<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.33 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4191 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4191.xml">
<!ENTITY RFC4193 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4193.xml">
<!ENTITY RFC7526 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7526.xml">
<!ENTITY RFC8925 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8925.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC6724 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6724.xml">
<!ENTITY RFC1918 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1918.xml">
<!ENTITY RFC3484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3484.xml">
<!ENTITY RFC6555 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6555.xml">
<!ENTITY RFC8305 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8305.xml">
<!ENTITY RFC3587 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3587.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-6man-rfc6724-update-09" category="std" consensus="true" submissionType="IETF" updates="6724">
  <front>
    <title abbrev="Prioritizing known-local ULAs in RFC 6724">Prioritizing known-local IPv6 ULAs through address selection policy</title>

    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <email>Tim.Chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Duncan" fullname="Jeremy Duncan">
      <organization>Tachyon Dynamics</organization>
      <address>
        <email>jduncan@tachyondynamics.com</email>
      </address>
    </author>

    <date year="2024" month="June" day="28"/>

    <area>Int</area>
    <workgroup>6MAN</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 48?>

<t>When RFC 6724 was published it defined an address selection algorithm along with a default policy table, and noted a number of examples where that policy table might benefit from adjustment for specific scenarios. It also noted that it is important for implementations to provide a way to change the default policies as more experience is gained. This update draws on several years of such operational experience to refine RFC 6724, with emphasis on preference for the use of ULA addresses over IPv4 addresses and the addition of mandatory support for Rule 5.5. It also defines the concept of "known-local" ULA prefixes and the means by which nodes can identify them and insert them into their policy table such that local ULA-to-ULA communications become preferred over GUA-to-GUA for local use. The update also demotes the preference for 6to4 addresses. These changes to default behavior improve supportability of common use cases, including automatic / unmanaged scenarios. It is recognized that some less common deployment scenarios may require explicit configuration or custom changes to achieve desired operational parameters.</t>



    </abstract>



  </front>

  <middle>


<?line 52?>

<section anchor="introduction"><name>Introduction</name>

<t>Since its publication in 2012, <xref target="RFC6724"/> has become an important mechanism by which nodes can perform address selection, deriving the most appropriate source and destination address pair to use from a
candidate set by following the procedures defined in the RFC. Part of the process involves the use of a policy table, where the precedence and labels for address prefixes are listed, and for which a default policy table is defined.</t>

<t>It was always expected that the default policy table may need to be changed based on operational experience; section 2.1 says "It is important that implementations provide a way to change the default policies as more experience is gained" and points to the examples in Section 10, which include Section 10.6 where a ULA example is presented.</t>

<t>This document is written on the basis of such operational experience, in particular for scenarios where ULAs are used for their intended purpose as stated in <xref target="RFC4193"/>, i.e., they are designed to be routed within a local site and by default not advertised, used or received from externally to that site. The document defines how preference for ULAs may be elevated for appropriate, common scenarios.</t>

<t>To support the preference to use ULA address pairs over GUA address pairs for local intra-site scenarios, the concept of a "known-local" ULA address is introduced. The means for nodes to determine ULA prefixes that are known to be local to the site they are operating in and to insert those prefix(es) into their policy table is described in this document. This capability allows nodes to prefer ULA-ULA communication locally, but still use GUA-GUA address pairs for external communication, and importantly avoid selecting a ULA source to talk to a non-local ULA destination.</t>

<t>It also reinforces the text in RFC 6724 to require support for Rule 5.5.</t>

<t>The overall goal of the document is to improve behavior for common scenarios, and to assist in the phasing out of use of IPv4, while noting that some specific scenarios may still require explicit configuration.</t>

<t>An IPv6 deployment, whether enterprise, residential or other, may use combinations of IPv6 GUAs, IPv6 ULAs, IPv4 globals, IPv4 RFC 1918 addressing, and may or may not use some form of NAT. However, this document makes no comment or recommendation on how ULAs are used, or on the use of NAT in an IPv6 network.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>GUA: Global Unicast Addressing as defined in <xref target="RFC3587"></xref></t>

