<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.6.10) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc rfcprocack="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-clw-6man-rfc8504-bis-01" category="bcp" consensus="true" submissionType="IETF" obsoletes="8504" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>IPv6 Node Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-clw-6man-rfc8504-bis-01"/>
    <seriesInfo name="bcp" value="220"/>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <postal>
          <street>Lumen House, Library Avenue</street>
          <city>Harwell Oxford, Didcot</city>
          <code>OX11 0SG</code>
          <country>United Kingdom</country>
        </postal>
        <email>tim.chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Loughney" fullname="John Loughney">
      <organization>Intel</organization>
      <address>
        <postal>
          <city>Santa Clara, CA</city>
          <country>United States of America</country>
        </postal>
        <phone/>
        <email>john.loughney@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Winters" fullname="Timothy Winters">
      <organization>QA Cafe</organization>
      <address>
        <postal>
          <city>Dover</city>
          <region>NH</region>
          <country>United States of America</country>
        </postal>
        <email>tim@qacafe.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Internet</area>
    <workgroup>IPv6 Maintenance</workgroup>
    <keyword>IPv6</keyword>
    <abstract>
      <?line 187?>

<t>This document defines requirements for IPv6 nodes.  It is
expected that IPv6 will be deployed in a wide range of devices and
situations.  Specifying the requirements for IPv6 nodes allows
IPv6 to function well and interoperate in a large number of
situations and deployments.</t>
      <t>This document obsoletes RFC 8504, and in turn RFC 6434 and its predecessor, RFC 4294.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://timchown.github.io/rfc8504-bis/draft-clw-6man-rfc8504-bis.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-clw-6man-rfc8504-bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Maintenance Working Group mailing list (<eref target="mailto:ipv6@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipv6/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipv6/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/timchown/rfc8504-bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 198?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines common functionality required by both
IPv6 hosts and routers.  Many IPv6 nodes will implement optional
or additional features, but this document collects and summarizes
requirements from other published Standards Track documents in one
place.</t>
      <t>This document tries to avoid discussion of protocol details
and references RFCs for this purpose.  This document is intended
to be an applicability statement and to provide guidance as to which
IPv6 specifications should be implemented in the general case and
which specifications may be of interest to specific deployment
scenarios. This document does not update any individual protocol
document RFCs.</t>
      <t>Although this document points to different specifications, it
should be noted that in many cases, the granularity of a
particular requirement will be smaller than a single specification,
as many specifications define multiple, independent pieces, some
of which may not be mandatory. In addition, most specifications
define both client and server behavior in the same specification,
while many implementations will be focused on only one of those
roles.</t>
      <t>This document defines a minimal level of requirement needed
for a device to provide useful Internet service and considers a
broad range of device types and deployment scenarios. Because of
the wide range of deployment scenarios, the minimal requirements
specified in this document may not be sufficient for all
deployment scenarios. It is perfectly reasonable (and indeed
expected) for other profiles to define additional or stricter
requirements appropriate for specific usage and deployment
environments. As an example, this document does not mandate that all
clients support DHCP, but some deployment scenarios may deem
it appropriate to make such a requirement. As another example,
NIST has defined profiles for specialized requirements for IPv6
in target environments (see <xref target="USGv6"/>).</t>
      <t>As it is not always possible for an implementer to know the
exact usage of IPv6 in a node, an overriding requirement for IPv6
nodes is that they should adhere to Jon Postel's Robustness
Principle: "Be conservative in what you do, be liberal in what you accept
from others" <xref target="RFC0793"/>.</t>
      <section anchor="scope-of-this-document">
        <name>Scope of This Document</name>
        <t>IPv6 covers many specifications.  It is intended that IPv6
will be deployed in many different situations and environments.
Therefore, it is important to develop requirements for IPv6
nodes to ensure interoperability.</t>
      </section>
      <section anchor="description-of-ipv6-nodes">
        <name>Description of IPv6 Nodes</name>
        <t>From "Internet Protocol, Version 6 (IPv6) Specification" <xref target="RFC8200"/>, we
have the following definitions:</t>
        <artwork><![CDATA[
IPv6 node   - a device that implements IPv6.
IPv6 router - a node that forwards IPv6 packets not explicitly
              addressed to itself.
IPv6 host   - any IPv6 node that is not a router.
]]></artwork>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="abbreviations-used-in-this-document">
      <name>Abbreviations Used in This Document</name>
      <artwork><![CDATA[
AH    Authentication Header
DAD   Duplicate Address Detection
ESP   Encapsulating Security Payload
ICMP  Internet Control Message Protocol
IKE   Internet Key Exchange
MIB   Management Information Base
MLD   Multicast Listener Discovery
MTU   Maximum Transmission Unit
NA    Neighbor Advertisement
NBMA  Non-Broadcast Multi-Access
ND    Neighbor Discovery
NS    Neighbor Solicitation
NUD   Neighbor Unreachability Detection
PPP   Point-to-Point Protocol
]]></artwork>
    </section>
    <section anchor="sub-ip-layer">
      <name>Sub-IP Layer</name>
      <t>An IPv6 node <bcp14>MUST</bcp14> include support for one or more IPv6
link-layer specifications.  Which link-layer specifications an
implementation should include will depend upon what link layers
are supported by the hardware available on the system.  It is
possible for a conformant IPv6 node to support IPv6 on some of its
interfaces and not on others.</t>
      <t>As IPv6 is run over new Layer 2 technologies, it is expected
that new specifications will be issued.  We list here some of
the Layer 2 technologies for which an IPv6 specification has been developed.
It is provided for informational purposes only and may
not be complete.</t>
      <ul spacing="normal">
        <li>
          <t>Transmission of IPv6 Packets over Ethernet Networks <xref target="RFC2464"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over Frame Relay Networks Specification
<xref target="RFC2590"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 1394 Networks <xref target="RFC3146"/></t>
        </li>
        <li>
          <t>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP)
Packets over Fibre Channel <xref target="RFC4338"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 802.15.4 Networks <xref target="RFC4944"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE
802.16 Networks <xref target="RFC5121"/></t>
        </li>
        <li>
          <t>IP version 6 over PPP <xref target="RFC5072"/></t>
        </li>
      </ul>
      <t>In addition to traditional physical link layers, it is also
possible to tunnel IPv6 over other protocols. Examples
include:</t>
      <ul spacing="normal">
        <li>
          <t>Teredo: Tunneling IPv6 over UDP through Network Address Translations
(NATs) <xref target="RFC4380"/></t>
        </li>
        <li>
          <t>Basic Transition Mechanisms for IPv6 Hosts and Routers (see <xref section="3" sectionFormat="of" target="RFC4213"/>)</t>
        </li>
      </ul>
    </section>
    <section anchor="ip-layer">
      <name>IP Layer</name>
      <section anchor="internet-protocol-version-6-rfc-8200">
        <name>Internet Protocol Version 6 - RFC 8200</name>
        <t>The Internet Protocol version 6 is specified in <xref target="RFC8200"/>.  This specification <bcp14>MUST</bcp14> be supported.</t>
        <t>The node <bcp14>MUST</bcp14> follow the packet transmission rules in RFC 8200.</t>
        <t>All conformant IPv6 implementations <bcp14>MUST</bcp14> be
capable of sending and receiving IPv6 packets; forwarding
functionality <bcp14>MAY</bcp14> be supported.
Nodes <bcp14>MUST</bcp14> always be able to send, receive, and process
Fragment headers.</t>
        <t>IPv6 nodes <bcp14>MUST NOT</bcp14> create
overlapping fragments.  Also, when reassembling an IPv6
datagram, if one or more of its constituent fragments is
determined to be an overlapping fragment, the entire datagram
(and any constituent fragments) <bcp14>MUST</bcp14> be silently discarded.
See Section 4.5 of <xref target="RFC8200"/> for more information.</t>
        <t>As recommended in Section 4.5 of <xref target="RFC8200"/>, nodes <bcp14>MUST NOT</bcp14>
generate atomic fragments, i.e., where the fragment is a whole datagram.
As per <xref target="RFC6946"/>, if a receiving node reassembling
a datagram encounters an atomic fragment,
it should be processed as a fully reassembled packet, and
any other fragments that match this packet should be processed independently.</t>
        <t>To mitigate a variety of potential attacks,
nodes <bcp14>SHOULD</bcp14> avoid using predictable Fragment Identification values
in Fragment headers, as discussed in <xref target="RFC7739"/>.</t>
        <t>All nodes <bcp14>SHOULD</bcp14> support the setting and use of the IPv6 Flow
Label field as defined in the IPv6 Flow Label specification <xref target="RFC6437"/>.
Forwarding nodes such as routers and load distributors
<bcp14>MUST NOT</bcp14> depend only on Flow Label values being uniformly
distributed.  It is <bcp14>RECOMMENDED</bcp14> that source hosts support the flow
label by setting the Flow Label field for all packets of a given
flow to the same value chosen from an approximation to a discrete
uniform distribution.</t>
      </section>
      <section anchor="support-for-ipv6-extension-headers">
        <name>Support for IPv6 Extension Headers</name>
        <t>RFC 8200 specifies extension headers and the processing for
these headers.</t>
        <t>Extension headers (except for the Hop-by-Hop Options header) are not
processed, inserted, or deleted by any node along a packet's delivery
path, until the packet reaches the node (or each of the set of nodes,
in the case of multicast) identified in the Destination Address field
of the IPv6 header.</t>
        <t>Any unrecognized extension headers or options <bcp14>MUST</bcp14> be
processed as described in RFC 8200. Note that where
<xref section="4" sectionFormat="of" target="RFC8200"/>
refers to the action to be taken when a Next Header value
in the current header is not recognized by a node, that action
applies whether the value is an unrecognized extension
header or an unrecognized upper-layer protocol (ULP).</t>
        <t>An IPv6 node <bcp14>MUST</bcp14> be able to process these extension headers.  An
exception is Routing Header type 0 (RH0), which was deprecated
by <xref target="RFC5095"/> due to security concerns and
which <bcp14>MUST</bcp14> be treated as an unrecognized routing type.</t>
        <t>Further, <xref target="RFC7045"/> adds specific requirements for
the processing of extension headers, in particular that any forwarding
node along an IPv6 packet's path, which forwards the packet for
any reason, <bcp14>SHOULD</bcp14> do so regardless of any extension headers
that are present.</t>
        <t>As per RFC 8200, when a node fragments an IPv6 datagram,
it <bcp14>MUST</bcp14> include the entire IPv6 Header Chain in the first fragment.
The Per-Fragment headers <bcp14>MUST</bcp14>
consist of the IPv6 header plus any extension headers that <bcp14>MUST</bcp14> be
processed by nodes en route to the destination,
that is, all headers up to and including the Routing
header if present, else the Hop-by-Hop Options header if present,
else no extension headers.  On reassembly,
if the first fragment does not include all headers through an
upper-layer header, then that fragment <bcp14>SHOULD</bcp14> be discarded and
an ICMP Parameter Problem, Code 3, message <bcp14>SHOULD</bcp14> be sent to
the source of the fragment, with the Pointer field set to zero.
See <xref target="RFC7112"/> for a discussion of why oversized
IPv6 Extension Header Chains are avoided.</t>
        <t>Defining new IPv6 extension headers is not recommended, unless there
are no existing IPv6 extension headers that can be used by specifying
a new option for that IPv6 extension header.  A proposal to specify a
new IPv6 extension header <bcp14>MUST</bcp14> include a detailed technical
explanation of why an existing IPv6 extension header can not be used
for the desired new function, and in such cases, it needs to follow the format
described in <xref section="8" sectionFormat="of" target="RFC8200"/>.  For further background
reading on this topic, see <xref target="RFC6564"/>.</t>
      </section>
      <section anchor="protecting-a-node-from-excessive-extension-header-options">
        <name>Protecting a Node from Excessive Extension Header Options</name>
        <t>As per RFC 8200, end hosts are expected to process all extension headers,
destination options, and hop-by-hop options in a packet. Given that
the only limit on the number and size of extension headers is the MTU,
the processing of received packets could be considerable. It is also
conceivable that a long chain of extension headers might be used as a
form of denial-of-service attack. Accordingly, a host may place limits
on the number and sizes of extension headers and options it is willing
to process.</t>
        <t>A host <bcp14>MAY</bcp14> limit the number of consecutive PAD1 options in destination
options or hop-by-hop options to 7.
