<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc rfcprocack="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-clw-6man-rfc8504-bis-00" category="bcp" consensus="true" submissionType="IETF" obsoletes="8504" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title>IPv6 Node Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-clw-6man-rfc8504-bis-00"/>
    <seriesInfo name="bcp" value="220"/>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <postal>
          <street>Lumen House, Library Avenue</street>
          <city>Harwell Oxford, Didcot</city>
          <code>OX11 0SG</code>
          <country>United Kingdom</country>
        </postal>
        <email>tim.chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Loughney" fullname="John Loughney">
      <organization>Intel</organization>
      <address>
        <postal>
          <city>Santa Clara, CA</city>
          <country>United States of America</country>
        </postal>
        <phone/>
        <email>john.loughney@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Winters" fullname="Timothy Winters">
      <organization abbrev="UNH-IOL">University of New Hampshire, Interoperability Lab (UNH-IOL)</organization>
      <address>
        <postal>
          <city>Durham</city>
          <region>NH</region>
          <country>United States of America</country>
        </postal>
        <email>twinters@iol.unh.edu</email>
      </address>
    </author>
    <date year="2024" month="July" day="07"/>
    <area>Internet</area>
    <workgroup>IPv6 Maintenance</workgroup>
    <keyword>IPv6</keyword>
    <abstract>
      <?line 188?>

<t>This document defines requirements for IPv6 nodes.  It is
expected that IPv6 will be deployed in a wide range of devices and
situations.  Specifying the requirements for IPv6 nodes allows
IPv6 to function well and interoperate in a large number of
situations and deployments.</t>
      <t>This document obsoletes RFC 8504, and in turn RFC 6434 and its predecessor, RFC 4294.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://timchown.github.io/rfc8504-bis/draft-clw-6man-rfc8504-bis.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-clw-6man-rfc8504-bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Maintenance Working Group mailing list (<eref target="mailto:ipv6@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipv6/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipv6/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/timchown/rfc8504-bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 199?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines common functionality required by both
IPv6 hosts and routers.  Many IPv6 nodes will implement optional
or additional features, but this document collects and summarizes
requirements from other published Standards Track documents in one
place.</t>
      <t>This document tries to avoid discussion of protocol details
and references RFCs for this purpose.  This document is intended
to be an applicability statement and to provide guidance as to which
IPv6 specifications should be implemented in the general case and
which specifications may be of interest to specific deployment
scenarios. This document does not update any individual protocol
document RFCs.</t>
      <t>Although this document points to different specifications, it
should be noted that in many cases, the granularity of a
particular requirement will be smaller than a single specification,
as many specifications define multiple, independent pieces, some
of which may not be mandatory. In addition, most specifications
define both client and server behavior in the same specification,
while many implementations will be focused on only one of those
roles.</t>
      <t>This document defines a minimal level of requirement needed
for a device to provide useful Internet service and considers a
broad range of device types and deployment scenarios. Because of
the wide range of deployment scenarios, the minimal requirements
specified in this document may not be sufficient for all
deployment scenarios. It is perfectly reasonable (and indeed
expected) for other profiles to define additional or stricter
requirements appropriate for specific usage and deployment
environments. As an example, this document does not mandate that all
clients support DHCP, but some deployment scenarios may deem
it appropriate to make such a requirement. As another example,
NIST has defined profiles for specialized requirements for IPv6
in target environments (see <xref target="USGv6"/>).</t>
      <t>As it is not always possible for an implementer to know the
exact usage of IPv6 in a node, an overriding requirement for IPv6
nodes is that they should adhere to Jon Postel's Robustness
Principle: "Be conservative in what you do, be liberal in what you accept
from others" <xref target="RFC0793"/>.</t>
      <section anchor="scope-of-this-document">
        <name>Scope of This Document</name>
        <t>IPv6 covers many specifications.  It is intended that IPv6
will be deployed in many different situations and environments.
Therefore, it is important to develop requirements for IPv6
nodes to ensure interoperability.</t>
      </section>
      <section anchor="description-of-ipv6-nodes">
        <name>Description of IPv6 Nodes</name>
        <t>From "Internet Protocol, Version 6 (IPv6) Specification" <xref target="RFC8200"/>, we
have the following definitions:</t>
        <artwork><![CDATA[
IPv6 node   - a device that implements IPv6.
IPv6 router - a node that forwards IPv6 packets not explicitly
              addressed to itself.
IPv6 host   - any IPv6 node that is not a router.
]]></artwork>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="abbreviations-used-in-this-document">
      <name>Abbreviations Used in This Document</name>
      <artwork><![CDATA[
AH    Authentication Header
DAD   Duplicate Address Detection
ESP   Encapsulating Security Payload
ICMP  Internet Control Message Protocol
IKE   Internet Key Exchange
MIB   Management Information Base
MLD   Multicast Listener Discovery
MTU   Maximum Transmission Unit
NA    Neighbor Advertisement
NBMA  Non-Broadcast Multi-Access
ND    Neighbor Discovery
NS    Neighbor Solicitation
NUD   Neighbor Unreachability Detection
PPP   Point-to-Point Protocol
]]></artwork>
    </section>
    <section anchor="sub-ip-layer">
      <name>Sub-IP Layer</name>
      <t>An IPv6 node <bcp14>MUST</bcp14> include support for one or more IPv6
link-layer specifications.  Which link-layer specifications an
implementation should include will depend upon what link layers
are supported by the hardware available on the system.  It is
possible for a conformant IPv6 node to support IPv6 on some of its
interfaces and not on others.</t>
      <t>As IPv6 is run over new Layer 2 technologies, it is expected
that new specifications will be issued.  We list here some of
the Layer 2 technologies for which an IPv6 specification has been developed.
It is provided for informational purposes only and may
not be complete.</t>
      <ul spacing="normal">
        <li>
          <t>Transmission of IPv6 Packets over Ethernet Networks <xref target="RFC2464"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over Frame Relay Networks Specification
<xref target="RFC2590"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 1394 Networks <xref target="RFC3146"/></t>
        </li>
        <li>
          <t>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP)
Packets over Fibre Channel <xref target="RFC4338"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 802.15.4 Networks <xref target="RFC4944"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE
802.16 Networks <xref target="RFC5121"/></t>
        </li>
        <li>
          <t>IP version 6 over PPP <xref target="RFC5072"/></t>
        </li>
      </ul>
      <t>In addition to traditional physical link layers, it is also
possible to tunnel IPv6 over other protocols. Examples
include:</t>
      <ul spacing="normal">
        <li>
          <t>Teredo: Tunneling IPv6 over UDP through Network Address Translations
(NATs) <xref target="RFC4380"/></t>
        </li>
        <li>
          <t>Basic Transition Mechanisms for IPv6 Hosts and Routers (see <xref section="3" sectionFormat="of" target="RFC4213"/>)</t>
        </li>
      </ul>
    </section>
    <section anchor="ip-layer">
      <name>IP Layer</name>
      <section anchor="internet-protocol-version-6-rfc-8200">
        <name>Internet Protocol Version 6 - RFC 8200</name>
        <t>The Internet Protocol version 6 is specified in <xref target="RFC8200"/>.  This specification <bcp14>MUST</bcp14> be supported.</t>
        <t>The node <bcp14>MUST</bcp14> follow the packet transmission rules in RFC 8200.</t>
        <t>All conformant IPv6 implementations <bcp14>MUST</bcp14> be
capable of sending and receiving IPv6 packets; forwarding
functionality <bcp14>MAY</bcp14> be supported.
Nodes <bcp14>MUST</bcp14> always be able to send, receive, and process
Fragment headers.</t>
        <t>IPv6 nodes <bcp14>MUST NOT</bcp14> create
overlapping fragments.  Also, when reassembling an IPv6
datagram, if one or more of its constituent fragments is
determined to be an overlapping fragment, the entire datagram
(and any constituent fragments) <bcp14>MUST</bcp14> be silently discarded.
See <xref target="RFC5722"/> for more information.</t>
        <t>As recommended in <xref target="RFC8021"/>, nodes <bcp14>MUST NOT</bcp14>
generate atomic fragments, i.e., where the fragment is a whole datagram.
As per <xref target="RFC6946"/>, if a receiving node reassembling
a datagram encounters an atomic fragment,
it should be processed as a fully reassembled packet, and
any other fragments that match this packet should be processed independently.</t>
        <t>To mitigate a variety of potential attacks,
nodes <bcp14>SHOULD</bcp14> avoid using predictable Fragment Identification values
in Fragment headers, as discussed in <xref target="RFC7739"/>.</t>
        <t>All nodes <bcp14>SHOULD</bcp14> support the setting and use of the IPv6 Flow
Label field as defined in the IPv6 Flow Label specification <xref target="RFC6437"/>.  Forwarding nodes such as routers and load distributors
<bcp14>MUST NOT</bcp14> depend only on Flow Label values being uniformly
distributed.  It is <bcp14>RECOMMENDED</bcp14> that source hosts support the flow
label by setting the Flow Label field for all packets of a given
flow to the same value chosen from an approximation to a discrete
uniform distribution.</t>
      </section>
      <section anchor="support-for-ipv6-extension-headers">
        <name>Support for IPv6 Extension Headers</name>
        <t>RFC 8200 specifies extension headers and the processing for
these headers.</t>
        <t>Extension headers (except for the Hop-by-Hop Options header) are not
processed, inserted, or deleted by any node along a packet's delivery
path, until the packet reaches the node (or each of the set of nodes,
in the case of multicast) identified in the Destination Address field
of the IPv6 header.</t>
        <t>Any unrecognized extension headers or options <bcp14>MUST</bcp14> be
processed as described in RFC 8200. Note that where
<xref section="4" sectionFormat="of" target="RFC8200"/>
refers to the action to be taken when a Next Header value
in the current header is not recognized by a node, that action
applies whether the value is an unrecognized extension
header or an unrecognized upper-layer protocol (ULP).</t>
        <t>An IPv6 node <bcp14>MUST</bcp14> be able to process these extension headers.  An
exception is Routing Header type 0 (RH0), which was deprecated
by <xref target="RFC5095"/> due to security concerns and
which <bcp14>MUST</bcp14> be treated as an unrecognized routing type.</t>
        <t>Further, <xref target="RFC7045"/> adds specific requirements for
the processing of extension headers, in particular that any forwarding
node along an IPv6 packet's path, which forwards the packet for
any reason, <bcp14>SHOULD</bcp14> do so regardless of any extension headers
that are present.</t>
        <t>As per RFC 8200, when a node fragments an IPv6 datagram,
it <bcp14>MUST</bcp14> include the entire IPv6 Header Chain in the first fragment.
The Per-Fragment headers <bcp14>MUST</bcp14>
consist of the IPv6 header plus any extension headers that <bcp14>MUST</bcp14> be
processed by nodes en route to the destination,
that is, all headers up to and including the Routing
header if present, else the Hop-by-Hop Options header if present,
else no extension headers.  On reassembly,
if the first fragment does not include all headers through an
upper-layer header, then that fragment <bcp14>SHOULD</bcp14> be discarded and
an ICMP Parameter Problem, Code 3, message <bcp14>SHOULD</bcp14> be sent to
the source of the fragment, with the Pointer field set to zero.
See <xref target="RFC7112"/> for a discussion of why oversized
IPv6 Extension Header Chains are avoided.</t>
        <t>Defining new IPv6 extension headers is not recommended, unless there
are no existing IPv6 extension headers that can be used by specifying
a new option for that IPv6 extension header.  A proposal to specify a
new IPv6 extension header <bcp14>MUST</bcp14> include a detailed technical
explanation of why an existing IPv6 extension header can not be used
for the desired new function, and in such cases, it needs to follow the format
described in <xref section="8" sectionFormat="of" target="RFC8200"/>.  For further background
reading on this topic, see <xref target="RFC6564"/>.</t>
      </section>
      <section anchor="protecting-a-node-from-excessive-extension-header-options">
        <name>Protecting a Node from Excessive Extension Header Options</name>
        <t>As per RFC 8200, end hosts are expected to process all extension headers,
destination options, and hop-by-hop options in a packet. Given that
the only limit on the number and size of extension headers is the MTU,
the processing of received packets could be considerable. It is also
conceivable that a long chain of extension headers might be used as a
form of denial-of-service attack. Accordingly, a host may place limits
on the number and sizes of extension headers and options it is willing
to process.</t>
        <t>A host <bcp14>MAY</bcp14> limit the number of consecutive PAD1 options in destination
options or hop-by-hop options to 7.