<t>ULA: Unique Local Addressing as defined in <xref target="RFC4193"></xref></t>

<t>Known-local ULA: A ULA prefix that an individual organization/site has determined to be local to a given node/network</t>

</section>
<section anchor="operational-issues-regarding-preference-for-ipv4-addresses-over-ulas"><name>Operational Issues Regarding Preference for IPv4 addresses over ULAs</name>

<t>With multiaddressing being the norm for IPv6, moreso where nodes are dual-stack, the ability for a node to pick an appropriate address pair for communication is very important.</t>

<t>Where getaddrinfo() or a comparable API is used, the sorting behavior should take into account both
the source addresses of the requesting node as well as the destination addresses returned, and sort the candidate address pairs following the procedures defined in RFC 6724.</t>

<t>The current default policy table leads to preference for IPv6 GUAs over IPv4 globals, which is widely considered preferential behavior to support greater use of IPv6 in dual-stack environments. This helps allow sites to phase out IPv4 as its evidenced use becomes ever lower.</t>

<t>However, there are two issues with preference, or rather non-preference, for ULAs as orginally defined in RFC 6724.</t>

<t>One is that the same default policy table also puts IPv6 ULAs below all IPv4 addresses, including <xref target="RFC1918"/> addresses, such that IPv4-IPv4 address pairs are favoured over ULA-ULA address pairs. For many site operators this behavior will be counter-intuitive, given the IPv6 GUA preference, and may create difficulties with respect to planning, operational, and security implications for environments where ULA addressing is used in IPv4/IPv6 dual-stack network scenarios. The expected default prioritization of IPv6 traffic over IPv4 by default, as happens with IPv6 GUA addressing, does not happen for ULAs.</t>

<t>As a result, the use of ULAs is not a viable option for dual-stack networking transition planning, large scale network modeling, network lab environments or other modes of large scale networking that run both IPv4 and IPv6 concurrently with the expectation that IPv6 will be preferred by default.</t>

<t>The other issue is that where nodes in a dual-stack site are addressed from both ULA and GUA prefixes, RFC 6724 will see GUA-GUA address pairs chosen over ULA-ULA. One goal of ULA addressing was to allow local communications to be independent of the availablility of external connectivity and addressing, such that persistent ULAs can be used even when the global prefix made available to a site is withdrawn or changes.</t>

<t>This document therefore describes two methods to support a node implementing elevated or differential preference for ULAs in specific conditions.</t>

<t>The first, general method is by updating the default policy table to elevate the preference for ULAs such that ULAs will be preferred over all IPv4 addresses, providing more consistent and less confusing behavior for operators, and to assist operators in phasing out IPv4 from dual-stack environments, since by this update both IPv6 GUAs and ULAs will be preferred over any IPv4 addresses. This is an important enabler for sites seeking to move from dual-stack to IPv6-only networking.</t>

<t>The second method introduces the concept of known-local ULAs. RFC 6724 includes a method by which nodes <bcp14>MAY</bcp14> provide more fine-grained support for elevating the preference for specific ULA prefixes, while leaving other general ULA prefixes at their existing precedence. This document elevates the requirement for specific ULA prefixes to be inserted into the policy table to be a <bcp14>MUST</bcp14>, but only for observed prefixes that are known to be local, i.e., known-local ULAs. Nodes implementing this behaviour will see ULA prefixes known to be local to the node's site having precedence over IPv6 GUA addresses, such that they can use ULA addressing independently of global prefixes within their site and continue to use GUA-GUA address pairs to talk to destinations external to their site.</t>

<t>These changes aim to improve the default handling of address selection for common cases, and unmanaged / automatic scenarios rather than those where DHCPv6 is deployed. The changes are discussed in more detail in the following sections, with a further section providing a summary of the proposed updates.</t>

</section>
<section anchor="preference-of-6to4-addresses"><name>Preference of 6to4 addresses</name>

<t>The anycast prefix for 6to4 relays was formally deprecated by <xref target="RFC7526"/> in 2015, and since that time the use of 6to4 addressing has further declined, with very little evidence of its use on the public internet. Note that RFC 7526 does not deprecate the 6to4 IPv6 prefix 2002::/16, it only deprecates the 6to4 Relay IPv4 prefix.</t>