In this case, if there are more than 7
consecutive PAD1 options present, the packet <bcp14>MAY</bcp14> be
silently discarded. The rationale is that if padding of 8 or more
bytes is required, then the PADN option <bcp14>SHOULD</bcp14> be used.</t>
        <t>A host <bcp14>MAY</bcp14> limit the number of bytes in a PADN option to be less than
8. In such a case, if a PADN option is present that has a length
greater than 7, the packet <bcp14>SHOULD</bcp14> be silently discarded. The
rationale for this guideline is that the purpose of padding is for
alignment and 8 bytes is the maximum alignment used in IPv6.</t>
        <t>A host <bcp14>MAY</bcp14> disallow unknown options in destination options or
hop-by-hop options. This <bcp14>SHOULD</bcp14> be configurable where the default is
to accept unknown options and process them per <xref target="RFC8200"/>. If a packet
with unknown options is received and the host is configured to
disallow them, then the packet <bcp14>SHOULD</bcp14> be silently discarded.</t>
        <t>A host <bcp14>MAY</bcp14> impose a limit on the maximum number of non-padding options
allowed in the destination options and hop-by-hop extension headers. If
this feature is supported, the maximum number <bcp14>SHOULD</bcp14> be configurable,
and the default value <bcp14>SHOULD</bcp14> be set to 8. The limits for
destination options and hop-by-hop options may be separately
configurable. If a packet is received and the number of destination or
hop-by-hop options exceeds the limit, then the packet <bcp14>SHOULD</bcp14> be
silently discarded.</t>
        <t>A host <bcp14>MAY</bcp14> impose a limit on the maximum length of Destination Options
or Hop-by-Hop Options extension headers. This value <bcp14>SHOULD</bcp14> be
configurable, and the default is to accept options of any length. If a
packet is received and the length of the Destination or Hop-by-Hop Options
extension header exceeds the length limit, then the packet <bcp14>SHOULD</bcp14> be
silently discarded.</t>
      </section>
      <section anchor="ND">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Neighbor Discovery is defined in <xref target="RFC4861"/>; the
definition was updated by <xref target="RFC5942"/>. Neighbor Discovery
<bcp14>MUST</bcp14> be supported with the noted exceptions below.  RFC 4861 states:</t>
        <ul empty="true">
          <li>
            <t>Unless specified otherwise (in a document that covers operating IP
over a particular link type) this document applies to all link types.
However, because ND uses link-layer multicast for some of its
services, it is possible that on some link types (e.g., Non‑Broadcast
Multi-Access (NBMA) links), alternative protocols or mechanisms to
implement those services will be specified (in the appropriate
document covering the operation of IP over a particular link type).
The services described in this document that are not directly
dependent on multicast, such as Redirects, Next-hop determination,
Neighbor Unreachability Detection, etc., are expected to be provided
as specified in this document.
The details of how one uses ND on
NBMA links are addressed in <xref target="RFC2491"/>.</t>
          </li>
        </ul>
        <t>Some detailed analysis of Neighbor Discovery follows:</t>
        <t>Router Discovery is how hosts locate routers that reside on
an attached link.  Hosts <bcp14>MUST</bcp14> support Router Discovery
functionality.</t>
        <t>Prefix Discovery is how hosts discover the set of address
prefixes that define which destinations are on-link for an
attached link. Hosts <bcp14>MUST</bcp14> support Prefix Discovery.</t>
        <t>Hosts <bcp14>MUST</bcp14> also implement Neighbor Unreachability Detection
(NUD) for all paths between hosts and neighboring nodes.  NUD is
not required for paths between routers.  However, all nodes <bcp14>MUST</bcp14>
respond to unicast Neighbor Solicitation (NS) messages.</t>
        <t><xref target="RFC7048"/> discusses NUD, in particular cases
where it behaves too impatiently. It states that if a node
transmits more than a certain number of packets, then it
<bcp14>SHOULD</bcp14> use the exponential backoff of the retransmit timer,
up to a certain threshold point.</t>
        <t>Hosts <bcp14>MUST</bcp14> support the sending of Router Solicitations and
the receiving of Router Advertisements (RAs).  The ability to
understand individual RA options is dependent
on supporting the functionality making use of the particular
option.</t>
        <t><xref target="RFC7559"/> discusses packet loss resiliency
for Router Solicitations and requires that nodes <bcp14>MUST</bcp14> use
a specific exponential backoff algorithm for retransmission of Router
Solicitations.</t>
        <t>All nodes <bcp14>MUST</bcp14> support the sending and receiving of Neighbor
Solicitation (NS) and Neighbor Advertisement (NA) messages.  NS
and NA messages are required for Duplicate Address Detection
(DAD).</t>
        <t>Hosts <bcp14>SHOULD</bcp14> support the processing of Redirect
functionality.  Routers <bcp14>MUST</bcp14> support the sending of Redirects,
though not necessarily for every individual packet (e.g., due to
rate limiting). Redirects are only useful on networks supporting
hosts. In core networks dominated by routers, Redirects are
typically disabled.  The sending of Redirects <bcp14>SHOULD</bcp14> be disabled
by default on routers intended to be deployed on core networks. They <bcp14>MAY</bcp14>
be enabled by default on routers intended to support hosts on edge networks.</t>
        <t>As specified in <xref target="RFC6980"/>, nodes <bcp14>MUST NOT</bcp14> employ IPv6 fragmentation
for sending any of the following Neighbor Discovery and SEcure
Neighbor Discovery messages: Neighbor Solicitation, Neighbor
Advertisement, Router Solicitation, Router Advertisement, Redirect, or
Certification Path Solicitation.
Nodes <bcp14>MUST</bcp14> silently ignore any of these messages on receipt if
fragmented.
See RFC 6980 for details and motivation.</t>
        <t>"IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> includes additional
recommendations on how to select from a set of available routers.
<xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be supported.</t>
      </section>
      <section anchor="secure-neighbor-discovery-send-rfc-3971">
        <name>SEcure Neighbor Discovery (SEND) - RFC 3971</name>
        <t>SEND <xref target="RFC3971"/> and Cryptographically Generated
Addresses (CGAs) <xref target="RFC3972"/> provide a way to
secure the message exchanges of Neighbor Discovery. SEND
has the potential to address certain classes of spoofing
attacks, but it does not provide specific protection for threats
from off-link attackers.</t>
        <t>There have been relatively few implementations of SEND
in common operating systems and platforms since its publication in 2005;
thus, deployment experience remains very limited to date.</t>
        <t>At this time, support for SEND is considered optional. Due to the
complexity in deploying SEND and its heavyweight provisioning,
its deployment is only
likely to be considered where nodes are operating in a
particularly strict security environment.</t>
      </section>
      <section anchor="ipv6-router-advertisement-flags-option-rfc-5175">
        <name>IPv6 Router Advertisement Flags Option - RFC 5175</name>
        <t>Router Advertisements include an 8-bit field of single-bit
Router Advertisement flags.  The Router Advertisement Flags
Option extends the number of available flag bits by 48 bits. At
the time of this writing, 6 of the original 8 single-bit flags have
been assigned, while 2 remain available for future
assignment. No flags have been defined that make use of the new
option; thus, strictly speaking, there is no requirement to
implement the option today. However, implementations that are
able to pass unrecognized options to a higher-level entity that
may be able to understand them (e.g., a user-level process using
a "raw socket" facility) <bcp14>MAY</bcp14> take steps to handle the option in
anticipation of a future usage.</t>
      </section>
      <section anchor="path-mtu-discovery-and-packet-size">
        <name>Path MTU Discovery and Packet Size</name>
        <section anchor="path-mtu-discovery-rfc-8201">
          <name>Path MTU Discovery - RFC 8201</name>
          <t>"Path MTU Discovery for IP version 6" <xref target="RFC8201"/> <bcp14>SHOULD</bcp14> be
supported.  From <xref target="RFC8200"/>:</t>
          <ul empty="true">
            <li>
              <t>It is strongly recommended that IPv6 nodes implement
Path MTU Discovery <xref target="RFC8201"/>, in order to
discover and
take advantage of path MTUs greater than 1280 octets.
However, a minimal IPv6 implementation (e.g., in a boot
ROM) may simply restrict itself to sending packets no
larger than 1280 octets, and omit implementation of Path
MTU Discovery.</t>
            </li>
          </ul>
          <t>The rules in <xref target="RFC8200"/> and <xref target="RFC5722"/> <bcp14>MUST</bcp14> be followed for packet
fragmentation and reassembly.</t>
          <t>As described in RFC 8201,
nodes implementing Path MTU Discovery and sending packets larger than
the IPv6 minimum link MTU are susceptible to problematic connectivity
if ICMPv6 messages are blocked or not transmitted.  For
example, this will result in connections that complete the TCP
three-way handshake correctly but then hang when data is transferred.  This
state is referred to as a black-hole connection <xref target="RFC2923"/>.  Path MTU
Discovery relies on ICMPv6 Packet Too Big (PTB) to determine the MTU
of the path (and thus these <bcp14>MUST NOT</bcp14> be filtered, as per the
recommendation in <xref target="RFC4890"/>).</t>
          <t>An alternative to Path MTU Discovery defined in RFC 8201 can be
found in <xref target="RFC4821"/>, which defines a method for Packetization
Layer Path MTU Discovery (PLPMTUD) designed for use over paths where
delivery of ICMPv6 messages to a host is not assured.</t>
        </section>
        <section anchor="minimum-mtu-considerations">
          <name>Minimum MTU Considerations</name>
          <t>While an IPv6 link MTU can be set to 1280 bytes,
it is recommended that for IPv6 UDP in particular,
which includes DNS operation, the sender use a
large MTU if they can, in order to avoid gratuitous
fragmentation-caused packet drops.</t>
        </section>
      </section>
      <section anchor="icmp-for-the-internet-protocol-version-6-ipv6-rfc-4443">
        <name>ICMP for the Internet Protocol Version 6 (IPv6) - RFC 4443</name>
        <t>ICMPv6 <xref target="RFC4443"/> <bcp14>MUST</bcp14> be supported. "Extended
ICMP to Support Multi-Part Messages" <xref target="RFC4884"/> <bcp14>MAY</bcp14> be supported.</t>
      </section>
      <section anchor="default-router-preferences-and-more-specific-routes-rfc-4191">
        <name>Default Router Preferences and More-Specific Routes - RFC 4191</name>
        <t>"Default Router Preferences and More-Specific Routes" <xref target="RFC4191"/>
provides support for nodes attached to
multiple (different) networks, each providing routers that
advertise themselves as default routers via Router
Advertisements. In some scenarios, one router may provide
connectivity to destinations that the other router does not, and
choosing the "wrong" default router can result in reachability
failures. In order to resolve this scenario, IPv6 nodes <bcp14>MUST</bcp14> implement
<xref target="RFC4191"/> and <bcp14>MUST</bcp14> implement the Type C host role defined in RFC 4191.</t>
      </section>
      <section anchor="first-hop-router-selection-rfc-8028">
        <name>First-Hop Router Selection - RFC 8028</name>
        <t>In multihomed scenarios, where a host has more than one prefix,
each allocated by an upstream network that is assumed to implement
BCP 38 ingress filtering, the host may have multiple routers to
choose from.</t>
        <t>Hosts that may be deployed in such multihomed environments
<bcp14>SHOULD</bcp14> follow the guidance given in <xref target="RFC8028"/>.</t>
      </section>
      <section anchor="mld">
        <name>Multicast Listener Discovery (MLD) for IPv6 - RFC 3810</name>
        <t>Nodes that need to join multicast groups <bcp14>MUST</bcp14> support MLDv2
<xref target="RFC3810"/>. MLD is needed by any node that is
expected to receive and process multicast traffic; in particular,
MLDv2 is required for support for source-specific multicast (SSM) as
per <xref target="RFC4607"/>.</t>
        <t>Previous versions of this specification only required MLDv1 <xref target="RFC2710"/>
to be implemented
on all nodes.  Since participation of any
MLDv1-only nodes on a link require that all other nodes on the link then
operate in version 1 compatibility mode, the requirement to support MLDv2
on all nodes was upgraded to a <bcp14>MUST</bcp14>. Further, SSM is now the preferred
multicast distribution method, rather than Any-Source Multicast (ASM).</t>
        <t>Note that Neighbor Discovery (as used on most link types -- see <xref target="ND"/>)
depends on multicast and requires that nodes join Solicited Node
multicast addresses.</t>
      </section>
      <section anchor="explicit-congestion-notification-ecn-rfc-3168">
        <name>Explicit Congestion Notification (ECN) - RFC 3168</name>
        <t>An ECN-aware router sets a mark in the IP header in order to signal
impending congestion, rather than dropping a packet. The receiver of
the packet echoes the congestion indication to the sender, which can then
reduce its transmission rate as if it detected a dropped packet.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support ECN <xref target="RFC3168"/> by implementing an interface
for the upper layer to access and by setting the ECN bits in the IP header.
The benefits of using ECN are documented in <xref target="RFC8087"/>.</t>
      </section>
    </section>
    <section anchor="addressing-and-address-configuration">
      <name>Addressing and Address Configuration</name>
      <section anchor="ip-version-6-addressing-architecture-rfc-4291">
        <name>IP Version 6 Addressing Architecture - RFC 4291</name>
        <t>The IPv6 Addressing Architecture <xref target="RFC4291"/> <bcp14>MUST</bcp14> be supported.</t>
        <t>The current IPv6 Address Architecture is based on a 64-bit boundary for subnet
prefixes.
The reasoning behind this decision is documented in <xref target="RFC7421"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> also support the multicast flag updates
documented in <xref target="RFC7371"/>.</t>
      </section>
      <section anchor="host-address-availability-recommendations">
        <name>Host Address Availability Recommendations</name>
        <t>Hosts may be configured with addresses through a variety of methods,
including Stateless Address Autoconfiguration (SLAAC), DHCPv6, or manual
configuration.</t>
        <t><xref target="RFC7934"/> recommends that networks provide general-purpose end hosts
with multiple global IPv6 addresses when they attach, and it describes
the benefits of and the options for doing so.
Routers <bcp14>SHOULD</bcp14> support <xref target="RFC7934"/> for assigning multiple addresses to a
host.
A host <bcp14>SHOULD</bcp14> support assigning multiple addresses as described in
<xref target="RFC7934"/>.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support the capability to be assigned a prefix per host as
documented in <xref target="RFC8273"/>.
