 28, pp. 604-611"/>
  <seriesInfo name="DOI" value="10.1109/tcom.1980.1094705"/>
</reference>

<reference anchor="HEADER_COMP_ISSUES1" quote-title="true">
  <front>
    <title>The effect of fragmentation and header compression on IP-based sensor networks (6LoWPAN)</title>
    <author initials="F." surname="Mesrinejad" fullname="Farhad Mesrinejad">
      <organization/>
    </author>
    <author initials="F." surname="Hashim" fullname="Fazirulhisyam Hashim">
      <organization/>
    </author>
    <author initials="N." surname="Noordin" fullname="N. K. Noordin">
      <organization/>
    </author>
    <author initials="M." surname="Rasid" fullname="M. F. A. Rasid">
      <organization/>
    </author>
    <author initials="R." surname="Abdullah" fullname="R. S. A. Raja Abdullah">
      <organization/>
    </author>
    <date year="2011" month="October"/>
  </front>
  <seriesInfo name="The 17th Asia Pacific Conference on" value="Communications"/>
  <seriesInfo name="DOI" value="10.1109/apcc.2011.6152926"/>
</reference>

<reference anchor="ROBUSTSDN" quote-title="true">
  <front>
    <title>A distributed and robust SDN control plane for transactional network updates</title>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization/>
    </author>
    <author initials="P." surname="Kuznetsov" fullname="Petr Kuznetsov">
      <organization/>
    </author>
    <author initials="D." surname="Levin" fullname="Dan Levin">
      <organization/>
    </author>
    <author initials="S." surname="Schmid" fullname="Stefan Schmid">
      <organization/>
    </author>
    <date year="2015" month="April"/>
  </front>
  <seriesInfo name="2015 IEEE Conference on Computer Communications" value="(INFOCOM)"/>
  <seriesInfo name="DOI" value="10.1109/infocom.2015.7218382"/>
</reference>

<reference anchor="TRANSACTIONSDN" quote-title="true">
  <front>
    <title>Transactional Network Updates in SDN</title>
    <author initials="M." surname="Curic" fullname="Maja Curic">
      <organization/>
    </author>
    <author initials="Z." surname="Despotovic" fullname="Zoran Despotovic">
      <organization/>
    </author>
    <author initials="A." surname="Hecker" fullname="Artur Hecker">
      <organization/>
    </author>
    <author initials="G." surname="Carle" fullname="Georg Carle">
      <organization/>
    </author>
    <date year="2018" month="June"/>
  </front>
  <seriesInfo name="2018 European Conference on Networks and Communications" value="(EuCNC)"/>
  <seriesInfo name="DOI" value="10.1109/eucnc.2018.8442793"/>
</reference>

<reference anchor="P4" quote-title="true">
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization/>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization/>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization/>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization/>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization/>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization/>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization/>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization/>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization/>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization/>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization/>
    </author>
    <date year="2014" month="July"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 44, pp. 87-95"/>
  <seriesInfo name="DOI" value="10.1145/2656877.2656890"/>
</reference>


<reference anchor="TOR" target="https://www.torproject.org/" quote-title="true">
  <front>
    <title>The Tor Project</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="HICN" target="https://datatracker.ietf.org/meeting/interim-2018-icnrg-01/materials/slides-interim-2018-icnrg-01-sessa-hybrid-icn-hicn-luca-muscariello" quote-title="true">
  <front>
    <title>Hybrid Information-Centric Networking: ICN inside the Internet Protocol</title>
    <author initials="L." surname="Muscariello">
      <organization/>
    </author>
    <date year="2018" month="March"/>
  </front>
</reference>
<reference anchor="EXPRESSIVE-POWER" target="http://groups.csail.mit.edu/ana/People/DDC/Expressive%20power%205.pdf" quote-title="true">
  <front>
    <title>The expressive power of the Internet design</title>
    <author initials="D." surname="Clark">
      <organization/>
    </author>
    <date year="2009" month="April"/>
  </front>
</reference>
<reference anchor="CONTIKI" target="https://github.com/contiki-ng/contiki-ng" quote-title="true">
  <front>
    <title>Contiki-NG: The OS for Next Generation IoT Devices</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="GNATCATCHER" target="https://github.com/bslassey/ip-blindness" quote-title="true">
  <front>
    <title>Global Network Address Translation Combined with Audited and Trusted CDN or HTTP-Proxy Eliminating Reidentification</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="EIBP" target="First Intl Workshop on Semantic Addressing and Routing for Future Networks" quote-title="true">
  <front>
    <title>A Structured Approach to Routing in the Internet</title>
    <author initials="N.Shenoy, S.Chandraiah, P." surname="Willis">
      <organization/>
    </author>
    <date year="2021" month="June"/>
  </front>
</reference>
<reference anchor="HISTORY127" target="https://elists.isoc.org/pipermail/internet-history/2021-January/006920.html" quote-title="true">
  <front>
    <title>History of 127/8 as localhost/loopback addresses</title>
    <author>
      <organization/>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791" quote-title="true">
<front>
<title>Internet Protocol</title>
<author initials="J." surname="Postel" fullname="J. Postel"><organization/></author>
<date year="1981" month="September"/>
</front>
<seriesInfo name="STD" value="5"/>
<seriesInfo name="RFC" value="791"/>
<seriesInfo name="DOI" value="10.17487/RFC0791"/>
</reference>



<reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" quote-title="true">
<front>
<title>Internet Protocol, Version 6 (IPv6) Specification</title>
<author initials="S." surname="Deering" fullname="S. Deering"><organization/></author>
<author initials="R." surname="Hinden" fullname="R. Hinden"><organization/></author>
<date year="2017" month="July"/>
<abstract><t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t></abstract>
</front>
<seriesInfo name="STD" value="86"/>
<seriesInfo name="RFC" value="8200"/>
<seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>


