<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.33 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4193 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4193.xml">
<!ENTITY RFC7078 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7078.xml">
<!ENTITY RFC7526 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7526.xml">
<!ENTITY RFC8925 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8925.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC6724 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6724.xml">
<!ENTITY RFC1918 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1918.xml">
<!ENTITY RFC3484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3484.xml">
<!ENTITY RFC6555 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6555.xml">
<!ENTITY RFC8305 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8305.xml">
<!ENTITY RFC4861 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4861.xml">
<!ENTITY RFC4191 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4191.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-6man-rfc6724-update-06" category="std" consensus="true" submissionType="IETF" updates="6724">
  <front>
    <title abbrev="Update on ULAs in RFC 6724">Preference for IPv6 ULAs over IPv4 addresses in RFC6724</title>

    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <email>Tim.Chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Duncan" fullname="Jeremy Duncan">
      <organization>Tachyon Dynamics</organization>
      <address>
        <email>jduncan@tachyondynamics.com</email>
      </address>
    </author>

    <date year="2024" month="January" day="02"/>

    <area>Int</area>
    <workgroup>6MAN</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 49?>

<t>When <xref target="RFC6724"/> was published it defined an address selection algorithm along with a default policy table, and noted a number of examples where that policy table might benefit from adjustment for specific scenarios. It also noted that it is important for implementations to provide a way to change the default policies as more experience is gained. This update draws on several years of operational experience to refine RFC 6724 further, with particular emphasis on preference for the use of ULA addresses over IPv4 addresses and the addition of mandatory support for Rule 5.5. The update also demotes the preference for 6to4 addresses. The changes to default behavior improve supportability of common use cases, including automatic / unmanaged scenarios. It is recognized that some less common deployment scenarios may require explicit configuration or custom changes to achieve desired operational parameters.</t>



    </abstract>



  </front>

  <middle>


<?line 53?>

<section anchor="introduction"><name>Introduction</name>

<t>Since its publication in 2012, <xref target="RFC6724"/> has become an important mechanism by which nodes can perform address selection, deriving the most appropriate source and destination address pair to use from a
candidate set by following the procedures defined in the RFC. Part of the process involves the use of a policy table, where the precedence and labels for address prefixes are listed, and for which a default table is defined.</t>

<t>It was always expected that the default policy table may need to be changed based on operational experience; section 2.1 says "It is important that implementations provide a way to change the default policies as more experience is gained" and points to the examples in Section 10, which include Section 10.6 where a ULA example is presented.</t>

<t>This document is written on the basis of such operational experience, in particular for scenarios where ULAs are used for their intended purpose as stated in <xref target="RFC4193"/>, i.e., they designed to be routed inside of a local site and by default not received from or advertised externally. It also includes updated requirements on support for RFC 6724 Rule 5.5. The goal of the document is to improve behavior for common scenarios, and to assist in the phasing out of use of IPv4, while noting that some specific scenarios may still require explicit configuration.</t>

<t>An IPv6 deployment, whether enterprise, residential or other, may use combinations of IPv6 GUAs, IPv6 ULAs, IPv4 globals, IPv4 RFC 1918 addressing, and may or may not use some form of NAT. However, this document makes no comment or recommendation on how ULAs are used, or on the use of NAT in an IPv6 network.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="operational-issues-regarding-preference-for-ipv4-addresses-over-ulas"><name>Operational Issues Regarding Preference for IPv4 addresses over ULAs</name>

<t>With multiaddressing being the norm for IPv6, moreso where nodes are dual-stack, the ability for a node to pick an appropriate address pair for communication is very important.</t>

<t>Where getaddrinfo() or a comparable API is used, the sorting behavior should take into account both
the source addresses of the requesting node as well as the destination addresses returned, and sort the candidate address pairs following the procedures defined in RFC 6724.</t>

<t>The current default policy table leads to preference for IPv6 GUAs over IPv4 globals, which is widely considered preferential behavior to support greater use of IPv6 in dual-stack environments. This helps allow sites to phase out IPv4 as its evidenced use becomes ever lower.</t>

<t>However, the same default policy table also puts IPv6 ULAs below all IPv4 addresses, including <xref target="RFC1918"/> addresses. For many site operators this behavior will be counter-intuitive, and may create difficulties with respect to planning, operational, and security implications for environments where ULA addressing is used in IPv4/IPv6 dual-stack network scenarios. The expected default prioritization of IPv6 traffic over IPv4 by default, as happens with IPv6 GUA addressing, does not happen for ULAs.</t>