Such an approach can offer improved host
isolation and enhanced subscriber management on shared network segments.</t>
      </section>
      <section anchor="ipv6-stateless-address-autoconfiguration-rfc-4862">
        <name>IPv6 Stateless Address Autoconfiguration - RFC 4862</name>
        <t>Hosts <bcp14>MUST</bcp14> support IPv6 Stateless Address Autoconfiguration.
It is <bcp14>RECOMMENDED</bcp14>, as described in <xref target="RFC8064"/>, that unless there
is a specific requirement for Media Access Control (MAC) addresses to be
embedded in
an Interface Identifier (IID), nodes follow the procedure in <xref target="RFC7217"/> to generate SLAAC-based
addresses, rather than use <xref target="RFC4862"/>.
Addresses generated using the method described in <xref target="RFC7217"/> will be the same whenever a given device (re)appears on the
same subnet (with a specific IPv6 prefix), but the IID will vary on
each subnet visited.</t>
        <t>Nodes that are routers <bcp14>MUST</bcp14> be able to generate link-local
addresses as described in <xref target="RFC4862"/>.</t>
        <t>From RFC 4862:</t>
        <ul empty="true">
          <li>
            <!-- Begin DNE text -->
  <t>The autoconfiguration process specified in this document
applies only to hosts and not routers.  Since host
autoconfiguration uses information advertised by routers,
routers will need to be configured by some other means.
However, it is expected that routers will generate link-local
addresses using the mechanism described in this document.  In
addition, routers are expected to successfully pass the
Duplicate Address Detection procedure described in this
document on all addresses prior to assigning them to an
interface.</t>
          </li>
        </ul>
        <t>All nodes <bcp14>MUST</bcp14> implement Duplicate Address Detection. Quoting
from <xref section="5.4" sectionFormat="of" target="RFC4862"/>:</t>
        <ul empty="true">
          <li>
            <t>Duplicate Address Detection <bcp14>MUST</bcp14>
be performed on all unicast addresses prior to assigning them
to an interface, regardless of whether they are obtained
through stateless autoconfiguration, DHCPv6, or manual
configuration, with the following exceptions [noted therein].</t>
          </li>
        </ul>
        <t>"Optimistic Duplicate Address Detection (DAD) for
IPv6" <xref target="RFC4429"/> specifies a mechanism to reduce
delays associated with generating addresses via Stateless
Address Autoconfiguration <xref target="RFC4862"/>.  RFC 4429
was developed in conjunction with Mobile IPv6 in order to reduce
the time needed to acquire and configure addresses as devices
quickly move from one network to another, and it is desirable to
minimize transition delays.  For general purpose devices, RFC 4429 remains
optional at this time.</t>
        <t><xref target="RFC7527"/> discusses enhanced DAD and describes an
algorithm to automate the detection of looped-back IPv6 ND messages
used by DAD. Nodes <bcp14>SHOULD</bcp14> implement this behavior where such
detection is beneficial.</t>
      </section>
      <section anchor="privacy-extensions-for-address-configuration-in-ipv6-rfc-8981">
        <name>Privacy Extensions for Address Configuration in IPv6 - RFC 8981</name>
        <t>A node using Stateless Address
Autoconfiguration <xref target="RFC4862"/> to form a globally
unique IPv6 address that uses its MAC address to generate the IID
will see that the IID remains the same on any visited
network, even though the network prefix part changes.
Thus, it is possible for a third-party device to track the activities of
the node they
communicate with, as that node moves around the network.  Privacy Extensions
for Stateless Address
Autoconfiguration <xref target="RFC8981"/> address this
concern by allowing nodes to configure an additional temporary address
where the IID is effectively randomly generated.  Privacy addresses
are then used as source addresses for new communications initiated by the
node.</t>
        <t>General issues regarding privacy issues for IPv6 addressing are discussed
in <xref target="RFC7721"/>.</t>
        <t>RFC 8981 <bcp14>SHOULD</bcp14> be supported.  In some scenarios,
such as dedicated servers in a data
center, it provides limited or no benefit, or it may complicate network management.
Thus, devices implementing this specification <bcp14>MUST</bcp14> provide a way for the
end user to explicitly enable or disable the use of such temporary
addresses.</t>
        <t>Note that RFC 8981 can be used independently of traditional SLAAC or independently
of SLAAC that is based on RFC 7217.</t>
        <t>Implementers of RFC 8981 should be aware that certain
addresses are reserved and should not be chosen for use as
temporary addresses. Consult "Reserved IPv6 Interface
Identifiers" <xref target="RFC5453"/> for more details.</t>
      </section>
      <section anchor="stateful1">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>DHCPv6 <xref target="RFC8415"/> can be used to obtain and
configure addresses. In general, a network may provide for the
configuration of addresses through SLAAC,
DHCPv6, or both.  There will be a wide range of IPv6 deployment
models and differences in address assignment requirements,
some of which may require DHCPv6 for stateful address assignment.
Consequently, all hosts <bcp14>SHOULD</bcp14> implement address configuration
via DHCPv6.</t>
        <t>In the absence of observed Router Advertisement messages, IPv6 nodes
<bcp14>MAY</bcp14> initiate DHCP to obtain IPv6 addresses
and other configuration information, as described in <xref section="5.5.2" sectionFormat="of" target="RFC4862"/>.</t>
        <t>Where devices are likely to be carried by users and attached
to multiple visited networks, DHCPv6 client
anonymity profiles <bcp14>SHOULD</bcp14> be supported as described in <xref target="RFC7844"/> to minimize the disclosure of identifying information.
<xref section="5" sectionFormat="of" target="RFC7844"/> describes operational considerations on the use of
such anonymity profiles.</t>
      </section>
      <section anchor="default-address-selection-for-ipv6-rfc-6724">
        <name>Default Address Selection for IPv6 - RFC 6724</name>
        <t>IPv6 nodes will invariably have multiple addresses configured simultaneously
and thus will need to choose which addresses to use for which communications.
The rules specified in the Default Address Selection for
IPv6 document <xref target="RFC6724"/> <bcp14>MUST</bcp14> be implemented. <xref target="RFC8028"/> updates Rule 5.5 from <xref target="RFC6724"/>; implementations
<bcp14>SHOULD</bcp14> implement this rule.</t>
      </section>
    </section>
    <section anchor="dns">
      <name>DNS</name>
      <t>DNS is described in <xref target="RFC1034"/>, <xref target="RFC1035"/>, <xref target="RFC3363"/>, and <xref target="RFC3596"/>.  Not all nodes will need to resolve names;
those that will never need to resolve DNS names do not need to
implement resolver functionality.  However, the ability to
resolve names is a basic infrastructure capability on which
applications rely, and most nodes will need to provide
support.  All nodes <bcp14>SHOULD</bcp14> implement stub-resolver <xref target="RFC1034"/> functionality, as in Section 5.3.1 of <xref target="RFC1034"/>, with support for:</t>
      <dl>
        <dt>-</dt>
        <dd>
          <t>AAAA type Resource Records <xref target="RFC3596"/>;</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>reverse addressing in ip6.arpa using PTR records <xref target="RFC3596"/>; and</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>Extension Mechanisms for DNS (EDNS(0)) <xref target="RFC6891"/> to allow for DNS packet sizes larger than 512 octets.</t>
        </dd>
      </dl>
      <t>Those nodes are <bcp14>RECOMMENDED</bcp14> to support DNS security extensions <xref target="RFC4033"/>  <xref target="RFC4034"/>  <xref target="RFC4035"/>.</t>
      <t>A6 Resource Records <xref target="RFC2874"/> are classified as Historic per <xref target="RFC6563"/>.  These were defined with Experimental status in <xref target="RFC3363"/>.</t>
    </section>
    <section anchor="OtherConfig">
      <name>Configuring Non-address Information</name>
      <section anchor="dhcp-for-other-configuration-information">
        <name>DHCP for Other Configuration Information</name>
        <t>DHCP <xref target="RFC8415"/> specifies a mechanism for IPv6 nodes to obtain
address configuration information (see <xref target="stateful1"/>) and to
obtain additional (non-address) configuration.  If a host
implementation supports applications or other protocols that
require configuration that is only available via DHCP, hosts
<bcp14>SHOULD</bcp14> implement DHCP. For specialized devices on which no
such configuration need is present, DHCP may not be
necessary.</t>
        <t>An IPv6 node can use the subset of DHCP (described in <xref target="RFC8415"/>) to obtain other configuration
information.</t>
        <t>If an IPv6 node implements DHCP, it <bcp14>MUST</bcp14> implement the DNS options <xref target="RFC3646"/> as most deployments will expect that these options are available.</t>
      </section>
      <section anchor="router-advertisements-and-default-gateway">
        <name>Router Advertisements and Default Gateway</name>
        <t>There is no defined DHCPv6 Gateway option.</t>
        <t>Nodes using the Dynamic Host Configuration Protocol for
IPv6 (DHCPv6) are thus expected to determine their default router
information and on-link prefix information from received
Router Advertisements.</t>
      </section>
      <section anchor="ipv6-router-advertisement-options-for-dns-configuration-rfc-8106">
        <name>IPv6 Router Advertisement Options for DNS         Configuration - RFC 8106</name>
        <t>Router Advertisement options have historically been limited to
those that are critical to basic IPv6 functionality. Originally,
DNS configuration was not included as an RA option, and DHCP
was the recommended way to obtain DNS configuration
information. Over time, the thinking surrounding such an
option has evolved. It is now generally recognized that few
nodes can function adequately without having access to a
working DNS resolver; thus, a
Standards Track document has been published to provide this
capability <xref target="RFC8106"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> include support for the DNS RA option <xref target="RFC8106"/>.</t>
      </section>
      <section anchor="dhcp-options-versus-router-advertisement-options-for-host-configuration">
        <name>DHCP Options versus Router Advertisement Options for Host Configuration</name>
        <t>In IPv6, there are two main protocol mechanisms for
propagating configuration information to hosts: RAs and DHCP. RA options
have been
restricted to those deemed essential for basic network
functioning and for which all nodes are configured with exactly
the same information.  Examples include the Prefix Information
Options, the MTU option, etc. On the other hand, DHCP has
generally been preferred for configuration of more general
parameters and for parameters that may be client specific.
Generally speaking, however, there has been a desire
to define only one mechanism for configuring a given option,
rather than defining multiple (different) ways of configuring
the same information.</t>
        <t>One issue with having multiple ways to configure the same
information is that interoperability suffers if a host chooses one
mechanism but the
network operator chooses a different mechanism. For "closed"
environments, where the network operator
has significant influence over what devices connect to the
network and thus what configuration mechanisms they support, the
operator may be able to ensure that a particular mechanism is
supported by all connected hosts. In more open environments,
however, where arbitrary devices may connect (e.g., a Wi-Fi
hotspot), problems can arise. To maximize interoperability in
such environments, hosts would need to implement multiple
configuration mechanisms to ensure interoperability.</t>
      </section>
    </section>
    <section anchor="service-discovery-protocols">
      <name>Service Discovery Protocols</name>
      <t>Multicast DNS (mDNS) and
DNS-based Service Discovery (DNS-SD) are described in <xref target="RFC6762"/> and <xref target="RFC6763"/>, respectively.
These protocols, often collectively referred to as the
'Bonjour' protocols after their naming by Apple, provide
the means for devices to discover services within a local
link and, in the absence of a unicast DNS service, to
exchange naming information.</t>
      <t>Where devices are to be deployed in networks where
service discovery would be beneficial, e.g., for users
seeking to discover printers or display devices, mDNS and
DNS-SD <bcp14>SHOULD</bcp14> be supported.</t>
    </section>
    <section anchor="ipv4-support-and-transition">
      <name>IPv4 Support and Transition</name>
      <t>IPv6 nodes <bcp14>MAY</bcp14> support IPv4.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <section anchor="basic-transition-mechanisms-for-ipv6-hosts-and-routers-rfc4213">
          <name>Basic Transition Mechanisms for IPv6 Hosts and Routers - RFC 4213</name>
          <t>If an IPv6 node implements dual stack and tunneling, then <xref target="RFC4213"/> <bcp14>MUST</bcp14> be supported.</t>
        </section>
      </section>
    </section>
    <section anchor="application-support">
      <name>Application Support</name>
      <section anchor="textual-representation-of-ipv6-addresses-rfc-5952">
        <name>Textual Representation of IPv6 Addresses - RFC 5952</name>
        <t>Software that allows users and operators to input IPv6
addresses in text form <bcp14>SHOULD</bcp14> support "A Recommendation for
IPv6 Address Text Representation" <xref target="RFC5952"/>.</t>
      </section>
      <section anchor="application-programming-interfaces-apis">
        <name>Application Programming Interfaces (APIs)</name>
        <t>There are a number of IPv6-related APIs. This document does
not mandate the use of any, because the choice of API does not
directly relate to on-the-wire behavior of
protocols. Implementers, however, would be advised to consider
providing a common API or reviewing existing APIs for the type
of functionality they provide to applications.</t>
        <t>"Basic Socket Interface Extensions for IPv6" <xref target="RFC3493"/> provides IPv6 functionality used by
typical applications. Implementers should note that RFC 3493 has
been picked up and further standardized by the Portable Operating System
Interface (POSIX) <xref target="POSIX"/>.</t>
        <t>"Advanced Sockets Application Program Interface (API) for
IPv6" <xref target="RFC3542"/> provides access to
advanced IPv6 features needed by diagnostic and other
more specialized applications.</t>
        <t>"IPv6 Socket API for Source Address Selection" <xref target="RFC5014"/> provides facilities that allow an
application to override the default Source Address Selection
rules of <xref target="RFC6724"/>.</t>
        <t>"Socket Interface Extensions for Multicast Source Filters" <xref target="RFC3678"/> provides support for expressing source
filters on multicast group memberships.</t>
        <t>"Extension to Sockets API for Mobile IPv6" <xref target="RFC4584"/> provides application support for
accessing and enabling Mobile IPv6 <xref target="RFC6275"/> features.</t>
      </section>
    </section>
    <section anchor="mobility">
      <name>Mobility</name>
      <t>Mobile IPv6 <xref target="RFC6275"/> and associated
specifications <xref target="RFC3776"/>  <xref target="RFC4877"/> allow a node to change its point of attachment within the
Internet, while maintaining (and using) a permanent address. All
communication using the permanent address continues to proceed as
expected even as the node moves around. The definition of Mobile
IP includes requirements for the following types of nodes:</t>
      <ul spacing="normal">
        <li>
          <t>mobile nodes</t>
        </li>
        <li>
          <t>correspondent nodes with support for route optimization</t>
        </li>
        <li>
          <t>home agents</t>
        </li>
        <li>
          <t>all IPv6 routers</t>
        </li>
      </ul>
      <t>At the present time, Mobile IP has seen only limited
implementation and no significant deployment, partly because it
originally assumed an IPv6-only environment rather than a mixed
IPv4/IPv6 Internet. Additional work has been done to
support mobility in mixed-mode IPv4 and IPv6
networks <xref target="RFC5555"/>.</t>
      <t>More usage and deployment experience is needed with mobility
before any specific approach can be recommended for broad
implementation in all hosts and routers.