<reference anchor="I-D.jia-intarea-scenarios-problems-addressing" quote-title="true">
   <front>
      <title>Challenging Scenarios and Problems in Internet Addressing</title>
      <author fullname="Yihao Jia">
	 <organization>Huawei Technologies Co., Ltd</organization>
      </author>
      <author fullname="Dirk Trossen">
	 <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Luigi Iannone">
	 <organization>Huawei Technologies France S.A.S.U.</organization>
      </author>
      <author fullname="Donald E. Eastlake 3rd">
	 <organization>Futurewei Technologies</organization>
      </author>
      <author fullname="Peng Liu">
	 <organization>China Mobile</organization>
      </author>
      <date month="February" day="22" year="2021"/>
      <abstract>
	 <t>   The Internet Protocol (IP) has been the major technological success
   in information technology of the last half century.  As Internet
   become pervasive, IP start replacing communication technology for
   domain-specific solutions.  However, domains with specific
   requirements as well as communication behaviors and semantics still
   exists and represent what [RFC8799] recognizes as "limited domains".
   When communicating within limited domains, the address semantic and
   format may differ with respect to the IP address one.  As such, there
   is a need to adapt the domain-specific addressing to the Internet
   addressing paradigm.  In certain scenarios, such adaptation may raise
   challenges.

   This document describes well-recognized scenarios that showcase
   possibly different addressing requirements which are challenging to
   be accommodated in the IP addressing model.  These scenarios
   highlight issues related to the Internet addressing model and call
   for starting a discussion on a way to re-think/evolve the addressing
   model so to better accommodate different domain-specific
   requirements.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-jia-intarea-scenarios-problems-addressing-00"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-jia-intarea-scenarios-problems-addressing-00.txt"/>
</reference>



<reference anchor="RFC6250" target="https://www.rfc-editor.org/info/rfc6250" quote-title="true">
<front>
<title>Evolution of the IP Model</title>
<author initials="D." surname="Thaler" fullname="D. Thaler"><organization/></author>
<date year="2011" month="May"/>
<abstract><t>This RFC attempts to document various aspects of the IP service model and how it has evolved over time.  In particular, it attempts to document the properties of the IP layer as they are seen by upper- layer protocols and applications, especially properties that were (and, at times, still are) incorrectly perceived to exist as well as properties that would cause problems if changed.  The discussion of these properties is organized around evaluating a set of claims, or misconceptions.  Finally, this document provides some guidance to protocol designers and implementers.  This document is not an Internet  Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name="RFC" value="6250"/>
<seriesInfo name="DOI" value="10.17487/RFC6250"/>
</reference>



<reference anchor="RFC1752" target="https://www.rfc-editor.org/info/rfc1752" quote-title="true">
<front>
<title>The Recommendation for the IP Next Generation Protocol</title>
<author initials="S." surname="Bradner" fullname="S. Bradner"><organization/></author>
<author initials="A." surname="Mankin" fullname="A. Mankin"><organization/></author>
<date year="1995" month="January"/>
<abstract><t>This document presents the recommendation of the IPng Area Directors on what should be used to replace the current version of the Internet Protocol. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="1752"/>
<seriesInfo name="DOI" value="10.17487/RFC1752"/>
</reference>



<reference anchor="RFC2101" target="https://www.rfc-editor.org/info/rfc2101" quote-title="true">
<front>
<title>IPv4 Address Behaviour Today</title>
<author initials="B." surname="Carpenter" fullname="B. Carpenter"><organization/></author>
<author initials="J." surname="Crowcroft" fullname="J. Crowcroft"><organization/></author>
<author initials="Y." surname="Rekhter" fullname="Y. Rekhter"><organization/></author>
<date year="1997" month="February"/>
<abstract><t>The main purpose of this note is to clarify the current interpretation of the 32-bit IP version 4 address space, whose significance has changed substantially since it was originally defined.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name="RFC" value="2101"/>
<seriesInfo name="DOI" value="10.17487/RFC2101"/>
</reference>



<reference anchor="RFC1918" target="https://www.rfc-editor.org/info/rfc1918" quote-title="true">
<front>
<title>Address Allocation for Private Internets</title>
<author initials="Y." surname="Rekhter" fullname="Y. Rekhter"><organization/></author>
<author initials="B." surname="Moskowitz" fullname="B. Moskowitz"><organization/></author>
<author initials="D." surname="Karrenberg" fullname="D. Karrenberg"><organization/></author>
<author initials="G. J." surname="de Groot" fullname="G. J. de Groot"><organization/></author>
<author initials="E." surname="Lear" fullname="E. Lear"><organization/></author>
<date year="1996" month="February"/>
<abstract><t>This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name="BCP" value="5"/>
<seriesInfo name="RFC" value="1918"/>
<seriesInfo name="DOI" value="10.17487/RFC1918"/>
</reference>



<reference anchor="RFC4291" target="https://www.rfc-editor.org/info/rfc4291" quote-title="true">
<front>
<title>IP Version 6 Addressing Architecture</title>
<author initials="R." surname="Hinden" fullname="R. Hinden"><organization/></author>
<author initials="S." surname="Deering" fullname="S. Deering"><organization/></author>
<date year="2006" month="February"/>
<abstract><t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol.  The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t><t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture".   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4291"/>
<seriesInfo name="DOI" value="10.17487/RFC4291"/>
</reference>



<reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" quote-title="true">
<front>
<title>Terminology for Constrained-Node Networks</title>
<author initials="C." surname="Bormann" fullname="C. Bormann"><organization/></author>
<author initials="M." surname="Ersue" fullname="M. Ersue"><organization/></author>
<author initials="A." surname="Keranen" fullname="A. Keranen"><organization/></author>
<date year="2014" month="May"/>
<abstract><t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t></abstract>
</front>
<seriesInfo name="RFC" value="7228"/>
<seriesInfo name="DOI" value="10.17487/RFC7228"/>
</reference>



