<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.6.10) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc rfcprocack="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-6man-rfc8504-bis-00" category="bcp" consensus="true" submissionType="IETF" obsoletes="8504" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>IPv6 Node Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-6man-rfc8504-bis-00"/>
    <seriesInfo name="bcp" value="220"/>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <postal>
          <street>Lumen House, Library Avenue</street>
          <city>Harwell Oxford, Didcot</city>
          <code>OX11 0SG</code>
          <country>United Kingdom</country>
        </postal>
        <email>tim.chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Loughney" fullname="John Loughney">
      <organization>Intel</organization>
      <address>
        <postal>
          <city>Santa Clara, CA</city>
          <country>United States of America</country>
        </postal>
        <phone/>
        <email>john.loughney@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Winters" fullname="Timothy Winters">
      <organization>QA Cafe</organization>
      <address>
        <postal>
          <city>Dover</city>
          <region>NH</region>
          <country>United States of America</country>
        </postal>
        <email>tim@qacafe.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Internet</area>
    <workgroup>IPv6 Maintenance</workgroup>
    <keyword>IPv6</keyword>
    <abstract>
      <?line 182?>

<t>This document defines requirements for IPv6 nodes.  It is
expected that IPv6 will be deployed in a wide range of devices and
situations.  Specifying the requirements for IPv6 nodes allows
IPv6 to function well and interoperate in a large number of
situations and deployments.</t>
      <t>This document obsoletes RFC 8504, and in turn RFC 6434 and its predecessor, RFC 4294.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://timchown.github.io/rfc8504-bis/draft-ietf-6man-rfc8504-bis.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-6man-rfc8504-bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Maintenance Working Group mailing list (<eref target="mailto:ipv6@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipv6/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipv6/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/timchown/rfc8504-bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 193?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines common functionality required by both
IPv6 hosts and routers.  Many IPv6 nodes will implement optional
or additional features, but this document collects and summarizes
requirements from other published Standards Track documents in one
place.</t>
      <t>This document tries to avoid discussion of protocol details
and references RFCs for this purpose.  This document is intended
to be an applicability statement and to provide guidance as to which
IPv6 specifications should be implemented in the general case and
which specifications may be of interest to specific deployment
scenarios. This document does not update any individual protocol
document RFCs.</t>
      <t>Although this document points to different specifications, it
should be noted that in many cases, the granularity of a
particular requirement will be smaller than a single specification,
as many specifications define multiple, independent pieces, some
of which may not be mandatory. In addition, most specifications
define both client and server behavior in the same specification,
while many implementations will be focused on only one of those
roles.</t>
      <t>This document defines a minimal level of requirement needed
for a device to provide useful Internet service and considers a
broad range of device types and deployment scenarios. Because of
the wide range of deployment scenarios, the minimal requirements
specified in this document may not be sufficient for all
deployment scenarios. It is perfectly reasonable (and indeed
expected) for other profiles to define additional or stricter
requirements appropriate for specific usage and deployment
environments. As an example, this document does not mandate that all
clients support DHCP, but some deployment scenarios may deem
it appropriate to make such a requirement. As another example,
NIST has defined profiles for specialized requirements for IPv6
in target environments (see <xref target="USGv6"/>).</t>
      <t>As it is not always possible for an implementer to know the
exact usage of IPv6 in a node, an overriding requirement for IPv6
nodes is that they should adhere to Jon Postel's Robustness
Principle: "Be conservative in what you do, be liberal in what you accept
from others" <xref target="RFC0793"/>.</t>
      <section anchor="scope-of-this-document">
        <name>Scope of This Document</name>
        <t>IPv6 covers many specifications.  It is intended that IPv6
will be deployed in many different situations and environments.
Therefore, it is important to develop requirements for IPv6
nodes to ensure interoperability.</t>
      </section>
      <section anchor="description-of-ipv6-nodes">
        <name>Description of IPv6 Nodes</name>
        <t>From "Internet Protocol, Version 6 (IPv6) Specification" <xref target="RFC8200"/>, we
have the following definitions:</t>
        <artwork><![CDATA[
IPv6 node   - a device that implements IPv6.