Consequently, Mobility Support in IPv6 <xref target="RFC6275"/>, Mobile IPv6 Support for Dual Stack Hosts and Routers <xref target="RFC5555"/>, and associated
standards (such as Mobile IPv6 with IKEv2 and IPsec <xref target="RFC4877"/>) are considered a <bcp14>MAY</bcp14>
at this time.</t>
      <t>IPv6 for 3GPP <xref target="RFC7066"/> lists a snapshot of required
IPv6 functionalities at the time the document was published that would
need to be implemented, going above
and beyond the recommendations in this document.
Additionally, a 3GPP IPv6 Host <bcp14>MAY</bcp14> implement <xref target="RFC7278"/> to deliver IPv6 prefixes on the LAN link.</t>
    </section>
    <section anchor="sec">
      <name>Security</name>
      <t>This section describes the security specification for IPv6
nodes.</t>
      <t>Achieving security in practice is a complex undertaking.
Operational procedures, protocols, key distribution mechanisms,
certificate management approaches, etc., are all components that
impact the level of security actually achieved in practice. More
importantly, deficiencies or a poor fit in any one individual
component can significantly reduce the overall effectiveness of a
particular security approach.</t>
      <t>IPsec can provide either end-to-end security between nodes
or channel security (for example, via a site-to-site IPsec
VPN), making it possible to provide secure communication for all (or a subset
of) communication flows at the IP layer between pairs of Internet
nodes.  IPsec has two standard operating modes: Tunnel-mode and Transport-mode.
In Tunnel-mode, IPsec provides network-layer security and protects an entire
IP packet
by encapsulating the original IP packet and then prepending a new IP header.
In Transport-mode, IPsec provides security for the transport layer (and above)
by
encapsulating only the transport-layer (and above) portion of the IP packet
(i.e., without adding
a second IP header).</t>
      <t>Although IPsec can be used with manual keying in some cases,
such usage has limited applicability and is not recommended.</t>
      <t>A range of security technologies and approaches proliferate
today (e.g., IPsec, Transport Layer Security (TLS), Secure SHell (SSH), TLS
VPNS, etc.).
No single approach has emerged as
an ideal technology for all needs and environments. Moreover, IPsec
is not viewed as the ideal security technology in all cases and is
unlikely to displace the others.</t>
      <t>Previously, IPv6 mandated implementation of IPsec and
recommended the key-management approach of IKE. RFC 6434 updated that recommendation
by making support of the IPsec
architecture <xref target="RFC4301"/> a <bcp14>SHOULD</bcp14> for all IPv6 nodes, and this document retains that recommendation.
Note that
the IPsec Architecture requires the
implementation of both manual and automatic key management (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).
Currently, the recommended automated key-management protocol to
implement is IKEv2 <xref target="RFC7296"/>.</t>
      <t>This document recognizes that there exists a range of device
types and environments where approaches to security other than
IPsec can be justified. For example, special-purpose devices may
support only a very limited number or type of applications, and an
application-specific security approach may be sufficient for
limited management or configuration capabilities. Alternatively,
some devices may run on extremely constrained hardware (e.g.,
sensors) where the full IPsec Architecture is not justified.</t>
      <t>Because most common platforms now support IPv6 and have it
enabled by default, IPv6 security is an issue for networks
that are ostensibly IPv4 only; see <xref target="RFC7123"/> for guidance on this area.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>"Security Architecture for the Internet Protocol" <xref target="RFC4301"/> <bcp14>SHOULD</bcp14> be supported by all IPv6
nodes. Note that the IPsec Architecture requires the implementation of both
manual and automatic key
management  (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).  Currently, the default automated key-management
protocol to implement is IKEv2. As required in <xref target="RFC4301"/>, IPv6
nodes implementing the IPsec Architecture <bcp14>MUST</bcp14> implement ESP <xref target="RFC4303"/> and <bcp14>MAY</bcp14> implement AH <xref target="RFC4302"/>.</t>
      </section>
      <section anchor="transforms-and-algorithms">
        <name>Transforms and Algorithms</name>
        <t>The current set of mandatory-to-implement algorithms for the
IPsec Architecture are defined in Cryptographic
Algorithm Implementation Requirements for ESP and AH <xref target="RFC8221"/>.  IPv6 nodes implementing the IPsec
Architecture <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8221"/>.
Preferred cryptographic algorithms often change more
frequently than security protocols. Therefore, implementations
<bcp14>MUST</bcp14> allow for migration to new algorithms, as RFC 8221 is
replaced or updated in the future.</t>
        <t>The current set of mandatory-to-implement algorithms for
IKEv2 are defined in Cryptographic Algorithm Implementation
Requirements for ESP and AH <xref target="RFC8247"/>.  IPv6 nodes
implementing IKEv2 <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8247"/> and/or any future
updates or replacements to <xref target="RFC8247"/>.</t>
      </section>
    </section>
    <section anchor="router-specific-functionality">
      <name>Router-Specific Functionality</name>
      <t>This section defines general host considerations for IPv6 nodes
that act as routers.  Currently, this section does not discuss
detailed routing-specific requirements. For the case of typical home routers, <xref target="RFC7084"/> defines basic requirements for customer edge routers.</t>
      <section anchor="ipv6-router-alert-option-rfc-2711">
        <name>IPv6 Router Alert Option - RFC 2711</name>
        <t>The IPv6 Router Alert option <xref target="RFC2711"/> is
an optional IPv6 Hop-by-Hop Header that is used in conjunction
with some protocols (e.g., RSVP <xref target="RFC2205"/> or
Multicast Listener Discovery (MLDv2) <xref target="RFC3810"/>).  The Router Alert option will
need to be implemented whenever such protocols that mandate its
use are implemented.  See <xref target="mld"/>.</t>
      </section>
      <section anchor="neighbor-discovery-for-ipv6-rfc-4861">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Sending Router Advertisements and processing Router
Solicitations <bcp14>MUST</bcp14> be supported.</t>
        <t>Routers <bcp14>SHOULD</bcp14> support <xref target="RFC9131"/> to avoid packet lost.</t>
        <t><xref section="7" sectionFormat="of" target="RFC6275"/> includes some mobility-specific
extensions to Neighbor Discovery.
Routers <bcp14>SHOULD</bcp14> implement
Sections 7.3 and 7.5, even if they do not implement home
agent functionality.</t>
      </section>
      <section anchor="stateful-address-autoconfiguration-dhcpv6-rfc-8415">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>A single DHCP server (<xref target="RFC8415"/> or <xref target="RFC4862"/>) can provide configuration information to
devices directly attached to a shared link, as well as to
devices located elsewhere within a site. Communication between
a client and a DHCP server located on different links requires
the use of DHCP relay agents on routers.</t>
        <t>In simple deployments, consisting of a single router and
either a single LAN or multiple LANs attached to the single
router, together with a WAN connection, a DHCP server
embedded within the router is one common deployment scenario
(e.g., <xref target="RFC7084"/>). There is no need
for relay agents in such scenarios.</t>
        <t>In more complex deployment scenarios, such as within
enterprise or service provider networks, the use of DHCP
requires some level of configuration, in order to configure
relay agents, DHCP servers, etc. In such environments, the
DHCP server might even be run on a traditional server, rather
than as part of a router.</t>
        <t>Because of the wide range of deployment scenarios, support
for DHCP server functionality on routers is optional. However,
routers targeted for deployment within more complex scenarios
(as described above) <bcp14>SHOULD</bcp14> support relay agent functionality.
Note that "Basic Requirements for IPv6 Customer Edge Routers" <xref target="RFC7084"/> requires implementation of a DHCPv6
server function in IPv6 Customer Edge (CE) routers.</t>
      </section>
      <section anchor="ipv6-prefix-length-recommendation-for-forwarding-bcp-198">
        <name>IPv6 Prefix Length Recommendation for Forwarding - BCP 198</name>
        <t>Forwarding nodes <bcp14>MUST</bcp14> conform to BCP 198 <xref target="RFC7608"/>;
thus, IPv6 implementations of nodes that may forward packets
<bcp14>MUST</bcp14> conform to the rules specified in <xref section="5.1" sectionFormat="of" target="RFC4632"/>.</t>
      </section>
    </section>
    <section anchor="constrained-devices">
      <name>Constrained Devices</name>
      <t>The focus of this document is general IPv6 nodes. In this section, we briefly
discuss considerations for constrained devices.</t>
      <t>In the case of constrained nodes,
with limited CPU, memory, bandwidth or power, support for certain IPv6 functionality
may need
to be considered due to those limitations.  While the requirements of this
document are
<bcp14>RECOMMENDED</bcp14> for all nodes, including constrained nodes, compromises may need
to be
made in certain cases.  Where such compromises are made, the interoperability
of devices
should be strongly considered, particularly where this may impact other nodes
on the same
link, e.g., only supporting MLDv1 will affect other nodes.</t>
      <t>The IETF 6LowPAN (IPv6 over Low-Power Wireless Personal Area Network) WG
produced six RFCs, including a general
overview and problem statement <xref target="RFC4919"/> (the means by which IPv6 packets
are transmitted over IEEE 802.15.4 networks <xref target="RFC4944"/> and ND optimizations for that medium <xref target="RFC6775"/>).</t>
      <t>IPv6 nodes that are battery powered <bcp14>SHOULD</bcp14> implement the recommendations
in <xref target="RFC7772"/>.</t>
    </section>
    <section anchor="ipv6-node-management">
      <name>IPv6 Node Management</name>
      <t>Network management <bcp14>MAY</bcp14> be supported by IPv6 nodes.  However,
for IPv6 nodes that are embedded devices, network management may
be the only possible way of controlling these nodes.</t>
      <t>Existing network management protocols include SNMP <xref target="RFC3411"/>, NETCONF <xref target="RFC6241"/>, and RESTCONF <xref target="RFC8040"/>.</t>
      <section anchor="management-information-base-mib-modules">
        <name>Management Information Base (MIB) Modules</name>
        <t>The obsoleted status of
various IPv6-specific MIB modules is clarified in <xref target="RFC8096"/>.</t>
        <t>The following two MIB modules <bcp14>SHOULD</bcp14> be supported by nodes that
support an SNMP agent.</t>
        <section anchor="ip-forwarding-table-mib">
          <name>IP Forwarding Table MIB</name>
          <t>The IP Forwarding Table MIB <xref target="RFC4292"/> <bcp14>SHOULD</bcp14> be supported by nodes that support an
SNMP agent.</t>
        </section>
        <section anchor="management-information-base-for-the-internet-protocol-ip">
          <name>Management Information Base for the Internet Protocol (IP)</name>
          <t>The IP MIB <xref target="RFC4293"/> <bcp14>SHOULD</bcp14> be supported by nodes
that support an SNMP agent.</t>
        </section>
        <section anchor="interface-mib">
          <name>Interface MIB</name>
          <t>The Interface MIB <xref target="RFC2863"/> <bcp14>SHOULD</bcp14> be supported by nodes that support
an SNMP agent.</t>
        </section>
      </section>
      <section anchor="yang-data-models">
        <name>YANG Data Models</name>
        <t>The following YANG data models <bcp14>SHOULD</bcp14> be supported by nodes that support
a
NETCONF or RESTCONF agent.</t>
        <section anchor="ip-management-yang-model">
          <name>IP Management YANG Model</name>
          <t>The IP Management YANG Model <xref target="RFC8344"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
        <section anchor="interface-management-yang-model">
          <name>Interface Management YANG Model</name>
          <t>The Interface Management YANG Model <xref target="RFC8343"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not directly affect the security of the
Internet, beyond the security considerations associated with the
individual protocols.</t>
      <t>Security is also discussed in <xref target="sec"/> above.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2710">
          <front>
            <title>Multicast Listener Discovery (MLD) for IPv6</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="W. Fenner" initials="W." surname="Fenner"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This document specifies the protocol used by an IPv6 router to discover the presence of multicast listeners (that is, nodes wishing to receive multicast packets) on its directly attached links, and to discover specifically which multicast addresses are of interest to those neighboring nodes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2710"/>
          <seriesInfo name="DOI" value="10.17487/RFC2710"/>
        </reference>
        <reference anchor="RFC2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <author fullname="A. Jackson" initials="A." surname="Jackson"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC2863">
          <front>
            <title>The Interfaces Group MIB</title>
            <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
            <author fullname="F. Kastenholz" initials="F." surname="Kastenholz"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This memo discusses the 'interfaces' group of MIB-II, especially the experience gained from the definition of numerous media-specific MIB modules for use in conjunction with the 'interfaces' group for managing various sub-layers beneath the internetwork-layer. It specifies clarifications to, and extensions of, the architectural issues within the MIB-II model of the 'interfaces' group. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2863"/>
          <seriesInfo name="DOI" value="10.17487/RFC2863"/>
        </reference>
        <reference anchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC3411">
          <front>
            <title>An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="R. Presuhn" initials="R." surname="Presuhn"/>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes an architecture for describing Simple Network Management Protocol (SNMP) Management Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing a Message Processing Subsystem, a Security Subsystem and an Access Control Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data. This document obsoletes RFC 2571. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3411"/>
          <seriesInfo name="DOI" value="10.17487/RFC3411"/>
        </reference>
        <reference anchor="RFC3596">
          <front>
            <title>DNS Extensions to Support IP Version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="V. Ksinant" initials="V." surname="Ksinant"/>
            <author fullname="M. Souissi" initials="M." surname="Souissi"/>
            <date month="October" year="2003"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="88"/>
          <seriesInfo name="RFC" value="3596"/>
          <seriesInfo name="DOI" value="10.17487/RFC3596"/>
        </reference>
        <reference anchor="RFC3810">
          <front>
            <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
            <author fullname="R. Vida" initials="R." role="editor" surname="Vida"/>
            <author fullname="L. Costa" initials="L." role="editor" surname="Costa"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document updates RFC 2710, and it specifies Version 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links, and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3810"/>
          <seriesInfo name="DOI" value="10.17487/RFC3810"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC4213">
          <front>
            <title>Basic Transition Mechanisms for IPv6 Hosts and Routers</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. Two mechanisms are specified, dual stack and configured tunneling. Dual stack implies providing complete implementations of both versions of the Internet Protocol (IPv4 and IPv6), and configured tunneling provides a means to carry IPv6 packets over unmodified IPv4 routing infrastructures.</t>
              <t>This document obsoletes RFC 2893. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4213"/>
          <seriesInfo name="DOI" value="10.17487/RFC4213"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC4292">