<reference anchor="RFC5795" target="https://www.rfc-editor.org/info/rfc5795" quote-title="true">
<front>
<title>The RObust Header Compression (ROHC) Framework</title>
<author initials="K." surname="Sandlund" fullname="K. Sandlund"><organization/></author>
<author initials="G." surname="Pelletier" fullname="G. Pelletier"><organization/></author>
<author initials="L-E." surname="Jonsson" fullname="L-E. Jonsson"><organization/></author>
<date year="2010" month="March"/>
<abstract><t>The Robust Header Compression (ROHC) protocol provides an efficient, flexible, and future-proof header compression concept.  It is designed to operate efficiently and robustly over various link technologies with different characteristics.</t><t>The ROHC framework, along with a set of compression profiles, was initially defined in RFC 3095.  To improve and simplify the ROHC specifications, this document explicitly defines the ROHC framework and the profile for uncompressed separately.  More specifically, the definition of the framework does not modify or update the definition of the framework specified by RFC 3095.</t><t>This specification obsoletes RFC 4995.  It fixes one interoperability issue that was erroneously introduced in RFC 4995, and adds some minor clarifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5795"/>
<seriesInfo name="DOI" value="10.17487/RFC5795"/>
</reference>



<reference anchor="RFC6282" target="https://www.rfc-editor.org/info/rfc6282" quote-title="true">
<front>
<title>Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks</title>
<author initials="J." surname="Hui" fullname="J. Hui" role="editor"><organization/></author>
<author initials="P." surname="Thubert" fullname="P. Thubert"><organization/></author>
<date year="2011" month="September"/>
<abstract><t>This document updates RFC 4944, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks".  This document specifies an IPv6 header compression format for IPv6 packet delivery in Low Power Wireless Personal Area Networks (6LoWPANs).  The compression format relies on shared context to allow compression of arbitrary prefixes.  How the information is maintained in that shared context is out of scope. This document specifies compression of multicast addresses and a framework for compressing next headers.  UDP header compression is specified within this framework.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="6282"/>
<seriesInfo name="DOI" value="10.17487/RFC6282"/>
</reference>



<reference anchor="RFC7400" target="https://www.rfc-editor.org/info/rfc7400" quote-title="true">
<front>
<title>6LoWPAN-GHC: Generic Header Compression for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
<author initials="C." surname="Bormann" fullname="C. Bormann"><organization/></author>
<date year="2014" month="November"/>
<abstract><t>RFC 6282 defines header compression in 6LoWPAN packets (where "6LoWPAN" refers to "IPv6 over Low-Power Wireless Personal Area Network").  The present document specifies a simple addition that enables the compression of generic headers and header-like payloads, without a need to define a new header compression scheme for each such new header or header-like payload.</t></abstract>
</front>
<seriesInfo name="RFC" value="7400"/>
<seriesInfo name="DOI" value="10.17487/RFC7400"/>
</reference>



<reference anchor="RFC8376" target="https://www.rfc-editor.org/info/rfc8376" quote-title="true">
<front>
<title>Low-Power Wide Area Network (LPWAN) Overview</title>
<author initials="S." surname="Farrell" fullname="S. Farrell" role="editor"><organization/></author>
<date year="2018" month="May"/>
<abstract><t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation.  This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t></abstract>
</front>
<seriesInfo name="RFC" value="8376"/>
<seriesInfo name="DOI" value="10.17487/RFC8376"/>
</reference>



<reference anchor="RFC8724" target="https://www.rfc-editor.org/info/rfc8724" quote-title="true">
<front>
<title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
<author initials="A." surname="Minaburo" fullname="A. Minaburo"><organization/></author>
<author initials="L." surname="Toutain" fullname="L. Toutain"><organization/></author>
<author initials="C." surname="Gomez" fullname="C. Gomez"><organization/></author>
<author initials="D." surname="Barthel" fullname="D. Barthel"><organization/></author>
<author initials="JC." surname="Z&#250;&#241;iga" fullname="JC. Z&#250;&#241;iga"><organization/></author>
<date year="2020" month="April"/>
<abstract><t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t><t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t><t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t><t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t></abstract>
</front>
<seriesInfo name="RFC" value="8724"/>
<seriesInfo name="DOI" value="10.17487/RFC8724"/>
</reference>



<reference anchor="RFC8105" target="https://www.rfc-editor.org/info/rfc8105" quote-title="true">
<front>
<title>Transmission of IPv6 Packets over Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE)</title>
<author initials="P." surname="Mariager" fullname="P. Mariager"><organization/></author>
<author initials="J." surname="Petersen" fullname="J. Petersen" role="editor"><organization/></author>
<author initials="Z." surname="Shelby" fullname="Z. Shelby"><organization/></author>
<author initials="M." surname="Van de Logt" fullname="M. Van de Logt"><organization/></author>
<author initials="D." surname="Barthel" fullname="D. Barthel"><organization/></author>
<date year="2017" month="May"/>
<abstract><t>Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE) is a low-power air interface technology that is proposed by the DECT Forum and is defined and specified by ETSI.</t><t>The DECT air interface technology has been used worldwide in communication devices for more than 20 years.  It has primarily been used to carry voice for cordless telephony but has also been deployed for data-centric services.</t><t>DECT ULE is a recent addition to the DECT interface primarily intended for low-bandwidth, low-power applications such as sensor devices, smart meters, home automation, etc.  As the DECT ULE interface inherits many of the capabilities from DECT, it benefits from operation that is long-range and interference-free, worldwide- reserved frequency band, low silicon prices, and maturity.  There is an added value in the ability to communicate with IPv6 over DECT ULE, such as for Internet of Things applications.</t><t>This document describes how IPv6 is transported over DECT ULE using IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) techniques.</t></abstract>
</front>
<seriesInfo name="RFC" value="8105"/>
<seriesInfo name="DOI" value="10.17487/RFC8105"/>
</reference>