<t>As a result, the use of ULAs is not a viable option for dual-stack networking transition planning, large scale network modeling, network lab environments or other modes of large scale networking that run both IPv4 and IPv6 concurrently with the expectation that IPv6 will be preferred by default.</t>

<t>This document updates the default policy table to elevate the preference for ULAs such that ULAs will be preferred over all IPv4 addresses, providing more consistent and less confusing behavior for operators, and to assist operators in phasing out IPv4 from dual-stack environments, since by this update IPv6 GUAs and ULAs will be preferred over any IPv4 addresses. This is an important enabler for sites seeking to move from dual-stack to IPv6-only networking.</t>

<t>This change aims to improve the default handling of address selection for common cases, and unmanaged / automatic scenarios rather than those where DHCPv6 is deployed. Sites using DHCPv6 for host configuration management can make use of implementations of <xref target="RFC7078"/> to apply changes to the <xref target="RFC6724"/> policy table.</t>

<t>The changes are discussed in more detail in the following sections, with a further section providing a summary of the proposed updates.</t>

</section>
<section anchor="preference-of-6to4-addresses"><name>Preference of 6to4 addresses</name>

<t>The anycast prefix for 6to4 relays was deprecated by <xref target="RFC7526"/> in 2015, and since that time the use of 6to4 addressing has further declined to the point where it is generally not seen and can be considered to all intents and purposes deprecated in use.</t>

<t>This document therefore demotes the precedence of the 6to4 prefix in the policy table to the same minimum preference as carried by the deprecated site local and 6bone address prefixes.</t>

</section>
<section anchor="adjustments-to-rfc-6724"><name>Adjustments to RFC 6724</name>

<t>This update makes two specific changes to RFC 6724: first to update the default policy table, and second to change Rule 5.5 on prefering addresses in a prefix advertised by the next-hop to a <bcp14>MUST</bcp14>.</t>

<section anchor="policy-table-update"><name>Policy Table Update</name>

<t>This update alters the default policy table listed in Rule 2.1 of RFC 6724.</t>

<t>The table below reflects the current RFC 6724 state on the left, and the updated state defined by this RFC on the right:</t>

<figure><artwork><![CDATA[
                    RFC 6724                                Updated                  
      Prefix        Precedence Label          Prefix        Precedence Label              
      ::1/128               50     0          ::1/128               50     0
      ::/0                  40     1          ::/0                  40     1
      ::ffff:0:0/96         35     4          ::ffff:0:0/96         20     4 (*)
      2002::/16             30     2          2002::/16              5     2 (*)
      2001::/32              5     5          2001::/32              5     5
      fc00::/7               3    13          fc00::/7              30    13 (*)
      ::/96                  1     3          ::/96                  1     3
      fec0::/10              1    11          fec0::/10              1     11
      3ffe::/16              1    12          3ffe::/16              1     12

 (*) value(s) changed in update

]]></artwork></figure>

<t>The update moves 2002::/16 to de-preference its status in line with <xref target="RFC7526"/> and moves the precedence of fc00::/7 above legacy IPv4, with ::ffff:0:0/96 now set to precedence 20.</t>

</section>
<section anchor="rule-55"><name>Rule 5.5</name>

<t>The heuristic for address selection defined in Rule 5.5 of Section 5 of RFC 6724 to prefer addresses in a prefix advertised by a next-hop router has proven to be very useful.</t>

<t>The text in RFC 6724 states that the Rules <bcp14>MUST</bcp14> be followed in order, but also includes a discussion note under Rule 5.5 that says that an IPv6 implementation is not required to remember which next-hops advertised which prefixes and thus that Rule 5.5 is only applicable to implementations that track this information.</t>

<t>This document elevates the requirement to prefer addresses in a prefix advertised by a next-hop router to a <bcp14>MUST</bcp14> for all nodes.</t>

</section>
<section anchor="automatic-insertion-of-prefixes-in-the-policy-table"><name>Automatic insertion of prefixes in the policy table</name>

<t>Section 2.1 of RFC 6724 states that "an implementation <bcp14>MAY</bcp14> automatically add additional site-specific rows to the default table based on its configured addresses, such as for Unique Local Addresses (ULAs)".</t>

