<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4191 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4191.xml">
<!ENTITY RFC4193 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4193.xml">
<!ENTITY RFC7078 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7078.xml">
<!ENTITY RFC7526 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7526.xml">
<!ENTITY RFC8925 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8925.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC6724 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6724.xml">
<!ENTITY RFC1918 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1918.xml">
<!ENTITY RFC3484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3484.xml">
<!ENTITY RFC6555 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6555.xml">
<!ENTITY RFC8305 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8305.xml">
<!ENTITY RFC3587 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3587.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-6man-rfc6724-update-08" category="std" consensus="true" submissionType="IETF" updates="6724">
  <front>
    <title abbrev="Update on ULAs in RFC 6724">Preference for IPv6 ULAs over IPv4 addresses in RFC6724</title>

    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <email>Tim.Chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Duncan" fullname="Jeremy Duncan">
      <organization>Tachyon Dynamics</organization>
      <address>
        <email>jduncan@tachyondynamics.com</email>
      </address>
    </author>

    <date year="2024" month="April" day="08"/>

    <area>Int</area>
    <workgroup>6MAN</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 49?>

<t>When RFC 6724 was published it defined an address selection algorithm along with a default policy table, and noted a number of examples where that policy table might benefit from adjustment for specific scenarios. It also noted that it is important for implementations to provide a way to change the default policies as more experience is gained. This update draws on several years of operational experience to refine RFC 6724 further, with particular emphasis on preference for the use of ULA addresses over IPv4 addresses and the addition of mandatory support for Rule 5.5. The update also demotes the preference for 6to4 addresses. The changes to default behavior improve supportability of common use cases, including automatic / unmanaged scenarios. It is recognized that some less common deployment scenarios may require explicit configuration or custom changes to achieve desired operational parameters.</t>



    </abstract>



  </front>

  <middle>


<?line 53?>

<section anchor="introduction"><name>Introduction</name>

<t>Since its publication in 2012, <xref target="RFC6724"/> has become an important mechanism by which nodes can perform address selection, deriving the most appropriate source and destination address pair to use from a
candidate set by following the procedures defined in the RFC. Part of the process involves the use of a policy table, where the precedence and labels for address prefixes are listed, and for which a default table is defined.</t>

<t>It was always expected that the default policy table may need to be changed based on operational experience; section 2.1 says "It is important that implementations provide a way to change the default policies as more experience is gained" and points to the examples in Section 10, which include Section 10.6 where a ULA example is presented.</t>

<t>This document is written on the basis of such operational experience, in particular for scenarios where ULAs are used for their intended purpose as stated in <xref target="RFC4193"/>, i.e., they are designed to be routed inside of a local site and by default not received from or advertised externally. The document defines how preference for ULAs may be elevated for appropriate, common scenarios.</t>

<t>It also includes updated requirements on support for RFC 6724 Rule 5.5. The goal of the document is to improve behavior for common scenarios, and to assist in the phasing out of use of IPv4, while noting that some specific scenarios may still require explicit configuration.</t>

<t>An IPv6 deployment, whether enterprise, residential or other, may use combinations of IPv6 GUAs, IPv6 ULAs, IPv4 globals, IPv4 RFC 1918 addressing, and may or may not use some form of NAT. However, this document makes no comment or recommendation on how ULAs are used, or on the use of NAT in an IPv6 network.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>GUA: Global Unicast Addressing as defined in <xref target="RFC3587"></xref></t>

<t>ULA: Unique Local Addressing as defined in <xref target="RFC4193"></xref></t>

<t>Known-local ULA: A ULA prefix that is determined to be local to a given node</t>

</section>
<section anchor="operational-issues-regarding-preference-for-ipv4-addresses-over-ulas"><name>Operational Issues Regarding Preference for IPv4 addresses over ULAs</name>

<t>With multiaddressing being the norm for IPv6, moreso where nodes are dual-stack, the ability for a node to pick an appropriate address pair for communication is very important.</t>

<t>Where getaddrinfo() or a comparable API is used, the sorting behavior should take into account both
the source addresses of the requesting node as well as the destination addresses returned, and sort the candidate address pairs following the procedures defined in RFC 6724.</t>

<t>The current default policy table leads to preference for IPv6 GUAs over IPv4 globals, which is widely considered preferential behavior to support greater use of IPv6 in dual-stack environments. This helps allow sites to phase out IPv4 as its evidenced use becomes ever lower.</t>