<reference anchor="RFC8163" target="https://www.rfc-editor.org/info/rfc8163" quote-title="true">
<front>
<title>Transmission of IPv6 over Master-Slave/Token-Passing (MS/TP) Networks</title>
<author initials="K." surname="Lynn" fullname="K. Lynn" role="editor"><organization/></author>
<author initials="J." surname="Martocci" fullname="J. Martocci"><organization/></author>
<author initials="C." surname="Neilson" fullname="C. Neilson"><organization/></author>
<author initials="S." surname="Donaldson" fullname="S. Donaldson"><organization/></author>
<date year="2017" month="May"/>
<abstract><t>Master-Slave/Token-Passing (MS/TP) is a medium access control method for the RS-485 physical layer and is used primarily in building automation networks.  This specification defines the frame format for transmission of IPv6 packets and the method of forming link-local and statelessly autoconfigured IPv6 addresses on MS/TP networks.</t></abstract>
</front>
<seriesInfo name="RFC" value="8163"/>
<seriesInfo name="DOI" value="10.17487/RFC8163"/>
</reference>


<reference anchor="I-D.ietf-6lo-nfc" quote-title="true">
   <front>
      <title>Transmission of IPv6 Packets over Near Field Communication</title>
      <author fullname="Younghwan Choi">
	 <organization>Electronics and Telecommunications Research Institute</organization>
      </author>
      <author fullname="Yong-Geun Hong">
	 <organization>Electronics and Telecommunications Research Institute</organization>
      </author>
      <author fullname="Joo-Sang Youn">
	 <organization>DONG-EUI University</organization>
      </author>
      <author fullname="Dongkyun Kim">
	 <organization>Kyungpook National University</organization>
      </author>
      <author fullname="JinHyouk Choi">
	 <organization>Samsung Electronics Co.,</organization>
      </author>
      <date month="August" day="23" year="2020"/>
      <abstract>
	 <t>   Near Field Communication (NFC) is a set of standards for smartphones
   and portable devices to establish radio communication with each other
   by touching them together or bringing them into proximity, usually no
   more than 10 cm apart.  NFC standards cover communications protocols
   and data exchange formats, and are based on existing radio-frequency
   identification (RFID) standards including ISO/IEC 14443 and FeliCa.
   The standards include ISO/IEC 18092 and those defined by the NFC
   Forum.  The NFC technology has been widely implemented and available
   in mobile phones, laptop computers, and many other devices.  This
   document describes how IPv6 is transmitted over NFC using 6LoWPAN
   techniques.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-6lo-nfc-17"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-6lo-nfc-17.txt"/>
</reference>


<reference anchor="I-D.ietf-6lo-plc" quote-title="true">
   <front>
      <title>Transmission of IPv6 Packets over PLC Networks</title>
      <author fullname="Jianqiang Hou">
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Bing Liu">
	 <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Yong-Geun Hong">
	 <organization>ETRI</organization>
      </author>
      <author fullname="Xiaojun Tang">
	 <organization>SGEPRI</organization>
      </author>
      <author fullname="Charles E. Perkins">
	 <organization>Lupin Lodge</organization>
      </author>
      <date month="April" day="20" year="2021"/>
      <abstract>
	 <t>   Power Line Communication (PLC), namely using the electric-power lines
   for indoor and outdoor communications, has been widely applied to
   support Advanced Metering Infrastructure (AMI), especially smart
   meters for electricity.  The inherent advantage of existing
   electricity infrastructure facilitates the expansion of PLC
   deployments, and moreover, a wide variety of accessible devices
   raises the potential demand of IPv6 for future applications.  This
   document describes how IPv6 packets are transported over constrained
   PLC networks, such as ITU-T G.9903, IEEE 1901.1 and IEEE 1901.2.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-6lo-plc-06"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-6lo-plc-06.txt"/>
</reference>



<reference anchor="RFC8060" target="https://www.rfc-editor.org/info/rfc8060" quote-title="true">
<front>
<title>LISP Canonical Address Format (LCAF)</title>
<author initials="D." surname="Farinacci" fullname="D. Farinacci"><organization/></author>
<author initials="D." surname="Meyer" fullname="D. Meyer"><organization/></author>
<author initials="J." surname="Snijders" fullname="J. Snijders"><organization/></author>
<date year="2017" month="February"/>
<abstract><t>This document defines a canonical address format encoding used in Locator/ID Separation Protocol (LISP) control messages and in the encoding of lookup keys for the LISP Mapping Database System.</t></abstract>
</front>
<seriesInfo name="RFC" value="8060"/>
<seriesInfo name="DOI" value="10.17487/RFC8060"/>
</reference>


<reference anchor="I-D.ietf-lisp-rfc6833bis" quote-title="true">
   <front>
      <title>Locator/ID Separation Protocol (LISP) Control-Plane</title>
      <author fullname="Dino Farinacci">
	 <organization>lispers.net</organization>
      </author>
      <author fullname="Fabio Maino">
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname="Vince Fuller">
	 <organization>vaf.net Internet Consulting</organization>
      </author>
      <author fullname="Albert Cabellos">
	 <organization>UPC/BarcelonaTech</organization>
      </author>
      <date month="November" day="18" year="2020"/>
      <abstract>
	 <t>   This document describes the Control-Plane and Mapping Service for the
   Locator/ID Separation Protocol (LISP), implemented by two types of
   LISP-speaking devices -- the LISP Map-Resolver and LISP Map-Server --
   that provides a simplified "front end" for one or more Endpoint ID to
   Routing Locator mapping databases.

   By using this Control-Plane service interface and communicating with
   Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers (ITRs) and
   Egress Tunnel Routers (ETRs) are not dependent on the details of
   mapping database systems, which facilitates modularity with different
   database designs.  Since these devices implement the "edge" of the
   LISP Control-Plane infrastructure, connecting EID addressable nodes
   of a LISP site, it the implementation and operational complexity of
   the overall cost and effort of deploying LISP.