In this case, if there are more than 7
consecutive PAD1 options present, the packet <bcp14>MAY</bcp14> be
silently discarded. The rationale is that if padding of 8 or more
bytes is required, then the PADN option <bcp14>SHOULD</bcp14> be used.</t>
        <t>A host <bcp14>MAY</bcp14> limit the number of bytes in a PADN option to be less than
8. In such a case, if a PADN option is present that has a length
greater than 7, the packet <bcp14>SHOULD</bcp14> be silently discarded. The
rationale for this guideline is that the purpose of padding is for
alignment and 8 bytes is the maximum alignment used in IPv6.</t>
        <t>A host <bcp14>MAY</bcp14> disallow unknown options in destination options or
hop-by-hop options. This <bcp14>SHOULD</bcp14> be configurable where the default is
to accept unknown options and process them per <xref target="RFC8200"/>. If a packet
with unknown options is received and the host is configured to
disallow them, then the packet <bcp14>SHOULD</bcp14> be silently discarded.</t>
        <t>A host <bcp14>MAY</bcp14> impose a limit on the maximum number of non-padding options
allowed in the destination options and hop-by-hop extension headers. If
this feature is supported, the maximum number <bcp14>SHOULD</bcp14> be configurable,
and the default value <bcp14>SHOULD</bcp14> be set to 8. The limits for
destination options and hop-by-hop options may be separately
configurable. If a packet is received and the number of destination or
hop-by-hop options exceeds the limit, then the packet <bcp14>SHOULD</bcp14> be
silently discarded.</t>
        <t>A host <bcp14>MAY</bcp14> impose a limit on the maximum length of Destination Options
or Hop-by-Hop Options extension headers. This value <bcp14>SHOULD</bcp14> be
configurable, and the default is to accept options of any length. If a
packet is received and the length of the Destination or Hop-by-Hop Options
extension header exceeds the length limit, then the packet <bcp14>SHOULD</bcp14> be
silently discarded.</t>
      </section>
      <section anchor="ND">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Neighbor Discovery is defined in <xref target="RFC4861"/>; the
definition was updated by <xref target="RFC5942"/>. Neighbor Discovery
<bcp14>MUST</bcp14> be supported with the noted exceptions below.  RFC 4861 states:</t>
        <ul empty="true">
          <li>
            <t>Unless specified otherwise (in a document that covers operating IP
over a particular link type) this document applies to all link types.
However, because ND uses link-layer multicast for some of its
services, it is possible that on some link types (e.g., Non‑Broadcast
Multi-Access (NBMA) links), alternative protocols or mechanisms to
implement those services will be specified (in the appropriate
document covering the operation of IP over a particular link type).
The services described in this document that are not directly
dependent on multicast, such as Redirects, Next-hop determination,
Neighbor Unreachability Detection, etc., are expected to be provided
as specified in this document.
The details of how one uses ND on
NBMA links are addressed in <xref target="RFC2491"/>.</t>
          </li>
        </ul>
        <t>Some detailed analysis of Neighbor Discovery follows:</t>
        <t>Router Discovery is how hosts locate routers that reside on
an attached link.  Hosts <bcp14>MUST</bcp14> support Router Discovery
functionality.</t>
        <t>Prefix Discovery is how hosts discover the set of address
prefixes that define which destinations are on-link for an
attached link. Hosts <bcp14>MUST</bcp14> support Prefix Discovery.</t>
        <t>Hosts <bcp14>MUST</bcp14> also implement Neighbor Unreachability Detection
(NUD) for all paths between hosts and neighboring nodes.  NUD is
not required for paths between routers.  However, all nodes <bcp14>MUST</bcp14>
respond to unicast Neighbor Solicitation (NS) messages.</t>
        <t><xref target="RFC7048"/> discusses NUD, in particular cases
where it behaves too impatiently. It states that if a node
transmits more than a certain number of packets, then it
<bcp14>SHOULD</bcp14> use the exponential backoff of the retransmit timer,
up to a certain threshold point.</t>
        <t>Hosts <bcp14>MUST</bcp14> support the sending of Router Solicitations and
the receiving of Router Advertisements (RAs).  The ability to
understand individual RA options is dependent
on supporting the functionality making use of the particular
option.</t>
        <t><xref target="RFC7559"/> discusses packet loss resiliency
for Router Solicitations and requires that nodes <bcp14>MUST</bcp14> use
a specific exponential backoff algorithm for retransmission of Router
Solicitations.</t>
        <t>All nodes <bcp14>MUST</bcp14> support the sending and receiving of Neighbor
Solicitation (NS) and Neighbor Advertisement (NA) messages.  NS
and NA messages are required for Duplicate Address Detection
(DAD).</t>
        <t>Hosts <bcp14>SHOULD</bcp14> support the processing of Redirect
functionality.  Routers <bcp14>MUST</bcp14> support the sending of Redirects,
though not necessarily for every individual packet (e.g., due to
rate limiting). Redirects are only useful on networks supporting
hosts. In core networks dominated by routers, Redirects are
typically disabled.  The sending of Redirects <bcp14>SHOULD</bcp14> be disabled
by default on routers intended to be deployed on core networks. They <bcp14>MAY</bcp14>
be enabled by default on routers intended to support hosts on edge networks.</t>
        <t>As specified in <xref target="RFC6980"/>, nodes <bcp14>MUST NOT</bcp14> employ IPv6 fragmentation
for sending any of the following Neighbor Discovery and SEcure
Neighbor Discovery messages: Neighbor Solicitation, Neighbor
Advertisement, Router Solicitation, Router Advertisement, Redirect, or
Certification Path Solicitation.
Nodes <bcp14>MUST</bcp14> silently ignore any of these messages on receipt if
fragmented.
See RFC 6980 for details and motivation.</t>
        <t>"IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> includes additional
recommendations on how to select from a set of available routers.
<xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be supported.</t>
      </section>
      <section anchor="secure-neighbor-discovery-send-rfc-3971">
        <name>SEcure Neighbor Discovery (SEND) - RFC 3971</name>
        <t>SEND <xref target="RFC3971"/> and Cryptographically Generated
Addresses (CGAs) <xref target="RFC3972"/> provide a way to
secure the message exchanges of Neighbor Discovery. SEND
has the potential to address certain classes of spoofing
attacks, but it does not provide specific protection for threats
from off-link attackers.</t>
        <t>There have been relatively few implementations of SEND
in common operating systems and platforms since its publication in 2005;
thus, deployment experience remains very limited to date.</t>
        <t>At this time, support for SEND is considered optional. Due to the
complexity in deploying SEND and its heavyweight provisioning,
its deployment is only
likely to be considered where nodes are operating in a
particularly strict security environment.</t>
      </section>
      <section anchor="ipv6-router-advertisement-flags-option-rfc-5175">
        <name>IPv6 Router Advertisement Flags Option - RFC 5175</name>
        <t>Router Advertisements include an 8-bit field of single-bit
Router Advertisement flags.  The Router Advertisement Flags
Option extends the number of available flag bits by 48 bits. At
the time of this writing, 6 of the original 8 single-bit flags have
been assigned, while 2 remain available for future
assignment. No flags have been defined that make use of the new
option; thus, strictly speaking, there is no requirement to
implement the option today. However, implementations that are
able to pass unrecognized options to a higher-level entity that
may be able to understand them (e.g., a user-level process using
a "raw socket" facility) <bcp14>MAY</bcp14> take steps to handle the option in
anticipation of a future usage.</t>
      </section>
      <section anchor="path-mtu-discovery-and-packet-size">
        <name>Path MTU Discovery and Packet Size</name>
        <section anchor="path-mtu-discovery-rfc-8201">
          <name>Path MTU Discovery - RFC 8201</name>
          <t>"Path MTU Discovery for IP version 6" <xref target="RFC8201"/> <bcp14>SHOULD</bcp14> be
supported.  From <xref target="RFC8200"/>:</t>
          <ul empty="true">
            <li>
              <t>It is strongly recommended that IPv6 nodes implement
Path MTU Discovery <xref target="RFC8201"/>, in order to
discover and
take advantage of path MTUs greater than 1280 octets.
However, a minimal IPv6 implementation (e.g., in a boot
ROM) may simply restrict itself to sending packets no
larger than 1280 octets, and omit implementation of Path
MTU Discovery.</t>
            </li>
          </ul>
          <t>The rules in <xref target="RFC8200"/> and <xref target="RFC5722"/> <bcp14>MUST</bcp14> be followed for packet
fragmentation and reassembly.</t>
          <t>As described in RFC 8201,
nodes implementing Path MTU Discovery and sending packets larger than
the IPv6 minimum link MTU are susceptible to problematic connectivity
if ICMPv6 messages are blocked or not transmitted.  For
example, this will result in connections that complete the TCP
three-way handshake correctly but then hang when data is transferred.  This
state is referred to as a black-hole connection <xref target="RFC2923"/>.  Path MTU
Discovery relies on ICMPv6 Packet Too Big (PTB) to determine the MTU
of the path (and thus these <bcp14>MUST NOT</bcp14> be filtered, as per the
recommendation in <xref target="RFC4890"/>).</t>
          <t>An alternative to Path MTU Discovery defined in RFC 8201 can be
found in <xref target="RFC4821"/>, which defines a method for Packetization
Layer Path MTU Discovery (PLPMTUD) designed for use over paths where
delivery of ICMPv6 messages to a host is not assured.</t>
        </section>
        <section anchor="minimum-mtu-considerations">
          <name>Minimum MTU Considerations</name>
          <t>While an IPv6 link MTU can be set to 1280 bytes,
it is recommended that for IPv6 UDP in particular,
which includes DNS operation, the sender use a
large MTU if they can, in order to avoid gratuitous
fragmentation-caused packet drops.</t>
        </section>
      </section>
      <section anchor="icmp-for-the-internet-protocol-version-6-ipv6-rfc-4443">
        <name>ICMP for the Internet Protocol Version 6 (IPv6) - RFC 4443</name>
        <t>ICMPv6 <xref target="RFC4443"/> <bcp14>MUST</bcp14> be supported. "Extended
ICMP to Support Multi-Part Messages" <xref target="RFC4884"/> <bcp14>MAY</bcp14> be supported.</t>
      </section>
      <section anchor="default-router-preferences-and-more-specific-routes-rfc-4191">
        <name>Default Router Preferences and More-Specific Routes - RFC 4191</name>
        <t>"Default Router Preferences and More-Specific Routes" <xref target="RFC4191"/>
provides support for nodes attached to
multiple (different) networks, each providing routers that
advertise themselves as default routers via Router
Advertisements. In some scenarios, one router may provide
connectivity to destinations that the other router does not, and
choosing the "wrong" default router can result in reachability
failures. In order to resolve this scenario, IPv6 nodes <bcp14>MUST</bcp14> implement
<xref target="RFC4191"/> and <bcp14>SHOULD</bcp14> implement the Type C host role defined in RFC 4191.</t>
      </section>
      <section anchor="first-hop-router-selection-rfc-8028">
        <name>First-Hop Router Selection - RFC 8028</name>
        <t>In multihomed scenarios, where a host has more than one prefix,
each allocated by an upstream network that is assumed to implement
BCP 38 ingress filtering, the host may have multiple routers to
choose from.</t>
        <t>Hosts that may be deployed in such multihomed environments
<bcp14>SHOULD</bcp14> follow the guidance given in <xref target="RFC8028"/>.</t>
      </section>
      <section anchor="mld">
        <name>Multicast Listener Discovery (MLD) for IPv6 - RFC 3810</name>
        <t>Nodes that need to join multicast groups <bcp14>MUST</bcp14> support MLDv2
<xref target="RFC3810"/>. MLD is needed by any node that is
expected to receive and process multicast traffic; in particular,
MLDv2 is required for support for source-specific multicast (SSM) as
per <xref target="RFC4607"/>.</t>
        <t>Previous versions of this specification only required MLDv1 <xref target="RFC2710"/>
to be implemented
on all nodes.  Since participation of any
MLDv1-only nodes on a link require that all other nodes on the link then
operate in version 1 compatibility mode, the requirement to support MLDv2
on all nodes was upgraded to a <bcp14>MUST</bcp14>. Further, SSM is now the preferred
multicast distribution method, rather than Any-Source Multicast (ASM).</t>
        <t>Note that Neighbor Discovery (as used on most link types -- see <xref target="ND"/>)
depends on multicast and requires that nodes join Solicited Node
multicast addresses.</t>
      </section>
      <section anchor="explicit-congestion-notification-ecn-rfc-3168">
        <name>Explicit Congestion Notification (ECN) - RFC 3168</name>
        <t>An ECN-aware router sets a mark in the IP header in order to signal
impending congestion, rather than dropping a packet. The receiver of
the packet echoes the congestion indication to the sender, which can then
reduce its transmission rate as if it detected a dropped packet.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support ECN <xref target="RFC3168"/> by implementing an interface
for the upper layer to access and by setting the ECN bits in the IP header.
The benefits of using ECN are documented in <xref target="RFC8087"/>.</t>
      </section>
    </section>
    <section anchor="addressing-and-address-configuration">
      <name>Addressing and Address Configuration</name>
      <section anchor="ip-version-6-addressing-architecture-rfc-4291">
        <name>IP Version 6 Addressing Architecture - RFC 4291</name>
        <t>The IPv6 Addressing Architecture <xref target="RFC4291"/> <bcp14>MUST</bcp14> be supported.</t>
        <t>The current IPv6 Address Architecture is based on a 64-bit boundary for subnet
prefixes.
The reasoning behind this decision is documented in <xref target="RFC7421"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> also support the multicast flag updates
documented in <xref target="RFC7371"/>.</t>
      </section>
      <section anchor="host-address-availability-recommendations">
        <name>Host Address Availability Recommendations</name>
        <t>Hosts may be configured with addresses through a variety of methods,
including Stateless Address Autoconfiguration (SLAAC), DHCPv6, or manual
configuration.</t>
        <t><xref target="RFC7934"/> recommends that networks provide general-purpose end hosts
with multiple global IPv6 addresses when they attach, and it describes
the benefits of and the options for doing so.