IPv6 router - a node that forwards IPv6 packets not explicitly
              addressed to itself.
IPv6 host   - any IPv6 node that is not a router.
]]></artwork>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="abbreviations-used-in-this-document">
      <name>Abbreviations Used in This Document</name>
      <artwork><![CDATA[
AH    Authentication Header
DAD   Duplicate Address Detection
ESP   Encapsulating Security Payload
ICMP  Internet Control Message Protocol
IKE   Internet Key Exchange
MIB   Management Information Base
MLD   Multicast Listener Discovery
MTU   Maximum Transmission Unit
NA    Neighbor Advertisement
NBMA  Non-Broadcast Multi-Access
ND    Neighbor Discovery
NS    Neighbor Solicitation
NUD   Neighbor Unreachability Detection
PPP   Point-to-Point Protocol
]]></artwork>
    </section>
    <section anchor="sub-ip-layer">
      <name>Sub-IP Layer</name>
      <t>An IPv6 node <bcp14>MUST</bcp14> include support for one or more IPv6
link-layer specifications.  Which link-layer specifications an
implementation should include will depend upon what link layers
are supported by the hardware available on the system.  It is
possible for a conformant IPv6 node to support IPv6 on some of its
interfaces and not on others.</t>
      <t>As IPv6 is run over new Layer 2 technologies, it is expected
that new specifications will be issued.  We list here some of
the Layer 2 technologies for which an IPv6 specification has been developed.
It is provided for informational purposes only and may
not be complete.</t>
      <ul spacing="normal">
        <li>
          <t>Transmission of IPv6 Packets over Ethernet Networks <xref target="RFC2464"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over Frame Relay Networks Specification
<xref target="RFC2590"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 1394 Networks <xref target="RFC3146"/></t>
        </li>
        <li>
          <t>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP)
Packets over Fibre Channel <xref target="RFC4338"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 802.15.4 Networks <xref target="RFC4944"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE
802.16 Networks <xref target="RFC5121"/></t>
        </li>
        <li>
          <t>IP version 6 over PPP <xref target="RFC5072"/></t>
        </li>
      </ul>
      <t>In addition to traditional physical link layers, it is also
possible to tunnel IPv6 over other protocols. Examples
include:</t>
      <ul spacing="normal">
        <li>
          <t>Teredo: Tunneling IPv6 over UDP through Network Address Translations
(NATs) <xref target="RFC4380"/></t>
        </li>
        <li>
          <t>Basic Transition Mechanisms for IPv6 Hosts and Routers (see <xref section="3" sectionFormat="of" target="RFC4213"/>)</t>
        </li>
      </ul>
    </section>
    <section anchor="ip-layer">
      <name>IP Layer</name>
      <section anchor="internet-protocol-version-6-rfc-8200">
        <name>Internet Protocol Version 6 - RFC 8200</name>
        <t>The Internet Protocol version 6 is specified in <xref target="RFC8200"/>.  This specification <bcp14>MUST</bcp14> be supported.</t>
        <t>The node <bcp14>MUST</bcp14> follow the packet transmission rules in RFC 8200.</t>
        <t>All conformant IPv6 implementations <bcp14>MUST</bcp14> be
capable of sending and receiving IPv6 packets; forwarding
functionality <bcp14>MAY</bcp14> be supported.
Nodes <bcp14>MUST</bcp14> always be able to send, receive, and process
Fragment headers.</t>
        <t>IPv6 nodes <bcp14>MUST NOT</bcp14> create
overlapping fragments.  Also, when reassembling an IPv6
datagram, if one or more of its constituent fragments is
determined to be an overlapping fragment, the entire datagram
(and any constituent fragments) <bcp14>MUST</bcp14> be silently discarded.