   This document obsoletes RFC 6830 and RFC 6833.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-rfc6833bis-30"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lisp-rfc6833bis-30.txt"/>
</reference>



<reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258" quote-title="true">
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author initials="S." surname="Farrell" fullname="S. Farrell"><organization/></author>
<author initials="H." surname="Tschofenig" fullname="H. Tschofenig"><organization/></author>
<date year="2014" month="May"/>
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name="BCP" value="188"/>
<seriesInfo name="RFC" value="7258"/>
<seriesInfo name="DOI" value="10.17487/RFC7258"/>
</reference>



<reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484" quote-title="true">
<front>
<title>DNS Queries over HTTPS (DoH)</title>
<author initials="P." surname="Hoffman" fullname="P. Hoffman"><organization/></author>
<author initials="P." surname="McManus" fullname="P. McManus"><organization/></author>
<date year="2018" month="October"/>
<abstract><t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t></abstract>
</front>
<seriesInfo name="RFC" value="8484"/>
<seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>



<reference anchor="RFC8981" target="https://www.rfc-editor.org/info/rfc8981" quote-title="true">
<front>
<title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
<author initials="F." surname="Gont" fullname="F. Gont"><organization/></author>
<author initials="S." surname="Krishnan" fullname="S. Krishnan"><organization/></author>
<author initials="T." surname="Narten" fullname="T. Narten"><organization/></author>
<author initials="R." surname="Draves" fullname="R. Draves"><organization/></author>
<date year="2021" month="February"/>
<abstract><t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t></abstract>
</front>
<seriesInfo name="RFC" value="8981"/>
<seriesInfo name="DOI" value="10.17487/RFC8981"/>
</reference>



<reference anchor="RFC4193" target="https://www.rfc-editor.org/info/rfc4193" quote-title="true">
<front>
<title>Unique Local IPv6 Unicast Addresses</title>
<author initials="R." surname="Hinden" fullname="R. Hinden"><organization/></author>
<author initials="B." surname="Haberman" fullname="B. Haberman"><organization/></author>
<date year="2005" month="October"/>
<abstract><t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4193"/>
<seriesInfo name="DOI" value="10.17487/RFC4193"/>
</reference>



<reference anchor="RFC2663" target="https://www.rfc-editor.org/info/rfc2663" quote-title="true">
<front>
<title>IP Network Address Translator (NAT) Terminology and Considerations</title>
<author initials="P." surname="Srisuresh" fullname="P. Srisuresh"><organization/></author>
<author initials="M." surname="Holdrege" fullname="M. Holdrege"><organization/></author>
<date year="1999" month="August"/>
<abstract><t>This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="2663"/>
<seriesInfo name="DOI" value="10.17487/RFC2663"/>
</reference>



<reference anchor="RFC8061" target="https://www.rfc-editor.org/info/rfc8061" quote-title="true">
<front>
<title>Locator/ID Separation Protocol (LISP) Data-Plane Confidentiality</title>
<author initials="D." surname="Farinacci" fullname="D. Farinacci"><organization/></author>
<author initials="B." surname="Weis" fullname="B. Weis"><organization/></author>
<date year="2017" month="February"/>
<abstract><t>This document describes a mechanism for encrypting traffic encapsulated using the Locator/ID Separation Protocol (LISP).  The design describes how key exchange is achieved using existing LISP control-plane mechanisms as well as how to secure the LISP data plane from third-party surveillance attacks.</t></abstract>
</front>
<seriesInfo name="RFC" value="8061"/>
<seriesInfo name="DOI" value="10.17487/RFC8061"/>
</reference>



<reference anchor="RFC3972" target="https://www.rfc-editor.org/info/rfc3972" quote-title="true">
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author initials="T." surname="Aura" fullname="T. Aura"><organization/></author>
<date year="2005" month="March"/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="3972"/>
<seriesInfo name="DOI" value="10.17487/RFC3972"/>
</reference>



<reference anchor="RFC4581" target="https://www.rfc-editor.org/info/rfc4581" quote-title="true">
<front>
<title>Cryptographically Generated Addresses (CGA) Extension Field Format</title>
<author initials="M." surname="Bagnulo" fullname="M. Bagnulo"><organization/></author>
<author initials="J." surname="Arkko" fullname="J. Arkko"><organization/></author>
<date year="2006" month="October"/>
<abstract><t>This document defines a Type-Length-Value format for Cryptographically Generated Address (CGA) Extensions.  This document updates RFC 3972.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4581"/>
<seriesInfo name="DOI" value="10.17487/RFC4581"/>
</reference>



<reference anchor="RFC4982" target="https://www.rfc-editor.org/info/rfc4982" quote-title="true">
<front>
<title>Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs)</title>
<author initials="M." surname="Bagnulo" fullname="M. Bagnulo"><organization/></author>
<author initials="J." surname="Arkko" fullname="J. Arkko"><organization/></author>
<date year="2007" month="July"/>
<abstract><t>This document analyzes the implications of recent attacks on commonly used hash functions on Cryptographically Generated Addresses (CGAs) and updates the CGA specification to support multiple hash algorithms.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4982"/>
<seriesInfo name="DOI" value="10.17487/RFC4982"/>
</reference>



<reference anchor="RFC3118" target="https://www.rfc-editor.org/info/rfc3118" quote-title="true">
<front>
<title>Authentication for DHCP Messages</title>
<author initials="R." surname="Droms" fullname="R. Droms" role="editor"><organization/></author>
<author initials="W." surname="Arbaugh" fullname="W. Arbaugh" role="editor"><organization/></author>
<date year="2001" month="June"/>
<abstract><t>This document defines a new Dynamic Host Configuration Protocol (DHCP) option through which authorization tickets can be easily generated and newly attached hosts with proper authorization can be automatically configured from an authenticated DHCP server.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="3118"/>
<seriesInfo name="DOI" value="10.17487/RFC3118"/>
</reference>