<t>However, the same default policy table also puts IPv6 ULAs below all IPv4 addresses, including <xref target="RFC1918"/> addresses. For many site operators this behavior will be counter-intuitive, given the IPv6 GUA preference, and may create difficulties with respect to planning, operational, and security implications for environments where ULA addressing is used in IPv4/IPv6 dual-stack network scenarios. The expected default prioritization of IPv6 traffic over IPv4 by default, as happens with IPv6 GUA addressing, does not happen for ULAs.</t>

<t>As a result, the use of ULAs is not a viable option for dual-stack networking transition planning, large scale network modeling, network lab environments or other modes of large scale networking that run both IPv4 and IPv6 concurrently with the expectation that IPv6 will be preferred by default.</t>

<t>This document describes two methods by which a node can implement elevated or differential preference for ULAs.</t>

<t>The general method is by updating the default policy table to elevate the preference for ULAs such that ULAs will be preferred over all IPv4 addresses, providing more consistent and less confusing behavior for operators, and to assist operators in phasing out IPv4 from dual-stack environments, since by this update IPv6 GUAs and ULAs will be preferred over any IPv4 addresses. This is an important enabler for sites seeking to move from dual-stack to IPv6-only networking.</t>

<t>RFC 6724 defined a method by which nodes may provide more fine-grained support for elevating the preference for specific ULA prefixes that are known to be local, while leaving other general ULA prefixes at their existing precedence. This document upgrades the requirement in RFC 6724 for nodes to insert a higher precedence entry in the policy table for observed ULA prefixes that are known to be local, referred to in this document as "known-local" ULAs, from a <bcp14>MAY</bcp14> to a <bcp14>SHOULD</bcp14>. Nodes implementing this behaviour would see ULA prefixes known to be local to the node's site having precedence over both IPv6 GUA and IPv4 addresses, while other general ULAs would not.</t>

<t>AUTHORS' NOTE: The authors have had feedback suggesting this requirement should be a <bcp14>MUST</bcp14>, which would mean that known-local ULAs would take precedence on compliant implementations over all IPv6 GUAs and all IPv4 addresses, but other general ULAs would not.  We would very much like further feedback on this potential change to the document, or from those who may have implementations of such an approach.</t>

<t>This change aims to improve the default handling of address selection for common cases, and unmanaged / automatic scenarios rather than those where DHCPv6 is deployed. Sites using DHCPv6 for host configuration management can make use of implementations of <xref target="RFC7078"/> to apply changes to the <xref target="RFC6724"/> policy table.</t>

<t>The changes are discussed in more detail in the following sections, with a further section providing a summary of the proposed updates.</t>

</section>
<section anchor="preference-of-6to4-addresses"><name>Preference of 6to4 addresses</name>

<t>The anycast prefix for 6to4 relays was formally deprecated by <xref target="RFC7526"/> in 2015, and since that time the use of 6to4 addressing has further declined, with very little evidence of its use on the public internet. Note that RFC 7526 does not deprecate the 6to4 IPv6 prefix 2002::/16, it only deprecates the 6to4 Relay IPv4 prefix.</t>

<t>This document therefore demotes the precedence of the 6to4 prefix in the policy table to the same precedence as carried by the Teredo prefix. Leaving this entry in the default table will cause no problems and will help if any deployments still exist, and ensure 6to4 prefixes are differentiated from general GUAs.</t>

<t>The discussion regarding the adding of 6to4 site prefixes in section 10.7 of RFC6724 remains valid.</t>

</section>
<section anchor="adjustments-to-rfc-6724"><name>Adjustments to RFC 6724</name>

<t>This update makes three specific changes to RFC 6724: first to update the default policy table, second to change Rule 5.5 on prefering addresses in a prefix advertised by the next-hop to a <bcp14>MUST</bcp14>, and third to upgrade the requirement to automatically insert known-local ULAs into a node's policy table from a <bcp14>MAY</bcp14> to a <bcp14>SHOULD</bcp14>.</t>

<section anchor="policy-table-update"><name>Policy Table Update</name>

<t>This update alters the default policy table listed in Rule 2.1 of RFC 6724.</t>

<t>The table below reflects the current RFC 6724 state on the left, and the updated state defined by this RFC on the right:</t>