<t>This document therefore demotes the precedence of the 6to4 prefix in the policy table to the same precedence as carried by the Teredo prefix. Leaving this entry in the default table will cause no problems and will help if any deployments still exist, and ensure 6to4 prefixes are differentiated from general GUAs.</t>

<t>The discussion regarding the adding of 6to4 site prefixes in section 10.7 of RFC6724 remains valid.</t>

</section>
<section anchor="adjustments-to-rfc-6724"><name>Adjustments to RFC 6724</name>

<t>This document makes three specific changes to RFC 6724: first to update the default policy table, second to change Rule 5.5 on prefering addresses in a prefix advertised by the next-hop to a <bcp14>MUST</bcp14>, and third to require that nodes <bcp14>MUST</bcp14> insert observed known-local ULAs into their policy table.</t>

<section anchor="policy-table-update"><name>Policy Table Update</name>

<t>This update alters the default policy table listed in Rule 2.1 of RFC 6724.</t>

<t>The table below reflects the current RFC 6724 state on the left, and the updated state defined by this RFC on the right:</t>

<figure><artwork><![CDATA[
                    RFC 6724                              Updated                  
Prefix        Precedence Label        Prefix        Precedence Label              
::1/128               50     0        ::1/128               50     0
::/0                  40     1        ::/0                  40     1
::ffff:0:0/96         35     4        ::ffff:0:0/96         20     4 (*)
2002::/16             30     2        2002::/16              5     2 (*)
2001::/32              5     5        2001::/32              5     5
fc00::/7               3    13        fc00::/7              30    13 (*)
::/96                  1     3        ::/96                  1     3
fec0::/10              1    11        fec0::/10              1     11
3ffe::/16              1    12        3ffe::/16              1     12

(*) value(s) changed in update

]]></artwork></figure>

<t>The update moves 2002::/16 to de-preference its status in line with <xref target="RFC7526"/> and moves the precedence of fc00::/7 above legacy IPv4, with ::ffff:0:0/96 now set to precedence 20.</t>

</section>
<section anchor="rule-55"><name>Rule 5.5</name>

<t>The heuristic for address selection defined in Rule 5.5 of Section 5 of RFC 6724 to prefer addresses in a prefix advertised by a next-hop router has proven to be very useful.</t>

<t>The text in RFC 6724 states that the Rules <bcp14>MUST</bcp14> be followed in order, but also includes a discussion note under Rule 5.5 that says that an IPv6 implementation is not required to remember which next-hops advertised which prefixes and thus that Rule 5.5 is only applicable to implementations that track this information.</t>

<t>This document elevates the requirement to prefer ULA addresses in a prefix advertised by a next-hop router to a <bcp14>MUST</bcp14> for all nodes.</t>

</section>
<section anchor="automatic-insertion-of-known-local-ula-prefixes-into-the-policy-table"><name>Automatic insertion of known-local ULA prefixes into the policy table</name>

<t>Section 2.1 of RFC 6724 states that "an implementation <bcp14>MAY</bcp14> automatically add additional site-specific rows to the default table based on its configured addresses, such as for Unique Local Addresses (ULAs)".</t>

<t>If a node can determine which ULA prefix(es) are known to be local, it can provide differential treatment for those over general ULAs, and insert these into the policy table at a higher precedence than GUAs while keeping all general ULA prefixes to a lower precedence.</t>

<t>This document thus elevates the <bcp14>MAY</bcp14> requirement above for insertion to a <bcp14>MUST</bcp14> for the specific case of known-local ULAs.</t>

<t>Such known-local ULA prefixes include prefixes containing a ULA address assigned to any interface via manual configuration, Route Information Options (RIO) in RAs, or SLAAC or learned from a PIO (regardless of how the PIO flags are set) received on any interface. Additionally, type C hosts, as defined in <xref target="RFC4191"/> section 3, include any ULA prefixes learned from RIOs as known-local ULAs.</t>

<t>The following rules define how known-local ULA prefixes are inserted into the address selection policy table for a node, through a conceptual list of known-local prefixes.</t>

