<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.33 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4193 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4193.xml">
<!ENTITY RFC7078 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7078.xml">
<!ENTITY RFC7526 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7526.xml">
<!ENTITY RFC8925 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8925.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC6724 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6724.xml">
<!ENTITY RFC1918 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1918.xml">
<!ENTITY RFC3484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3484.xml">
<!ENTITY RFC6555 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6555.xml">
<!ENTITY RFC8305 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8305.xml">
<!ENTITY RFC4861 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4861.xml">
<!ENTITY RFC4191 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4191.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-6man-rfc6724-update-05" category="std" consensus="true" submissionType="IETF" updates="6724">
  <front>
    <title abbrev="Update on ULAs in RFC 6724">Preference for IPv6 ULAs over IPv4 addresses in RFC6724</title>

    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <email>Tim.Chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Duncan" fullname="Jeremy Duncan">
      <organization>Tachyon Dynamics</organization>
      <address>
        <email>jduncan@tachyondynamics.com</email>
      </address>
    </author>

    <date year="2023" month="December" day="22"/>

    <area>Int</area>
    <workgroup>6MAN</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 49?>

<t>When <xref target="RFC6724"/> was published it defined an address selection algorithm along with a default policy table, and noted a number of examples where that policy table might benefit from adjustment for specific scenarios. It also noted that it is important for implementations to provide a way to change the default policies as more experience is gained. This update draws on several years of operational experience to refine RFC 6724 further, with particular emphasis on preference for the use of ULA addresses over IPv4 addresses and the addition of mandatory support for Rule 5.5. The update also demotes the preference for 6to4 addresses. The changes to default behavior improve supportability of common use cases, including automatic / unmanaged scenarios. It is recognized that some less common deployment scenarios may require explicit configuration or custom changes to achieve desired operational parameters.</t>



    </abstract>



  </front>

  <middle>


<?line 53?>

<section anchor="introduction"><name>Introduction</name>

<t>Since its publication in 2012, <xref target="RFC6724"/> has become an important mechanism by which nodes can perform address selection, deriving the most appropriate source and destination address pair to use from a
candidate set by following the procedures defined in the RFC. Part of the process involves the use of a policy table, where the precedence and labels for address prefixes are listed, and for which a default table is defined.</t>

<t>It was always expected that the default policy table may need to be changed based on operational experience; section 2.1 says "It is important that implementations provide a way to change the default policies as more experience is gained" and points to the examples in Section 10, which include Section 10.6 where a ULA example is presented.</t>

<t>This document is written on the basis of such operational experience, in particular for scenarios where ULAs are used for their intended purpose as stated in <xref target="RFC4193"/>, i.e., they designed to be routed inside of a local site and by default not received from or advertised externally. It also includes updated requirements on support for RFC 6724 Rule 5.5. The goal of the document is to improve behavior for common scenarios, and to assist in the phasing out of use of IPv4, while noting that some specific scenarios may still require explicit configuration.</t>

<t>An IPv6 deployment, whether enterprise, residential or other, may use combinations of IPv6 GUAs, IPv6 ULAs, IPv4 globals, IPv4 RFC 1918 addressing, and may or may not use some form of NAT. However, this document makes no comment or recommendation on how ULAs are used, or on the use of NAT in an IPv6 network.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="operational-issues-regarding-preference-for-ipv4-addresses-over-ulas"><name>Operational Issues Regarding Preference for IPv4 addresses over ULAs</name>

<t>With multiaddressing being the norm for IPv6, moreso where nodes are dual-stack, the ability for a node to pick an appropriate address pair for communication is very important.</t>

<t>Where getaddrinfo() or a comparable API is used, the sorting behavior should take into account both
the source addresses of the requesting node as well as the destination addresses returned, and sort the candidate address pairs following the procedures defined in RFC 6724.</t>

<t>The current default policy table leads to preference for IPv6 GUAs over IPv4 globals, which is widely considered preferential behavior to support greater use of IPv6 in dual-stack environments. This helps allow sites to phase out IPv4 as its evidenced use becomes ever lower.</t>

<t>However, the same default policy table also puts IPv6 ULAs below all IPv4 addresses, including <xref target="RFC1918"/> addresses. For many site operators this behavior will be counter-intuitive, and may create difficulties with respect to planning, operational, and security implications for environments where ULA addressing is used in IPv4/IPv6 dual-stack network scenarios. The expected default prioritization of IPv6 traffic over IPv4 by default, as happens with IPv6 GUA addressing, does not happen for ULAs.</t>

