<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chroboczek-intarea-v4-via-v6-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="v4-via-v6">IPv4 routes with an IPv6 next hop</title>
    <seriesInfo name="Internet-Draft" value="draft-chroboczek-intarea-v4-via-v6-00"/>
    <author fullname="Juliusz Chroboczek">
      <organization>IRIF, University of Paris</organization>
      <address>
        <postal>
          <street>Case 7014</street>
          <street>75205 Paris Cedex 13</street>
          <street>France</street>
        </postal>
        <email>jch@irif.fr</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="T." surname="Høiland-Jørgensen" fullname="Toke Høiland-Jørgensen">
      <organization>Red Hat</organization>
      <address>
        <email>toke@toke.dk</email>
      </address>
    </author>
    <date year="2024" month="January" day="21"/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 62?>

<t>We propose "v4-via-v6" routing, a technique that uses IPv6 next-hop
addresses for routing IPv4 packets, thus making it possible to route IPv4
packets across a network where routers have not been assigned IPv4
addresses.  We describe the technique, and discuss its operational
implications.</t>
      <t>{ Editor note: This document was originally published as draft-chroboczek-int-v4-via-v6, and later renamed to
draft-chroboczek-intarea-v4-via-v6 . }</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://wkumari.github.io/draft-chroboczek-intarea-v4-via-v6/draft-chroboczek-intarea-v4-via-v6.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-chroboczek-intarea-v4-via-v6/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Internet Area Working Group Working Group mailing list (<eref target="mailto:int-area@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/int-area/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/wkumari/draft-chroboczek-intarea-v4-via-v6"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The dominant form of routing in the Internet is next-hop routing, where
a routing protocol constructs a routing table which is used by
a forwarding process to forward packets.  The routing table is a data
structure that maps network prefixes in a given family (IPv4 or IPv6) to
next hops, pairs of an outgoing interface and a neighbor's network
address, for example:</t>
      <artwork><![CDATA[
    destination                      next hop
  2001:db8:0:1::/64               eth0, fe80::1234:5678
  203.0.113.0/24                  eth0, 192.0.2.1
]]></artwork>
      <t>When a packet is routed according to a given routing table entry, the
forwarding plane uses a neighbor discovery protocol (the Neighbor
Discovery protocol (ND) <xref target="RFC4861"/> in the case of IPv6, the Address
Resolution Protocol (ARP) <xref target="RFC0826"/> in the case of IPv4) to map the
next-hop address to a link-layer address (a "MAC address"), which is then
used to construct the link-layer frames that encapsulate forwarded
packets.</t>
      <t>It is apparent from the description above that there is no fundamental
reason why the destination prefix and the next-hop address should be in
the same address family: there is nothing preventing an IPv6 packet from
being routed through a next hop with an IPv4 address (in which case the
next hop's MAC address will be obtained using ARP), or, conversely, an
IPv4 packet from being routed through a next hop with an IPv6 address.
(In fact, it is even possible to store link-layer addresses directly in
the next-hop entry of the routing table, thus avoiding the use of an
address resolution protocol altogether, which is commonly done in networks
using the OSI protocol suite).</t>
      <t>The case of routing IPv4 packets through an IPv6 next hop is
particularly interesting, since it makes it possible to build
networks that have no IPv4 addresses except at the edges and still
provide IPv4 connectivity to edge hosts. In addition, since an IPv6
next hop can use a link-local address that is autonomously
configured, the use of such routes enables a mode of operation where
the network core has no statically assigned IP addresses of either
family, which significantly reduces the amount of manual
configuration required.  (See also <xref target="RFC7404"/> for a discussion of the
issues involved with such an approach.)</t>
      <t>We call a route towards an IPv4 prefix that uses an IPv6 next hop a
"v4-via-v6" route.</t>
      <t><xref target="RFC8950"/> discusses advertising of IPv4 NLRI with a next-hop address that
belongs to the IPv6 protocol, but confines itself to how this is carried and
advertised in the BGP protocol. This document, on the other hand, discusses the
concept of v4-via-v6 routes independently of any specific routing protocol,
their design and operational considerations, and the implications of using
them.</t>
      <t>{ Editor note, to be removed before publication. This document is heavily based
on draft-ietf-babel-v4viav6. When draft-ietf-babel-v4viav6 was
going through IESG eval, Warren raised concerns that something this
fundamental deserved to be documented in a separate, standalone document, so
that it can be more fully discussed, and, more importantly, referenced