Routers <bcp14>SHOULD</bcp14> support <xref target="RFC7934"/> for assigning multiple addresses to a
host.
A host <bcp14>SHOULD</bcp14> support assigning multiple addresses as described in
<xref target="RFC7934"/>.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support the capability to be assigned a prefix per host as
documented in <xref target="RFC8273"/>.
Such an approach can offer improved host
isolation and enhanced subscriber management on shared network segments.</t>
      </section>
      <section anchor="ipv6-stateless-address-autoconfiguration-rfc-4862">
        <name>IPv6 Stateless Address Autoconfiguration - RFC 4862</name>
        <t>Hosts <bcp14>MUST</bcp14> support IPv6 Stateless Address Autoconfiguration.
It is <bcp14>RECOMMENDED</bcp14>, as described in <xref target="RFC8064"/>, that unless there
is a specific requirement for Media Access Control (MAC) addresses to be
embedded in
an Interface Identifier (IID), nodes follow the procedure in <xref target="RFC7217"/> to generate SLAAC-based
addresses, rather than use <xref target="RFC4862"/>.
Addresses generated using the method described in <xref target="RFC7217"/> will be the same whenever a given device (re)appears on the
same subnet (with a specific IPv6 prefix), but the IID will vary on
each subnet visited.</t>
        <t>Nodes that are routers <bcp14>MUST</bcp14> be able to generate link-local
addresses as described in <xref target="RFC4862"/>.</t>
        <t>From RFC 4862:</t>
        <ul empty="true">
          <li>
            <!-- Begin DNE text -->
  <t>The autoconfiguration process specified in this document
applies only to hosts and not routers.  Since host
autoconfiguration uses information advertised by routers,
routers will need to be configured by some other means.
However, it is expected that routers will generate link-local
addresses using the mechanism described in this document.  In
addition, routers are expected to successfully pass the
Duplicate Address Detection procedure described in this
document on all addresses prior to assigning them to an
interface.</t>
          </li>
        </ul>
        <t>All nodes <bcp14>MUST</bcp14> implement Duplicate Address Detection. Quoting
from <xref section="5.4" sectionFormat="of" target="RFC4862"/>:</t>
        <ul empty="true">
          <li>
            <t>Duplicate Address Detection <bcp14>MUST</bcp14>
be performed on all unicast addresses prior to assigning them
to an interface, regardless of whether they are obtained
through stateless autoconfiguration, DHCPv6, or manual
configuration, with the following exceptions [noted therein].</t>
          </li>
        </ul>
        <t>"Optimistic Duplicate Address Detection (DAD) for
IPv6" <xref target="RFC4429"/> specifies a mechanism to reduce
delays associated with generating addresses via Stateless
Address Autoconfiguration <xref target="RFC4862"/>.  RFC 4429
was developed in conjunction with Mobile IPv6 in order to reduce
the time needed to acquire and configure addresses as devices
quickly move from one network to another, and it is desirable to
minimize transition delays.  For general purpose devices, RFC 4429 remains
optional at this time.</t>
        <t><xref target="RFC7527"/> discusses enhanced DAD and describes an
algorithm to automate the detection of looped-back IPv6 ND messages
used by DAD. Nodes <bcp14>SHOULD</bcp14> implement this behavior where such
detection is beneficial.</t>
      </section>
      <section anchor="privacy-extensions-for-address-configuration-in-ipv6-rfc-8981">
        <name>Privacy Extensions for Address Configuration in IPv6 - RFC 8981</name>
        <t>A node using Stateless Address
Autoconfiguration <xref target="RFC4862"/> to form a globally
unique IPv6 address that uses its MAC address to generate the IID
will see that the IID remains the same on any visited
network, even though the network prefix part changes.
Thus, it is possible for a third-party device to track the activities of
the node they
communicate with, as that node moves around the network.  Privacy Extensions
for Stateless Address
Autoconfiguration <xref target="RFC8981"/> address this
concern by allowing nodes to configure an additional temporary address
where the IID is effectively randomly generated.  Privacy addresses
are then used as source addresses for new communications initiated by the
node.</t>
        <t>General issues regarding privacy issues for IPv6 addressing are discussed
in <xref target="RFC7721"/>.</t>
        <t>RFC 8981 <bcp14>SHOULD</bcp14> be supported.  In some scenarios,
such as dedicated servers in a data
center, it provides limited or no benefit, or it may complicate network management.
Thus, devices implementing this specification <bcp14>MUST</bcp14> provide a way for the
end user to explicitly enable or disable the use of such temporary
addresses.</t>
        <t>Note that RFC 8981 can be used independently of traditional SLAAC or independently
of SLAAC that is based on RFC 7217.</t>
        <t>Implementers of RFC 8981 should be aware that certain
addresses are reserved and should not be chosen for use as
temporary addresses. Consult "Reserved IPv6 Interface
Identifiers" <xref target="RFC5453"/> for more details.</t>
      </section>
      <section anchor="stateful1">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>DHCPv6 <xref target="RFC8415"/> can be used to obtain and
configure addresses. In general, a network may provide for the
configuration of addresses through SLAAC,
DHCPv6, or both.  There will be a wide range of IPv6 deployment
models and differences in address assignment requirements,
some of which may require DHCPv6 for stateful address assignment.
Consequently, all hosts <bcp14>SHOULD</bcp14> implement address configuration
via DHCPv6.</t>
        <t>In the absence of observed Router Advertisement messages, IPv6 nodes
<bcp14>MAY</bcp14> initiate DHCP to obtain IPv6 addresses
and other configuration information, as described in <xref section="5.5.2" sectionFormat="of" target="RFC4862"/>.</t>
        <t>Where devices are likely to be carried by users and attached
to multiple visited networks, DHCPv6 client
anonymity profiles <bcp14>SHOULD</bcp14> be supported as described in <xref target="RFC7844"/> to minimize the disclosure of identifying information.
<xref section="5" sectionFormat="of" target="RFC7844"/> describes operational considerations on the use of
such anonymity profiles.</t>
      </section>
      <section anchor="default-address-selection-for-ipv6-rfc-6724">
        <name>Default Address Selection for IPv6 - RFC 6724</name>
        <t>IPv6 nodes will invariably have multiple addresses configured simultaneously
and thus will need to choose which addresses to use for which communications.
The rules specified in the Default Address Selection for
IPv6 document <xref target="RFC6724"/> <bcp14>MUST</bcp14> be implemented. <xref target="RFC8028"/> updates Rule 5.5 from <xref target="RFC6724"/>; implementations
<bcp14>SHOULD</bcp14> implement this rule.</t>
      </section>
    </section>
    <section anchor="dns">
      <name>DNS</name>
      <t>DNS is described in <xref target="RFC1034"/>, <xref target="RFC1035"/>, <xref target="RFC3363"/>, and <xref target="RFC3596"/>.  Not all nodes will need to resolve names;
those that will never need to resolve DNS names do not need to
implement resolver functionality.  However, the ability to
resolve names is a basic infrastructure capability on which
applications rely, and most nodes will need to provide
support.  All nodes <bcp14>SHOULD</bcp14> implement stub-resolver <xref target="RFC1034"/> functionality, as in Section 5.3.1 of <xref target="RFC1034"/>, with support for:</t>
      <dl>
        <dt>-</dt>
        <dd>
          <t>AAAA type Resource Records <xref target="RFC3596"/>;</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>reverse addressing in ip6.arpa using PTR records <xref target="RFC3596"/>; and</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>Extension Mechanisms for DNS (EDNS(0)) <xref target="RFC6891"/> to allow for DNS packet sizes larger than 512 octets.</t>
        </dd>
      </dl>
      <t>Those nodes are <bcp14>RECOMMENDED</bcp14> to support DNS security extensions <xref target="RFC4033"/>  <xref target="RFC4034"/>  <xref target="RFC4035"/>.</t>
      <t>A6 Resource Records <xref target="RFC2874"/> are classified as Historic per <xref target="RFC6563"/>.  These were defined with Experimental status in <xref target="RFC3363"/>.</t>
    </section>
    <section anchor="OtherConfig">
      <name>Configuring Non-address Information</name>
      <section anchor="dhcp-for-other-configuration-information">
        <name>DHCP for Other Configuration Information</name>
        <t>DHCP <xref target="RFC8415"/> specifies a mechanism for IPv6 nodes to obtain
address configuration information (see <xref target="stateful1"/>) and to
obtain additional (non-address) configuration.  If a host
implementation supports applications or other protocols that
require configuration that is only available via DHCP, hosts
<bcp14>SHOULD</bcp14> implement DHCP. For specialized devices on which no
such configuration need is present, DHCP may not be
necessary.</t>
        <t>An IPv6 node can use the subset of DHCP (described in <xref target="RFC8415"/>) to obtain other configuration
information.</t>
        <t>If an IPv6 node implements DHCP, it <bcp14>MUST</bcp14> implement the DNS options <xref target="RFC3646"/> as most deployments will expect that these options are available.</t>
      </section>
      <section anchor="router-advertisements-and-default-gateway">
        <name>Router Advertisements and Default Gateway</name>
        <t>There is no defined DHCPv6 Gateway option.</t>
        <t>Nodes using the Dynamic Host Configuration Protocol for
IPv6 (DHCPv6) are thus expected to determine their default router
information and on-link prefix information from received
Router Advertisements.</t>
      </section>
      <section anchor="ipv6-router-advertisement-options-for-dns-configuration-rfc-8106">
        <name>IPv6 Router Advertisement Options for DNS         Configuration - RFC 8106</name>
        <t>Router Advertisement options have historically been limited to
those that are critical to basic IPv6 functionality. Originally,
DNS configuration was not included as an RA option, and DHCP
was the recommended way to obtain DNS configuration
information. Over time, the thinking surrounding such an
option has evolved. It is now generally recognized that few
nodes can function adequately without having access to a
working DNS resolver; thus, a
Standards Track document has been published to provide this
capability <xref target="RFC8106"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> include support for the DNS RA option <xref target="RFC8106"/>.</t>
      </section>
      <section anchor="dhcp-options-versus-router-advertisement-options-for-host-configuration">
        <name>DHCP Options versus Router Advertisement Options for Host Configuration</name>
        <t>In IPv6, there are two main protocol mechanisms for
propagating configuration information to hosts: RAs and DHCP. RA options
have been
restricted to those deemed essential for basic network
functioning and for which all nodes are configured with exactly
the same information.  Examples include the Prefix Information
Options, the MTU option, etc. On the other hand, DHCP has
generally been preferred for configuration of more general
parameters and for parameters that may be client specific.
Generally speaking, however, there has been a desire
to define only one mechanism for configuring a given option,
rather than defining multiple (different) ways of configuring
the same information.</t>
        <t>One issue with having multiple ways to configure the same
information is that interoperability suffers if a host chooses one
mechanism but the
network operator chooses a different mechanism. For "closed"
environments, where the network operator
has significant influence over what devices connect to the
network and thus what configuration mechanisms they support, the
operator may be able to ensure that a particular mechanism is
supported by all connected hosts. In more open environments,
however, where arbitrary devices may connect (e.g., a Wi-Fi
hotspot), problems can arise. To maximize interoperability in
such environments, hosts would need to implement multiple
configuration mechanisms to ensure interoperability.</t>
      </section>
    </section>
    <section anchor="service-discovery-protocols">
      <name>Service Discovery Protocols</name>
      <t>Multicast DNS (mDNS) and
DNS-based Service Discovery (DNS-SD) are described in <xref target="RFC6762"/> and <xref target="RFC6763"/>, respectively.