<t>As a result, the use of ULAs is not a viable option for dual-stack networking transition planning, large scale network modeling, network lab environments or other modes of large scale networking that run both IPv4 and IPv6 concurrently with the expectation that IPv6 will be preferred by default.</t>

<t>This document updates the default policy table to elevate the preference for ULAs such that ULAs will be preferred over all IPv4 addresses, providing more consistent and less confusing behavior for operators, and to assist operators in phasing out IPv4 from dual-stack environments, since by this update IPv6 GUAs and ULAs will be preferred over any IPv4 addresses. This is an important enabler for sites seeking to move from dual-stack to IPv6-only networking.</t>

<t>This change aims to improve the default handling of address selection for common cases, and unmanaged / automatic scenarios rather than those where DHCPv6 is deployed. Sites using DHCPv6 for host configuration management can make use of implementations of <xref target="RFC7078"/> to apply changes to the <xref target="RFC6724"/> policy table.</t>

<t>The changes are discussed in more detail in the following sections, with a further section providing a summary of the proposed updates.</t>

</section>
<section anchor="preference-of-6to4-addresses"><name>Preference of 6to4 addresses</name>

<t>The anycast prefix for 6to4 relays was deprecated by <xref target="RFC7526"/> in 2015, and since that time the use of 6to4 addressing has further declined to the point where it is generally not seen and can be considered to all intents and purposes deprecated in use.</t>

<t>This document therefore demotes the precedence of the 6to4 prefix in the policy table to the same minimum preference as carried by the deprecated site local and 6bone address prefixes.</t>

</section>
<section anchor="adjustments-to-rfc-6724"><name>Adjustments to RFC 6724</name>

<t>This update makes two specific changes to RFC 6724: first to update the default policy table, and second to change Rule 5.5 on prefering addresses in a prefix advertised by the next-hop to a <bcp14>MUST</bcp14>.</t>

<section anchor="policy-table-update"><name>Policy Table Update</name>

<t>This update alters the default policy table listed in Rule 2.1 of RFC 6724.</t>

<t>The table below reflects the current RFC 6724 state on the left, and the updated state defined by this RFC on the right:</t>

<figure><artwork><![CDATA[
                    RFC 6724                                Updated                  
      Prefix        Precedence Label          Prefix        Precedence Label              
      ::1/128               50     0          ::1/128               50     0
      ::/0                  40     1          ::/0                  40     1
      ::ffff:0:0/96         35     4          ::ffff:0:0/96         20     4 (*)
      2002::/16             30     2          2002::/16              5     2 (*)
      2001::/32              5     5          2001::/32              5     5
      fc00::/7               3    13          fc00::/7              30    13 (*)
      ::/96                  1     3          ::/96                  1     3
      fec0::/10              1    11          fec0::/10              1     11
      3ffe::/16              1    12          3ffe::/16              1     12

 (*) value(s) changed in update

]]></artwork></figure>

<t>The update moves 2002::/16 to de-preference its status in line with <xref target="RFC7526"/> and moves the precedence of fc00::/7 above legacy IPv4, with ::ffff:0:0/96 now set to precedence 20.</t>

</section>
<section anchor="rule-55"><name>Rule 5.5</name>

<t>The heuristic for address selection defined in Rule 5.5 of Section 5 of RFC 6724 to prefer addresses in a prefix advertised by a next-hop router has proven to be very useful.</t>

<t>The text in RFC 6724 states that the Rules <bcp14>MUST</bcp14> be followed in order, but also includes a discussion note under Rule 5.5 that says that an IPv6 implementation is not required to remember which next-hops advertised which prefixes and thus that Rule 5.5 is only applicable to implementations that track this information.</t>

<t>This document elevates the requirement to prefer addresses in a prefix advertised by a next-hop router to a <bcp14>MUST</bcp14> for all nodes.</t>

</section>
<section anchor="automatic-insertion-of-prefixes-in-the-policy-table"><name>Automatic insertion of prefixes in the policy table</name>

<t>Section 2.1 of RFC 6724 states that "an implementation <bcp14>MAY</bcp14> automatically add additional site-specific rows to the default table based on its configured addresses, such as for Unique Local Addresses (ULAs)".</t>