cleanly in the future.}</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="operation">
      <name>Operation</name>
      <t>Next-hop routing is implemented by two separate components, the routing
protocol and the forwarding plane, that communicate through a shared
data structure, the routing table.</t>
      <section anchor="structure-of-the-routing-table">
        <name>Structure of the routing table</name>
        <t>The routing table is a data structure that maps address prefixes to
next-hops, pairs of the form (interface, address).  In traditional
next-hop routing, the routing table maps IPv4 prefixes to IPv4 next hops,
and IPv6 addresses to IPv6 next hops.  With v4-via-v6 routing, the routing
table is extended so that an IPv4 prefix may map to either an IPv4 or an
IPv6 next hop.</t>
      </section>
      <section anchor="operation-of-the-forwarding-plane">
        <name>Operation of the forwarding plane</name>
        <t>The forwarding plane is the part of the routing implementation that is
executed for every forwarded packet.  As a packet arrives, the forwarding
plane consults the routing table, selects a single route matching the
packet, determines the next-hop address, and forwards the packet to the
next-hop address.</t>
        <t>With v4-via-v6 routing, the address family of the next-hop address is no
longer determined by the address family of the prefix: since the routing
table may map an IPv4 prefix to either an IPv4 or an IPv6 next-hop, the
forwarding plane must be able to determine, on a per-packet basis, whether
the next-hop address is an IPv4 or an IPv6 address, and to use that
information in order to choose the right address resolution protocol to
use (ARP for IP4, ND for IPv6).</t>
      </section>
      <section anchor="operation-of-routing-protocols">
        <name>Operation of routing protocols</name>
        <t>The routing protocol is the part of the routing implementation that is
executed asynchronously from the forwarding plane, and whose role is to
build the routing table.  Since v4-via-v6 routing is a generalisation of
traditional next-hop routing, v4-via-v6 can interoperate with existing
routing protocols: a traditional routing protocol produces a traditional
next-hop routing table, which can be used by an implementation supporting
v4-via-v6 routing.</t>
        <t>However, in order to use the additional flexibility provided by v4-via-v6
routing, routing protocols will need to be extended with the ability to
populate the routing table with v4-via-v6 routes when an IPv4 address is
not available or when the available IPv4 addresses are not suitable for
use as a next-hop (e.g., not stable enough).</t>
        <section anchor="distance-vector-routing-protocols">
          <name>Distance-vector routing protocols</name>
        </section>
        <section anchor="link-state-routing-protocols">
          <name>Link-state routing protocols</name>
        </section>
      </section>
    </section>
    <section anchor="icmp-considerations">
      <name>ICMP Considerations</name>
      <t>The Internet Control Message Protocol (ICMPv4, or simply ICMP)
<xref target="RFC0792"/> is a protocol related to IPv4 that is primarily used to
carry diagnostic and debugging information.  ICMPv4 packets may be
originated by end hosts (e.g., the "destination unreachable, port
unreachable" ICMPv4 packet), but they may also be originated by
intermediate routers (e.g., most other kinds of "destination
unreachable" packets).</t>
      <t>Some protocols deployed in the Internet rely on ICMPv4 packets sent
by intermediate routers.  Most notably, path MTU Discovery (PMTUd)
<xref target="RFC1191"/> is an algorithm executed by end hosts to discover the
maximum packet size that a route is able to carry.  While there exist
variants of PMTUd that are purely end-to-end <xref target="RFC4821"/>, the variant
most commonly deployed in the Internet has a hard dependency on
ICMPv4 packets originated by intermediate routers: if intermediate
routers are unable to send ICMPv4 packets, PMTUd may lead to
persistent black-holing of IPv4 traffic.</t>
      <t>Due to this kind of dependency, every router that is able to
forward IPv4 traffic <bcp14>SHOULD</bcp14> be able originate ICMPv4 traffic.  Since
the extension described in this document enables routers to forward
IPv4 traffic received over an interface that has not been assigned an
IPv4 address, a router implementing this extension <bcp14>MUST</bcp14> be able to
originate ICMPv4 packets even when the outgoing interface has not
been assigned an IPv4 address.</t>
      <t>In such a situation, if the router has an interface that has been
assigned an IPv4 address (other than the loopback address), or if an
IPv4 address has been assigned to the router itself (to the "loopback
interface"), then that IPv4 address may be used as the source of
originated ICMPv4 packets.  If no IPv4 address is available, the
router could use the experimental mechanism described in Requirement
R-22 of Section 4.8 <xref target="RFC7600"/>, which consists of using the dummy
address 192.0.0.8 as the source address of originated ICMPv4 packets.