          <front>
            <title>IP Forwarding Table MIB</title>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects related to the forwarding of Internet Protocol (IP) packets in an IP version-independent manner. This document obsoletes RFC 2096. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4292"/>
          <seriesInfo name="DOI" value="10.17487/RFC4292"/>
        </reference>
        <reference anchor="RFC4293">
          <front>
            <title>Management Information Base for the Internet Protocol (IP)</title>
            <author fullname="S. Routhier" initials="S." role="editor" surname="Routhier"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for implementations of the Internet Protocol (IP) in an IP version independent manner. This memo obsoletes RFCs 2011, 2465, and 2466. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4293"/>
          <seriesInfo name="DOI" value="10.17487/RFC4293"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4311">
          <front>
            <title>IPv6 Host-to-Router Load Sharing</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>The original IPv6 conceptual sending algorithm does not do load sharing among equivalent IPv6 routers, and suggests schemes that can be problematic in practice. This document updates the conceptual sending algorithm in RFC 2461 so that traffic to different destinations can be distributed among routers in an efficient fashion. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4311"/>
          <seriesInfo name="DOI" value="10.17487/RFC4311"/>
        </reference>
        <reference anchor="RFC4443" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4443.xml">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC4607">
          <front>
            <title>Source-Specific Multicast for IP</title>
            <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
            <author fullname="B. Cain" initials="B." surname="Cain"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>IP version 4 (IPv4) addresses in the 232/8 (232.0.0.0 to 232.255.255.255) range are designated as source-specific multicast (SSM) destination addresses and are reserved for use by source-specific applications and protocols. For IP version 6 (IPv6), the address prefix FF3x::/32 is reserved for source-specific multicast use. This document defines an extension to the Internet network service that applies to datagrams sent to SSM addresses and defines the host and router requirements to support this extension. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4607"/>
          <seriesInfo name="DOI" value="10.17487/RFC4607"/>
        </reference>
        <reference anchor="RFC4632" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4632.xml">
          <front>
            <title>Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan</title>
            <author fullname="V. Fuller" initials="V." surname="Fuller"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This memo discusses the strategy for address assignment of the existing 32-bit IPv4 address space with a view toward conserving the address space and limiting the growth rate of global routing state. This document obsoletes the original Classless Inter-domain Routing (CIDR) spec in RFC 1519, with changes made both to clarify the concepts it introduced and, after more than twelve years, to update the Internet community on the results of deploying the technology described. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="122"/>
          <seriesInfo name="RFC" value="4632"/>
          <seriesInfo name="DOI" value="10.17487/RFC4632"/>
        </reference>
        <reference anchor="RFC4861" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4861.xml">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4862" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4862.xml">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC5453">
          <front>
            <title>Reserved IPv6 Interface Identifiers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>Interface identifiers in IPv6 unicast addresses are used to identify interfaces on a link. They are required to be unique within a subnet. Several RFCs have specified interface identifiers or identifier ranges that have a special meaning attached to them. An IPv6 node autoconfiguring an interface identifier in these ranges will encounter unexpected consequences. Since there is no centralized repository for such reserved identifiers, this document aims to create one. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5453"/>
          <seriesInfo name="DOI" value="10.17487/RFC5453"/>
        </reference>
        <reference anchor="RFC5722">
          <front>
            <title>Handling of Overlapping IPv6 Fragments</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="December" year="2009"/>
            <abstract>
              <t>The fragmentation and reassembly algorithm specified in the base IPv6 specification allows fragments to overlap. This document demonstrates the security issues associated with allowing overlapping fragments and updates the IPv6 specification to explicitly forbid overlapping fragments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5722"/>
          <seriesInfo name="DOI" value="10.17487/RFC5722"/>
        </reference>
        <reference anchor="RFC5790">
          <front>
            <title>Lightweight Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Version 2 (MLDv2) Protocols</title>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <author fullname="W. Cao" initials="W." surname="Cao"/>
            <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>This document describes lightweight IGMPv3 and MLDv2 protocols (LW- IGMPv3 and LW-MLDv2), which simplify the standard (full) versions of IGMPv3 and MLDv2. The interoperability with the full versions and the previous versions of IGMP and MLD is also taken into account. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5790"/>
          <seriesInfo name="DOI" value="10.17487/RFC5790"/>
        </reference>
        <reference anchor="RFC5942" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5942.xml">
          <front>
            <title>IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>IPv6 specifies a model of a subnet that is different than the IPv4 subnet model. The subtlety of the differences has resulted in incorrect implementations that do not interoperate. This document spells out the most important difference: that an IPv6 address isn't automatically associated with an IPv6 on-link prefix. This document also updates (partially due to security concerns caused by incorrect implementations) a part of the definition of "on-link" from RFC 4861. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5942"/>
          <seriesInfo name="DOI" value="10.17487/RFC5942"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6437">
          <front>
            <title>IPv6 Flow Label Specification</title>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="J. Rajahalme" initials="J." surname="Rajahalme"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods. Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.</t>
              <t>The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6437"/>
          <seriesInfo name="DOI" value="10.17487/RFC6437"/>
        </reference>
        <reference anchor="RFC6564">
          <front>
            <title>A Uniform Format for IPv6 Extension Headers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="J. Woodyatt" initials="J." surname="Woodyatt"/>
            <author fullname="E. Kline" initials="E." surname="Kline"/>
            <author fullname="J. Hoagland" initials="J." surname="Hoagland"/>
            <author fullname="M. Bhatia" initials="M." surname="Bhatia"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the transport-layer header. There are a small number of such extension headers currently defined. This document describes the issues that can arise when defining new extension headers and discusses the alternate extension mechanisms in IPv6. It also provides a common format for defining any new IPv6 extension headers, if they are needed. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6564"/>
          <seriesInfo name="DOI" value="10.17487/RFC6564"/>
        </reference>
        <reference anchor="RFC6724">
          <front>
            <title>Default Address Selection for Internet Protocol Version 6 (IPv6)</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="A. Matsumoto" initials="A." surname="Matsumoto"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document describes two algorithms, one for source address selection and one for destination address selection. The algorithms specify default behavior for all Internet Protocol version 6 (IPv6) implementations. They do not override choices made by applications or upper-layer protocols, nor do they preclude the development of more advanced mechanisms for address selection. The two algorithms share a common context, including an optional mechanism for allowing administrators to provide policy that can override the default behavior. In dual-stack implementations, the destination address selection algorithm can consider both IPv4 and IPv6 addresses -- depending on the available source addresses, the algorithm might prefer IPv6 addresses over IPv4 addresses, or vice versa.</t>
              <t>Default address selection as defined in this specification applies to all IPv6 nodes, including both hosts and routers. This document obsoletes RFC 3484. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6724"/>
          <seriesInfo name="DOI" value="10.17487/RFC6724"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC6775">
          <front>
            <title>Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4. This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation. In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links. IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network. This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks. The document thus updates RFC 4944 to specify the use of the optimizations defined here. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6775"/>
          <seriesInfo name="DOI" value="10.17487/RFC6775"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC6946">
          <front>
            <title>Processing of IPv6 "Atomic" Fragments</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The IPv6 specification allows packets to contain a Fragment Header without the packet being actually fragmented into multiple pieces (we refer to these packets as "atomic fragments"). Such packets are typically sent by hosts that have received an ICMPv6 "Packet Too Big" error message that advertises a Next-Hop MTU smaller than 1280 bytes, and are currently processed by some implementations as normal "fragmented traffic" (i.e., they are "reassembled" with any other queued fragments that supposedly correspond to the same original packet). Thus, an attacker can cause hosts to employ atomic fragments by forging ICMPv6 "Packet Too Big" error messages, and then launch any fragmentation-based attacks against such traffic. This document discusses the generation of the aforementioned atomic fragments and the corresponding security implications. Additionally, this document formally updates RFC 2460 and RFC 5722, such that IPv6 atomic fragments are processed independently of any other fragments, thus completely eliminating the aforementioned attack vector.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6946"/>
          <seriesInfo name="DOI" value="10.17487/RFC6946"/>
        </reference>
        <reference anchor="RFC7045">
          <front>
            <title>Transmission and Processing of IPv6 Extension Headers</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <date month="December" year="2013"/>
            <abstract>
              <t>Various IPv6 extension headers have been standardised since the IPv6 standard was first published. This document updates RFC 2460 to clarify how intermediate nodes should deal with such extension headers and with any that are defined in the future. It also specifies how extension headers should be registered by IANA, with a corresponding minor update to RFC 2780.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7045"/>
          <seriesInfo name="DOI" value="10.17487/RFC7045"/>
        </reference>
        <reference anchor="RFC7048">
          <front>
            <title>Neighbor Unreachability Detection Is Too Impatient</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="I. Gashinsky" initials="I." surname="Gashinsky"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>IPv6 Neighbor Discovery includes Neighbor Unreachability Detection. That function is very useful when a host has an alternative neighbor -- for instance, when there are multiple default routers -- since it allows the host to switch to the alternative neighbor in a short time. By default, this time is 3 seconds after the node starts probing. However, if there are no alternative neighbors, this timeout behavior is far too impatient. This document specifies relaxed rules for Neighbor Discovery retransmissions that allow an implementation to choose different timeout behavior based on whether or not there are alternative neighbors. This document updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7048"/>
          <seriesInfo name="DOI" value="10.17487/RFC7048"/>
        </reference>
        <reference anchor="RFC7112">
          <front>
            <title>Implications of Oversized IPv6 Header Chains</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="V. Manral" initials="V." surname="Manral"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>The IPv6 specification allows IPv6 Header Chains of an arbitrary size. The specification also allows options that can, in turn, extend each of the headers. In those scenarios in which the IPv6 Header Chain or options are unusually long and packets are fragmented, or scenarios in which the fragment size is very small, the First Fragment of a packet may fail to include the entire IPv6 Header Chain. This document discusses the interoperability and security problems of such traffic, and updates RFC 2460 such that the First Fragment of a packet is required to contain the entire IPv6 Header Chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7112"/>
          <seriesInfo name="DOI" value="10.17487/RFC7112"/>
        </reference>
        <reference anchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another. This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users. The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7527">
          <front>
            <title>Enhanced Duplicate Address Detection</title>
            <author fullname="R. Asati" initials="R." surname="Asati"/>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <author fullname="E. Dart" initials="E." surname="Dart"/>
            <author fullname="W. George" initials="W." surname="George"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of RFC 4862. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. Several service provider communities have expressed a need for automated detection of looped back Neighbor Discovery (ND) messages used by DAD. This document includes mitigation techniques and outlines the Enhanced DAD algorithm to automate the detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks, this document automates resolving a specific duplicate address conflict. This document updates RFCs 4429, 4861, and 4862.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7527"/>
          <seriesInfo name="DOI" value="10.17487/RFC7527"/>
        </reference>
        <reference anchor="RFC7559">
          <front>
            <title>Packet-Loss Resiliency for Router Solicitations</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="D. Anipko" initials="D." surname="Anipko"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>When an interface on a host is initialized, the host transmits Router Solicitations in order to minimize the amount of time it needs to wait until the next unsolicited multicast Router Advertisement is received. In certain scenarios, these Router Solicitations transmitted by the host might be lost. This document specifies a mechanism for hosts to cope with the loss of the initial Router Solicitations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7559"/>
          <seriesInfo name="DOI" value="10.17487/RFC7559"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC8028">
          <front>