<t><list style="numbers">
  <t>RIOs from within fc00::/7 are considered the preferred information source for determining known-local ULAs and should override other conflicting information or assumptions from other sources, including PIOs.</t>
  <t>RIOs within fd00::/8 with a prefix length of /48 or longer <bcp14>MUST</bcp14> be added to the known-local ULA list, while RIOs within fd00::/8 that are shorter than /48 <bcp14>MAY</bcp14> be excluded from the known-local ULA list.</t>
  <t>RIOs within fc00::/8 of any prefix length <bcp14>SHOULD</bcp14> be added to the known-local ULA list.</t>
  <t>PIOs of length /64 with A=1 or interface addresses from within fd00::/8 that are not already covered by the known-local ULA list <bcp14>SHOULD</bcp14> be added to the list with an assumed prefix length of /48.</t>
  <t>Addresses added by other means (static, DHCPv6, etc) that are not currently in the prefix policy table, then the /48 known-local prefix within which the address sits <bcp14>MUST</bcp14> be added. The entry <bcp14>MUST</bcp14> be removed upon the address being removed from an interface when there is no covering RIO or PIO.</t>
  <t>In all cases, when inserting an entry in the known-local ULA list a node <bcp14>MUST</bcp14> set the label of the prefix to 14 (rather than the default ULA label of 13) and its precedence to 45.</t>
  <t>A node <bcp14>MUST</bcp14> remove inserted entries from its policy table when announced prefixes are deprecated, or when an interface address within fd00::/8 is removed and there is no covering RIO or PIO.</t>
  <t>Regardless of prefix length or associated flags, other PIOs from within fc00::/7 that are not already covered by the known-local ULA list <bcp14>MAY</bcp14> added, but only with the advertised prefix length.</t>
</list></t>

<t>Note that the above rules differentiate between the part of the overall ULA space (fc00::/7) that is in use at the time of publication of this document (fd00::/8) and the space that is currently reserved for future use (fc00::/8).</t>

<t>When support is added for the insertion of known-local ULA prefixes it <bcp14>MUST</bcp14> default to on, but a mechanism <bcp14>SHOULD</bcp14> be supported to administratively toggle the behaviour off and on.</t>

<t>Tools that display a node's default policy table <bcp14>MUST</bcp14> show all currently inserted known-local ULA prefixes.</t>

</section>
</section>
<section anchor="configuration-of-the-default-policy-table"><name>Configuration of the default policy table</name>

<t>As stated in Section 2.1 of RFC 6724 "IPv6 implementations <bcp14>SHOULD</bcp14> support configurable address selection via a mechanism at least as powerful as the policy tables defined here".</t>

<t>Based on operational experience to date, it is important that node policy tables can be changed once deployed to support future emerging use cases. This update thus re-states the importance of such configurability.</t>

</section>
<section anchor="intended-behaviors"><name>Intended behaviors</name>

<t>In this section we review the intended default behaviors after this update is applied.</t>

<section anchor="gua-gua-preferred-over-ipv4-ipv4"><name>GUA-GUA preferred over IPv4-IPv4</name>

<t>This is the current behaviour, and remains unaltered. The rationale is to promote use of IPv6 GUAs in dual-stack environments.</t>

</section>
<section anchor="gua-gua-preferred-over-ula-ula"><name>GUA-GUA preferred over ULA-ULA</name>

<t>This is the current behaviour, and remains unaltered for the general case.</t>

<t>However, where a ULA prefix is determined to be local, and added as a known-local ULA prefix to a node's address selection policy table, communications to addresses in that prefix will prefer ULA-ULA address pairs to GUA-GUA.</t>

<t>By only adapting this behaviour for known-local ULAs, a node will not select a ULA source to talk to a non-local ULA destination and will instead correctly use GUA-GUA.</t>

<t>Nodes not yet implementing this RFC will continue to use GUA-GUA over ULA-ULA for all cases.</t>

</section>
<section anchor="ula-ula-preferred-over-ipv4-ipv4"><name>ULA-ULA preferred over IPv4-IPv4</name>