Note however that using the same address on multiple routers may
hamper debugging and fault isolation, e.g., when using the
"traceroute" utility.</t>
      <t>{Editor note: It would be surprising to many operators to see something like:</t>
      <artwork><![CDATA[
> $ traceroute -n 8.8.8.8
traceroute to 8.8.8.8 (8.8.8.8), 64 hops max, 52 byte packets
 1  192.168.0.1  1.894 ms  1.953 ms  1.463 ms
 2  192.0.0.8  9.012 ms  8.852 ms  12.211 ms
 3  192.0.0.8  8.445 ms  9.426 ms  9.781 ms
 4  192.0.0.8  9.984 ms  10.282 ms  10.763 ms
 5  192.0.0.8  13.994 ms  13.031 ms  12.948 ms
 6  192.0.0.8  27.502 ms  26.895 ms
 7  8.8.8.8  26.509 ms
]]></artwork>
      <t>Is this a problem though? If this becomes common practice, will operators
just come to understand that the repeated 192.0.0.8 is not actually a looping
packet, but rather that the packet is (probably!) making forward progress?
What if it goes:
<tt>192.168.0.1 -&gt; 192.0.0.8 -&gt; 10.10.10.10 -&gt; 192.0.0.8 -&gt; 172.16.14.2 -&gt; dest?</tt></t>
      <t>In addition, see RFC5837, and, as a side note, Bill Fenner is working on an
update to that document.
}</t>
      <t>{ Editor note / question:
192.0.0.8 is assigned in the <xref target="IANA-IPV4-REGISTRY"/> as the "IPv4 dummy address".
It may be used as a Source Address, and was requested in <xref target="RFC7600"/> to be used
as the IPv4 source address when synthesizing an ICMPv4 packet to mirror an
ICMPv6 error message.  This is all fine and good - but, 192.0.0.0/24 is
commonly considered a bogon or martian</t>
      <t>Example (from a Juniper router):</t>
      <artwork><![CDATA[
wkumari@rtr2.pao> show route martians

inet.0:
             0.0.0.0/0 exact -- allowed
             0.0.0.0/8 orlonger -- disallowed
             127.0.0.0/8 orlonger -- disallowed
             192.0.0.0/24 orlonger -- disallowed
             240.0.0.0/4 orlonger -- disallowed
             224.0.0.0/4 exact -- disallowed
             224.0.0.0/24 exact -- disallowed
]]></artwork>
      <t>This means that these packets are likely to be filtered in many places, and
so ICMP packets with this source address are likely to be dropped. Is this a
major issue? Would requesting another address be a better solution? Would it help? If it were to be allocated from some more global pool, it would still
likely require "magic" to allow it to pass BCP38 filters.