<t>Given this document now elevates ULAs above all IPv4 addresses for address selection, should an implementation choose to insert specific ULA prefixes into the policy table, e.g., based on observed Router Advertisements (RAs) <xref target="RFC4861"/> and their Prefix Information Options (PIOs) or Route Information Options (RIOs) <xref target="RFC4191"/>, it <bcp14>SHOULD</bcp14> give such "known local" prefixes a precedence of 45, and <bcp14>SHOULD</bcp14> also reduce the precedence of other ULA addresses, i.e., the general fc07::/7 prefix, to precedence 10, such that IPv4 would be preferred to ULA prefixes that have not been explicitly added.</t>

</section>
</section>
<section anchor="configuration-of-the-default-policy-table"><name>Configuration of the default policy table</name>

<t>As stated in Section 2.1 of RFC 6724 "IPv6 implementations <bcp14>SHOULD</bcp14> support configurable address selection via a mechanism at least as powerful as the policy tables defined here".</t>

<t>While this document defines changes to RFC 6724 behavior based on operational experience to date, it is important that node policy tables can be changed once deployed to support future emerging use cases. This update thus re-states the importance of such configurability.</t>

</section>
<section anchor="intended-behaviors"><name>Intended behaviors</name>

<t>In this section we reiew the intended default behaviors after this update is applied.</t>

<section anchor="gua-gua-preferred-over-ipv4-ipv4"><name>GUA-GUA preferred over IPv4-IPv4</name>

<t>This is the current behaviour, and remains unaltered. The rationale is to promote use of IPv6 GUAs in dual-stack environments.</t>

</section>
<section anchor="ula-ula-preferred-over-gua-gua"><name>ULA-ULA preferred over GUA-GUA</name>

<t>This is the current behaviour, and remains unaltered. One important rationale is to support consistent, stable addressing in a site where the global prefix might change over time, or become unavailable.</t>

</section>
<section anchor="ula-ula-preferred-over-ipv4-ipv4"><name>ULA-ULA preferred over IPv4-IPv4</name>

<t>This is a change introduced by this update. RFC 6724 as originally defined would lead to IPv4 being preferred over ULAs, which is contrary to the spirit of the GUA preference over IPv4, and to the goal of removing evidenced use of IPv4 in a dual-stack site before transitioning to IPv6-only.</t>

</section>
<section anchor="ipv4-ipv4-preferred-over-ula-gua"><name>IPv4-IPv4 preferred over ULA-GUA</name>

<t>An IPv6 ULA address will only be preferred over an IPv4 address if both IPv6 ULA source and destination addresses are available. With Rule 5 of Section 6 of RFC 6724 and the ULA-specific label added in <xref target="RFC6724"/> (which was not present in <xref target="RFC3484"/>) an IPv4 source and destination will be preferred over an IPv6 ULA source and an IPv6 GUA destination address, even though generally IPv6 ULA addresses are preferred over IPv4 in the policy table as proposed in this update. The IPv4 matching label trumps ULA-GUA.</t>

</section>
</section>
<section anchor="discussion-of-ula-source-with-gua-or-remote-ula-destination"><name>Discussion of ULA source with GUA or remote ULA destination</name>

<t>In this section we present a discussion on the specific cases where a ULA source may be communicating with a GUA or ULA destination.</t>

<t>A potential problem exists when a ULA source attempts to communicate with GUA or remote ULA destinations. In these scenarios, the ULA source as stated earlier is by default intended for communication only with the local network, meaning an individual site, several sites that are part of the same organization, or multiple sites across cooperating organizations, as detailed in RFC 4193. As a result, most GUA and ULA destinations are not attached to the same local network as the ULA source and are, therefore, not reachable from the ULA source.</t>

<t>When only a ULA source is available for communication with GUA destinations, this generally implies no connectivity to the IPv6 Internet is available. Otherwise, a GUA source would have been made available and selected for use with GUA destinations. As a result, the ULA source will typically fail when it attempts to communicate with most GUA destinations. However, corner cases exist where the ULA source will not fail, such as when GUA destinations are attached to the same local network as the ULA source.</t>

<t>Receiving a DNS response for a ULA destination that is not attached to the local network, in other words, a remote ULA destination, is considered a misconfiguration in most cases, or at least this contradicts the operational guidelines provided in Section 4.4 of RFC 4193. Nevertheless, this can occur, and the ULA source will typically fail when it attempts to communicate with ULA destinations that are not attached to the same local network as the ULA source.</t>

<t>This section discusses several complementary mechanisms involved with these scenarios.</t>

<section anchor="the-ula-label-and-its-precedence"><name>The ULA Label and its Precedence</name>