<t>Given this document now elevates ULAs above all IPv4 addresses for address selection, should an implementation choose to insert specific ULA prefixes into the policy table, e.g., based on observed Router Advertisements (RAs) <xref target="RFC4861"/> and their Prefix Information Options (PIOs) or Route Information Options (RIOs) <xref target="RFC4191"/>, it <bcp14>SHOULD</bcp14> give such "known local" prefixes a precedence of 45, and <bcp14>SHOULD</bcp14> also reduce the precedence of other ULA addresses, i.e., the general fc07::/7 prefix, to precedence 10, such that IPv4 would be preferred to ULA prefixes that have not been explicitly added.</t>

</section>
</section>
<section anchor="configuration-of-the-default-policy-table"><name>Configuration of the default policy table</name>

<t>As stated in Section 2.1 of RFC 6724 "IPv6 implementations <bcp14>SHOULD</bcp14> support configurable address selection via a mechanism at least as powerful as the policy tables defined here".</t>

<t>While this document defines changes to RFC 6724 behavior based on operational experience to date, it is important that node policy tables can be changed once deployed to support future emerging use cases. This update thus re-states the importance of such configurability.</t>

</section>
<section anchor="intended-behaviors"><name>Intended behaviors</name>

<t>In this section we reiew the intended default behaviors after this update is applied.</t>

<section anchor="gua-gua-preferred-over-ipv4-ipv4"><name>GUA-GUA preferred over IPv4-IPv4</name>

<t>This is the current behaviour, and remains unaltered. The rationale is to promote use of IPv6 GUAs in dual-stack environments.</t>

</section>
<section anchor="gua-gua-preferred-over-ula-ula"><name>GUA-GUA preferred over ULA-ULA</name>

<t>This is the current behaviour, and remains unaltered. Both cases have matching labels, with GUAs having higher precedence.</t>

</section>
<section anchor="ula-ula-preferred-over-ipv4-ipv4"><name>ULA-ULA preferred over IPv4-IPv4</name>

<t>This is a change introduced by this update. RFC 6724 as originally defined would lead to IPv4 being preferred over ULAs, which is contrary to the spirit of the GUA preference over IPv4, and to the goal of removing evidenced use of IPv4 in a dual-stack site before transitioning to IPv6-only.</t>

</section>
<section anchor="ipv4-ipv4-preferred-over-ula-gua"><name>IPv4-IPv4 preferred over ULA-GUA</name>

<t>An IPv6 ULA address will only be preferred over an IPv4 address if both IPv6 ULA source and destination addresses are available. With Rule 5 of Section 6 of RFC 6724 and the ULA-specific label added in <xref target="RFC6724"/> (which was not present in <xref target="RFC3484"/>) an IPv4 source and destination will be preferred over an IPv6 ULA source and an IPv6 GUA destination address, even though generally IPv6 ULA addresses are preferred over IPv4 in the policy table as proposed in this update. The IPv4 matching label trumps ULA-GUA.</t>

</section>
</section>
<section anchor="discussion-of-ula-source-with-gua-or-remote-ula-destination"><name>Discussion of ULA source with GUA or remote ULA destination</name>

<t>In this section we present a discussion on the specific cases where a ULA source may be communicating with a GUA or ULA destination.</t>

<t>A potential problem exists when a ULA source attempts to communicate with GUA or remote ULA destinations. In these scenarios, the ULA source as stated earlier is by default intended for communication only with the local network, meaning an individual site, several sites that are part of the same organization, or multiple sites across cooperating organizations, as detailed in RFC 4193. As a result, most GUA and ULA destinations are not attached to the same local network as the ULA source and are, therefore, not reachable from the ULA source.</t>

<t>When only a ULA source is available for communication with GUA destinations, this generally implies no connectivity to the IPv6 Internet is available. Otherwise, a GUA source would have been made available and selected for use with GUA destinations. As a result, the ULA source will typically fail when it attempts to communicate with most GUA destinations. However, corner cases exist where the ULA source will not fail, such as when GUA destinations are attached to the same local network as the ULA source.</t>

<t>Receiving a DNS response for a ULA destination that is not attached to the local network, in other words, a remote ULA destination, is considered a misconfiguration in most cases, or at least this contradicts the operational guidelines provided in Section 4.4 of RFC 4193. Nevertheless, this can occur, and the ULA source will typically fail when it attempts to communicate with ULA destinations that are not attached to the same local network as the ULA source.</t>

<t>This section discusses several complementary mechanisms involved with these scenarios.</t>

<section anchor="the-ula-label-and-its-precedence"><name>The ULA Label and its Precedence</name>