            <title>First-Hop Router Selection by Hosts in a Multi-Prefix Network</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document describes expected IPv6 host behavior in a scenario that has more than one prefix, each allocated by an upstream network that is assumed to implement BCP 38 ingress filtering, when the host has multiple routers to choose from. It also applies to other scenarios such as the usage of stateful firewalls that effectively act as address-based filters. Host behavior in choosing a first-hop router may interact with source address selection in a given implementation. However, the selection of the source address for a packet is done before the first-hop router for that packet is chosen. Given that the network or host is, or appears to be, multihomed with multiple provider-allocated addresses, that the host has elected to use a source address in a given prefix, and that some but not all neighboring routers are advertising that prefix in their Router Advertisement Prefix Information Options, this document specifies to which router a host should present its transmission. It updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8028"/>
          <seriesInfo name="DOI" value="10.17487/RFC8028"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8064" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8064.xml">
          <front>
            <title>Recommendation on Stable IPv6 Interface Identifiers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document changes the recommended default Interface Identifier (IID) generation scheme for cases where Stateless Address Autoconfiguration (SLAAC) is used to generate a stable IPv6 address. It recommends using the mechanism specified in RFC 7217 in such cases, and recommends against embedding stable link-layer addresses in IPv6 IIDs. It formally updates RFC 2464, RFC 2467, RFC 2470, RFC 2491, RFC 2492, RFC 2497, RFC 2590, RFC 3146, RFC 3572, RFC 4291, RFC 4338, RFC 4391, RFC 5072, and RFC 5121. This document does not change any existing recommendations concerning the use of temporary addresses as specified in RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8064"/>
          <seriesInfo name="DOI" value="10.17487/RFC8064"/>
        </reference>
        <reference anchor="RFC8106" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8106.xml">
          <front>
            <title>IPv6 Router Advertisement Options for DNS Configuration</title>
            <author fullname="J. Jeong" initials="J." surname="Jeong"/>
            <author fullname="S. Park" initials="S." surname="Park"/>
            <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
              <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8106"/>
          <seriesInfo name="DOI" value="10.17487/RFC8106"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="RFC8221">
          <front>
            <title>Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document replaces RFC 7321, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)". The goal of this document is to enable ESP and AH to benefit from cryptography that is up to date while making IPsec interoperable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8221"/>
          <seriesInfo name="DOI" value="10.17487/RFC8221"/>
        </reference>
        <reference anchor="RFC8247">
          <front>
            <title>Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The Internet Key Exchange (IKE) protocol is used to negotiate the IPsec Security Association (IPsec SA) parameters, such as which algorithms should be used. To ensure interoperability between different implementations, it is necessary to specify a set of algorithm implementation requirements and usage guidance to ensure that there is at least one algorithm that all implementations support. This document updates RFC 7296 and obsoletes RFC 4307 in defining the current algorithm implementation requirements and usage guidance for IKEv2, and does minor cleaning up of the IKEv2 IANA registry. This document does not update the algorithms used for packet encryption using IPsec Encapsulating Security Payload (ESP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8247"/>
          <seriesInfo name="DOI" value="10.17487/RFC8247"/>
        </reference>
        <reference anchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC8344">
          <front>
            <title>A YANG Data Model for IP Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for management of IP implementations. The data model includes configuration and system state.</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7277.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8344"/>
          <seriesInfo name="DOI" value="10.17487/RFC8344"/>
        </reference>
        <reference anchor="RFC8415" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8415.xml">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="November" year="2018"/>
            <abstract>
              <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
        </reference>
        <reference anchor="RFC8981">
          <front>
            <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8981"/>
          <seriesInfo name="DOI" value="10.17487/RFC8981"/>
        </reference>
        <reference anchor="RFC9131" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9131.xml">
          <front>
            <title>Gratuitous Neighbor Discovery: Creating Neighbor Cache Entries on First-Hop Routers</title>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>Neighbor Discovery (RFC 4861) is used by IPv6 nodes to determine the link-layer addresses of neighboring nodes as well as to discover and maintain reachability information. This document updates RFC 4861 to allow routers to proactively create a Neighbor Cache entry when a new IPv6 address is assigned to a node. It also updates RFC 4861 and recommends that nodes send unsolicited Neighbor Advertisements upon assigning a new IPv6 address. These changes will minimize the delay and packet loss when a node initiates connections to an off-link destination from a new IPv6 address.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9131"/>
          <seriesInfo name="DOI" value="10.17487/RFC9131"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC0793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2205">
          <front>
            <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <author fullname="S. Berson" initials="S." surname="Berson"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="S. Jamin" initials="S." surname="Jamin"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2205"/>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
        </reference>
        <reference anchor="RFC2464" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2464.xml">
          <front>
            <title>Transmission of IPv6 Packets over Ethernet Networks</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document specifies the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Ethernet networks. It also specifies the content of the Source/Target Link-layer Address option used in Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement and Redirect messages when those messages are transmitted on an Ethernet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2464"/>
          <seriesInfo name="DOI" value="10.17487/RFC2464"/>
        </reference>
        <reference anchor="RFC2491">
          <front>
            <title>IPv6 over Non-Broadcast Multiple Access (NBMA) networks</title>
            <author fullname="G. Armitage" initials="G." surname="Armitage"/>
            <author fullname="P. Schulter" initials="P." surname="Schulter"/>
            <author fullname="M. Jork" initials="M." surname="Jork"/>
            <author fullname="G. Harter" initials="G." surname="Harter"/>
            <date month="January" year="1999"/>
            <abstract>
              <t>This document describes a general architecture for IPv6 over NBMA networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2491"/>
          <seriesInfo name="DOI" value="10.17487/RFC2491"/>
        </reference>
        <reference anchor="RFC2590">
          <front>
            <title>Transmission of IPv6 Packets over Frame Relay Networks Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="A. Malis" initials="A." surname="Malis"/>
            <author fullname="M. Mueller" initials="M." surname="Mueller"/>
            <date month="May" year="1999"/>
            <abstract>
              <t>This memo describes mechanisms for the transmission of IPv6 packets over Frame Relay networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2590"/>
          <seriesInfo name="DOI" value="10.17487/RFC2590"/>
        </reference>
        <reference anchor="RFC2874">
          <front>
            <title>DNS Extensions to Support IPv6 Address Aggregation and Renumbering</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="July" year="2000"/>
            <abstract>
              <t>This document defines changes to the Domain Name System to support renumberable and aggregatable IPv6 addressing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2874"/>
          <seriesInfo name="DOI" value="10.17487/RFC2874"/>
        </reference>
        <reference anchor="RFC2923">
          <front>
            <title>TCP Problems with Path MTU Discovery</title>
            <author fullname="K. Lahey" initials="K." surname="Lahey"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This memo catalogs several known Transmission Control Protocol (TCP) implementation problems dealing with Path Maximum Transmission Unit Discovery (PMTUD), including the long-standing black hole problem, stretch acknowlegements (ACKs) due to confusion between Maximum Segment Size (MSS) and segment size, and MSS advertisement based on PMTU. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2923"/>
          <seriesInfo name="DOI" value="10.17487/RFC2923"/>
        </reference>
        <reference anchor="RFC3146">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 1394 Networks</title>
            <author fullname="K. Fujisawa" initials="K." surname="Fujisawa"/>
            <author fullname="A. Onoe" initials="A." surname="Onoe"/>
            <date month="October" year="2001"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE1394 networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3146"/>
          <seriesInfo name="DOI" value="10.17487/RFC3146"/>
        </reference>
        <reference anchor="RFC3363">
          <front>
            <title>Representing Internet Protocol version 6 (IPv6) Addresses in the Domain Name System (DNS)</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="B. Fink" initials="B." surname="Fink"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="T. Hain" initials="T." surname="Hain"/>
            <date month="August" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3363"/>
          <seriesInfo name="DOI" value="10.17487/RFC3363"/>
        </reference>
        <reference anchor="RFC3493">
          <front>
            <title>Basic Socket Interface Extensions for IPv6</title>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <date month="February" year="2003"/>
            <abstract>
              <t>The de facto standard Application Program Interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to support IPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required by TCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3493"/>
          <seriesInfo name="DOI" value="10.17487/RFC3493"/>
        </reference>
        <reference anchor="RFC3542">
          <front>
            <title>Advanced Sockets Application Program Interface (API) for IPv6</title>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="May" year="2003"/>
            <abstract>
              <t>This document provides sockets Application Program Interface (API) to support "advanced" IPv6 applications, as a supplement to a separate specification, RFC 3493. The expected applications include Ping, Traceroute, routing daemons and the like, which typically use raw sockets to access IPv6 or ICMPv6 header fields. This document proposes some portable interfaces for applications that use raw sockets under IPv6. There are other features of IPv6 that some applications will need to access: interface identification (specifying the outgoing interface and determining the incoming interface), IPv6 extension headers, and path Maximum Transmission Unit (MTU) information. This document provides API access to these features too. Additionally, some extended interfaces to libraries for the "r" commands are defined. The extension will provide better backward compatibility to existing implementations that are not IPv6-capable. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3542"/>
          <seriesInfo name="DOI" value="10.17487/RFC3542"/>
        </reference>
        <reference anchor="RFC3646" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3646.xml">
          <front>
            <title>DNS Configuration options for Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="R. Droms" initials="R." role="editor" surname="Droms"/>
            <date month="December" year="2003"/>
            <abstract>
              <t>This document describes Dynamic Host Configuration Protocol for IPv6 (DHCPv6) options for passing a list of available DNS recursive name servers and a domain search list to a client.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3646"/>
          <seriesInfo name="DOI" value="10.17487/RFC3646"/>
        </reference>
        <reference anchor="RFC3678">
          <front>
            <title>Socket Interface Extensions for Multicast Source Filters</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>The Internet Group Management Protocol (IGMPv3) for IPv4 and the Multicast Listener Discovery (MLDv2) for IPv6 add the capability for applications to express source filters on multicast group memberships, which allows receiver applications to determine the set of senders (sources) from which to accept multicast traffic. This capability also simplifies support of one-to-many type multicast applications. This document specifies new socket options and functions to manage source filters for IP Multicast group memberships. It also defines the socket structures to provide input and output arguments to these new application program interfaces (APIs). These extensions are designed to provide access to the source filtering features, while introducing a minimum of change into the system and providing complete compatibility for existing multicast applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3678"/>
          <seriesInfo name="DOI" value="10.17487/RFC3678"/>
        </reference>
        <reference anchor="RFC3776">
          <front>
            <title>Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Devarapalli" initials="V." surname="Devarapalli"/>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>Mobile IPv6 uses IPsec to protect signaling between the home agent and the mobile node. Mobile IPv6 base document defines the main requirements these nodes must follow. This document discusses these requirements in more depth, illustrates the used packet formats, describes suitable configuration procedures, and shows how implementations can process the packets in the right order. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3776"/>
          <seriesInfo name="DOI" value="10.17487/RFC3776"/>
        </reference>
        <reference anchor="RFC3971">
          <front>
            <title>SEcure Neighbor Discovery (SEND)</title>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="J. Kempf" initials="J." surname="Kempf"/>
            <author fullname="B. Zill" initials="B." surname="Zill"/>
            <author fullname="P. Nikander" initials="P." surname="Nikander"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. If not secured, NDP is vulnerable to various attacks. This document specifies security mechanisms for NDP. Unlike those in the original NDP specifications, these mechanisms do not use IPsec. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3971"/>
          <seriesInfo name="DOI" value="10.17487/RFC3971"/>
        </reference>
        <reference anchor="RFC3972">
          <front>
            <title>Cryptographically Generated Addresses (CGA)</title>
            <author fullname="T. Aura" initials="T." surname="Aura"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol. Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters. The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier. Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key. The protection works without a certification authority or any security infrastructure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3972"/>
          <seriesInfo name="DOI" value="10.17487/RFC3972"/>
        </reference>
        <reference anchor="RFC4191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4191.xml">
          <front>
            <title>Default Router Preferences and More-Specific Routes</title>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>This document describes an optional extension to Router Advertisement messages for communicating default router preferences and more-specific routes from routers to hosts. This improves the ability of hosts to pick an appropriate router, especially when the host is multi-homed and the routers are on different links. The preference values and specific routes advertised to hosts require administrative configuration; they are not automatically derived from routing tables. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4191"/>