<figure><artwork><![CDATA[
                    RFC 6724                              Updated                  
Prefix        Precedence Label        Prefix        Precedence Label              
::1/128               50     0        ::1/128               50     0
::/0                  40     1        ::/0                  40     1
::ffff:0:0/96         35     4        ::ffff:0:0/96         20     4 (*)
2002::/16             30     2        2002::/16              5     2 (*)
2001::/32              5     5        2001::/32              5     5
fc00::/7               3    13        fc00::/7              30    13 (*)
::/96                  1     3        ::/96                  1     3
fec0::/10              1    11        fec0::/10              1     11
3ffe::/16              1    12        3ffe::/16              1     12

(*) value(s) changed in update

]]></artwork></figure>

<t>The update moves 2002::/16 to de-preference its status in line with <xref target="RFC7526"/> and moves the precedence of fc00::/7 above legacy IPv4, with ::ffff:0:0/96 now set to precedence 20.</t>

</section>
<section anchor="rule-55"><name>Rule 5.5</name>

<t>The heuristic for address selection defined in Rule 5.5 of Section 5 of RFC 6724 to prefer addresses in a prefix advertised by a next-hop router has proven to be very useful.</t>

<t>The text in RFC 6724 states that the Rules <bcp14>MUST</bcp14> be followed in order, but also includes a discussion note under Rule 5.5 that says that an IPv6 implementation is not required to remember which next-hops advertised which prefixes and thus that Rule 5.5 is only applicable to implementations that track this information.</t>

<t>This document elevates the requirement to prefer addresses in a prefix advertised by a next-hop router to a <bcp14>MUST</bcp14> for all nodes.</t>

</section>
<section anchor="automatic-insertion-of-prefixes-in-the-policy-table"><name>Automatic insertion of prefixes in the policy table</name>

<t>Section 2.1 of RFC 6724 states that "an implementation <bcp14>MAY</bcp14> automatically add additional site-specific rows to the default table based on its configured addresses, such as for Unique Local Addresses (ULAs)".</t>

<t>It is advantageous when preferring ULAs over IPv4 addresses to have the highest confidence that the ULA is local to the node, and reachable through ULA addressing, to avoid connection failures or time-outs. If a node can determine which ULA prefix(es) are known to be local, it can provide differential treatment for those over general ULAs, and add these to the policy table at a higher precedence while keeping all general ULA prefixes to a lower precedence.</t>

<t>This document thus elevates the <bcp14>MAY</bcp14> requirement above to a <bcp14>SHOULD</bcp14> for known-local ULAs.</t>

<t>Therefore where a node learns of a ULA prefix known to be local it <bcp14>SHOULD</bcp14> give such known-local prefixes a precedence of 45, and <bcp14>SHOULD</bcp14> also reduce the precedence of other ULA addresses, i.e., the general fc00::/7 prefix, to precedence 10, such that IPv4 would be preferred to ULA prefixes that have not been explicitly added.</t>

<t>Such known-local ULA prefixes include /48 prefixes containing a ULA address assigned to any interface via manual configuration, DHCPv6 NA_IA, or SLAAC or learned from a PIO received on any interface, regardless of how the PIO flags are set. Additionally, type C hosts, as defined in <xref target="RFC4191"/> section 3, include any ULA prefixes learned from RIOs as known-local ULAs.</t>

<t>Any such inserted "known local" ULA entries should also have a different, but common, label, rather than the default ULA label, 13. This document defines a label of 14 for such inserted known-local ULA prefixes.</t>

<t>A node <bcp14>MUST</bcp14> remove inserted entries from its policy table when announced prefixes are deprecated.</t>

<t>Where support is added for the insertion of known-local ULA prefixes, it <bcp14>MUST</bcp14> default to on, but a mechanism <bcp14>SHOULD</bcp14> be supported to administratively toggle the behaviour off and on.</t>

<t>EDITORS' NOTE: as stated above, we seek feedback on whether this <bcp14>SHOULD</bcp14> should be elevated to a <bcp14>MUST</bcp14>.</t>

</section>
</section>
<section anchor="configuration-of-the-default-policy-table"><name>Configuration of the default policy table</name>

<t>As stated in Section 2.1 of RFC 6724 "IPv6 implementations <bcp14>SHOULD</bcp14> support configurable address selection via a mechanism at least as powerful as the policy tables defined here".</t>

<t>Based on operational experience to date, it is important that node policy tables can be changed once deployed to support future emerging use cases. This update thus re-states the importance of such configurability.</t>