<t>RFC 6724 added (in obsoleting RFC 3484) a separate label for ULA (fc00::/7), whose default precedence is raised by this update. This separate label interacts with Rule 5 of Section 6 of RFC 6724, which says;</t>

<figure><artwork><![CDATA[
  Rule 5: Prefer matching label.
  If Label(Source(DA)) = Label(DA) and Label(Source(DB)) <> Label(DB), then prefer DA.  Similarly, if       Label(Source(DA)) <> Label(DA) and Label(Source(DB)) = Label(DB), then prefer DB.
]]></artwork></figure>

<t>The ULA source label will not match the GUA destination label in the first scenario. Therefore, an IPv4 destination, if available, will be preferred over a GUA destination with a ULA source, even though the GUA destination has higher precedence than the IPv4 destination in the policy table. This means the IPv4 destination will be moved up in the list of destinations over the GUA destination with the ULA source.</t>

<t>If the ULA (fc00::/7) label is removed from the policy table, a GUA destination with a ULA source will be preferred over an IPv4 destination, as GUA and ULA will be part of the same label (::/0).</t>

<t>The ULA source label will match the ULA destination label in the second scenario; therefore, whether part of the local network or not, a ULA destination will be preferred over an IPv4 destination.</t>

<t>If the ULA label (fc00::/7) has its precedence lowered below IPv4 or the IPv4 precedence is raised above ULA, an IPv4 destination will be preferred over all ULA destinations.</t>

</section>
<section anchor="happy-eyeballs"><name>Happy Eyeballs</name>

<t>Regardless of the preference resulting from the above discussion, Happy Eyeballs version 1 <xref target="RFC6555"/> or version 2 <xref target="RFC8305"/>, if implemented, will try both the GUA or ULA destination with the ULA source and the IPv4 destination and source pairings. The ULA source will typically fail to communicate with most GUA or remote ULA destinations, and IPv4 will be preferred if IPv4 connectivity is available unless the GUA or ULA destinations are attached to the same local network as the ULA source.</t>

</section>
<section anchor="try-the-next-address"><name>Try the Next Address</name>

<t>As stated in Section 2 of RFC 6724,</t>

<figure><artwork><![CDATA[
  Well-behaved applications SHOULD NOT simply use the first address returned from an API such as
  getaddrinfo() and then give up if it fails. For many applications, it is appropriate to iterate 
  through the list of addresses returned from getaddrinfo() until a working address is found. For
  other applications, it might be appropriate to try multiple addresses in parallel (e.g., with some
  small delay in between) and use the first one to succeed.
]]></artwork></figure>

<t>Therefore, when an IPv4 destination is preferred over GUA or ULA destinations, IPv4 will likely succeed if IPv4 connectivity is available, and the GUA or ULA destination may only be tried if Happy Eyeballs is implemented.</t>

<t>On the other hand, if the GUA or ULA destination with the ULA source is preferred, the ULA source will typically fail to communicate GUA or ULA destinations that are not connected to the same local network as the ULA source. However, if the operational guidelines in Section 4.3 of RFC 4193 are followed, recognizing this failure can be accelerated, and transport layer timeouts (e.g., TCP) can be avoided. The guidelines will cause a Destination Unreachable ICMPv6 Error to be received by the source device, signaling the next address in the list to be tried, as discussed above.</t>

</section>
</section>
<section anchor="following-ula-operational-guidelines-in-rfc-4193"><name>Following ULA operational guidelines in RFC 4193</name>

<t>This section re-emphasises two important operational requirements stated in <xref target="RFC4193"/> that should be followed by operators.</t>

<section anchor="filtering-ula-source-addresses-at-site-borders"><name>Filtering ULA-source addresses at site borders</name>

<t>Section 4.3 states "Site border routers and firewalls should be configured to not forward
any packets with Local IPv6 source or destination addresses outside of the site, unless they have been explicitly configured with routing information about specific /48 or longer Local IPv6 prefixes".</t>

<t>And further that "Site border routers should respond with the appropriate ICMPv6 Destination Unreachable message to inform the source that the packet was not forwarded".</t>

<t>As stated in the above discussion, such ICMPv6 messages can assist in fast failover for TCP connections.</t>

</section>
<section anchor="avoid-using-ula-addresses-in-the-global-dns"><name>Avoid using ULA addresses in the global DNS</name>

<t>Section 4.3 of RFC 4193 states that "AAAA and PTR records for locally assigned local IPv6 addresses are not recommended to be installed in the global DNS."</t>