<t>This is another change introduced by this update. RFC 6724 as originally defined would lead to IPv4 being preferred over ULAs, which is contrary to the spirit of the IPv6 GUA preference over IPv4, and to the goal of removing evidenced use of IPv4 in a dual-stack site before transitioning to IPv6-only.</t>

<t>This document elevates the precedence of ULAs above IPv4, so ULA-ULA address pairs will be chosen over IPv4-IPv4 pairs.</t>

</section>
<section anchor="ipv4-ipv4-preferred-over-ula-gua"><name>IPv4-IPv4 preferred over ULA-GUA</name>

<t>An IPv6 ULA address will only be preferred over an IPv4 address if both IPv6 ULA source and destination addresses are available. With Rule 5 of Section 6 of RFC 6724 and the ULA-specific label added in <xref target="RFC6724"/> (which was not present in <xref target="RFC3484"/>) an IPv4 source and destination will be preferred over an IPv6 ULA source and an IPv6 GUA destination address, even though generally IPv6 ULA addresses are preferred over IPv4 in the policy table as proposed in this update. The IPv4 matching label trumps ULA-GUA.</t>

</section>
</section>
<section anchor="discussion-of-ula-source-with-gua-or-remote-ula-destination"><name>Discussion of ULA source with GUA or remote ULA destination</name>

<t>In this section we present a discussion on the specific cases where a ULA source may be communicating with a GUA or ULA destination.</t>

<t>A potential problem exists when a ULA source attempts to communicate with GUA or remote ULA destinations. In these scenarios, the ULA source as stated earlier is by default intended for communication only with the local network, meaning an individual site, several sites that are part of the same organization, or multiple sites across cooperating organizations, as detailed in <xref target="RFC4193"></xref>. As a result, most GUA and ULA destinations are not attached to the same local network as the ULA source and are, therefore, not reachable from the ULA source.</t>

<t>When only a ULA source is available for communication with GUA destinations, this generally implies no connectivity to the IPv6 Internet is available. Otherwise, a GUA source would have been made available and selected for use with GUA destinations. As a result, the ULA source will typically fail when it attempts to communicate with most GUA destinations. However, corner cases exist where the ULA source will not fail, such as when GUA destinations are attached to the same local network as the ULA source.</t>

<t>Receiving a DNS response for a ULA destination that is not attached to the local network, in other words, a remote ULA destination, is considered a misconfiguration in most cases, or at least this contradicts the operational guidelines provided in Section 4.4 of <xref target="RFC4193"></xref>. Nevertheless, this can occur, and the ULA source will typically fail when it attempts to communicate with ULA destinations that are not attached to the same local network as the ULA source. This case provides a rationale for implementing support for known-local ULA prefix insertion in the policy table, such that differential behaviour can be applied for known-local versus general ULA prefixes.</t>

<t>The remainder of this section discusses several complementary mechanisms involved with these scenarios.</t>

<section anchor="the-ula-label-and-its-precedence"><name>The ULA Label and its Precedence</name>

<t>RFC 6724 added (in obsoleting RFC 3484) a separate label for ULA (fc00::/7), whose default precedence is raised by this update. This separate label interacts with Rule 5 of Section 6 of RFC 6724, which says:</t>

<figure><artwork><![CDATA[
Rule 5: Prefer matching label.

If Label(Source(DA)) = Label(DA) and Label(Source(DB)) <> Label(DB), 
then prefer DA.

Similarly, if Label(Source(DA)) <> Label(DA) and Label(Source(DB)) = 
Label(DB), then prefer DB.
]]></artwork></figure>

<t>The ULA source label will not match the GUA destination label in the first scenario. Therefore, an IPv4 destination, if available, will be preferred over a GUA destination with a ULA source, even though the GUA destination has higher precedence than the IPv4 destination in the policy table. This means the IPv4 destination will be moved up in the list of destinations over the GUA destination with the ULA source.</t>

<t>If the ULA (fc00::/7) label is removed from the policy table, a GUA destination with a ULA source will be preferred over an IPv4 destination, as GUA and ULA will be part of the same label (for ::/0).</t>