          <seriesInfo name="DOI" value="10.17487/RFC4191"/>
        </reference>
        <reference anchor="RFC4294">
          <front>
            <title>IPv6 Node Requirements</title>
            <author fullname="J. Loughney" initials="J." role="editor" surname="Loughney"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4294"/>
          <seriesInfo name="DOI" value="10.17487/RFC4294"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4338">
          <front>
            <title>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP) Packets over Fibre Channel</title>
            <author fullname="C. DeSanti" initials="C." surname="DeSanti"/>
            <author fullname="C. Carlson" initials="C." surname="Carlson"/>
            <author fullname="R. Nixon" initials="R." surname="Nixon"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies the way of encapsulating IPv6, IPv4, and Address Resolution Protocol (ARP) packets over Fibre Channel. This document also specifies the method of forming IPv6 link-local addresses and statelessly autoconfigured IPv6 addresses on Fibre Channel networks, and a mechanism to perform IPv4 address resolution over Fibre Channel networks.</t>
              <t>This document obsoletes RFC 2625 and RFC 3831. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4338"/>
          <seriesInfo name="DOI" value="10.17487/RFC4338"/>
        </reference>
        <reference anchor="RFC4380">
          <front>
            <title>Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP; we call this the Teredo service. Running the service requires the help of "Teredo servers" and "Teredo relays". The Teredo servers are stateless, and only have to manage a small fraction of the traffic between Teredo clients; the Teredo relays act as IPv6 routers between the Teredo service and the "native" IPv6 Internet. The relays can also provide interoperability with hosts using other transition mechanisms such as "6to4". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4380"/>
          <seriesInfo name="DOI" value="10.17487/RFC4380"/>
        </reference>
        <reference anchor="RFC4429">
          <front>
            <title>Optimistic Duplicate Address Detection (DAD) for IPv6</title>
            <author fullname="N. Moore" initials="N." surname="Moore"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>Optimistic Duplicate Address Detection is an interoperable modification of the existing IPv6 Neighbor Discovery (RFC 2461) and Stateless Address Autoconfiguration (RFC 2462) processes. The intention is to minimize address configuration delays in the successful case, to reduce disruption as far as possible in the failure case, and to remain interoperable with unmodified hosts and routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4429"/>
          <seriesInfo name="DOI" value="10.17487/RFC4429"/>
        </reference>
        <reference anchor="RFC4584">
          <front>
            <title>Extension to Sockets API for Mobile IPv6</title>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2006"/>
            <abstract>
              <t>This document describes data structures and API support for Mobile IPv6 as an extension to the Advanced Socket API for IPv6.</t>
              <t>Just as the Advanced Sockets API for IPv6 gives access to various extension headers and the ICMPv6 protocol, this document specifies the same level of access for Mobile IPv6 components. It specifies a mechanism for applications to retrieve and set information for Mobility Header messages, Home Address destination options, and Routing Header Type 2 extension headers. It also specifies the common data structures and definitions that might be used by certain advanced Mobile IPv6 socket applications. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4584"/>
          <seriesInfo name="DOI" value="10.17487/RFC4584"/>
        </reference>
        <reference anchor="RFC4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="RFC4877">
          <front>
            <title>Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture</title>
            <author fullname="V. Devarapalli" initials="V." surname="Devarapalli"/>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document describes Mobile IPv6 operation with the revised IPsec architecture and IKEv2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4877"/>
          <seriesInfo name="DOI" value="10.17487/RFC4877"/>
        </reference>
        <reference anchor="RFC4884">
          <front>
            <title>Extended ICMP to Support Multi-Part Messages</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document redefines selected ICMP messages to support multi-part operation. A multi-part ICMP message carries all of the information that ICMP messages carried previously, as well as additional information that applications may require.</t>
              <t>Multi-part messages are supported by an ICMP extension structure. The extension structure is situated at the end of the ICMP message. It includes an extension header followed by one or more extension objects. Each extension object contains an object header and object payload. All object headers share a common format.</t>
              <t>This document further redefines the above mentioned ICMP messages by specifying a length attribute. All of the currently defined ICMP messages to which an extension structure can be appended include an "original datagram" field. The "original datagram" field contains the initial octets of the datagram that elicited the ICMP error message. Although the original datagram field is of variable length, the ICMP message does not include a field that specifies its length. Therefore, in order to facilitate message parsing, this document allocates eight previously reserved bits to reflect the length of the "original datagram" field.</t>
              <t>The proposed modifications change the requirements for ICMP compliance. The impact of these changes on compliant implementations is discussed, and new requirements for future implementations are presented.</t>
              <t>This memo updates RFC 792 and RFC 4443. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4884"/>
          <seriesInfo name="DOI" value="10.17487/RFC4884"/>
        </reference>
        <reference anchor="RFC4890">
          <front>
            <title>Recommendations for Filtering ICMPv6 Messages in Firewalls</title>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="May" year="2007"/>
            <abstract>
              <t>In networks supporting IPv6, the Internet Control Message Protocol version 6 (ICMPv6) plays a fundamental role with a large number of functions, and a correspondingly large number of message types and options. ICMPv6 is essential to the functioning of IPv6, but there are a number of security risks associated with uncontrolled forwarding of ICMPv6 messages. Filtering strategies designed for the corresponding protocol, ICMP, in IPv4 networks are not directly applicable, because these strategies are intended to accommodate a useful auxiliary protocol that may not be required for correct functioning.</t>
              <t>This document provides some recommendations for ICMPv6 firewall filter configuration that will allow propagation of ICMPv6 messages that are needed to maintain the functioning of the network but drop messages that are potential security risks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4890"/>
          <seriesInfo name="DOI" value="10.17487/RFC4890"/>
        </reference>
        <reference anchor="RFC4919">
          <front>
            <title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="C. Schumacher" initials="C." surname="Schumacher"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks. The set of goals enumerated in this document form an initial set only. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4919"/>
          <seriesInfo name="DOI" value="10.17487/RFC4919"/>
        </reference>
        <reference anchor="RFC4944">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="D. Culler" initials="D." surname="Culler"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4944"/>
          <seriesInfo name="DOI" value="10.17487/RFC4944"/>
        </reference>
        <reference anchor="RFC5014">
          <front>
            <title>IPv6 Socket API for Source Address Selection</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="J. Laganier" initials="J." surname="Laganier"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The IPv6 default address selection document (RFC 3484) describes the rules for selecting source and destination IPv6 addresses, and indicates that applications should be able to reverse the sense of some of the address selection rules through some unspecified API. However, no such socket API exists in the basic (RFC 3493) or advanced (RFC 3542) IPv6 socket API documents. This document fills that gap partially by specifying new socket-level options for source address selection and flags for the getaddrinfo() API to specify address selection based on the source address preference in accordance with the socket-level options that modify the default source address selection algorithm. The socket API described in this document will be particularly useful for IPv6 applications that want to choose between temporary and public addresses, and for Mobile IPv6 aware applications that want to use the care-of address for communication. It also specifies socket options and flags for selecting Cryptographically Generated Address (CGA) or non-CGA source addresses. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5014"/>
          <seriesInfo name="DOI" value="10.17487/RFC5014"/>
        </reference>
        <reference anchor="RFC5072" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5072.xml">
          <front>
            <title>IP Version 6 over PPP</title>
            <author fullname="S. Varada" initials="S." role="editor" surname="Varada"/>
            <author fullname="D. Haskins" initials="D." surname="Haskins"/>
            <author fullname="E. Allen" initials="E." surname="Allen"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method of encapsulating network-layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.</t>
              <t>This document defines the method for sending IPv6 packets over PPP links, the NCP for establishing and configuring the IPv6 over PPP, and the method for forming IPv6 link-local addresses on PPP links.</t>
              <t>It also specifies the conditions for performing Duplicate Address Detection on IPv6 global unicast addresses configured for PPP links either through stateful or stateless address autoconfiguration.</t>
              <t>This document obsoletes RFC 2472. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5072"/>
          <seriesInfo name="DOI" value="10.17487/RFC5072"/>
        </reference>
        <reference anchor="RFC5121">
          <front>
            <title>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE 802.16 Networks</title>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="F. Xia" initials="F." surname="Xia"/>
            <author fullname="B. Sarikaya" initials="B." surname="Sarikaya"/>
            <author fullname="JH. Choi" initials="JH." surname="Choi"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>IEEE Std 802.16 is an air interface specification for fixed and mobile Broadband Wireless Access Systems. Service-specific convergence sublayers to which upper-layer protocols interface are a part of the IEEE 802.16 MAC (Medium Access Control). The Packet convergence sublayer (CS) is used for the transport of all packet- based protocols such as Internet Protocol (IP) and IEEE 802.3 LAN/MAN CSMA/CD Access Method (Ethernet). IPv6 packets can be sent and received via the IP-specific part of the Packet CS. This document specifies the addressing and operation of IPv6 over the IP-specific part of the Packet CS for hosts served by a network that utilizes the IEEE Std 802.16 air interface. It recommends the assignment of a unique prefix (or prefixes) to each host and allows the host to use multiple identifiers within that prefix, including support for randomly generated interface identifiers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5121"/>
          <seriesInfo name="DOI" value="10.17487/RFC5121"/>
        </reference>
        <reference anchor="RFC5555">
          <front>
            <title>Mobile IPv6 Support for Dual Stack Hosts and Routers</title>
            <author fullname="H. Soliman" initials="H." role="editor" surname="Soliman"/>
            <date month="June" year="2009"/>
            <abstract>
              <t>The current Mobile IPv6 and Network Mobility (NEMO) specifications support IPv6 only. This specification extends those standards to allow the registration of IPv4 addresses and prefixes, respectively, and the transport of both IPv4 and IPv6 packets over the tunnel to the home agent. This specification also allows the mobile node to roam over both IPv6 and IPv4, including the case where Network Address Translation is present on the path between the mobile node and its home agent. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5555"/>
          <seriesInfo name="DOI" value="10.17487/RFC5555"/>
        </reference>
        <reference anchor="RFC6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins"/>
            <author fullname="D. Johnson" initials="D." surname="Johnson"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address. The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address. To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option. All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes. This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6275"/>
          <seriesInfo name="DOI" value="10.17487/RFC6275"/>
        </reference>
        <reference anchor="RFC6563">
          <front>
            <title>Moving A6 to Historic Status</title>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="D. Conrad" initials="D." surname="Conrad"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>This document provides a summary of issues related to the use of A6 records, discusses the current status, and moves RFC 2874 to Historic status, providing clarity to implementers and operators. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6563"/>
          <seriesInfo name="DOI" value="10.17487/RFC6563"/>
        </reference>
        <reference anchor="RFC6980">
          <front>
            <title>Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document analyzes the security implications of employing IPv6 fragmentation with Neighbor Discovery (ND) messages. It updates RFC 4861 such that use of the IPv6 Fragmentation Header is forbidden in all Neighbor Discovery messages, thus allowing for simple and effective countermeasures for Neighbor Discovery attacks. Finally, it discusses the security implications of using IPv6 fragmentation with SEcure Neighbor Discovery (SEND) and formally updates RFC 3971 to provide advice regarding how the aforementioned security implications can be mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6980"/>
          <seriesInfo name="DOI" value="10.17487/RFC6980"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC7084" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7084.xml">
          <front>
            <title>Basic Requirements for IPv6 Customer Edge Routers</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="B. Stark" initials="B." surname="Stark"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies requirements for an IPv6 Customer Edge (CE) router. Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it. The document also covers IP transition technologies. Two transition technologies in RFC 5969's IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) and RFC 6333's Dual-Stack Lite (DS-Lite) are covered in the document. The document obsoletes RFC 6204.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7084"/>
          <seriesInfo name="DOI" value="10.17487/RFC7084"/>
        </reference>
        <reference anchor="RFC7123">
          <front>
            <title>Security Implications of IPv6 on IPv4 Networks</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2014"/>
            <abstract>
              <t>This document discusses the security implications of native IPv6 support and IPv6 transition/coexistence technologies on "IPv4-only" networks and describes possible mitigations for the aforementioned issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7123"/>
          <seriesInfo name="DOI" value="10.17487/RFC7123"/>
        </reference>
        <reference anchor="RFC7278">