See Section 4.5 of <xref target="RFC8200"/> for more information.</t>
        <t>As recommended in Section 4.5 of <xref target="RFC8200"/>, nodes <bcp14>MUST NOT</bcp14>
generate atomic fragments, i.e., where the fragment is a whole datagram.
As per <xref target="RFC6946"/>, if a receiving node reassembling
a datagram encounters an atomic fragment,
it should be processed as a fully reassembled packet, and
any other fragments that match this packet should be processed independently.</t>
        <t>To mitigate a variety of potential attacks,
nodes <bcp14>SHOULD</bcp14> avoid using predictable Fragment Identification values
in Fragment headers, as discussed in <xref target="RFC7739"/>.</t>
        <t>All nodes <bcp14>SHOULD</bcp14> support the setting and use of the IPv6 Flow
Label field as defined in the IPv6 Flow Label specification <xref target="RFC6437"/>.
Forwarding nodes such as routers and load distributors
<bcp14>MUST NOT</bcp14> depend only on Flow Label values being uniformly
distributed.  It is <bcp14>RECOMMENDED</bcp14> that source hosts support the flow
label by setting the Flow Label field for all packets of a given
flow to the same value chosen from an approximation to a discrete
uniform distribution.</t>
      </section>
      <section anchor="support-for-ipv6-extension-headers">
        <name>Support for IPv6 Extension Headers</name>
        <t>RFC 8200 specifies extension headers and the processing for
these headers.</t>
        <t>Extension headers (except for the Hop-by-Hop Options header) are not
processed, inserted, or deleted by any node along a packet's delivery
path, until the packet reaches the node (or each of the set of nodes,
in the case of multicast) identified in the Destination Address field
of the IPv6 header.</t>
        <t>Any unrecognized extension headers or options <bcp14>MUST</bcp14> be
processed as described in RFC 8200. Note that where
<xref section="4" sectionFormat="of" target="RFC8200"/>
refers to the action to be taken when a Next Header value
in the current header is not recognized by a node, that action
applies whether the value is an unrecognized extension
header or an unrecognized upper-layer protocol (ULP).</t>
        <t>An IPv6 node <bcp14>MUST</bcp14> be able to process these extension headers.  An
exception is Routing Header type 0 (RH0), which was deprecated
by <xref target="RFC5095"/> due to security concerns and
which <bcp14>MUST</bcp14> be treated as an unrecognized routing type.</t>
        <t>Further, <xref target="RFC7045"/> adds specific requirements for
the processing of extension headers, in particular that any forwarding
node along an IPv6 packet's path, which forwards the packet for
any reason, <bcp14>SHOULD</bcp14> do so regardless of any extension headers
that are present.</t>
        <t>As per RFC 8200, when a node fragments an IPv6 datagram,
it <bcp14>MUST</bcp14> include the entire IPv6 Header Chain in the first fragment.
The Per-Fragment headers <bcp14>MUST</bcp14>
consist of the IPv6 header plus any extension headers that <bcp14>MUST</bcp14> be
processed by nodes en route to the destination,
that is, all headers up to and including the Routing
header if present, else the Hop-by-Hop Options header if present,
else no extension headers.  On reassembly,
if the first fragment does not include all headers through an
upper-layer header, then that fragment <bcp14>SHOULD</bcp14> be discarded and
an ICMP Parameter Problem, Code 3, message <bcp14>SHOULD</bcp14> be sent to
the source of the fragment, with the Pointer field set to zero.