These protocols, often collectively referred to as the
'Bonjour' protocols after their naming by Apple, provide
the means for devices to discover services within a local
link and, in the absence of a unicast DNS service, to
exchange naming information.</t>
      <t>Where devices are to be deployed in networks where
service discovery would be beneficial, e.g., for users
seeking to discover printers or display devices, mDNS and
DNS-SD <bcp14>SHOULD</bcp14> be supported.</t>
    </section>
    <section anchor="ipv4-support-and-transition">
      <name>IPv4 Support and Transition</name>
      <t>IPv6 nodes <bcp14>MAY</bcp14> support IPv4.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <section anchor="basic-transition-mechanisms-for-ipv6-hosts-and-routers-rfc4213">
          <name>Basic Transition Mechanisms for IPv6 Hosts and Routers - RFC 4213</name>
          <t>If an IPv6 node implements dual stack and tunneling, then <xref target="RFC4213"/> <bcp14>MUST</bcp14> be supported.</t>
        </section>
      </section>
    </section>
    <section anchor="application-support">
      <name>Application Support</name>
      <section anchor="textual-representation-of-ipv6-addresses-rfc-5952">
        <name>Textual Representation of IPv6 Addresses - RFC 5952</name>
        <t>Software that allows users and operators to input IPv6
addresses in text form <bcp14>SHOULD</bcp14> support "A Recommendation for
IPv6 Address Text Representation" <xref target="RFC5952"/>.</t>
      </section>
      <section anchor="application-programming-interfaces-apis">
        <name>Application Programming Interfaces (APIs)</name>
        <t>There are a number of IPv6-related APIs. This document does
not mandate the use of any, because the choice of API does not
directly relate to on-the-wire behavior of
protocols. Implementers, however, would be advised to consider
providing a common API or reviewing existing APIs for the type
of functionality they provide to applications.</t>
        <t>"Basic Socket Interface Extensions for IPv6" <xref target="RFC3493"/> provides IPv6 functionality used by
typical applications. Implementers should note that RFC 3493 has
been picked up and further standardized by the Portable Operating System
Interface (POSIX) <xref target="POSIX"/>.</t>
        <t>"Advanced Sockets Application Program Interface (API) for
IPv6" <xref target="RFC3542"/> provides access to
advanced IPv6 features needed by diagnostic and other
more specialized applications.</t>
        <t>"IPv6 Socket API for Source Address Selection" <xref target="RFC5014"/> provides facilities that allow an
application to override the default Source Address Selection
rules of <xref target="RFC6724"/>.</t>
        <t>"Socket Interface Extensions for Multicast Source Filters" <xref target="RFC3678"/> provides support for expressing source
filters on multicast group memberships.</t>
        <t>"Extension to Sockets API for Mobile IPv6" <xref target="RFC4584"/> provides application support for
accessing and enabling Mobile IPv6 <xref target="RFC6275"/> features.</t>
      </section>
    </section>
    <section anchor="mobility">
      <name>Mobility</name>
      <t>Mobile IPv6 <xref target="RFC6275"/> and associated
specifications <xref target="RFC3776"/>  <xref target="RFC4877"/> allow a node to change its point of attachment within the
Internet, while maintaining (and using) a permanent address. All
communication using the permanent address continues to proceed as
expected even as the node moves around. The definition of Mobile
IP includes requirements for the following types of nodes:</t>
      <ul spacing="normal">
        <li>
          <t>mobile nodes</t>
        </li>
        <li>
          <t>correspondent nodes with support for route optimization</t>
        </li>
        <li>
          <t>home agents</t>
        </li>
        <li>
          <t>all IPv6 routers</t>
        </li>
      </ul>
      <t>At the present time, Mobile IP has seen only limited
implementation and no significant deployment, partly because it
originally assumed an IPv6-only environment rather than a mixed
IPv4/IPv6 Internet. Additional work has been done to
support mobility in mixed-mode IPv4 and IPv6
networks <xref target="RFC5555"/>.</t>
      <t>More usage and deployment experience is needed with mobility
before any specific approach can be recommended for broad
implementation in all hosts and routers.
Consequently, Mobility Support in IPv6 <xref target="RFC6275"/>, Mobile IPv6 Support for Dual Stack Hosts and Routers <xref target="RFC5555"/>, and associated
standards (such as Mobile IPv6 with IKEv2 and IPsec <xref target="RFC4877"/>) are considered a <bcp14>MAY</bcp14>
at this time.</t>
      <t>IPv6 for 3GPP <xref target="RFC7066"/> lists a snapshot of required
IPv6 functionalities at the time the document was published that would
need to be implemented, going above
and beyond the recommendations in this document.
Additionally, a 3GPP IPv6 Host <bcp14>MAY</bcp14> implement <xref target="RFC7278"/> to deliver IPv6 prefixes on the LAN link.</t>
    </section>
    <section anchor="sec">
      <name>Security</name>
      <t>This section describes the security specification for IPv6
nodes.</t>
      <t>Achieving security in practice is a complex undertaking.
Operational procedures, protocols, key distribution mechanisms,
certificate management approaches, etc., are all components that
impact the level of security actually achieved in practice. More
importantly, deficiencies or a poor fit in any one individual
component can significantly reduce the overall effectiveness of a
particular security approach.</t>
      <t>IPsec can provide either end-to-end security between nodes
or channel security (for example, via a site-to-site IPsec
VPN), making it possible to provide secure communication for all (or a subset
of) communication flows at the IP layer between pairs of Internet
nodes.  IPsec has two standard operating modes: Tunnel-mode and Transport-mode.
In Tunnel-mode, IPsec provides network-layer security and protects an entire
IP packet
by encapsulating the original IP packet and then prepending a new IP header.
In Transport-mode, IPsec provides security for the transport layer (and above)
by
encapsulating only the transport-layer (and above) portion of the IP packet
(i.e., without adding
a second IP header).</t>
      <t>Although IPsec can be used with manual keying in some cases,
such usage has limited applicability and is not recommended.</t>
      <t>A range of security technologies and approaches proliferate
today (e.g., IPsec, Transport Layer Security (TLS), Secure SHell (SSH), TLS
VPNS, etc.).
No single approach has emerged as
an ideal technology for all needs and environments. Moreover, IPsec
is not viewed as the ideal security technology in all cases and is
unlikely to displace the others.</t>
      <t>Previously, IPv6 mandated implementation of IPsec and
recommended the key-management approach of IKE. RFC 6434 updated that recommendation
by making support of the IPsec
architecture <xref target="RFC4301"/> a <bcp14>SHOULD</bcp14> for all IPv6 nodes, and this document retains that recommendation.
Note that
the IPsec Architecture requires the
implementation of both manual and automatic key management (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).
Currently, the recommended automated key-management protocol to
implement is IKEv2 <xref target="RFC7296"/>.</t>
      <t>This document recognizes that there exists a range of device
types and environments where approaches to security other than
IPsec can be justified. For example, special-purpose devices may
support only a very limited number or type of applications, and an
application-specific security approach may be sufficient for
limited management or configuration capabilities. Alternatively,
some devices may run on extremely constrained hardware (e.g.,
sensors) where the full IPsec Architecture is not justified.</t>
      <t>Because most common platforms now support IPv6 and have it
enabled by default, IPv6 security is an issue for networks
that are ostensibly IPv4 only; see <xref target="RFC7123"/> for guidance on this area.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>"Security Architecture for the Internet Protocol" <xref target="RFC4301"/> <bcp14>SHOULD</bcp14> be supported by all IPv6
nodes. Note that the IPsec Architecture requires the implementation of both
manual and automatic key
management  (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).  Currently, the default automated key-management
protocol to implement is IKEv2. As required in <xref target="RFC4301"/>, IPv6
nodes implementing the IPsec Architecture <bcp14>MUST</bcp14> implement ESP <xref target="RFC4303"/> and <bcp14>MAY</bcp14> implement AH <xref target="RFC4302"/>.</t>
      </section>
      <section anchor="transforms-and-algorithms">
        <name>Transforms and Algorithms</name>
        <t>The current set of mandatory-to-implement algorithms for the
IPsec Architecture are defined in Cryptographic
Algorithm Implementation Requirements for ESP and AH <xref target="RFC8221"/>.  IPv6 nodes implementing the IPsec
Architecture <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8221"/>.
Preferred cryptographic algorithms often change more
frequently than security protocols. Therefore, implementations
<bcp14>MUST</bcp14> allow for migration to new algorithms, as RFC 8221 is
replaced or updated in the future.</t>
        <t>The current set of mandatory-to-implement algorithms for
IKEv2 are defined in Cryptographic Algorithm Implementation
Requirements for ESP and AH <xref target="RFC8247"/>.  IPv6 nodes
implementing IKEv2 <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8247"/> and/or any future
updates or replacements to <xref target="RFC8247"/>.</t>
      </section>
    </section>
    <section anchor="router-specific-functionality">
      <name>Router-Specific Functionality</name>
      <t>This section defines general host considerations for IPv6 nodes
that act as routers.  Currently, this section does not discuss
detailed routing-specific requirements. For the case of typical home routers, <xref target="RFC7084"/> defines basic requirements for customer edge routers.</t>
      <section anchor="ipv6-router-alert-option-rfc-2711">
        <name>IPv6 Router Alert Option - RFC 2711</name>
        <t>The IPv6 Router Alert option <xref target="RFC2711"/> is
an optional IPv6 Hop-by-Hop Header that is used in conjunction
with some protocols (e.g., RSVP <xref target="RFC2205"/> or
Multicast Listener Discovery (MLDv2) <xref target="RFC3810"/>).  The Router Alert option will
need to be implemented whenever such protocols that mandate its
use are implemented.  See <xref target="mld"/>.</t>
      </section>
      <section anchor="neighbor-discovery-for-ipv6-rfc-4861">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Sending Router Advertisements and processing Router
Solicitations <bcp14>MUST</bcp14> be supported.</t>
        <t><xref section="7" sectionFormat="of" target="RFC6275"/> includes some mobility-specific
extensions to Neighbor Discovery.
Routers <bcp14>SHOULD</bcp14> implement
Sections 7.3 and 7.5, even if they do not implement home
agent functionality.</t>
      </section>
      <section anchor="stateful-address-autoconfiguration-dhcpv6-rfc-8415">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>A single DHCP server (<xref target="RFC8415"/> or <xref target="RFC4862"/>) can provide configuration information to
devices directly attached to a shared link, as well as to
devices located elsewhere within a site. Communication between
a client and a DHCP server located on different links requires
the use of DHCP relay agents on routers.</t>
        <t>In simple deployments, consisting of a single router and
either a single LAN or multiple LANs attached to the single
router, together with a WAN connection, a DHCP server
embedded within the router is one common deployment scenario
(e.g., <xref target="RFC7084"/>). There is no need
for relay agents in such scenarios.</t>
        <t>In more complex deployment scenarios, such as within
enterprise or service provider networks, the use of DHCP
requires some level of configuration, in order to configure
relay agents, DHCP servers, etc. In such environments, the
DHCP server might even be run on a traditional server, rather
than as part of a router.</t>
        <t>Because of the wide range of deployment scenarios, support
for DHCP server functionality on routers is optional. However,
routers targeted for deployment within more complex scenarios
(as described above) <bcp14>SHOULD</bcp14> support relay agent functionality.