<reference anchor="RFC4014" target="https://www.rfc-editor.org/info/rfc4014" quote-title="true">
<front>
<title>Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option</title>
<author initials="R." surname="Droms" fullname="R. Droms"><organization/></author>
<author initials="J." surname="Schnizlein" fullname="J. Schnizlein"><organization/></author>
<date year="2005" month="February"/>
<abstract><t>The RADIUS Attributes suboption enables a network element to pass identification and authorization attributes received during RADIUS authentication to a DHCP server.  When the DHCP server receives a message from a relay agent containing a RADIUS Attributes suboption, it extracts the contents of the suboption and uses that information in selecting configuration parameters for the client.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4014"/>
<seriesInfo name="DOI" value="10.17487/RFC4014"/>
</reference>



<reference anchor="RFC7665" target="https://www.rfc-editor.org/info/rfc7665" quote-title="true">
<front>
<title>Service Function Chaining (SFC) Architecture</title>
<author initials="J." surname="Halpern" fullname="J. Halpern" role="editor"><organization/></author>
<author initials="C." surname="Pignataro" fullname="C. Pignataro" role="editor"><organization/></author>
<date year="2015" month="October"/>
<abstract><t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t></abstract>
</front>
<seriesInfo name="RFC" value="7665"/>
<seriesInfo name="DOI" value="10.17487/RFC7665"/>
</reference>



<reference anchor="RFC6740" target="https://www.rfc-editor.org/info/rfc6740" quote-title="true">
<front>
<title>Identifier-Locator Network Protocol (ILNP) Architectural Description</title>
<author initials="RJ" surname="Atkinson" fullname="RJ Atkinson"><organization/></author>
<author initials="SN" surname="Bhatti" fullname="SN Bhatti"><organization/></author>
<date year="2012" month="November"/>
<abstract><t>This document provides an architectural description and the concept of operations for the Identifier-Locator Network Protocol (ILNP), which is an experimental, evolutionary enhancement to IP.  This is a product of the IRTF Routing Research Group.  This  document defines an Experimental Protocol for the Internet  community.</t></abstract>
</front>
<seriesInfo name="RFC" value="6740"/>
<seriesInfo name="DOI" value="10.17487/RFC6740"/>
</reference>



<reference anchor="RFC2474" target="https://www.rfc-editor.org/info/rfc2474" quote-title="true">
<front>
<title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
<author initials="K." surname="Nichols" fullname="K. Nichols"><organization/></author>
<author initials="S." surname="Blake" fullname="S. Blake"><organization/></author>
<author initials="F." surname="Baker" fullname="F. Baker"><organization/></author>
<author initials="D." surname="Black" fullname="D. Black"><organization/></author>
<date year="1998" month="December"/>
<abstract><t>This document defines the IP header field, called the DS (for differentiated services) field.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="2474"/>
<seriesInfo name="DOI" value="10.17487/RFC2474"/>
</reference>



<reference anchor="RFC8939" target="https://www.rfc-editor.org/info/rfc8939" quote-title="true">
<front>
<title>Deterministic Networking (DetNet) Data Plane: IP</title>
<author initials="B." surname="Varga" fullname="B. Varga" role="editor"><organization/></author>
<author initials="J." surname="Farkas" fullname="J. Farkas"><organization/></author>
<author initials="L." surname="Berger" fullname="L. Berger"><organization/></author>
<author initials="D." surname="Fedyk" fullname="D. Fedyk"><organization/></author>
<author initials="S." surname="Bryant" fullname="S. Bryant"><organization/></author>
<date year="2020" month="November"/>
<abstract><t>This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery.  This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t></abstract>
</front>
<seriesInfo name="RFC" value="8939"/>
<seriesInfo name="DOI" value="10.17487/RFC8939"/>
</reference>



<reference anchor="RFC8402" target="https://www.rfc-editor.org/info/rfc8402" quote-title="true">
<front>
<title>Segment Routing Architecture</title>
<author initials="C." surname="Filsfils" fullname="C. Filsfils" role="editor"><organization/></author>
<author initials="S." surname="Previdi" fullname="S. Previdi" role="editor"><organization/></author>
<author initials="L." surname="Ginsberg" fullname="L. Ginsberg"><organization/></author>
<author initials="B." surname="Decraene" fullname="B. Decraene"><organization/></author>
<author initials="S." surname="Litkowski" fullname="S. Litkowski"><organization/></author>
<author initials="R." surname="Shakir" fullname="R. Shakir"><organization/></author>
<date year="2018" month="July"/>
<abstract><t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called "segments".  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t><t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t><t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t></abstract>
</front>
<seriesInfo name="RFC" value="8402"/>
<seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>



<reference anchor="RFC5533" target="https://www.rfc-editor.org/info/rfc5533" quote-title="true">
<front>
<title>Shim6: Level 3 Multihoming Shim Protocol for IPv6</title>
<author initials="E." surname="Nordmark" fullname="E. Nordmark"><organization/></author>
<author initials="M." surname="Bagnulo" fullname="M. Bagnulo"><organization/></author>
<date year="2009" month="June"/>
<abstract><t>This document defines the Shim6 protocol, a layer 3 shim for providing locator agility below the transport protocols, so that multihoming can be provided for IPv6 with failover and load-sharing properties, without assuming that a multihomed site will have a provider-independent IPv6 address prefix announced in the global IPv6 routing table.  The hosts in a site that has multiple provider- allocated IPv6 address prefixes will use the Shim6 protocol specified in this document to set up state with peer hosts so that the state can later be used to failover to a different locator pair, should the original one stop working.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5533"/>
<seriesInfo name="DOI" value="10.17487/RFC5533"/>
</reference>