</section>
<section anchor="intended-behaviors"><name>Intended behaviors</name>

<t>In this section we review the intended default behaviors after this update is applied.</t>

<section anchor="gua-gua-preferred-over-ipv4-ipv4"><name>GUA-GUA preferred over IPv4-IPv4</name>

<t>This is the current behaviour, and remains unaltered. The rationale is to promote use of IPv6 GUAs in dual-stack environments.</t>

</section>
<section anchor="gua-gua-preferred-over-ula-ula"><name>GUA-GUA preferred over ULA-ULA</name>

<t>This is the current behaviour, and remains unaltered. Both cases have matching labels, with GUAs having higher precedence.</t>

<t>However, where a node inserts a known-local ULA into its policy table with a precedence of 45, such ULA-ULA traffic will take priority over GUA-GUA, because both pairs will have matching labels but here the inserted ULA will have higher precedence.</t>

</section>
<section anchor="ula-ula-preferred-over-ipv4-ipv4"><name>ULA-ULA preferred over IPv4-IPv4</name>

<t>This is a change introduced by this update. RFC 6724 as originally defined would lead to IPv4 being preferred over ULAs, which is contrary to the spirit of the GUA preference over IPv4, and to the goal of removing evidenced use of IPv4 in a dual-stack site before transitioning to IPv6-only.</t>

<t>Where a node supports insertion of known-local ULAs, only those ULAs will be preferred to IPv4 addresses, since general ULAs under fc00::/7 will only carry precedence 10 where IPv4 carries precedence 20.</t>

</section>
<section anchor="ipv4-ipv4-preferred-over-ula-gua"><name>IPv4-IPv4 preferred over ULA-GUA</name>

<t>An IPv6 ULA address will only be preferred over an IPv4 address if both IPv6 ULA source and destination addresses are available. With Rule 5 of Section 6 of RFC 6724 and the ULA-specific label added in <xref target="RFC6724"/> (which was not present in <xref target="RFC3484"/>) an IPv4 source and destination will be preferred over an IPv6 ULA source and an IPv6 GUA destination address, even though generally IPv6 ULA addresses are preferred over IPv4 in the policy table as proposed in this update. The IPv4 matching label trumps ULA-GUA.</t>

</section>
</section>
<section anchor="discussion-of-ula-source-with-gua-or-remote-ula-destination"><name>Discussion of ULA source with GUA or remote ULA destination</name>

<t>In this section we present a discussion on the specific cases where a ULA source may be communicating with a GUA or ULA destination.</t>

<t>A potential problem exists when a ULA source attempts to communicate with GUA or remote ULA destinations. In these scenarios, the ULA source as stated earlier is by default intended for communication only with the local network, meaning an individual site, several sites that are part of the same organization, or multiple sites across cooperating organizations, as detailed in <xref target="RFC4193"></xref>. As a result, most GUA and ULA destinations are not attached to the same local network as the ULA source and are, therefore, not reachable from the ULA source.</t>

<t>When only a ULA source is available for communication with GUA destinations, this generally implies no connectivity to the IPv6 Internet is available. Otherwise, a GUA source would have been made available and selected for use with GUA destinations. As a result, the ULA source will typically fail when it attempts to communicate with most GUA destinations. However, corner cases exist where the ULA source will not fail, such as when GUA destinations are attached to the same local network as the ULA source.</t>

<t>Receiving a DNS response for a ULA destination that is not attached to the local network, in other words, a remote ULA destination, is considered a misconfiguration in most cases, or at least this contradicts the operational guidelines provided in Section 4.4 of <xref target="RFC4193"></xref>. Nevertheless, this can occur, and the ULA source will typically fail when it attempts to communicate with ULA destinations that are not attached to the same local network as the ULA source. This case provides a rationale for implementing support for known-local ULA prefix insertion in the policy table, such that differential behaviour can be applied for known-local versus general ULA prefixes.</t>

<t>The remainder of this section discusses several complementary mechanisms involved with these scenarios.</t>

<section anchor="the-ula-label-and-its-precedence"><name>The ULA Label and its Precedence</name>

<t>RFC 6724 added (in obsoleting RFC 3484) a separate label for ULA (fc00::/7), whose default precedence is raised by this update. This separate label interacts with Rule 5 of Section 6 of RFC 6724, which says:</t>

<figure><artwork><![CDATA[
Rule 5: Prefer matching label.

If Label(Source(DA)) = Label(DA) and Label(Source(DB)) <> Label(DB), 
then prefer DA.