Note that "Basic Requirements for IPv6 Customer Edge Routers" <xref target="RFC7084"/> requires implementation of a DHCPv6
server function in IPv6 Customer Edge (CE) routers.</t>
      </section>
      <section anchor="ipv6-prefix-length-recommendation-for-forwarding-bcp-198">
        <name>IPv6 Prefix Length Recommendation for Forwarding - BCP 198</name>
        <t>Forwarding nodes <bcp14>MUST</bcp14> conform to BCP 198 <xref target="RFC7608"/>;
thus, IPv6 implementations of nodes that may forward packets
<bcp14>MUST</bcp14> conform to the rules specified in <xref section="5.1" sectionFormat="of" target="RFC4632"/>.</t>
      </section>
    </section>
    <section anchor="constrained-devices">
      <name>Constrained Devices</name>
      <t>The focus of this document is general IPv6 nodes. In this section, we briefly
discuss considerations for constrained devices.</t>
      <t>In the case of constrained nodes,
with limited CPU, memory, bandwidth or power, support for certain IPv6 functionality
may need
to be considered due to those limitations.  While the requirements of this
document are
<bcp14>RECOMMENDED</bcp14> for all nodes, including constrained nodes, compromises may need
to be
made in certain cases.  Where such compromises are made, the interoperability
of devices
should be strongly considered, particularly where this may impact other nodes
on the same
link, e.g., only supporting MLDv1 will affect other nodes.</t>
      <t>The IETF 6LowPAN (IPv6 over Low-Power Wireless Personal Area Network) WG
produced six RFCs, including a general
overview and problem statement <xref target="RFC4919"/> (the means by which IPv6 packets
are transmitted over IEEE 802.15.4 networks <xref target="RFC4944"/> and ND optimizations for that medium <xref target="RFC6775"/>).</t>
      <t>IPv6 nodes that are battery powered <bcp14>SHOULD</bcp14> implement the recommendations
in <xref target="RFC7772"/>.</t>
    </section>
    <section anchor="ipv6-node-management">
      <name>IPv6 Node Management</name>
      <t>Network management <bcp14>MAY</bcp14> be supported by IPv6 nodes.  However,
for IPv6 nodes that are embedded devices, network management may
be the only possible way of controlling these nodes.</t>
      <t>Existing network management protocols include SNMP <xref target="RFC3411"/>, NETCONF <xref target="RFC6241"/>, and RESTCONF <xref target="RFC8040"/>.</t>
      <section anchor="management-information-base-mib-modules">
        <name>Management Information Base (MIB) Modules</name>
        <t>The obsoleted status of
various IPv6-specific MIB modules is clarified in <xref target="RFC8096"/>.</t>
        <t>The following two MIB modules <bcp14>SHOULD</bcp14> be supported by nodes that
support an SNMP agent.</t>
        <section anchor="ip-forwarding-table-mib">
          <name>IP Forwarding Table MIB</name>
          <t>The IP Forwarding Table MIB <xref target="RFC4292"/> <bcp14>SHOULD</bcp14> be supported by nodes that support an
SNMP agent.</t>
        </section>
        <section anchor="management-information-base-for-the-internet-protocol-ip">
          <name>Management Information Base for the Internet Protocol (IP)</name>
          <t>The IP MIB <xref target="RFC4293"/> <bcp14>SHOULD</bcp14> be supported by nodes
that support an SNMP agent.</t>
        </section>
        <section anchor="interface-mib">
          <name>Interface MIB</name>
          <t>The Interface MIB <xref target="RFC2863"/> <bcp14>SHOULD</bcp14> be supported by nodes that support
an SNMP agent.</t>
        </section>
      </section>
      <section anchor="yang-data-models">
        <name>YANG Data Models</name>
        <t>The following YANG data models <bcp14>SHOULD</bcp14> be supported by nodes that support
a
NETCONF or RESTCONF agent.</t>
        <section anchor="ip-management-yang-model">
          <name>IP Management YANG Model</name>
          <t>The IP Management YANG Model <xref target="RFC8344"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
        <section anchor="interface-management-yang-model">
          <name>Interface Management YANG Model</name>
          <t>The Interface Management YANG Model <xref target="RFC8343"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not directly affect the security of the
Internet, beyond the security considerations associated with the
individual protocols.</t>
      <t>Security is also discussed in <xref target="sec"/> above.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2710">
          <front>
            <title>Multicast Listener Discovery (MLD) for IPv6</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="W. Fenner" initials="W." surname="Fenner"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This document specifies the protocol used by an IPv6 router to discover the presence of multicast listeners (that is, nodes wishing to receive multicast packets) on its directly attached links, and to discover specifically which multicast addresses are of interest to those neighboring nodes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2710"/>
          <seriesInfo name="DOI" value="10.17487/RFC2710"/>
        </reference>
        <reference anchor="RFC2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <author fullname="A. Jackson" initials="A." surname="Jackson"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC2863">
          <front>
            <title>The Interfaces Group MIB</title>
            <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
            <author fullname="F. Kastenholz" initials="F." surname="Kastenholz"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This memo discusses the 'interfaces' group of MIB-II, especially the experience gained from the definition of numerous media-specific MIB modules for use in conjunction with the 'interfaces' group for managing various sub-layers beneath the internetwork-layer. It specifies clarifications to, and extensions of, the architectural issues within the MIB-II model of the 'interfaces' group. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2863"/>
          <seriesInfo name="DOI" value="10.17487/RFC2863"/>
        </reference>
        <reference anchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC3411">
          <front>
            <title>An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="R. Presuhn" initials="R." surname="Presuhn"/>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes an architecture for describing Simple Network Management Protocol (SNMP) Management Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing a Message Processing Subsystem, a Security Subsystem and an Access Control Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data. This document obsoletes RFC 2571. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3411"/>
          <seriesInfo name="DOI" value="10.17487/RFC3411"/>
        </reference>
        <reference anchor="RFC3596">
          <front>
            <title>DNS Extensions to Support IP Version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="V. Ksinant" initials="V." surname="Ksinant"/>
            <author fullname="M. Souissi" initials="M." surname="Souissi"/>
            <date month="October" year="2003"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="88"/>
          <seriesInfo name="RFC" value="3596"/>
          <seriesInfo name="DOI" value="10.17487/RFC3596"/>
        </reference>
        <reference anchor="RFC3810">
          <front>
            <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
            <author fullname="R. Vida" initials="R." role="editor" surname="Vida"/>
            <author fullname="L. Costa" initials="L." role="editor" surname="Costa"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document updates RFC 2710, and it specifies Version 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links, and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3810"/>
          <seriesInfo name="DOI" value="10.17487/RFC3810"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC4213">
          <front>
            <title>Basic Transition Mechanisms for IPv6 Hosts and Routers</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. Two mechanisms are specified, dual stack and configured tunneling. Dual stack implies providing complete implementations of both versions of the Internet Protocol (IPv4 and IPv6), and configured tunneling provides a means to carry IPv6 packets over unmodified IPv4 routing infrastructures.</t>
              <t>This document obsoletes RFC 2893. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4213"/>
          <seriesInfo name="DOI" value="10.17487/RFC4213"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC4292">
          <front>
            <title>IP Forwarding Table MIB</title>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects related to the forwarding of Internet Protocol (IP) packets in an IP version-independent manner. This document obsoletes RFC 2096. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4292"/>
          <seriesInfo name="DOI" value="10.17487/RFC4292"/>
        </reference>
        <reference anchor="RFC4293">
          <front>
            <title>Management Information Base for the Internet Protocol (IP)</title>
            <author fullname="S. Routhier" initials="S." role="editor" surname="Routhier"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for implementations of the Internet Protocol (IP) in an IP version independent manner. This memo obsoletes RFCs 2011, 2465, and 2466. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4293"/>
          <seriesInfo name="DOI" value="10.17487/RFC4293"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4311">
          <front>
            <title>IPv6 Host-to-Router Load Sharing</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>The original IPv6 conceptual sending algorithm does not do load sharing among equivalent IPv6 routers, and suggests schemes that can be problematic in practice. This document updates the conceptual sending algorithm in RFC 2461 so that traffic to different destinations can be distributed among routers in an efficient fashion. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4311"/>
          <seriesInfo name="DOI" value="10.17487/RFC4311"/>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC4607">
          <front>
            <title>Source-Specific Multicast for IP</title>
            <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
            <author fullname="B. Cain" initials="B." surname="Cain"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>IP version 4 (IPv4) addresses in the 232/8 (232.0.0.0 to 232.255.255.255) range are designated as source-specific multicast (SSM) destination addresses and are reserved for use by source-specific applications and protocols. For IP version 6 (IPv6), the address prefix FF3x::/32 is reserved for source-specific multicast use. This document defines an extension to the Internet network service that applies to datagrams sent to SSM addresses and defines the host and router requirements to support this extension. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4607"/>
          <seriesInfo name="DOI" value="10.17487/RFC4607"/>
        </reference>
        <reference anchor="RFC4632">
          <front>
            <title>Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan</title>
            <author fullname="V. Fuller" initials="V." surname="Fuller"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This memo discusses the strategy for address assignment of the existing 32-bit IPv4 address space with a view toward conserving the address space and limiting the growth rate of global routing state. This document obsoletes the original Classless Inter-domain Routing (CIDR) spec in RFC 1519, with changes made both to clarify the concepts it introduced and, after more than twelve years, to update the Internet community on the results of deploying the technology described. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="122"/>
          <seriesInfo name="RFC" value="4632"/>
          <seriesInfo name="DOI" value="10.17487/RFC4632"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4862">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC5453">
          <front>
            <title>Reserved IPv6 Interface Identifiers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>Interface identifiers in IPv6 unicast addresses are used to identify interfaces on a link. They are required to be unique within a subnet. Several RFCs have specified interface identifiers or identifier ranges that have a special meaning attached to them. An IPv6 node autoconfiguring an interface identifier in these ranges will encounter unexpected consequences. Since there is no centralized repository for such reserved identifiers, this document aims to create one. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5453"/>
          <seriesInfo name="DOI" value="10.17487/RFC5453"/>
        </reference>
        <reference anchor="RFC5722">
          <front>
            <title>Handling of Overlapping IPv6 Fragments</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="December" year="2009"/>
            <abstract>
              <t>The fragmentation and reassembly algorithm specified in the base IPv6 specification allows fragments to overlap. This document demonstrates the security issues associated with allowing overlapping fragments and updates the IPv6 specification to explicitly forbid overlapping fragments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5722"/>
          <seriesInfo name="DOI" value="10.17487/RFC5722"/>
        </reference>
        <reference anchor="RFC5790">
          <front>
            <title>Lightweight Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Version 2 (MLDv2) Protocols</title>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <author fullname="W. Cao" initials="W." surname="Cao"/>
            <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>This document describes lightweight IGMPv3 and MLDv2 protocols (LW- IGMPv3 and LW-MLDv2), which simplify the standard (full) versions of IGMPv3 and MLDv2. The interoperability with the full versions and the previous versions of IGMP and MLD is also taken into account. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5790"/>
          <seriesInfo name="DOI" value="10.17487/RFC5790"/>
        </reference>
        <reference anchor="RFC5942">
          <front>
            <title>IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>IPv6 specifies a model of a subnet that is different than the IPv4 subnet model. The subtlety of the differences has resulted in incorrect implementations that do not interoperate. This document spells out the most important difference: that an IPv6 address isn't automatically associated with an IPv6 on-link prefix. This document also updates (partially due to security concerns caused by incorrect implementations) a part of the definition of "on-link" from RFC 4861. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5942"/>
          <seriesInfo name="DOI" value="10.17487/RFC5942"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6437">
          <front>
            <title>IPv6 Flow Label Specification</title>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="J. Rajahalme" initials="J." surname="Rajahalme"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods. Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.</t>
              <t>The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6437"/>
          <seriesInfo name="DOI" value="10.17487/RFC6437"/>
        </reference>
        <reference anchor="RFC6564">
          <front>
            <title>A Uniform Format for IPv6 Extension Headers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="J. Woodyatt" initials="J." surname="Woodyatt"/>
            <author fullname="E. Kline" initials="E." surname="Kline"/>
            <author fullname="J. Hoagland" initials="J." surname="Hoagland"/>
            <author fullname="M. Bhatia" initials="M." surname="Bhatia"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the transport-layer header. There are a small number of such extension headers currently defined. This document describes the issues that can arise when defining new extension headers and discusses the alternate extension mechanisms in IPv6. It also provides a common format for defining any new IPv6 extension headers, if they are needed. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6564"/>
          <seriesInfo name="DOI" value="10.17487/RFC6564"/>
        </reference>
        <reference anchor="RFC6724">
          <front>
            <title>Default Address Selection for Internet Protocol Version 6 (IPv6)</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="A. Matsumoto" initials="A." surname="Matsumoto"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document describes two algorithms, one for source address selection and one for destination address selection. The algorithms specify default behavior for all Internet Protocol version 6 (IPv6) implementations. They do not override choices made by applications or upper-layer protocols, nor do they preclude the development of more advanced mechanisms for address selection. The two algorithms share a common context, including an optional mechanism for allowing administrators to provide policy that can override the default behavior. In dual-stack implementations, the destination address selection algorithm can consider both IPv4 and IPv6 addresses -- depending on the available source addresses, the algorithm might prefer IPv6 addresses over IPv4 addresses, or vice versa.</t>
              <t>Default address selection as defined in this specification applies to all IPv6 nodes, including both hosts and routers. This document obsoletes RFC 3484. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6724"/>
          <seriesInfo name="DOI" value="10.17487/RFC6724"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC6775">
          <front>
            <title>Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4. This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation. In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links. IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network. This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks. The document thus updates RFC 4944 to specify the use of the optimizations defined here. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6775"/>
          <seriesInfo name="DOI" value="10.17487/RFC6775"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC6946">
          <front>