<reference anchor="RFC6275" target="https://www.rfc-editor.org/info/rfc6275" quote-title="true">
<front>
<title>Mobility Support in IPv6</title>
<author initials="C." surname="Perkins" fullname="C. Perkins" role="editor"><organization/></author>
<author initials="D." surname="Johnson" fullname="D. Johnson"><organization/></author>
<author initials="J." surname="Arkko" fullname="J. Arkko"><organization/></author>
<date year="2011" month="July"/>
<abstract><t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location.  IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address.  The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address.  To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option.  All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.  This document obsoletes RFC 3775. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="6275"/>
<seriesInfo name="DOI" value="10.17487/RFC6275"/>
</reference>



<reference anchor="RFC7401" target="https://www.rfc-editor.org/info/rfc7401" quote-title="true">
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author initials="R." surname="Moskowitz" fullname="R. Moskowitz" role="editor"><organization/></author>
<author initials="T." surname="Heer" fullname="T. Heer"><organization/></author>
<author initials="P." surname="Jokela" fullname="P. Jokela"><organization/></author>
<author initials="T." surname="Henderson" fullname="T. Henderson"><organization/></author>
<date year="2015" month="April"/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name="RFC" value="7401"/>
<seriesInfo name="DOI" value="10.17487/RFC7401"/>
</reference>


<reference anchor="I-D.ietf-lisp-rfc6830bis" quote-title="true">
   <front>
      <title>The Locator/ID Separation Protocol (LISP)</title>
      <author fullname="Dino Farinacci">
	 <organization>lispers.net</organization>
      </author>
      <author fullname="Vince Fuller">
	 <organization>vaf.net Internet Consulting</organization>
      </author>
      <author fullname="Dave Meyer">
	 <organization>1-4-5.net</organization>
      </author>
      <author fullname="Darrel Lewis">
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname="Albert Cabellos">
	 <organization>UPC/BarcelonaTech</organization>
      </author>
      <date month="November" day="18" year="2020"/>
      <abstract>
	 <t>   This document describes the Data-Plane protocol for the Locator/ID
   Separation Protocol (LISP).  LISP defines two namespaces, End-point
   Identifiers (EIDs) that identify end-hosts and Routing Locators
   (RLOCs) that identify network attachment points.  With this, LISP
   effectively separates control from data, and allows routers to create
   overlay networks.  LISP-capable routers exchange encapsulated packets
   according to EID-to-RLOC mappings stored in a local Map-Cache.

   LISP requires no change to either host protocol stacks or to underlay
   routers and offers Traffic Engineering, multihoming and mobility,
   among other features.

   This document obsoletes RFC 6830.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-rfc6830bis-36"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-lisp-rfc6830bis-36.txt"/>
</reference>



<reference anchor="RFC7348" target="https://www.rfc-editor.org/info/rfc7348" quote-title="true">
<front>
<title>Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks</title>
<author initials="M." surname="Mahalingam" fullname="M. Mahalingam"><organization/></author>
<author initials="D." surname="Dutt" fullname="D. Dutt"><organization/></author>
<author initials="K." surname="Duda" fullname="K. Duda"><organization/></author>
<author initials="P." surname="Agarwal" fullname="P. Agarwal"><organization/></author>
<author initials="L." surname="Kreeger" fullname="L. Kreeger"><organization/></author>
<author initials="T." surname="Sridhar" fullname="T. Sridhar"><organization/></author>
<author initials="M." surname="Bursell" fullname="M. Bursell"><organization/></author>
<author initials="C." surname="Wright" fullname="C. Wright"><organization/></author>
<date year="2014" month="August"/>
<abstract><t>This document describes Virtual eXtensible Local Area Network (VXLAN), which is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants.  The scheme and the related protocols can be used in networks for cloud service providers and enterprise data centers.  This memo documents the deployed VXLAN protocol for the benefit of the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="7348"/>
<seriesInfo name="DOI" value="10.17487/RFC7348"/>
</reference>



<reference anchor="RFC8926" target="https://www.rfc-editor.org/info/rfc8926" quote-title="true">
<front>
<title>Geneve: Generic Network Virtualization Encapsulation</title>
<author initials="J." surname="Gross" fullname="J. Gross" role="editor"><organization/></author>
<author initials="I." surname="Ganga" fullname="I. Ganga" role="editor"><organization/></author>
<author initials="T." surname="Sridhar" fullname="T. Sridhar" role="editor"><organization/></author>
<date year="2020" month="November"/>
<abstract><t>Network virtualization involves the cooperation of devices with a wide variety of capabilities such as software and hardware tunnel endpoints, transit fabrics, and centralized control clusters.  As a result of their role in tying together different elements of the system, the requirements on tunnels are influenced by all of these components.  Therefore, flexibility is the most important aspect of a tunneling protocol if it is to keep pace with the evolution of technology. This document describes Geneve, an encapsulation protocol designed to recognize and accommodate these changing capabilities and needs.</t></abstract>
</front>
<seriesInfo name="RFC" value="8926"/>
<seriesInfo name="DOI" value="10.17487/RFC8926"/>
</reference>



<reference anchor="RFC8609" target="https://www.rfc-editor.org/info/rfc8609" quote-title="true">
<front>
<title>Content-Centric Networking (CCNx) Messages in TLV Format</title>
<author initials="M." surname="Mosko" fullname="M. Mosko"><organization/></author>
<author initials="I." surname="Solis" fullname="I. Solis"><organization/></author>
<author initials="C." surname="Wood" fullname="C. Wood"><organization/></author>
<date year="2019" month="July"/>
<abstract><t>Content-Centric Networking (CCNx) is a network protocol that uses a hierarchical name to forward requests and to match responses to requests.  This document specifies the encoding of CCNx messages in a TLV packet format, including the TLV types used by each message element and the encoding of each value.  The semantics of CCNx messages follow the encoding-independent CCNx Semantics specification.</t><t>This document is a product of the Information Centric Networking research group (ICNRG).  The document received wide review among ICNRG participants and has two full implementations currently in active use, which have informed the technical maturity of the protocol specification.</t></abstract>
</front>
<seriesInfo name="RFC" value="8609"/>
<seriesInfo name="DOI" value="10.17487/RFC8609"/>
</reference>



<reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" quote-title="true">
<front>
<title>Uniform Resource Identifier (URI): Generic Syntax</title>
<author initials="T." surname="Berners-Lee" fullname="T. Berners-Lee"><organization/></author>
<author initials="R." surname="Fielding" fullname="R. Fielding"><organization/></author>
<author initials="L." surname="Masinter" fullname="L. Masinter"><organization/></author>
<date year="2005" month="January"/>
<abstract><t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="STD" value="66"/>
<seriesInfo name="RFC" value="3986"/>
<seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>



<reference anchor="RFC2009" target="https://www.rfc-editor.org/info/rfc2009" quote-title="true">
<front>
<title>GPS-Based Addressing and Routing</title>
<author initials="T." surname="Imielinski" fullname="T. Imielinski"><organization/></author>
<author initials="J." surname="Navas" fullname="J. Navas"><organization/></author>
<date year="1996" month="November"/>
<abstract><t>This document describes a possible experiment with geographic addresses. It uses several specific IP addresses and domain names in the discussion as concrete examples to aid in understanding the concepts.  This memo defines an Experimental Protocol for the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="2009"/>
<seriesInfo name="DOI" value="10.17487/RFC2009"/>
</reference>



<reference anchor="RFC7872" target="https://www.rfc-editor.org/info/rfc7872" quote-title="true">
<front>
<title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
<author initials="F." surname="Gont" fullname="F. Gont"><organization/></author>
<author initials="J." surname="Linkova" fullname="J. Linkova"><organization/></author>
<author initials="T." surname="Chown" fullname="T. Chown"><organization/></author>
<author initials="W." surname="Liu" fullname="W. Liu"><organization/></author>
<date year="2016" month="June"/>
<abstract><t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t></abstract>
</front>
<seriesInfo name="RFC" value="7872"/>
<seriesInfo name="DOI" value="10.17487/RFC7872"/>
</reference>



<reference anchor="RFC8986" target="https://www.rfc-editor.org/info/rfc8986" quote-title="true">
<front>
<title>Segment Routing over IPv6 (SRv6) Network Programming</title>
<author initials="C." surname="Filsfils" fullname="C. Filsfils" role="editor"><organization/></author>
<author initials="P." surname="Camarillo" fullname="P. Camarillo" role="editor"><organization/></author>
<author initials="J." surname="Leddy" fullname="J. Leddy"><organization/></author>
<author initials="D." surname="Voyer" fullname="D. Voyer"><organization/></author>
<author initials="S." surname="Matsushima" fullname="S. Matsushima"><organization/></author>
<author initials="Z." surname="Li" fullname="Z. Li"><organization/></author>
<date year="2021" month="February"/>
<abstract><t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t><t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t><t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t></abstract>
</front>
<seriesInfo name="RFC" value="8986"/>
<seriesInfo name="DOI" value="10.17487/RFC8986"/>
</reference>


<reference anchor="I-D.rafiee-6man-cga-attack" quote-title="true">
   <front>
      <title>Possible Attack on Cryptographically Generated Addresses (CGA)</title>
      <author fullname="Hosnieh Rafiee">
	 </author>
      <author fullname="Christoph Meinel">
	 </author>
      <date month="May" day="8" year="2015"/>
      <abstract>
	 <t>   This document describes the possible attacks with the use of
   Cryptographically Generated Addresses.





	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-rafiee-6man-cga-attack-03"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-rafiee-6man-cga-attack-03.txt"/>
</reference>



<reference anchor="RFC8280" target="https://www.rfc-editor.org/info/rfc8280" quote-title="true">
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author initials="N." surname="ten Oever" fullname="N. ten Oever"><organization/></author>
<author initials="C." surname="Cath" fullname="C. Cath"><organization/></author>
<date year="2017" month="October"/>
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name="RFC" value="8280"/>
<seriesInfo name="DOI" value="10.17487/RFC8280"/>
</reference>


<reference anchor="I-D.ietf-intarea-tunnels" quote-title="true">
   <front>
      <title>IP Tunnels in the Internet Architecture</title>
      <author fullname="Joe Touch">
	 <organization>Independent consultant</organization>
      </author>
      <author fullname="Mark Townsley">
	 <organization>Cisco</organization>
      </author>
      <date month="September" day="12" year="2019"/>
      <abstract>
	 <t>   This document discusses the role of IP tunnels in the Internet
   architecture. An IP tunnel transits IP datagrams as payloads in non-
   link layer protocols. This document explains the relationship of IP
   tunnels to existing protocol layers and the challenges in supporting
   IP tunneling, based on the equivalence of tunnels to links. The
   implications of this document are used to derive recommendations that
   update MTU and fragment issues in RFC 4459.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-tunnels-10"/>
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-intarea-tunnels-10.txt"/>
</reference>



<reference anchor="RFC0757" target="https://www.rfc-editor.org/info/rfc757" quote-title="true">
<front>
<title>Suggested solution to the naming, addressing, and delivery problem for ARPANET message systems</title>
<author initials="D.P." surname="Deutsch" fullname="D.P. Deutsch"><organization/></author>
<date year="1979" month="September"/>
</front>
<seriesInfo name="RFC" value="757"/>
<seriesInfo name="DOI" value="10.17487/RFC0757"/>
</reference>




    </references>


<!--

# Change Log
**NOTES**: Please remove this section prior to publication of a final version of this document.

-->

<section numbered="false" anchor="acknowledgments" title="Acknowledgments" toc="default">

<t>Thanks to Carsten Bormann for useful conversations.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>