          <front>
            <title>Extending an IPv6 /64 Prefix from a Third Generation Partnership Project (3GPP) Mobile Interface to a LAN Link</title>
            <author fullname="C. Byrne" initials="C." surname="Byrne"/>
            <author fullname="D. Drown" initials="D." surname="Drown"/>
            <author fullname="A. Vizdal" initials="A." surname="Vizdal"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document describes requirements for extending an IPv6 /64 prefix from a User Equipment Third Generation Partnership Project (3GPP) radio interface to a LAN link and describes two implementation examples.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7278"/>
          <seriesInfo name="DOI" value="10.17487/RFC7278"/>
        </reference>
        <reference anchor="RFC7371">
          <front>
            <title>Updates to the IPv6 Multicast Addressing Architecture</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document updates the IPv6 multicast addressing architecture by redefining the reserved bits as generic flag bits. The document also provides some clarifications related to the use of these flag bits.</t>
              <t>This document updates RFCs 3956, 3306, and 4291.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7371"/>
          <seriesInfo name="DOI" value="10.17487/RFC7371"/>
        </reference>
        <reference anchor="RFC7421">
          <front>
            <title>Analysis of the 64-bit Boundary in IPv6 Addressing</title>
            <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The IPv6 unicast addressing format includes a separation between the prefix used to route packets to a subnet and the interface identifier used to specify a given interface connected to that subnet. Currently, the interface identifier is defined as 64 bits long for almost every case, leaving 64 bits for the subnet prefix. This document describes the advantages of this fixed boundary and analyzes the issues that would be involved in treating it as a variable boundary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7421"/>
          <seriesInfo name="DOI" value="10.17487/RFC7421"/>
        </reference>
        <reference anchor="RFC7721" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7721.xml">
          <front>
            <title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized. It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7721"/>
          <seriesInfo name="DOI" value="10.17487/RFC7721"/>
        </reference>
        <reference anchor="RFC7739">
          <front>
            <title>Security Implications of Predictable Fragment Identification Values</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>IPv6 specifies the Fragment Header, which is employed for the fragmentation and reassembly mechanisms. The Fragment Header contains an "Identification" field that, together with the IPv6 Source Address and the IPv6 Destination Address of a packet, identifies fragments that correspond to the same original datagram, such that they can be reassembled together by the receiving host. The only requirement for setting the Identification field is that the corresponding value must be different than that employed for any other fragmented datagram sent recently with the same Source Address and Destination Address. Some implementations use a simple global counter for setting the Identification field, thus leading to predictable Identification values. This document analyzes the security implications of predictable Identification values, and provides implementation guidance for setting the Identification field of the Fragment Header, such that the aforementioned security implications are mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7739"/>
          <seriesInfo name="DOI" value="10.17487/RFC7739"/>
        </reference>
        <reference anchor="RFC7772">
          <front>
            <title>Reducing Energy Consumption of Router Advertisements</title>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>Frequent Router Advertisement messages can severely impact host power consumption. This document recommends operational practices to avoid such impact.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="202"/>
          <seriesInfo name="RFC" value="7772"/>
          <seriesInfo name="DOI" value="10.17487/RFC7772"/>
        </reference>
        <reference anchor="RFC7844" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7844.xml">
          <front>
            <title>Anonymity Profiles for DHCP Clients</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>Some DHCP options carry unique identifiers. These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses. The anonymity profiles are designed for clients that wish to remain anonymous to the visited network. The profiles provide guidelines on the composition of DHCP or DHCPv6 messages, designed to minimize disclosure of identifying information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7844"/>
          <seriesInfo name="DOI" value="10.17487/RFC7844"/>
        </reference>
        <reference anchor="RFC7934">
          <front>
            <title>Host Address Availability Recommendations</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="V. Cerf" initials="V." surname="Cerf"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document recommends that networks provide general-purpose end hosts with multiple global IPv6 addresses when they attach, and it describes the benefits of and the options for doing so.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="204"/>
          <seriesInfo name="RFC" value="7934"/>
          <seriesInfo name="DOI" value="10.17487/RFC7934"/>
        </reference>
        <reference anchor="RFC8087">
          <front>
            <title>The Benefits of Using Explicit Congestion Notification (ECN)</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="M. Welzl" initials="M." surname="Welzl"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The goal of this document is to describe the potential benefits of applications using a transport that enables Explicit Congestion Notification (ECN). The document outlines the principal gains in terms of increased throughput, reduced delay, and other benefits when ECN is used over a network path that includes equipment that supports Congestion Experienced (CE) marking. It also discusses challenges for successful deployment of ECN. It does not propose new algorithms to use ECN nor does it describe the details of implementation of ECN in endpoint devices (Internet hosts), routers, or other network devices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8087"/>
          <seriesInfo name="DOI" value="10.17487/RFC8087"/>
        </reference>
        <reference anchor="RFC8096">
          <front>
            <title>The IPv6-Specific MIB Modules Are Obsolete</title>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>In 2005-2006, the IPv6 MIB update group published updated versions of the IP-MIB, UDP-MIB, TCP-MIB, and IP-FORWARD-MIB modules, which use the InetAddressType/InetAddress construct to handle IPv4 and IPv6 in the same table. This document contains versions of the obsoleted IPV6-MIB, IPV6-TC, IPV6-ICMP-MIB, IPV6-TCP-MIB, and IPV6-UDP-MIB modules for the purpose of updating MIB module repositories. This document obsoletes RFCs 2452, 2454, 2465, and 2466 (i.e., the RFCs containing these MIBs) and reclassifies them as Historic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8096"/>
          <seriesInfo name="DOI" value="10.17487/RFC8096"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="POSIX" target="https://ieeexplore.ieee.org/document/8277153">
          <front>
            <title>Information Technology -- Portable Operating System Interface (POSIX(R)) Base Specifications, Issue 7</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="January"/>
          </front>
          <seriesInfo name="IEEE Std" value="1003.1-2017"/>
          <seriesInfo name="DOI:" value="10.1109/IEEESTD.2018.8277153"/>
        </reference>
        <reference anchor="USGv6" target="https://www.nist.gov/programs-projects/usgv6-program">
          <front>
            <title>A Profile for IPv6 in the U.S. Government - Version 1.0</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2008" month="July"/>
          </front>
          <seriesInfo name="NIST" value="SP500-267"/>
        </reference>
      </references>
    </references>
    <?line 1347?>

<section anchor="changes-from-rfc-8504">
      <name>Changes from RFC 8504</name>
      <t>This section highlights the changes since RFC 8504. It is not a complete list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated obsoleted RFCs including 3315 and 3736 (both to 8415) and 4941 to 8981. RFC 793 has been obsoleted by 9293 but the latter does not include the the robustness principle for which RFC 793 is cited in this document.</t>
        </li>
        <li>
          <t>Added support for RFC 9131.</t>
        </li>
        <li>
          <t>Type C host from RFC 4191 is went from a <bcp14>SHOULD</bcp14> to <bcp14>MUST</bcp14>.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-6434-to-rfc-8504">
      <name>Changes from RFC 6434 to RFC 8504</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Restructured sections.</t>
        </li>
        <li>
          <t>Added 6LoWPAN to link layers as it has some deployment.</t>
        </li>
        <li>
          <t>Removed the Downstream-on-Demand (DoD) IPv6 Profile as it hasn't been updated.</t>
        </li>
        <li>
          <t>Updated MLDv2 support to a <bcp14>MUST</bcp14> since nodes are restricted if MLDv1 is used.</t>
        </li>
        <li>
          <t>Required DNS RA options so SLAAC-only devices can get DNS; RFC 8106 is a
  <bcp14>MUST</bcp14>.</t>
        </li>
        <li>
          <t>Required RFC 3646 DNS Options for DHCPv6 implementations.</t>
        </li>
        <li>
          <t>Added RESTCONF and NETCONF as possible options to network management.</t>
        </li>
        <li>
          <t>Added a section on constrained devices.</t>
        </li>
        <li>
          <t>Added text on RFC 7934 to address availability to hosts (<bcp14>SHOULD</bcp14>).</t>
        </li>
        <li>
          <t>Added text on RFC 7844 for anonymity profiles for DHCPv6 clients.</t>
        </li>
        <li>
          <t>Added mDNS and DNS-SD as updated service discovery.</t>
        </li>
        <li>
          <t>Added RFC 8028 as a <bcp14>SHOULD</bcp14> as a method for solving a multi-prefix network.</t>
        </li>
        <li>
          <t>Added ECN RFC 3168 as a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added reference to RFC 7123 for security over IPv4-only networks.</t>
        </li>
        <li>
          <t>Removed Jumbograms (RFC 2675) as they aren't deployed.</t>
        </li>
        <li>
          <t>Updated obsoleted RFCs to the new version of the RFC, including RFCs 2460,
  1981, 7321, and 4307.</t>
        </li>
        <li>
          <t>Added RFC 7772 for power consumptions considerations.</t>
        </li>
        <li>
          <t>Added why /64 boundaries for more detail --- RFC 7421.</t>
        </li>
        <li>
          <t>Added a unique IPv6 prefix per host to support currently deployed IPv6 networks.</t>
        </li>
        <li>
          <t>Clarified RFC 7066 was a snapshot for 3GPP.</t>
        </li>
        <li>
          <t>Updated RFC 4191 as a <bcp14>MUST</bcp14> and the Type C Host as a <bcp14>SHOULD</bcp14> as they help solve
  multi-prefix problems.</t>
        </li>
        <li>
          <t>Removed IPv6 over ATM since there aren't many deployments.</t>
        </li>
        <li>
          <t>Added a note in Section 6.6 for Rule 5.5 from RFC 6724.</t>
        </li>
        <li>
          <t>Added <bcp14>MUST</bcp14> for BCP 198 for forwarding IPv6 packets.</t>
        </li>
        <li>
          <t>Added a reference to RFC 8064 for stable address creation.</t>
        </li>
        <li>
          <t>Added text on the protection from excessive extension header options.</t>
        </li>
        <li>
          <t>Added text on the dangers of 1280 MTU UDP, especially with regard to DNS
  traffic.</t>
        </li>
        <li>
          <t>Added text to clarify RFC 8200 behavior for unrecognized extension headers
  or unrecognized ULPs.</t>
        </li>
        <li>
          <t>Removed dated email addresses from design team acknowledgements for <xref target="RFC4294"/>.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-4294-to-rfc-6434">
      <name>Changes from RFC 4294 to RFC 6434</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated the Introduction to indicate that this document is an
  applicability statement and is aimed at
  general nodes.</t>
        </li>
        <li>
          <t>Significantly updated the section on mobility protocols;
  added references and downgraded previous SHOULDs to MAYs.</t>
        </li>
        <li>
          <t>Changed the Sub-IP Layer section to just list relevant RFCs, and
  added some more RFCs.</t>
        </li>
        <li>
          <t>Added a section on SEND (it is a <bcp14>MAY</bcp14>).</t>
        </li>
        <li>
          <t>Revised the section on Privacy Extensions to add more
  nuance to the recommendation.</t>
        </li>
        <li>
          <t>Completely revised the IPsec/IKEv2 section, downgrading the overall
  recommendation to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Upgraded recommendation of DHCPv6 to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added a background section on DHCP versus RA options, added
  a <bcp14>SHOULD</bcp14> recommendation for DNS configuration via RAs (RFC 6106), and cleaned
  up the DHCP recommendations.</t>
        </li>
        <li>
          <t>Added the recommendation that routers implement Sections 7.3 and
  7.5 of <xref target="RFC6275"/>.</t>
        </li>
        <li>
          <t>Added a pointer to subnet clarification document <xref target="RFC5942"/>.</t>
        </li>
        <li>
          <t>Added text that "IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be implemented.</t>
        </li>
        <li>
          <t>Added reference to <xref target="RFC5722"/> (Overlapping Fragments),
  and made it a <bcp14>MUST</bcp14> to implement.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Removed the mention of delegation name (DNAME) from the discussion about <xref target="RFC3363"/>.</t>
        </li>
        <li>
          <t>Numerous updates to reflect newer versions of IPv6
  documents, including <xref target="RFC3596"/>, <xref target="RFC4213"/>, <xref target="RFC4291"/>, and <xref target="RFC4443"/>.</t>
        </li>
        <li>
          <t>Removed discussion of "Managed" and "Other" flags in
  RAs. There is no consensus at present on how to process these
  flags, and discussion of their semantics was removed in the most
  recent update of Stateless Address Autoconfiguration <xref target="RFC4862"/>.</t>
        </li>
        <li>
          <t>Added many more references to optional IPv6 documents.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Updated the MLD section to include reference to Lightweight MLD <xref target="RFC5790"/>.</t>
        </li>
        <li>
          <t>Added a <bcp14>SHOULD</bcp14> recommendation for "Default Router Preferences
  and More-Specific Routes" <xref target="RFC4191"/>.</t>
        </li>
        <li>
          <t>Made "IPv6 Flow Label Specification" <xref target="RFC6437"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Acknowledgments (Current Document)  </t>
          <t>
The authors would like to thank
Brian Carpenter, Dave Thaler,
Tom Herbert, Erik Kline, Mohamed Boucadair, and Michayla Newcombe
for their contributions and many members of the 6man WG for the inputs they
gave.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 6434  </t>
          <t>
RFC 6434 was authored by Ed Jankiewicz, John Loughney, and Thomas Narten.  </t>
          <t>
The authors of RFC 6434 thank Hitoshi Asaeda, Brian Carpenter, Tim Chown,
Ralph
Droms, Sheila Frankel, Sam Hartman, Bob Hinden, Paul Hoffman, Pekka
Savola, Yaron Sheffer, and Dave Thaler for their comments.  In addition,
the authors thank Mark Andrews for comments and corrections on DNS
text and Alfred Hoenes for tracking the updates to various RFCs.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 4294  </t>
          <t>
RFC 4294 was written by
the IPv6 Node Requirements design team, which had the following members:
Jari Arkko,
Marc Blanchet,
Samita Chakrabarti,
Alain Durand,
Gerard Gastaud,
Jun-ichiro Itojun Hagino,
Atsushi Inoue,
Masahiro Ishiyama,
John Loughney,
Rajiv Raghunarayan,
Shoichi Sakane,
Dave Thaler, and Juha Wiljakka.  </t>
          <t>
The authors of RFC 4294 thank Ran Atkinson, Jim Bound, Brian Carpenter, Ralph
Droms,
Christian Huitema, Adam Machalek, Thomas Narten, Juha Ollila, and Pekka
Savola for their comments.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