            <title>Processing of IPv6 "Atomic" Fragments</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The IPv6 specification allows packets to contain a Fragment Header without the packet being actually fragmented into multiple pieces (we refer to these packets as "atomic fragments"). Such packets are typically sent by hosts that have received an ICMPv6 "Packet Too Big" error message that advertises a Next-Hop MTU smaller than 1280 bytes, and are currently processed by some implementations as normal "fragmented traffic" (i.e., they are "reassembled" with any other queued fragments that supposedly correspond to the same original packet). Thus, an attacker can cause hosts to employ atomic fragments by forging ICMPv6 "Packet Too Big" error messages, and then launch any fragmentation-based attacks against such traffic. This document discusses the generation of the aforementioned atomic fragments and the corresponding security implications. Additionally, this document formally updates RFC 2460 and RFC 5722, such that IPv6 atomic fragments are processed independently of any other fragments, thus completely eliminating the aforementioned attack vector.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6946"/>
          <seriesInfo name="DOI" value="10.17487/RFC6946"/>
        </reference>
        <reference anchor="RFC7045">
          <front>
            <title>Transmission and Processing of IPv6 Extension Headers</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <date month="December" year="2013"/>
            <abstract>
              <t>Various IPv6 extension headers have been standardised since the IPv6 standard was first published. This document updates RFC 2460 to clarify how intermediate nodes should deal with such extension headers and with any that are defined in the future. It also specifies how extension headers should be registered by IANA, with a corresponding minor update to RFC 2780.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7045"/>
          <seriesInfo name="DOI" value="10.17487/RFC7045"/>
        </reference>
        <reference anchor="RFC7048">
          <front>
            <title>Neighbor Unreachability Detection Is Too Impatient</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="I. Gashinsky" initials="I." surname="Gashinsky"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>IPv6 Neighbor Discovery includes Neighbor Unreachability Detection. That function is very useful when a host has an alternative neighbor -- for instance, when there are multiple default routers -- since it allows the host to switch to the alternative neighbor in a short time. By default, this time is 3 seconds after the node starts probing. However, if there are no alternative neighbors, this timeout behavior is far too impatient. This document specifies relaxed rules for Neighbor Discovery retransmissions that allow an implementation to choose different timeout behavior based on whether or not there are alternative neighbors. This document updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7048"/>
          <seriesInfo name="DOI" value="10.17487/RFC7048"/>
        </reference>
        <reference anchor="RFC7112">
          <front>
            <title>Implications of Oversized IPv6 Header Chains</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="V. Manral" initials="V." surname="Manral"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>The IPv6 specification allows IPv6 Header Chains of an arbitrary size. The specification also allows options that can, in turn, extend each of the headers. In those scenarios in which the IPv6 Header Chain or options are unusually long and packets are fragmented, or scenarios in which the fragment size is very small, the First Fragment of a packet may fail to include the entire IPv6 Header Chain. This document discusses the interoperability and security problems of such traffic, and updates RFC 2460 such that the First Fragment of a packet is required to contain the entire IPv6 Header Chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7112"/>
          <seriesInfo name="DOI" value="10.17487/RFC7112"/>
        </reference>
        <reference anchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another. This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users. The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7527">
          <front>
            <title>Enhanced Duplicate Address Detection</title>
            <author fullname="R. Asati" initials="R." surname="Asati"/>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <author fullname="E. Dart" initials="E." surname="Dart"/>
            <author fullname="W. George" initials="W." surname="George"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of RFC 4862. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. Several service provider communities have expressed a need for automated detection of looped back Neighbor Discovery (ND) messages used by DAD. This document includes mitigation techniques and outlines the Enhanced DAD algorithm to automate the detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks, this document automates resolving a specific duplicate address conflict. This document updates RFCs 4429, 4861, and 4862.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7527"/>
          <seriesInfo name="DOI" value="10.17487/RFC7527"/>
        </reference>
        <reference anchor="RFC7559">
          <front>
            <title>Packet-Loss Resiliency for Router Solicitations</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="D. Anipko" initials="D." surname="Anipko"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>When an interface on a host is initialized, the host transmits Router Solicitations in order to minimize the amount of time it needs to wait until the next unsolicited multicast Router Advertisement is received. In certain scenarios, these Router Solicitations transmitted by the host might be lost. This document specifies a mechanism for hosts to cope with the loss of the initial Router Solicitations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7559"/>
          <seriesInfo name="DOI" value="10.17487/RFC7559"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC8028">
          <front>
            <title>First-Hop Router Selection by Hosts in a Multi-Prefix Network</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document describes expected IPv6 host behavior in a scenario that has more than one prefix, each allocated by an upstream network that is assumed to implement BCP 38 ingress filtering, when the host has multiple routers to choose from. It also applies to other scenarios such as the usage of stateful firewalls that effectively act as address-based filters. Host behavior in choosing a first-hop router may interact with source address selection in a given implementation. However, the selection of the source address for a packet is done before the first-hop router for that packet is chosen. Given that the network or host is, or appears to be, multihomed with multiple provider-allocated addresses, that the host has elected to use a source address in a given prefix, and that some but not all neighboring routers are advertising that prefix in their Router Advertisement Prefix Information Options, this document specifies to which router a host should present its transmission. It updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8028"/>
          <seriesInfo name="DOI" value="10.17487/RFC8028"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8064">
          <front>
            <title>Recommendation on Stable IPv6 Interface Identifiers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document changes the recommended default Interface Identifier (IID) generation scheme for cases where Stateless Address Autoconfiguration (SLAAC) is used to generate a stable IPv6 address. It recommends using the mechanism specified in RFC 7217 in such cases, and recommends against embedding stable link-layer addresses in IPv6 IIDs. It formally updates RFC 2464, RFC 2467, RFC 2470, RFC 2491, RFC 2492, RFC 2497, RFC 2590, RFC 3146, RFC 3572, RFC 4291, RFC 4338, RFC 4391, RFC 5072, and RFC 5121. This document does not change any existing recommendations concerning the use of temporary addresses as specified in RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8064"/>
          <seriesInfo name="DOI" value="10.17487/RFC8064"/>
        </reference>
        <reference anchor="RFC8106">
          <front>
            <title>IPv6 Router Advertisement Options for DNS Configuration</title>
            <author fullname="J. Jeong" initials="J." surname="Jeong"/>
            <author fullname="S. Park" initials="S." surname="Park"/>
            <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
              <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8106"/>
          <seriesInfo name="DOI" value="10.17487/RFC8106"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="RFC8221">
          <front>
            <title>Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document replaces RFC 7321, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)". The goal of this document is to enable ESP and AH to benefit from cryptography that is up to date while making IPsec interoperable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8221"/>
          <seriesInfo name="DOI" value="10.17487/RFC8221"/>
        </reference>
        <reference anchor="RFC8247">
          <front>
            <title>Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The Internet Key Exchange (IKE) protocol is used to negotiate the IPsec Security Association (IPsec SA) parameters, such as which algorithms should be used. To ensure interoperability between different implementations, it is necessary to specify a set of algorithm implementation requirements and usage guidance to ensure that there is at least one algorithm that all implementations support. This document updates RFC 7296 and obsoletes RFC 4307 in defining the current algorithm implementation requirements and usage guidance for IKEv2, and does minor cleaning up of the IKEv2 IANA registry. This document does not update the algorithms used for packet encryption using IPsec Encapsulating Security Payload (ESP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8247"/>
          <seriesInfo name="DOI" value="10.17487/RFC8247"/>
        </reference>
        <reference anchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC8344">
          <front>
            <title>A YANG Data Model for IP Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for management of IP implementations. The data model includes configuration and system state.</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7277.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8344"/>
          <seriesInfo name="DOI" value="10.17487/RFC8344"/>
        </reference>
        <reference anchor="RFC8415">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="November" year="2018"/>
            <abstract>
              <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
        </reference>
        <reference anchor="RFC8981">
          <front>
            <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8981"/>
          <seriesInfo name="DOI" value="10.17487/RFC8981"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC0793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2205">
          <front>
            <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <author fullname="S. Berson" initials="S." surname="Berson"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="S. Jamin" initials="S." surname="Jamin"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2205"/>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
        </reference>
        <reference anchor="RFC2464">
          <front>
            <title>Transmission of IPv6 Packets over Ethernet Networks</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document specifies the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Ethernet networks. It also specifies the content of the Source/Target Link-layer Address option used in Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement and Redirect messages when those messages are transmitted on an Ethernet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2464"/>
          <seriesInfo name="DOI" value="10.17487/RFC2464"/>
        </reference>
        <reference anchor="RFC2491">
          <front>
            <title>IPv6 over Non-Broadcast Multiple Access (NBMA) networks</title>
            <author fullname="G. Armitage" initials="G." surname="Armitage"/>
            <author fullname="P. Schulter" initials="P." surname="Schulter"/>
            <author fullname="M. Jork" initials="M." surname="Jork"/>
            <author fullname="G. Harter" initials="G." surname="Harter"/>
            <date month="January" year="1999"/>
            <abstract>
              <t>This document describes a general architecture for IPv6 over NBMA networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2491"/>
          <seriesInfo name="DOI" value="10.17487/RFC2491"/>
        </reference>
        <reference anchor="RFC2590">
          <front>
            <title>Transmission of IPv6 Packets over Frame Relay Networks Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="A. Malis" initials="A." surname="Malis"/>
            <author fullname="M. Mueller" initials="M." surname="Mueller"/>
            <date month="May" year="1999"/>
            <abstract>
              <t>This memo describes mechanisms for the transmission of IPv6 packets over Frame Relay networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2590"/>
          <seriesInfo name="DOI" value="10.17487/RFC2590"/>
        </reference>
        <reference anchor="RFC2874">
          <front>
            <title>DNS Extensions to Support IPv6 Address Aggregation and Renumbering</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="July" year="2000"/>
            <abstract>
              <t>This document defines changes to the Domain Name System to support renumberable and aggregatable IPv6 addressing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2874"/>
          <seriesInfo name="DOI" value="10.17487/RFC2874"/>
        </reference>
        <reference anchor="RFC2923">
          <front>
            <title>TCP Problems with Path MTU Discovery</title>
            <author fullname="K. Lahey" initials="K." surname="Lahey"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This memo catalogs several known Transmission Control Protocol (TCP) implementation problems dealing with Path Maximum Transmission Unit Discovery (PMTUD), including the long-standing black hole problem, stretch acknowlegements (ACKs) due to confusion between Maximum Segment Size (MSS) and segment size, and MSS advertisement based on PMTU. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2923"/>
          <seriesInfo name="DOI" value="10.17487/RFC2923"/>
        </reference>
        <reference anchor="RFC3146">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 1394 Networks</title>
            <author fullname="K. Fujisawa" initials="K." surname="Fujisawa"/>
            <author fullname="A. Onoe" initials="A." surname="Onoe"/>
            <date month="October" year="2001"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE1394 networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3146"/>
          <seriesInfo name="DOI" value="10.17487/RFC3146"/>
        </reference>
        <reference anchor="RFC3363">
          <front>
            <title>Representing Internet Protocol version 6 (IPv6) Addresses in the Domain Name System (DNS)</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="B. Fink" initials="B." surname="Fink"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="T. Hain" initials="T." surname="Hain"/>
            <date month="August" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3363"/>
          <seriesInfo name="DOI" value="10.17487/RFC3363"/>
        </reference>
        <reference anchor="RFC3493">
          <front>
            <title>Basic Socket Interface Extensions for IPv6</title>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <date month="February" year="2003"/>
            <abstract>
              <t>The de facto standard Application Program Interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to support IPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required by TCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3493"/>
          <seriesInfo name="DOI" value="10.17487/RFC3493"/>
        </reference>
        <reference anchor="RFC3542">
          <front>
            <title>Advanced Sockets Application Program Interface (API) for IPv6</title>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="May" year="2003"/>
            <abstract>
              <t>This document provides sockets Application Program Interface (API) to support "advanced" IPv6 applications, as a supplement to a separate specification, RFC 3493. The expected applications include Ping, Traceroute, routing daemons and the like, which typically use raw sockets to access IPv6 or ICMPv6 header fields. This document proposes some portable interfaces for applications that use raw sockets under IPv6. There are other features of IPv6 that some applications will need to access: interface identification (specifying the outgoing interface and determining the incoming interface), IPv6 extension headers, and path Maximum Transmission Unit (MTU) information. This document provides API access to these features too. Additionally, some extended interfaces to libraries for the "r" commands are defined. The extension will provide better backward compatibility to existing implementations that are not IPv6-capable. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3542"/>
          <seriesInfo name="DOI" value="10.17487/RFC3542"/>
        </reference>
        <reference anchor="RFC3646">
          <front>
            <title>DNS Configuration options for Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="R. Droms" initials="R." role="editor" surname="Droms"/>
            <date month="December" year="2003"/>
            <abstract>
              <t>This document describes Dynamic Host Configuration Protocol for IPv6 (DHCPv6) options for passing a list of available DNS recursive name servers and a domain search list to a client.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3646"/>
          <seriesInfo name="DOI" value="10.17487/RFC3646"/>
        </reference>
        <reference anchor="RFC3678">
          <front>