<t>RFC 6724 added (in obsoleting RFC 3484) a separate label for ULA (fc00::/7), whose default precedence is raised by this update. This separate label interacts with Rule 5 of Section 6 of RFC 6724, which says;</t>

<figure><artwork><![CDATA[
  Rule 5: Prefer matching label.
  If Label(Source(DA)) = Label(DA) and Label(Source(DB)) <> Label(DB), then prefer DA.  Similarly, if       Label(Source(DA)) <> Label(DA) and Label(Source(DB)) = Label(DB), then prefer DB.
]]></artwork></figure>

<t>The ULA source label will not match the GUA destination label in the first scenario. Therefore, an IPv4 destination, if available, will be preferred over a GUA destination with a ULA source, even though the GUA destination has higher precedence than the IPv4 destination in the policy table. This means the IPv4 destination will be moved up in the list of destinations over the GUA destination with the ULA source.</t>

<t>If the ULA (fc00::/7) label is removed from the policy table, a GUA destination with a ULA source will be preferred over an IPv4 destination, as GUA and ULA will be part of the same label (::/0).</t>

<t>The ULA source label will match the ULA destination label in the second scenario; therefore, whether part of the local network or not, a ULA destination will be preferred over an IPv4 destination.</t>

<t>If the ULA label (fc00::/7) has its precedence lowered below IPv4 or the IPv4 precedence is raised above ULA, an IPv4 destination will be preferred over all ULA destinations.</t>

</section>
<section anchor="happy-eyeballs"><name>Happy Eyeballs</name>

<t>Regardless of the preference resulting from the above discussion, Happy Eyeballs version 1 <xref target="RFC6555"/> or version 2 <xref target="RFC8305"/>, if implemented, will try both the GUA or ULA destination with the ULA source and the IPv4 destination and source pairings. The ULA source will typically fail to communicate with most GUA or remote ULA destinations, and IPv4 will be preferred if IPv4 connectivity is available unless the GUA or ULA destinations are attached to the same local network as the ULA source.</t>

</section>
<section anchor="try-the-next-address"><name>Try the Next Address</name>

<t>As stated in Section 2 of RFC 6724,</t>

<figure><artwork><![CDATA[
  Well-behaved applications SHOULD NOT simply use the first address returned from an API such as
  getaddrinfo() and then give up if it fails. For many applications, it is appropriate to iterate 
  through the list of addresses returned from getaddrinfo() until a working address is found. For
  other applications, it might be appropriate to try multiple addresses in parallel (e.g., with some
  small delay in between) and use the first one to succeed.
]]></artwork></figure>

<t>Therefore, when an IPv4 destination is preferred over GUA or ULA destinations, IPv4 will likely succeed if IPv4 connectivity is available, and the GUA or ULA destination may only be tried if Happy Eyeballs is implemented.</t>

<t>On the other hand, if the GUA or ULA destination with the ULA source is preferred, the ULA source will typically fail to communicate GUA or ULA destinations that are not connected to the same local network as the ULA source. However, if the operational guidelines in Section 4.3 of RFC 4193 are followed, recognizing this failure can be accelerated, and transport layer timeouts (e.g., TCP) can be avoided. The guidelines will cause a Destination Unreachable ICMPv6 Error to be received by the source device, signaling the next address in the list to be tried, as discussed above.</t>

</section>
</section>
<section anchor="following-ula-operational-guidelines-in-rfc-4193"><name>Following ULA operational guidelines in RFC 4193</name>

<t>This section re-emphasises two important operational requirements stated in <xref target="RFC4193"/> that should be followed by operators.</t>

<section anchor="filtering-ula-source-addresses-at-site-borders"><name>Filtering ULA-source addresses at site borders</name>

<t>Section 4.3 states "Site border routers and firewalls should be configured to not forward
any packets with Local IPv6 source or destination addresses outside of the site, unless they have been explicitly configured with routing information about specific /48 or longer Local IPv6 prefixes".</t>

<t>And further that "Site border routers should respond with the appropriate ICMPv6 Destination Unreachable message to inform the source that the packet was not forwarded".</t>

<t>As stated in the above discussion, such ICMPv6 messages can assist in fast failover for TCP connections.</t>

</section>
<section anchor="avoid-using-ula-addresses-in-the-global-dns"><name>Avoid using ULA addresses in the global DNS</name>

<t>Section 4.3 of RFC 4193 states that "AAAA and PTR records for locally assigned local IPv6 addresses are not recommended to be installed in the global DNS."</t>