}</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>( This section to be removed before publication. )</t>
      <t>As this document does not really define a protocol, this implementation status
section is much less formal. Instead, it is being used as a place to list implementations which are known to support this functionality, examples, notes, etc. This information is provided as a guide to the reader, and is not intended to be a complete list, nor endorsement, etc. If you know of an implementation which is not listed, please let the authors know.</t>
      <section anchor="arista-eos">
        <name>Arista EOS</name>
        <t>Arista has supported static IPv4 routes with IPv6 nexthops since EOS-4.30.1.</t>
      </section>
      <section anchor="the-babel-routing-protocol">
        <name>The Babel routing protocol</name>
        <t>As noted above, this document is heavily based on RFC9229
(nee draft-ietf-babel-v4viav6), and this functionality is supported by babeld.</t>
        <t>Pasted below is email sent to the babel mailing list (archived
at https://mailarchive.ietf.org/arch/msg/babel/QtFi3F4TFfF7fXXlkHSpEnuT44Y/)</t>
        <t>A route across three IPv6-only nodes:</t>
        <artwork><![CDATA[
$ ip route show 10.0.0.2
10.0.0.2 via inet6 fe80::216:3eff:fe00:1 dev lxcbr0 proto babel onlink
]]></artwork>
        <t>Here's how it's logged by babeld:</t>
        <artwork><![CDATA[
10.0.0.2/32 from 0.0.0.0/0 metric 384 (384) refmetric 288 id
02:16:3e:ff:fe:9a:5e:22 seqno 36425 chan (255) age 15 via lxcbr0 neigh
fe80::216:3eff:fe00:1 (installed)
]]></artwork>
        <t>Traceroute is a little confusing:</t>
        <artwork><![CDATA[
$ traceroute 10.0.0.2
traceroute to 10.0.0.2 (10.0.0.2), 30 hops max, 60 byte packets
 1  192.0.0.8 (192.0.0.8)  0.079 ms  0.019 ms  0.014 ms
 2  192.0.0.8 (192.0.0.8)  0.040 ms  0.023 ms  0.042 ms
 3  192.0.0.8 (192.0.0.8)  0.061 ms  0.030 ms  0.030 ms
 4  10.0.0.2 (10.0.0.2)  0.060 ms  0.040 ms  0.039 ms
]]></artwork>
        <t>PMTUD works fine (thanks to Toke):</t>
        <artwork><![CDATA[
19:58:47.402871 IP 192.168.0.27.60046 > 10.0.0.2.22: Flags [.],\
seq 33:1481, ack 33, win 502, options [nop,nop,TS val 917354570\
ecr 1849974691], length 1448
19:58:47.402874 IP 192.168.0.27.60046 > 10.0.0.2.22: Flags [P.],\
seq 1481:1537, ack 33, win 502, options [nop,nop,TS val 917354570\
ecr 1849974691], length 56
19:58:47.402906 IP 192.0.0.8 > 192.168.0.27: ICMP 10.0.0.2 \
unreachable- need to frag (mtu 1420), length 556
19:58:47.402919 IP 10.0.0.2.22 > 192.168.0.27.60046: Flags [.],\
ack 33, win 509, options [nop,nop,TS val 1849974692 \
ecr 917354569,nop,nop,sac 1 {1481:1537}], length 0
19:58:47.402934 IP 192.168.0.27.60046 > 10.0.0.2.22: Flags [.], \
seq 33:1401, ack 33, win 502, options [nop,nop,TS val 917354570 \
ecr 1849974692], length 1368
]]></artwork>
        <t>-- Juliusz</t>
      </section>
      <section anchor="linux">
        <name>Linux</name>
        <t>Linux has supported v4-via-v6 routes since kernel version 5.2, released on 2019-07-07.</t>
        <section anchor="example">
          <name>Example:</name>
          <artwork><![CDATA[
rincewind ~ #
ip -4 r a 192.0.2.23/32 via inet6 2001:db8::2342

rincewind ~ # ip r s 192.0.2.23/32
192.0.2.23 via inet6 2001:db8::2342 dev wlp36s0.25
]]></artwork>
        </section>
      </section>
      <section anchor="mikrotik-routeros">
        <name>Mikrotik RouterOS</name>
        <t>Mikrotik RouterOS has supported v4-via-v6 routes since (at least) version
7.11beta2</t>
        <t>{Editor note: I'm not sure when support was added. I tested this in Version
7.11beta2, and it worked there, but I believe that this functionality has
existed for a while. I'll try to find out when it was added.}</t>
        <section anchor="example-1">
          <name>Example</name>
          <artwork><![CDATA[
[wkumari@Dulles-CCR] /ip/route> print
Flags: D - DYNAMIC; I - INACTIVE, A - ACTIVE; c - CONNECT, s - STATIC,
d -DHCP, v - VPN; H - HW-OFFLOADED
Columns: DST-ADDRESS, GATEWAY, DISTANCE
#      DST-ADDRESS       GATEWAY                             DISTANCE
0  As  192.0.2.0/24      fe80::201:5cff:feb2:1646%1_Comcast         1
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The techniques described in this document make routing more flexible by
allowing IPv4 routes to propagate across a section of a network that has
only been assigned IPv6 addresses.  This additional flexibility might
invalidate otherwise reasonable assumptions made by network
administrators, which could potentially cause security issues.</t>
      <t>For example, if an island of IPv4-only hosts is separated from the IPv4
Internet by routers that have not been assigned IPv4 addresses, a network
administrator might reasonably assume that the IPv4-only hosts are
unreachable from the IPv4 Internet.  This assumption is broken if the
intermediary routers implement v4-via-v6 routing, which might make the
IPv4-only hosts reachable from the IPv4 Internet.  If this is not
desirable, then the network administrator must filter out the undesirable
traffic in the forwarding plane by implementing suitable packet filtering
rules.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7600">