            <title>Socket Interface Extensions for Multicast Source Filters</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>The Internet Group Management Protocol (IGMPv3) for IPv4 and the Multicast Listener Discovery (MLDv2) for IPv6 add the capability for applications to express source filters on multicast group memberships, which allows receiver applications to determine the set of senders (sources) from which to accept multicast traffic. This capability also simplifies support of one-to-many type multicast applications. This document specifies new socket options and functions to manage source filters for IP Multicast group memberships. It also defines the socket structures to provide input and output arguments to these new application program interfaces (APIs). These extensions are designed to provide access to the source filtering features, while introducing a minimum of change into the system and providing complete compatibility for existing multicast applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3678"/>
          <seriesInfo name="DOI" value="10.17487/RFC3678"/>
        </reference>
        <reference anchor="RFC3776">
          <front>
            <title>Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Devarapalli" initials="V." surname="Devarapalli"/>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>Mobile IPv6 uses IPsec to protect signaling between the home agent and the mobile node. Mobile IPv6 base document defines the main requirements these nodes must follow. This document discusses these requirements in more depth, illustrates the used packet formats, describes suitable configuration procedures, and shows how implementations can process the packets in the right order. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3776"/>
          <seriesInfo name="DOI" value="10.17487/RFC3776"/>
        </reference>
        <reference anchor="RFC3971">
          <front>
            <title>SEcure Neighbor Discovery (SEND)</title>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="J. Kempf" initials="J." surname="Kempf"/>
            <author fullname="B. Zill" initials="B." surname="Zill"/>
            <author fullname="P. Nikander" initials="P." surname="Nikander"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. If not secured, NDP is vulnerable to various attacks. This document specifies security mechanisms for NDP. Unlike those in the original NDP specifications, these mechanisms do not use IPsec. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3971"/>
          <seriesInfo name="DOI" value="10.17487/RFC3971"/>
        </reference>
        <reference anchor="RFC3972">
          <front>
            <title>Cryptographically Generated Addresses (CGA)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol. Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters. The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier. Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key. The protection works without a certification authority or any security infrastructure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3972"/>
          <seriesInfo name="DOI" value="10.17487/RFC3972"/>
        </reference>
        <reference anchor="RFC4191">
          <front>
            <title>Default Router Preferences and More-Specific Routes</title>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>This document describes an optional extension to Router Advertisement messages for communicating default router preferences and more-specific routes from routers to hosts. This improves the ability of hosts to pick an appropriate router, especially when the host is multi-homed and the routers are on different links. The preference values and specific routes advertised to hosts require administrative configuration; they are not automatically derived from routing tables. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4191"/>
          <seriesInfo name="DOI" value="10.17487/RFC4191"/>
        </reference>
        <reference anchor="RFC4294">
          <front>
            <title>IPv6 Node Requirements</title>
            <author fullname="J. Loughney" initials="J." role="editor" surname="Loughney"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4294"/>
          <seriesInfo name="DOI" value="10.17487/RFC4294"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4338">
          <front>
            <title>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP) Packets over Fibre Channel</title>
            <author fullname="C. DeSanti" initials="C." surname="DeSanti"/>
            <author fullname="C. Carlson" initials="C." surname="Carlson"/>
            <author fullname="R. Nixon" initials="R." surname="Nixon"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies the way of encapsulating IPv6, IPv4, and Address Resolution Protocol (ARP) packets over Fibre Channel. This document also specifies the method of forming IPv6 link-local addresses and statelessly autoconfigured IPv6 addresses on Fibre Channel networks, and a mechanism to perform IPv4 address resolution over Fibre Channel networks.</t>
              <t>This document obsoletes RFC 2625 and RFC 3831. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4338"/>
          <seriesInfo name="DOI" value="10.17487/RFC4338"/>
        </reference>
        <reference anchor="RFC4380">
          <front>
            <title>Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP; we call this the Teredo service. Running the service requires the help of "Teredo servers" and "Teredo relays". The Teredo servers are stateless, and only have to manage a small fraction of the traffic between Teredo clients; the Teredo relays act as IPv6 routers between the Teredo service and the "native" IPv6 Internet. The relays can also provide interoperability with hosts using other transition mechanisms such as "6to4". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4380"/>
          <seriesInfo name="DOI" value="10.17487/RFC4380"/>
        </reference>
        <reference anchor="RFC4429">
          <front>
            <title>Optimistic Duplicate Address Detection (DAD) for IPv6</title>
            <author fullname="N. Moore" initials="N." surname="Moore"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>Optimistic Duplicate Address Detection is an interoperable modification of the existing IPv6 Neighbor Discovery (RFC 2461) and Stateless Address Autoconfiguration (RFC 2462) processes. The intention is to minimize address configuration delays in the successful case, to reduce disruption as far as possible in the failure case, and to remain interoperable with unmodified hosts and routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4429"/>
          <seriesInfo name="DOI" value="10.17487/RFC4429"/>
        </reference>
        <reference anchor="RFC4584">
          <front>
            <title>Extension to Sockets API for Mobile IPv6</title>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2006"/>
            <abstract>
              <t>This document describes data structures and API support for Mobile IPv6 as an extension to the Advanced Socket API for IPv6.</t>
              <t>Just as the Advanced Sockets API for IPv6 gives access to various extension headers and the ICMPv6 protocol, this document specifies the same level of access for Mobile IPv6 components. It specifies a mechanism for applications to retrieve and set information for Mobility Header messages, Home Address destination options, and Routing Header Type 2 extension headers. It also specifies the common data structures and definitions that might be used by certain advanced Mobile IPv6 socket applications. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4584"/>
          <seriesInfo name="DOI" value="10.17487/RFC4584"/>
        </reference>
        <reference anchor="RFC4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="RFC4877">
          <front>
            <title>Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture</title>
            <author fullname="V. Devarapalli" initials="V." surname="Devarapalli"/>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document describes Mobile IPv6 operation with the revised IPsec architecture and IKEv2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4877"/>
          <seriesInfo name="DOI" value="10.17487/RFC4877"/>
        </reference>
        <reference anchor="RFC4884">
          <front>
            <title>Extended ICMP to Support Multi-Part Messages</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document redefines selected ICMP messages to support multi-part operation. A multi-part ICMP message carries all of the information that ICMP messages carried previously, as well as additional information that applications may require.</t>
              <t>Multi-part messages are supported by an ICMP extension structure. The extension structure is situated at the end of the ICMP message. It includes an extension header followed by one or more extension objects. Each extension object contains an object header and object payload. All object headers share a common format.</t>
              <t>This document further redefines the above mentioned ICMP messages by specifying a length attribute. All of the currently defined ICMP messages to which an extension structure can be appended include an "original datagram" field. The "original datagram" field contains the initial octets of the datagram that elicited the ICMP error message. Although the original datagram field is of variable length, the ICMP message does not include a field that specifies its length. Therefore, in order to facilitate message parsing, this document allocates eight previously reserved bits to reflect the length of the "original datagram" field.</t>
              <t>The proposed modifications change the requirements for ICMP compliance. The impact of these changes on compliant implementations is discussed, and new requirements for future implementations are presented.</t>
              <t>This memo updates RFC 792 and RFC 4443. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4884"/>
          <seriesInfo name="DOI" value="10.17487/RFC4884"/>
        </reference>
        <reference anchor="RFC4890">
          <front>
            <title>Recommendations for Filtering ICMPv6 Messages in Firewalls</title>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="May" year="2007"/>
            <abstract>
              <t>In networks supporting IPv6, the Internet Control Message Protocol version 6 (ICMPv6) plays a fundamental role with a large number of functions, and a correspondingly large number of message types and options. ICMPv6 is essential to the functioning of IPv6, but there are a number of security risks associated with uncontrolled forwarding of ICMPv6 messages. Filtering strategies designed for the corresponding protocol, ICMP, in IPv4 networks are not directly applicable, because these strategies are intended to accommodate a useful auxiliary protocol that may not be required for correct functioning.</t>
              <t>This document provides some recommendations for ICMPv6 firewall filter configuration that will allow propagation of ICMPv6 messages that are needed to maintain the functioning of the network but drop messages that are potential security risks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4890"/>
          <seriesInfo name="DOI" value="10.17487/RFC4890"/>
        </reference>
        <reference anchor="RFC4919">
          <front>
            <title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="C. Schumacher" initials="C." surname="Schumacher"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks. The set of goals enumerated in this document form an initial set only. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4919"/>
          <seriesInfo name="DOI" value="10.17487/RFC4919"/>
        </reference>
        <reference anchor="RFC4944">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="D. Culler" initials="D." surname="Culler"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4944"/>
          <seriesInfo name="DOI" value="10.17487/RFC4944"/>
        </reference>
        <reference anchor="RFC5014">
          <front>
            <title>IPv6 Socket API for Source Address Selection</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="J. Laganier" initials="J." surname="Laganier"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The IPv6 default address selection document (RFC 3484) describes the rules for selecting source and destination IPv6 addresses, and indicates that applications should be able to reverse the sense of some of the address selection rules through some unspecified API. However, no such socket API exists in the basic (RFC 3493) or advanced (RFC 3542) IPv6 socket API documents. This document fills that gap partially by specifying new socket-level options for source address selection and flags for the getaddrinfo() API to specify address selection based on the source address preference in accordance with the socket-level options that modify the default source address selection algorithm. The socket API described in this document will be particularly useful for IPv6 applications that want to choose between temporary and public addresses, and for Mobile IPv6 aware applications that want to use the care-of address for communication. It also specifies socket options and flags for selecting Cryptographically Generated Address (CGA) or non-CGA source addresses. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5014"/>
          <seriesInfo name="DOI" value="10.17487/RFC5014"/>
        </reference>
        <reference anchor="RFC5072">
          <front>
            <title>IP Version 6 over PPP</title>
            <author fullname="S. Varada" initials="S." role="editor" surname="Varada"/>
            <author fullname="D. Haskins" initials="D." surname="Haskins"/>
            <author fullname="E. Allen" initials="E." surname="Allen"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method of encapsulating network-layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.</t>
              <t>This document defines the method for sending IPv6 packets over PPP links, the NCP for establishing and configuring the IPv6 over PPP, and the method for forming IPv6 link-local addresses on PPP links.</t>
              <t>It also specifies the conditions for performing Duplicate Address Detection on IPv6 global unicast addresses configured for PPP links either through stateful or stateless address autoconfiguration.</t>
              <t>This document obsoletes RFC 2472. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5072"/>
          <seriesInfo name="DOI" value="10.17487/RFC5072"/>
        </reference>
        <reference anchor="RFC5121">
          <front>
            <title>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE 802.16 Networks</title>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="F. Xia" initials="F." surname="Xia"/>
            <author fullname="B. Sarikaya" initials="B." surname="Sarikaya"/>
            <author fullname="JH. Choi" initials="JH." surname="Choi"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>IEEE Std 802.16 is an air interface specification for fixed and mobile Broadband Wireless Access Systems. Service-specific convergence sublayers to which upper-layer protocols interface are a part of the IEEE 802.16 MAC (Medium Access Control). The Packet convergence sublayer (CS) is used for the transport of all packet- based protocols such as Internet Protocol (IP) and IEEE 802.3 LAN/MAN CSMA/CD Access Method (Ethernet). IPv6 packets can be sent and received via the IP-specific part of the Packet CS. This document specifies the addressing and operation of IPv6 over the IP-specific part of the Packet CS for hosts served by a network that utilizes the IEEE Std 802.16 air interface. It recommends the assignment of a unique prefix (or prefixes) to each host and allows the host to use multiple identifiers within that prefix, including support for randomly generated interface identifiers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5121"/>
          <seriesInfo name="DOI" value="10.17487/RFC5121"/>
        </reference>
        <reference anchor="RFC5555">
          <front>
            <title>Mobile IPv6 Support for Dual Stack Hosts and Routers</title>
            <author fullname="H. Soliman" initials="H." role="editor" surname="Soliman"/>
            <date month="June" year="2009"/>
            <abstract>
              <t>The current Mobile IPv6 and Network Mobility (NEMO) specifications support IPv6 only. This specification extends those standards to allow the registration of IPv4 addresses and prefixes, respectively, and the transport of both IPv4 and IPv6 packets over the tunnel to the home agent. This specification also allows the mobile node to roam over both IPv6 and IPv4, including the case where Network Address Translation is present on the path between the mobile node and its home agent. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5555"/>
          <seriesInfo name="DOI" value="10.17487/RFC5555"/>
        </reference>
        <reference anchor="RFC6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins"/>
            <author fullname="D. Johnson" initials="D." surname="Johnson"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address. The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address. To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option. All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes. This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6275"/>
          <seriesInfo name="DOI" value="10.17487/RFC6275"/>
        </reference>
        <reference anchor="RFC6563">
          <front>
            <title>Moving A6 to Historic Status</title>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="D. Conrad" initials="D." surname="Conrad"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>This document provides a summary of issues related to the use of A6 records, discusses the current status, and moves RFC 2874 to Historic status, providing clarity to implementers and operators. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6563"/>
          <seriesInfo name="DOI" value="10.17487/RFC6563"/>
        </reference>
        <reference anchor="RFC6980">
          <front>
            <title>Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document analyzes the security implications of employing IPv6 fragmentation with Neighbor Discovery (ND) messages. It updates RFC 4861 such that use of the IPv6 Fragmentation Header is forbidden in all Neighbor Discovery messages, thus allowing for simple and effective countermeasures for Neighbor Discovery attacks. Finally, it discusses the security implications of using IPv6 fragmentation with SEcure Neighbor Discovery (SEND) and formally updates RFC 3971 to provide advice regarding how the aforementioned security implications can be mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6980"/>
          <seriesInfo name="DOI" value="10.17487/RFC6980"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC7084">
          <front>