<t>The ULA source label will match the ULA destination label in the second scenario; therefore, whether part of the local network or not, a ULA destination will be preferred over an IPv4 destination.</t>

<t>Where known-local ULA prefix insertion is implemented, the known-local ULA will have a higher precedence (45) than either IPv6 GUAs (40) or IPv4 (20), while general ULAs will have the lowest precedence (10).</t>

<t>If the ULA label (fc00::/7) has its precedence lowered below IPv4 or the IPv4 precedence is raised above ULA, an IPv4 destination will be preferred over all ULA destinations.</t>

</section>
<section anchor="happy-eyeballs"><name>Happy Eyeballs</name>

<t>Regardless of the preference resulting from the above discussion, Happy Eyeballs version 1 <xref target="RFC6555"/> or version 2 <xref target="RFC8305"/>, if implemented, will try both the GUA or ULA destination with the ULA source and the IPv4 destination and source pairings. The ULA source will typically fail to communicate with most GUA or remote ULA destinations, and IPv4 will be preferred if IPv4 connectivity is available unless the GUA or ULA destinations are attached to the same local network as the ULA source.</t>

</section>
<section anchor="try-the-next-address"><name>Try the Next Address</name>

<t>As stated in Section 2 of RFC 6724:</t>

<t>"Well-behaved applications <bcp14>SHOULD NOT</bcp14> simply use the first address returned from an API such as getaddrinfo() and then give up if it fails. For many applications, it is appropriate to iterate through the list of addresses returned from getaddrinfo() until a working address is found. For other applications, it might be appropriate to try multiple addresses in parallel (e.g., with some small delay in between) and use the first one to succeed."</t>

<t>Therefore, when an IPv4 destination is preferred over GUA or ULA destinations, IPv4 will likely succeed if IPv4 connectivity is available, and the GUA or ULA destination may only be tried if Happy Eyeballs is implemented.</t>

<t>On the other hand, if the GUA or ULA destination with the ULA source is preferred, the ULA source will typically fail to communicate with GUA or ULA destinations that are not connected to the same local network as the ULA source. However, if the operational guidelines in Section 4.3 of RFC 4193  are followed, recognizing this failure can be accelerated, and transport layer timeouts (e.g., TCP) can be avoided. The guidelines will cause a Destination Unreachable ICMPv6 Error to be received by the source device, signaling the next address in the list to be tried, as discussed above.</t>

</section>
</section>
<section anchor="following-ula-operational-guidelines-in-rfc-4193"><name>Following ULA operational guidelines in RFC 4193</name>

<t>This section re-emphasises two important operational requirements stated in <xref target="RFC4193"/> that should be followed by operators.</t>

<section anchor="filtering-ula-source-addresses-at-site-borders"><name>Filtering ULA-source addresses at site borders</name>

<t>Section 4.3 states "Site border routers and firewalls should be configured to not forward
any packets with Local IPv6 source or destination addresses outside of the site, unless they have been explicitly configured with routing information about specific /48 or longer Local IPv6 prefixes".</t>

<t>And further that "Site border routers should respond with the appropriate ICMPv6 Destination Unreachable message to inform the source that the packet was not forwarded".</t>

<t>As stated in the above discussion, such ICMPv6 messages can assist in fast failover for TCP connections.</t>

</section>
<section anchor="avoid-using-ula-addresses-in-the-global-dns"><name>Avoid using ULA addresses in the global DNS</name>

<t>Section 4.3 of RFC 4193 states that "AAAA and PTR records for locally assigned local IPv6 addresses are not recommended to be installed in the global DNS."</t>

<t>This is particularly important given the general method presented in this document elevates the priority for ULAs above IPv4. However, where support for insertion of known-local prefixes is implemented, such "rogue" ULAs in the global DNS are no longer a concern for address selection as they would have the lowest precedence.</t>

</section>
</section>
<section anchor="the-practicalities-of-implementing-address-selection-support"><name>The practicalities of implementing address selection support</name>