Similarly, if Label(Source(DA)) <> Label(DA) and Label(Source(DB)) = 
Label(DB), then prefer DB.
]]></artwork></figure>

<t>The ULA source label will not match the GUA destination label in the first scenario. Therefore, an IPv4 destination, if available, will be preferred over a GUA destination with a ULA source, even though the GUA destination has higher precedence than the IPv4 destination in the policy table. This means the IPv4 destination will be moved up in the list of destinations over the GUA destination with the ULA source.</t>

<t>If the ULA (fc00::/7) label is removed from the policy table, a GUA destination with a ULA source will be preferred over an IPv4 destination, as GUA and ULA will be part of the same label (::/0).</t>

<t>The ULA source label will match the ULA destination label in the second scenario; therefore, whether part of the local network or not, a ULA destination will be preferred over an IPv4 destination.</t>

<t>Where known-local ULA prefix insertion is supported, the known-local ULA will have a higher precedence (45) than either IPv6 GUAs (40) or IPv4 (20), while general ULAs will have the lowest precedence (10).</t>

<t>If the ULA label (fc00::/7) has its precedence lowered below IPv4 or the IPv4 precedence is raised above ULA, an IPv4 destination will be preferred over all ULA destinations.</t>

</section>
<section anchor="happy-eyeballs"><name>Happy Eyeballs</name>

<t>Regardless of the preference resulting from the above discussion, Happy Eyeballs version 1 <xref target="RFC6555"/> or version 2 <xref target="RFC8305"/>, if implemented, will try both the GUA or ULA destination with the ULA source and the IPv4 destination and source pairings. The ULA source will typically fail to communicate with most GUA or remote ULA destinations, and IPv4 will be preferred if IPv4 connectivity is available unless the GUA or ULA destinations are attached to the same local network as the ULA source.</t>

</section>
<section anchor="try-the-next-address"><name>Try the Next Address</name>

<t>As stated in Section 2 of RFC 6724:</t>

<t>"Well-behaved applications <bcp14>SHOULD NOT</bcp14> simply use the first address returned from an API such as getaddrinfo() and then give up if it fails. For many applications, it is appropriate to iterate through the list of addresses returned from getaddrinfo() until a working address is found. For other applications, it might be appropriate to try multiple addresses in parallel (e.g., with some small delay in between) and use the first one to succeed."</t>

<t>Therefore, when an IPv4 destination is preferred over GUA or ULA destinations, IPv4 will likely succeed if IPv4 connectivity is available, and the GUA or ULA destination may only be tried if Happy Eyeballs is implemented.</t>

<t>On the other hand, if the GUA or ULA destination with the ULA source is preferred, the ULA source will typically fail to communicate with GUA or ULA destinations that are not connected to the same local network as the ULA source. However, if the operational guidelines in Section 4.3 of RFC 4193  are followed, recognizing this failure can be accelerated, and transport layer timeouts (e.g., TCP) can be avoided. The guidelines will cause a Destination Unreachable ICMPv6 Error to be received by the source device, signaling the next address in the list to be tried, as discussed above.</t>

</section>
</section>
<section anchor="following-ula-operational-guidelines-in-rfc-4193"><name>Following ULA operational guidelines in RFC 4193</name>

<t>This section re-emphasises two important operational requirements stated in <xref target="RFC4193"/> that should be followed by operators.</t>

<section anchor="filtering-ula-source-addresses-at-site-borders"><name>Filtering ULA-source addresses at site borders</name>

<t>Section 4.3 states "Site border routers and firewalls should be configured to not forward
any packets with Local IPv6 source or destination addresses outside of the site, unless they have been explicitly configured with routing information about specific /48 or longer Local IPv6 prefixes".</t>

<t>And further that "Site border routers should respond with the appropriate ICMPv6 Destination Unreachable message to inform the source that the packet was not forwarded".</t>

<t>As stated in the above discussion, such ICMPv6 messages can assist in fast failover for TCP connections.</t>

</section>
<section anchor="avoid-using-ula-addresses-in-the-global-dns"><name>Avoid using ULA addresses in the global DNS</name>

<t>Section 4.3 of RFC 4193 states that "AAAA and PTR records for locally assigned local IPv6 addresses are not recommended to be installed in the global DNS."</t>

<t>This is particularly important given the general method presented in this document elevates the priority for ULAs above IPv4. However, where support for insertion of known-local prefixes is implemented, such "rogue" ULAs in the global DNS are no longer a concern for address selection as they would have the lowest precedence.</t>