See <xref target="RFC7112"/> for a discussion of why oversized
IPv6 Extension Header Chains are avoided.</t>
        <t>Defining new IPv6 extension headers is not recommended, unless there
are no existing IPv6 extension headers that can be used by specifying
a new option for that IPv6 extension header.  A proposal to specify a
new IPv6 extension header <bcp14>MUST</bcp14> include a detailed technical
explanation of why an existing IPv6 extension header can not be used
for the desired new function, and in such cases, it needs to follow the format
described in <xref section="8" sectionFormat="of" target="RFC8200"/>.  For further background
reading on this topic, see <xref target="RFC6564"/>.</t>
      </section>
      <section anchor="protecting-a-node-from-excessive-extension-header-options">
        <name>Protecting a Node from Excessive Extension Header Options</name>
        <t>As per RFC 8200, end hosts are expected to process all extension headers,
destination options, and hop-by-hop options in a packet. Given that
the only limit on the number and size of extension headers is the MTU,
the processing of received packets could be considerable. It is also
conceivable that a long chain of extension headers might be used as a
form of denial-of-service attack. Accordingly, a host may place limits
on the number and sizes of extension headers and options it is willing
to process.</t>
        <t>A host <bcp14>MAY</bcp14> limit the number of consecutive PAD1 options in destination
options or hop-by-hop options to 7.
In this case, if there are more than 7
consecutive PAD1 options present, the packet <bcp14>MAY</bcp14> be
silently discarded. The rationale is that if padding of 8 or more
bytes is required, then the PADN option <bcp14>SHOULD</bcp14> be used.</t>
        <t>A host <bcp14>MAY</bcp14> limit the number of bytes in a PADN option to be less than
8. In such a case, if a PADN option is present that has a length
greater than 7, the packet <bcp14>SHOULD</bcp14> be silently discarded. The
rationale for this guideline is that the purpose of padding is for
alignment and 8 bytes is the maximum alignment used in IPv6.</t>
        <t>A host <bcp14>MAY</bcp14> disallow unknown options in destination options or
hop-by-hop options. This <bcp14>SHOULD</bcp14> be configurable where the default is
to accept unknown options and process them per <xref target="RFC8200"/>. If a packet
with unknown options is received and the host is configured to
disallow them, then the packet <bcp14>SHOULD</bcp14> be silently discarded.</t>
        <t>A host <bcp14>MAY</bcp14> impose a limit on the maximum number of non-padding options
allowed in the destination options and hop-by-hop extension headers. If
this feature is supported, the maximum number <bcp14>SHOULD</bcp14> be configurable,
and the default value <bcp14>SHOULD</bcp14> be set to 8. The limits for
destination options and hop-by-hop options may be separately
configurable. If a packet is received and the number of destination or
hop-by-hop options exceeds the limit, then the packet <bcp14>SHOULD</bcp14> be
silently discarded.</t>
        <t>A host <bcp14>MAY</bcp14> impose a limit on the maximum length of Destination Options
or Hop-by-Hop Options extension headers. This value <bcp14>SHOULD</bcp14> be
configurable, and the default is to accept options of any length. If a
packet is received and the length of the Destination or Hop-by-Hop Options
extension header exceeds the length limit, then the packet <bcp14>SHOULD</bcp14> be
silently discarded.</t>
      </section>
      <section anchor="ND">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Neighbor Discovery is defined in <xref target="RFC4861"/>; the
definition was updated by <xref target="RFC5942"/>. Neighbor Discovery
<bcp14>MUST</bcp14> be supported with the noted exceptions below.  RFC 4861 states:</t>
        <ul empty="true">
          <li>
            <t>Unless specified otherwise (in a document that covers operating IP
over a particular link type) this document applies to all link types.
However, because ND uses link-layer multicast for some of its
services, it is possible that on some link types (e.g., Non‑Broadcast
Multi-Access (NBMA) links), alternative protocols or mechanisms to
implement those services will be specified (in the appropriate
document covering the operation of IP over a particular link type).
The services described in this document that are not directly
dependent on multicast, such as Redirects, Next-hop determination,
Neighbor Unreachability Detection, etc., are expected to be provided
as specified in this document.