            <title>Basic Requirements for IPv6 Customer Edge Routers</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="B. Stark" initials="B." surname="Stark"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies requirements for an IPv6 Customer Edge (CE) router. Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it. The document also covers IP transition technologies. Two transition technologies in RFC 5969's IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) and RFC 6333's Dual-Stack Lite (DS-Lite) are covered in the document. The document obsoletes RFC 6204.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7084"/>
          <seriesInfo name="DOI" value="10.17487/RFC7084"/>
        </reference>
        <reference anchor="RFC7123">
          <front>
            <title>Security Implications of IPv6 on IPv4 Networks</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2014"/>
            <abstract>
              <t>This document discusses the security implications of native IPv6 support and IPv6 transition/coexistence technologies on "IPv4-only" networks and describes possible mitigations for the aforementioned issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7123"/>
          <seriesInfo name="DOI" value="10.17487/RFC7123"/>
        </reference>
        <reference anchor="RFC7278">
          <front>
            <title>Extending an IPv6 /64 Prefix from a Third Generation Partnership Project (3GPP) Mobile Interface to a LAN Link</title>
            <author fullname="C. Byrne" initials="C." surname="Byrne"/>
            <author fullname="D. Drown" initials="D." surname="Drown"/>
            <author fullname="A. Vizdal" initials="A." surname="Vizdal"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document describes requirements for extending an IPv6 /64 prefix from a User Equipment Third Generation Partnership Project (3GPP) radio interface to a LAN link and describes two implementation examples.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7278"/>
          <seriesInfo name="DOI" value="10.17487/RFC7278"/>
        </reference>
        <reference anchor="RFC7371">
          <front>
            <title>Updates to the IPv6 Multicast Addressing Architecture</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document updates the IPv6 multicast addressing architecture by redefining the reserved bits as generic flag bits. The document also provides some clarifications related to the use of these flag bits.</t>
              <t>This document updates RFCs 3956, 3306, and 4291.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7371"/>
          <seriesInfo name="DOI" value="10.17487/RFC7371"/>
        </reference>
        <reference anchor="RFC7421">
          <front>
            <title>Analysis of the 64-bit Boundary in IPv6 Addressing</title>
            <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The IPv6 unicast addressing format includes a separation between the prefix used to route packets to a subnet and the interface identifier used to specify a given interface connected to that subnet. Currently, the interface identifier is defined as 64 bits long for almost every case, leaving 64 bits for the subnet prefix. This document describes the advantages of this fixed boundary and analyzes the issues that would be involved in treating it as a variable boundary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7421"/>
          <seriesInfo name="DOI" value="10.17487/RFC7421"/>
        </reference>
        <reference anchor="RFC7721">
          <front>
            <title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized. It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7721"/>
          <seriesInfo name="DOI" value="10.17487/RFC7721"/>
        </reference>
        <reference anchor="RFC7739">
          <front>
            <title>Security Implications of Predictable Fragment Identification Values</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>IPv6 specifies the Fragment Header, which is employed for the fragmentation and reassembly mechanisms. The Fragment Header contains an "Identification" field that, together with the IPv6 Source Address and the IPv6 Destination Address of a packet, identifies fragments that correspond to the same original datagram, such that they can be reassembled together by the receiving host. The only requirement for setting the Identification field is that the corresponding value must be different than that employed for any other fragmented datagram sent recently with the same Source Address and Destination Address. Some implementations use a simple global counter for setting the Identification field, thus leading to predictable Identification values. This document analyzes the security implications of predictable Identification values, and provides implementation guidance for setting the Identification field of the Fragment Header, such that the aforementioned security implications are mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7739"/>
          <seriesInfo name="DOI" value="10.17487/RFC7739"/>
        </reference>
        <reference anchor="RFC7772">
          <front>
            <title>Reducing Energy Consumption of Router Advertisements</title>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>Frequent Router Advertisement messages can severely impact host power consumption. This document recommends operational practices to avoid such impact.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="202"/>
          <seriesInfo name="RFC" value="7772"/>
          <seriesInfo name="DOI" value="10.17487/RFC7772"/>
        </reference>
        <reference anchor="RFC7844">
          <front>
            <title>Anonymity Profiles for DHCP Clients</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>Some DHCP options carry unique identifiers. These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses. The anonymity profiles are designed for clients that wish to remain anonymous to the visited network. The profiles provide guidelines on the composition of DHCP or DHCPv6 messages, designed to minimize disclosure of identifying information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7844"/>
          <seriesInfo name="DOI" value="10.17487/RFC7844"/>
        </reference>
        <reference anchor="RFC7934">
          <front>
            <title>Host Address Availability Recommendations</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="V. Cerf" initials="V." surname="Cerf"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document recommends that networks provide general-purpose end hosts with multiple global IPv6 addresses when they attach, and it describes the benefits of and the options for doing so.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="204"/>
          <seriesInfo name="RFC" value="7934"/>
          <seriesInfo name="DOI" value="10.17487/RFC7934"/>
        </reference>
        <reference anchor="RFC8021">
          <front>
            <title>Generation of IPv6 Atomic Fragments Considered Harmful</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="T. Anderson" initials="T." surname="Anderson"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document discusses the security implications of the generation of IPv6 atomic fragments and a number of interoperability issues associated with IPv6 atomic fragments. It concludes that the aforementioned functionality is undesirable and thus documents the motivation for removing this functionality from an upcoming revision of the core IPv6 protocol specification (RFC 2460).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8021"/>
          <seriesInfo name="DOI" value="10.17487/RFC8021"/>
        </reference>
        <reference anchor="RFC8087">
          <front>
            <title>The Benefits of Using Explicit Congestion Notification (ECN)</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="M. Welzl" initials="M." surname="Welzl"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The goal of this document is to describe the potential benefits of applications using a transport that enables Explicit Congestion Notification (ECN). The document outlines the principal gains in terms of increased throughput, reduced delay, and other benefits when ECN is used over a network path that includes equipment that supports Congestion Experienced (CE) marking. It also discusses challenges for successful deployment of ECN. It does not propose new algorithms to use ECN nor does it describe the details of implementation of ECN in endpoint devices (Internet hosts), routers, or other network devices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8087"/>
          <seriesInfo name="DOI" value="10.17487/RFC8087"/>
        </reference>
        <reference anchor="RFC8096">
          <front>
            <title>The IPv6-Specific MIB Modules Are Obsolete</title>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>In 2005-2006, the IPv6 MIB update group published updated versions of the IP-MIB, UDP-MIB, TCP-MIB, and IP-FORWARD-MIB modules, which use the InetAddressType/InetAddress construct to handle IPv4 and IPv6 in the same table. This document contains versions of the obsoleted IPV6-MIB, IPV6-TC, IPV6-ICMP-MIB, IPV6-TCP-MIB, and IPV6-UDP-MIB modules for the purpose of updating MIB module repositories. This document obsoletes RFCs 2452, 2454, 2465, and 2466 (i.e., the RFCs containing these MIBs) and reclassifies them as Historic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8096"/>
          <seriesInfo name="DOI" value="10.17487/RFC8096"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="POSIX" target="https://ieeexplore.ieee.org/document/8277153">
          <front>
            <title>Information Technology -- Portable Operating System Interface (POSIX(R)) Base Specifications, Issue 7</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="January"/>
          </front>
          <seriesInfo name="IEEE Std" value="1003.1-2017"/>
          <seriesInfo name="DOI:" value="10.1109/IEEESTD.2018.8277153"/>
        </reference>
        <reference anchor="USGv6" target="https://www.nist.gov/programs-projects/usgv6-program">
          <front>
            <title>A Profile for IPv6 in the U.S. Government - Version 1.0</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2008" month="July"/>
          </front>
          <seriesInfo name="NIST" value="SP500-267"/>
        </reference>
      </references>
    </references>
    <?line 1345?>

<section anchor="changes-from-rfc-8504">
      <name>Changes from RFC 8504</name>
      <t>This section highlights the changes since RFC 8504. It is not a complete list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated obsoleted RFCs including 3315 and 3736 (both to 8415) and 4941 to 8981. RFC 793 has been obsoleted by 9293 but the latter does not include the the robustness principle for which RFC 793 is cited in this document.</t>
        </li>
        <li>
          <t>Made RFC 8021 informative, though this document cites it in a normative style.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-6434-to-rfc-8504">
      <name>Changes from RFC 6434 to RFC 8504</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Restructured sections.</t>
        </li>
        <li>
          <t>Added 6LoWPAN to link layers as it has some deployment.</t>
        </li>
        <li>
          <t>Removed the Downstream-on-Demand (DoD) IPv6 Profile as it hasn't been updated.</t>
        </li>
        <li>
          <t>Updated MLDv2 support to a <bcp14>MUST</bcp14> since nodes are restricted if MLDv1 is used.</t>
        </li>
        <li>
          <t>Required DNS RA options so SLAAC-only devices can get DNS; RFC 8106 is a
  <bcp14>MUST</bcp14>.</t>
        </li>
        <li>
          <t>Required RFC 3646 DNS Options for DHCPv6 implementations.</t>
        </li>
        <li>
          <t>Added RESTCONF and NETCONF as possible options to network management.</t>
        </li>
        <li>
          <t>Added a section on constrained devices.</t>
        </li>
        <li>
          <t>Added text on RFC 7934 to address availability to hosts (<bcp14>SHOULD</bcp14>).</t>
        </li>
        <li>
          <t>Added text on RFC 7844 for anonymity profiles for DHCPv6 clients.</t>
        </li>
        <li>
          <t>Added mDNS and DNS-SD as updated service discovery.</t>
        </li>
        <li>
          <t>Added RFC 8028 as a <bcp14>SHOULD</bcp14> as a method for solving a multi-prefix network.</t>
        </li>
        <li>
          <t>Added ECN RFC 3168 as a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added reference to RFC 7123 for security over IPv4-only networks.</t>
        </li>
        <li>
          <t>Removed Jumbograms (RFC 2675) as they aren't deployed.</t>
        </li>
        <li>
          <t>Updated obsoleted RFCs to the new version of the RFC, including RFCs 2460,
  1981, 7321, and 4307.</t>
        </li>
        <li>
          <t>Added RFC 7772 for power consumptions considerations.</t>
        </li>
        <li>
          <t>Added why /64 boundaries for more detail --- RFC 7421.</t>
        </li>
        <li>
          <t>Added a unique IPv6 prefix per host to support currently deployed IPv6 networks.</t>
        </li>
        <li>
          <t>Clarified RFC 7066 was a snapshot for 3GPP.</t>
        </li>
        <li>
          <t>Updated RFC 4191 as a <bcp14>MUST</bcp14> and the Type C Host as a <bcp14>SHOULD</bcp14> as they help solve
  multi-prefix problems.</t>
        </li>
        <li>
          <t>Removed IPv6 over ATM since there aren't many deployments.</t>
        </li>
        <li>
          <t>Added a note in Section 6.6 for Rule 5.5 from RFC 6724.</t>
        </li>
        <li>
          <t>Added <bcp14>MUST</bcp14> for BCP 198 for forwarding IPv6 packets.</t>
        </li>
        <li>
          <t>Added a reference to RFC 8064 for stable address creation.</t>
        </li>
        <li>
          <t>Added text on the protection from excessive extension header options.</t>
        </li>
        <li>
          <t>Added text on the dangers of 1280 MTU UDP, especially with regard to DNS
  traffic.</t>
        </li>
        <li>
          <t>Added text to clarify RFC 8200 behavior for unrecognized extension headers
  or unrecognized ULPs.</t>
        </li>
        <li>
          <t>Removed dated email addresses from design team acknowledgements for <xref target="RFC4294"/>.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-4294-to-rfc-6434">
      <name>Changes from RFC 4294 to RFC 6434</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated the Introduction to indicate that this document is an
  applicability statement and is aimed at
  general nodes.</t>
        </li>
        <li>
          <t>Significantly updated the section on mobility protocols;
  added references and downgraded previous SHOULDs to MAYs.</t>
        </li>
        <li>
          <t>Changed the Sub-IP Layer section to just list relevant RFCs, and
  added some more RFCs.</t>
        </li>
        <li>
          <t>Added a section on SEND (it is a <bcp14>MAY</bcp14>).</t>
        </li>
        <li>
          <t>Revised the section on Privacy Extensions to add more
  nuance to the recommendation.</t>
        </li>
        <li>
          <t>Completely revised the IPsec/IKEv2 section, downgrading the overall
  recommendation to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Upgraded recommendation of DHCPv6 to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added a background section on DHCP versus RA options, added
  a <bcp14>SHOULD</bcp14> recommendation for DNS configuration via RAs (RFC 6106), and cleaned
  up the DHCP recommendations.</t>
        </li>
        <li>
          <t>Added the recommendation that routers implement Sections 7.3 and
  7.5 of <xref target="RFC6275"/>.</t>
        </li>
        <li>
          <t>Added a pointer to subnet clarification document <xref target="RFC5942"/>.</t>
        </li>
        <li>
          <t>Added text that "IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be implemented.</t>
        </li>
        <li>
          <t>Added reference to <xref target="RFC5722"/> (Overlapping Fragments),
  and made it a <bcp14>MUST</bcp14> to implement.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Removed the mention of delegation name (DNAME) from the discussion about <xref target="RFC3363"/>.</t>
        </li>
        <li>
          <t>Numerous updates to reflect newer versions of IPv6
  documents, including <xref target="RFC3596"/>, <xref target="RFC4213"/>, <xref target="RFC4291"/>, and <xref target="RFC4443"/>.</t>
        </li>
        <li>
          <t>Removed discussion of "Managed" and "Other" flags in
  RAs. There is no consensus at present on how to process these
  flags, and discussion of their semantics was removed in the most
  recent update of Stateless Address Autoconfiguration <xref target="RFC4862"/>.</t>
        </li>
        <li>
          <t>Added many more references to optional IPv6 documents.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Updated the MLD section to include reference to Lightweight MLD <xref target="RFC5790"/>.</t>
        </li>
        <li>
          <t>Added a <bcp14>SHOULD</bcp14> recommendation for "Default Router Preferences
  and More-Specific Routes" <xref target="RFC4191"/>.</t>
        </li>
        <li>
          <t>Made "IPv6 Flow Label Specification" <xref target="RFC6437"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Acknowledgments (Current Document)  </t>
          <t>
The authors would like to thank
Brian Carpenter, Dave Thaler,
Tom Herbert, Erik Kline, Mohamed Boucadair, and Michayla Newcombe
for their contributions and many members of the 6man WG for the inputs they
gave.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 6434  </t>
          <t>
RFC 6434 was authored by Ed Jankiewicz, John Loughney, and Thomas Narten.  </t>
          <t>
The authors of RFC 6434 thank Hitoshi Asaeda, Brian Carpenter, Tim Chown,
Ralph
Droms, Sheila Frankel, Sam Hartman, Bob Hinden, Paul Hoffman, Pekka
Savola, Yaron Sheffer, and Dave Thaler for their comments.  In addition,
the authors thank Mark Andrews for comments and corrections on DNS
text and Alfred Hoenes for tracking the updates to various RFCs.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 4294  </t>
          <t>
RFC 4294 was written by
the IPv6 Node Requirements design team, which had the following members:
Jari Arkko,
Marc Blanchet,
Samita Chakrabarti,
Alain Durand,
Gerard Gastaud,
Jun-ichiro Itojun Hagino,
Atsushi Inoue,
Masahiro Ishiyama,
John Loughney,
Rajiv Raghunarayan,
Shoichi Sakane,
Dave Thaler, and Juha Wiljakka.  </t>
          <t>
The authors of RFC 4294 thank Ran Atkinson, Jim Bound, Brian Carpenter, Ralph
Droms,
Christian Huitema, Adam Machalek, Thomas Narten, Juha Ollila, and Pekka
Savola for their comments.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