<t>This is particularly important given this document elevates the priority for ULAs above IPv4, but is equally important in IPv6-only scenarios where just ULAs and GUAs are in use.</t>

</section>
</section>
<section anchor="the-practicalities-of-implementing-address-selection-support"><name>The practicalities of implementing address selection support</name>

<t>As with most adjustments to standards, and using the introduction of RFC 6724 as a measuring stick, the updates defined in this document will likely take several years to become common enough for consistent behavior within most operating systems. At the time of writing, it has been over 10 years since RFC 6724 has been published but we continue to see existing commercial and open source operating systems exhibiting RFC 3484 behavior.</t>

<t>While it should be noted that RFC 6724 defines a solution to adjust the address preference selection table that is functional theoretically, operationally the solution is operating system dependent and in practice policy table changes cannot be signaled by any currently deployed network mechanism. While RFC 7078 defines such a DHCPv6 option, it is not widely implemented. This lack of an intra-protocol or network-based ability to adjust address selection preference, along with the inability to adjust a notable number of operating systems either programmatically or manually, renders operational scalability of such a mechanism challenging.</t>

<t>It is especially important to note this behavior in the long lifecycle equipment that exists in industrial control and operational technology environments due to their very long mean time to replacement/lifecycle.</t>

</section>
<section anchor="limitations-of-rfc-6724"><name>Limitations of RFC 6724</name>

<t>The procedures defined in RFC 6724 do not give optimal results for all scenarios. As stated in the introduction, the aim of this update is to improve the behavior for the most common scenarios.</t>

<t>It is widely recognised in the IETF 6man WG that the whole 3484/6724/getaddrinfo() model is fundamentally inadequate for optimal address selection.  A model that considers address pairs directly, rather than sorting on destination addresses with the best source for that address, would be preferable, but beyond the scope of this document.</t>

<t>To simplify address selection, operators may instead look to deploy IPv6-only, and may choose to only use GUA addresses and no ULA addresses. Other approaches to reduce the use of IPv4, e.g., through use of DHCPv4 Option 108 as defined in <xref target="RFC8925"/>, also helps simplify address selection for nodes.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to acknowledge the valuable input and contributions of the 6man WG including (in alphabetic order) Erik Auerswald, Dale Carder, Brian Carpenter, Tom Coffeen, Lorenzo Colitti, Chris Cummings, David Farmer (in particular for the ULA to GUA/ULA discussion text), Bob Hinden, Scott Hogg, Ed Horley, Ted Lemon, Jen Linkova, Michael Richardson, Kyle Rose, Mark Smith, Ole Troan, Eduard Vasilenko, Eric Vyncke, Paul Wefel, Timothy Winters, and XiPeng Xiao.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>There are no direct security considerations in this document.</t>

<t>The mixed preference for IPv6 over IPv4 from the default policy table in RFC 6724 represents a potential security issue, given an operator may expect ULAs to be used when in practice RFC 1918 addresses are used instead.</t>

<t>The requirements of RFC4193, stated earlier in this document, should be followed for optimal behavior.</t>

<t>Operators should be mindful of cases where communicating nodes have differing behaviours for address selection, e.g., RFC3484 behavior, RFC6724, the updated RFC6724 behavior defined here, some other non-IETF-standardized behavior, or even no mechanism. There may thus be inconsistent behaviour for communications initiated in each direction. Ultimately all nodes should be made compliant to the updated specification described in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None.</t>

</section>
<section anchor="appendix-a-changes-and-additional-text-since-rfc-6724"><name>Appendix A. Changes and additional text since RFC 6724</name>

<t><list style="symbols">
  <t>Changed default policy table to move fc00::/7 to precedence 30, above legacy IPv4.</t>
  <t>Changed default policy table to move 6to4 address block 2002::/16 to the same as 6bone and deprecated site-local.</t>
  <t>Changed ::ffff:0:0/96 to precedence 20.</t>
  <t>Changed Rule 5.5 to a <bcp14>MUST</bcp14> support.</t>
  <t>Added note on precedence for general ULAs where specific ULAs are inserted in the policy table.</t>
  <t>Added text clarifying intended behaviors.</t>
  <t>Added text discussing ULA to GUA/ULA case.</t>
  <t>Added text for the security section.</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC2119;
&RFC4193;
&RFC7078;
&RFC7526;
&RFC8925;
&RFC8174;


    </references>

    <references title='Informative References'>

&RFC6724;
&RFC1918;
&RFC3484;
&RFC6555;
&RFC8305;
&RFC4861;
&RFC4191;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