<t>This is particularly important given this document elevates the priority for ULAs above IPv4.</t>

</section>
</section>
<section anchor="the-practicalities-of-implementing-address-selection-support"><name>The practicalities of implementing address selection support</name>

<t>As with most adjustments to standards, and using the introduction of RFC 6724 as a measuring stick, the updates defined in this document will likely take several years to become common enough for consistent behavior within most operating systems. At the time of writing, it has been over 10 years since RFC 6724 has been published but we continue to see existing commercial and open source operating systems exhibiting RFC 3484 behavior.</t>

<t>While it should be noted that RFC 6724 defines a solution to adjust the address preference selection table that is functional theoretically, operationally the solution is operating system dependent and in practice policy table changes cannot be signaled by any currently deployed network mechanism. While RFC 7078 defines such a DHCPv6 option, it is not widely implemented. This lack of an intra-protocol or network-based ability to adjust address selection preference, along with the inability to adjust a notable number of operating systems either programmatically or manually, renders operational scalability of such a mechanism challenging.</t>

<t>It is especially important to note this behavior in the long lifecycle equipment that exists in industrial control and operational technology environments due to their very long mean time to replacement/lifecycle.</t>

</section>
<section anchor="limitations-of-rfc-6724"><name>Limitations of RFC 6724</name>

<t>The procedures defined in RFC 6724 do not give optimal results for all scenarios. As stated in the introduction, the aim of this update is to improve the behavior for the most common scenarios.</t>

<t>It is widely recognised in the IETF 6man WG that the whole 3484/6724/getaddrinfo() model is fundamentally inadequate for optimal address selection.  A model that considers address pairs directly, rather than sorting on destination addresses with the best source for that address, would be preferable, but beyond the scope of this document.</t>

<t>To simplify address selection, operators may instead look to deploy IPv6-only, and may choose to only use GUA addresses and no ULA addresses. Other approaches to reduce the use of IPv4, e.g., through use of DHCPv4 Option 108 as defined in <xref target="RFC8925"/>, also helps simplify address selection for nodes.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to acknowledge the valuable input and contributions of the 6man WG including (in alphabetic order) Erik Auerswald, Dale Carder, Brian Carpenter, Tom Coffeen, Lorenzo Colitti, Chris Cummings, David Farmer (in particular for the ULA to GUA/ULA discussion text), Bob Hinden, Scott Hogg, Ed Horley, Ted Lemon, Jen Linkova, Michael Richardson, Kyle Rose, Mark Smith, Ole Troan, Eduard Vasilenko, Eric Vyncke, Paul Wefel, Timothy Winters, and XiPeng Xiao.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>There are no direct security considerations in this document.</t>

<t>The mixed preference for IPv6 over IPv4 from the default policy table in RFC 6724 represents a potential security issue, given an operator may expect ULAs to be used when in practice RFC 1918 addresses are used instead.</t>

<t>The requirements of RFC4193, stated earlier in this document, should be followed for optimal behavior.</t>

<t>Operators should be mindful of cases where communicating nodes have differing behaviours for address selection, e.g., RFC3484 behavior, RFC6724, the updated RFC6724 behavior defined here, some other non-IETF-standardized behavior, or even no mechanism. There may thus be inconsistent behaviour for communications initiated in each direction. Ultimately all nodes should be made compliant to the updated specification described in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None.</t>

</section>
<section anchor="appendix-a-changes-and-additional-text-since-rfc-6724"><name>Appendix A. Changes and additional text since RFC 6724</name>

<t><list style="symbols">
  <t>Changed default policy table to move fc00::/7 to precedence 30, above legacy IPv4.</t>
  <t>Changed default policy table to move 6to4 address block 2002::/16 to the same as 6bone and deprecated site-local.</t>
  <t>Changed ::ffff:0:0/96 to precedence 20.</t>
  <t>Changed Rule 5.5 to a <bcp14>MUST</bcp14> support.</t>
  <t>Added note on precedence for general ULAs where specific ULAs are inserted in the policy table.</t>
  <t>Added text clarifying intended behaviors.</t>
  <t>Added text discussing ULA to GUA/ULA case.</t>
  <t>Added text for the security section.</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC2119;
&RFC4193;
&RFC7078;
&RFC7526;
&RFC8925;
&RFC8174;


    </references>

    <references title='Informative References'>

&RFC6724;
&RFC1918;
&RFC3484;
&RFC6555;
&RFC8305;
&RFC4861;
&RFC4191;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