          <front>
            <title>IPv4 Residual Deployment via IPv6 - A Stateless Solution (4rd)</title>
            <author fullname="R. Despres" initials="R." surname="Despres"/>
            <author fullname="S. Jiang" initials="S." role="editor" surname="Jiang"/>
            <author fullname="R. Penno" initials="R." surname="Penno"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="G. Chen" initials="G." surname="Chen"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This document specifies a stateless solution for service providers to progressively deploy IPv6-only network domains while still offering IPv4 service to customers. The solution's distinctive properties are that TCP/UDP IPv4 packets are valid TCP/UDP IPv6 packets during domain traversal and that IPv4 fragmentation rules are fully preserved end to end. Each customer can be assigned one public IPv4 address, several public IPv4 addresses, or a shared address with a restricted port set.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7600"/>
          <seriesInfo name="DOI" value="10.17487/RFC7600"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC0792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC0826">
          <front>
            <title>An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware</title>
            <author fullname="D. Plummer" initials="D." surname="Plummer"/>
            <date month="November" year="1982"/>
            <abstract>
              <t>The purpose of this RFC is to present a method of Converting Protocol Addresses (e.g., IP addresses) to Local Network Addresses (e.g., Ethernet addresses). This is an issue of general concern in the ARPA Internet Community at this time. The method proposed here is presented for your consideration and comment. This is not the specification of an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="37"/>
          <seriesInfo name="RFC" value="826"/>
          <seriesInfo name="DOI" value="10.17487/RFC0826"/>
        </reference>
        <reference anchor="RFC1191">
          <front>
            <title>Path MTU discovery</title>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="November" year="1990"/>
            <abstract>
              <t>This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path. It specifies a small change to the way routers generate one type of ICMP message. For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1191"/>
          <seriesInfo name="DOI" value="10.17487/RFC1191"/>
        </reference>
        <reference anchor="RFC4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC7404">
          <front>
            <title>Using Only Link-Local Addressing inside an IPv6 Network</title>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="E. Vyncke" initials="E." surname="Vyncke"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>In an IPv6 network, it is possible to use only link-local addresses on infrastructure links between routers. This document discusses the advantages and disadvantages of this approach to facilitate the decision process for a given network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7404"/>
          <seriesInfo name="DOI" value="10.17487/RFC7404"/>
        </reference>
        <reference anchor="RFC8950">
          <front>
            <title>Advertising IPv4 Network Layer Reachability Information (NLRI) with an IPv6 Next Hop</title>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="S. Agrawal" initials="S." surname="Agrawal"/>
            <author fullname="K. Ananthamurthy" initials="K." surname="Ananthamurthy"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>Multiprotocol BGP (MP-BGP) specifies that the set of usable next-hop address families is determined by the Address Family Identifier (AFI) and the Subsequent Address Family Identifier (SAFI). The AFI/SAFI definitions for the IPv4 address family only have provisions for advertising a next-hop address that belongs to the IPv4 protocol when advertising IPv4 Network Layer Reachability Information (NLRI) or VPN-IPv4 NLRI.</t>
              <t>This document specifies the extensions necessary to allow the advertising of IPv4 NLRI or VPN-IPv4 NLRI with a next-hop address that belongs to the IPv6 protocol. This comprises an extension of the AFI/SAFI definitions to allow the address of the next hop for IPv4 NLRI or VPN-IPv4 NLRI to also belong to the IPv6 protocol, the encoding of the next hop to determine which of the protocols the address actually belongs to, and a BGP Capability allowing MP-BGP peers to dynamically discover whether they can exchange IPv4 NLRI and VPN-IPv4 NLRI with an IPv6 next hop. This document obsoletes RFC 5549.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8950"/>
          <seriesInfo name="DOI" value="10.17487/RFC8950"/>
        </reference>
        <reference anchor="IANA-IPV4-REGISTRY">
          <front>
            <title>IANA IPv4 Address Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="https://www.iana.org/assignments/iana-ipv4-special-registry/"/>
        </reference>
      </references>
    </references>
    <?line 418?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