<t>As with most adjustments to standards, and using the introduction of RFC 6724 as a measuring stick, the updates defined in this document will likely take several years to become common enough for consistent behavior within most operating systems. At the time of writing, it has been over 10 years since RFC 6724 has been published but we continue to see existing commercial and open source operating systems exhibiting RFC 3484 (or other) behavior.</t>

<t>While it should be noted that RFC 6724 defines a solution to adjust the address preference selection table that is functional theoretically, operationally the solution is operating system dependent and in practice policy table changes cannot be signaled by any currently deployed network mechanism. While RFC 7078 defines such a DHCPv6 option, it is not widely implemented. This lack of an intra-protocol or network-based ability to adjust address selection preference, along with the inability to adjust a notable number of operating systems either programmatically or manually, renders operational scalability of such a mechanism challenging.</t>

<t>It is especially important to note this behavior in the long lifecycle equipment that exists in industrial control and operational technology environments due to their very long mean time to replacement/lifecycle.</t>

</section>
<section anchor="limitations-of-rfc-6724"><name>Limitations of RFC 6724</name>

<t>The procedures defined in RFC 6724 do not give optimal results for all scenarios. As stated in the introduction, the aim of this update is to improve the behavior for the most common scenarios.</t>

<t>It is widely recognised in the IETF 6man WG that the whole 3484/6724/getaddrinfo() model is fundamentally inadequate for optimal address selection.  A model that considers address pairs directly, rather than sorting on destination addresses with the best source for that address, would be preferable, but beyond the scope of this document.</t>

<t>To simplify address selection, operators may instead look to deploy IPv6-only, and may choose to only use GUA addresses and no ULA addresses. Other approaches to reduce the use of IPv4, e.g., through use of DHCPv4 Option 108 as defined in <xref target="RFC8925"/>, also helps simplify address selection for nodes.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to acknowledge the valuable input and contributions of the 6man WG including (in alphabetic order) Erik Auerswald, Dale Carder, Brian Carpenter, Tom Coffeen, Lorenzo Colitti, Chris Cummings, David Farmer (in particular for the ULA to GUA/ULA discussion text), Bob Hinden, Scott Hogg, Ed Horley, Ted Lemon, Jen Linkova, Michael Richardson, Kyle Rose, Ole Troan, Eduard Vasilenko, Eric Vyncke, Paul Wefel, Timothy Winters, and XiPeng Xiao.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>There are no direct security considerations in this document.</t>

<t>The mixed preference for IPv6 over IPv4 from the default policy table in RFC 6724 represents a potential security issue, given an operator may expect ULAs to be used when in practice RFC 1918 addresses are used instead.</t>

<t>The requirements of RFC 4193, stated earlier in this document, should be followed for optimal behavior.</t>

<t>Operators should be mindful of cases where communicating nodes have differing behaviours for address selection, e.g., RFC3484 behavior, RFC6724, the updated RFC6724 behavior defined here, some other non-IETF-standardized behavior, or even no mechanism. There may thus be inconsistent behaviour for communications initiated in each direction. Ultimately all nodes should be made compliant to the updated specification described in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None.</t>

</section>
<section anchor="summary-of-changes-and-additional-text-since-rfc-6724"><name>Summary of changes and additional text since RFC 6724</name>

<t><list style="symbols">
  <t>Changed default policy table to move fc00::/7 to precedence 30, above legacy IPv4.</t>
  <t>Changed default policy table to move the 6to4 address block 2002::/16 to the same precedence as the Teredo prefix.</t>
  <t>Changed ::ffff:0:0/96 to precedence 20.</t>
  <t>Changed Rule 5.5 to a <bcp14>MUST</bcp14> support.</t>
  <t>Defined the concept of known-local ULA prefixes and the requirement to (<bcp14>MUST</bcp14>) insert them into the policy table.</t>
  <t>Added text clarifying intended behaviors.</t>
  <t>Added text discussing ULA to GUA/ULA case.</t>
  <t>Added text for the security section.</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC2119;
&RFC4191;
&RFC4193;
&RFC7526;
&RFC8925;
&RFC8174;


    </references>

    <references title='Informative References'>

&RFC6724;
&RFC1918;
&RFC3484;
&RFC6555;
&RFC8305;
&RFC3587;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