</section>
</section>
<section anchor="the-practicalities-of-implementing-address-selection-support"><name>The practicalities of implementing address selection support</name>

<t>As with most adjustments to standards, and using the introduction of RFC 6724 as a measuring stick, the updates defined in this document will likely take several years to become common enough for consistent behavior within most operating systems. At the time of writing, it has been over 10 years since RFC 6724 has been published but we continue to see existing commercial and open source operating systems exhibiting RFC 3484 behavior.</t>

<t>While it should be noted that RFC 6724 defines a solution to adjust the address preference selection table that is functional theoretically, operationally the solution is operating system dependent and in practice policy table changes cannot be signaled by any currently deployed network mechanism. While RFC 7078 defines such a DHCPv6 option, it is not widely implemented. This lack of an intra-protocol or network-based ability to adjust address selection preference, along with the inability to adjust a notable number of operating systems either programmatically or manually, renders operational scalability of such a mechanism challenging.</t>

<t>It is especially important to note this behavior in the long lifecycle equipment that exists in industrial control and operational technology environments due to their very long mean time to replacement/lifecycle.</t>

</section>
<section anchor="limitations-of-rfc-6724"><name>Limitations of RFC 6724</name>

<t>The procedures defined in RFC 6724 do not give optimal results for all scenarios. As stated in the introduction, the aim of this update is to improve the behavior for the most common scenarios.</t>

<t>It is widely recognised in the IETF 6man WG that the whole 3484/6724/getaddrinfo() model is fundamentally inadequate for optimal address selection.  A model that considers address pairs directly, rather than sorting on destination addresses with the best source for that address, would be preferable, but beyond the scope of this document.</t>

<t>To simplify address selection, operators may instead look to deploy IPv6-only, and may choose to only use GUA addresses and no ULA addresses. Other approaches to reduce the use of IPv4, e.g., through use of DHCPv4 Option 108 as defined in <xref target="RFC8925"/>, also helps simplify address selection for nodes.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to acknowledge the valuable input and contributions of the 6man WG including (in alphabetic order) Erik Auerswald, Dale Carder, Brian Carpenter, Tom Coffeen, Lorenzo Colitti, Chris Cummings, David Farmer (in particular for the ULA to GUA/ULA discussion text), Bob Hinden, Scott Hogg, Ed Horley, Ted Lemon, Jen Linkova, Michael Richardson, Kyle Rose, Ole Troan, Eduard Vasilenko, Eric Vyncke, Paul Wefel, Timothy Winters, and XiPeng Xiao.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>There are no direct security considerations in this document.</t>

<t>The mixed preference for IPv6 over IPv4 from the default policy table in RFC 6724 represents a potential security issue, given an operator may expect ULAs to be used when in practice RFC 1918 addresses are used instead.</t>

<t>The requirements of RFC 4193, stated earlier in this document, should be followed for optimal behavior.</t>

<t>Operators should be mindful of cases where communicating nodes have differing behaviours for address selection, e.g., RFC3484 behavior, RFC6724, the updated RFC6724 behavior defined here, some other non-IETF-standardized behavior, or even no mechanism. There may thus be inconsistent behaviour for communications initiated in each direction. Ultimately all nodes should be made compliant to the updated specification described in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None.</t>

</section>
<section anchor="summary-of-changes-and-additional-text-since-rfc-6724"><name>Summary of changes and additional text since RFC 6724</name>

<t><list style="symbols">
  <t>Changed default policy table to move fc00::/7 to precedence 30, above legacy IPv4.</t>
  <t>Changed default policy table to move the 6to4 address block 2002::/16 to the same precedence as the Teredo prefix.</t>
  <t>Changed ::ffff:0:0/96 to precedence 20.</t>
  <t>Changed Rule 5.5 to a <bcp14>MUST</bcp14> support.</t>
  <t>Added note on precedence for general ULAs where specific ULAs are inserted in the policy table.</t>
  <t>Added text clarifying intended behaviors.</t>
  <t>Added text discussing ULA to GUA/ULA case.</t>
  <t>Added text for the security section.</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC4191;
&RFC4193;
&RFC7078;
&RFC7526;
&RFC8925;
&RFC8174;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC6724;
&RFC1918;
&RFC3484;
&RFC6555;
&RFC8305;
&RFC3587;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