The details of how one uses ND on
NBMA links are addressed in <xref target="RFC2491"/>.</t>
          </li>
        </ul>
        <t>Some detailed analysis of Neighbor Discovery follows:</t>
        <t>Router Discovery is how hosts locate routers that reside on
an attached link.  Hosts <bcp14>MUST</bcp14> support Router Discovery
functionality.</t>
        <t>Prefix Discovery is how hosts discover the set of address
prefixes that define which destinations are on-link for an
attached link. Hosts <bcp14>MUST</bcp14> support Prefix Discovery.</t>
        <t>Hosts <bcp14>MUST</bcp14> also implement Neighbor Unreachability Detection
(NUD) for all paths between hosts and neighboring nodes.  NUD is
not required for paths between routers.  However, all nodes <bcp14>MUST</bcp14>
respond to unicast Neighbor Solicitation (NS) messages.</t>
        <t><xref target="RFC7048"/> discusses NUD, in particular cases
where it behaves too impatiently. It states that if a node
transmits more than a certain number of packets, then it
<bcp14>SHOULD</bcp14> use the exponential backoff of the retransmit timer,
up to a certain threshold point.</t>
        <t>Hosts <bcp14>MUST</bcp14> support the sending of Router Solicitations and
the receiving of Router Advertisements (RAs).  The ability to
understand individual RA options is dependent
on supporting the functionality making use of the particular
option.</t>
        <t><xref target="RFC7559"/> discusses packet loss resiliency
for Router Solicitations and requires that nodes <bcp14>MUST</bcp14> use
a specific exponential backoff algorithm for retransmission of Router
Solicitations.</t>
        <t>All nodes <bcp14>MUST</bcp14> support the sending and receiving of Neighbor
Solicitation (NS) and Neighbor Advertisement (NA) messages.  NS
and NA messages are required for Duplicate Address Detection
(DAD).</t>
        <t>Hosts <bcp14>SHOULD</bcp14> support the processing of Redirect
functionality.  Routers <bcp14>MUST</bcp14> support the sending of Redirects,
though not necessarily for every individual packet (e.g., due to
rate limiting). Redirects are only useful on networks supporting
hosts. In core networks dominated by routers, Redirects are
typically disabled.  The sending of Redirects <bcp14>SHOULD</bcp14> be disabled
by default on routers intended to be deployed on core networks. They <bcp14>MAY</bcp14>
be enabled by default on routers intended to support hosts on edge networks.</t>
        <t>As specified in <xref target="RFC6980"/>, nodes <bcp14>MUST NOT</bcp14> employ IPv6 fragmentation
for sending any of the following Neighbor Discovery and SEcure
Neighbor Discovery messages: Neighbor Solicitation, Neighbor
Advertisement, Router Solicitation, Router Advertisement, Redirect, or
Certification Path Solicitation.
Nodes <bcp14>MUST</bcp14> silently ignore any of these messages on receipt if
fragmented.
See RFC 6980 for details and motivation.</t>
        <t>"IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> includes additional
recommendations on how to select from a set of available routers.
<xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be supported.</t>
      </section>
      <section anchor="ipv6-router-advertisement-flags-option-rfc-5175">
        <name>IPv6 Router Advertisement Flags Option - RFC 5175</name>
        <t>Router Advertisements include an 8-bit field of single-bit
Router Advertisement flags.  The Router Advertisement Flags
Option extends the number of available flag bits by 48 bits. At
the time of this writing, 6 of the original 8 single-bit flags have
been assigned, while 2 remain available for future
assignment. No flags have been defined that make use of the new
option; thus, strictly speaking, there is no requirement to
implement the option today. However, implementations that are
able to pass unrecognized options to a higher-level entity that
may be able to understand them (e.g., a user-level process using
a "raw socket" facility) <bcp14>MAY</bcp14> take steps to handle the option in
anticipation of a future usage.</t>
      </section>
      <section anchor="path-mtu-discovery-and-packet-size">
        <name>Path MTU Discovery and Packet Size</name>
        <section anchor="path-mtu-discovery-rfc-8201">
          <name>Path MTU Discovery - RFC 8201</name>
          <t>"Path MTU Discovery for IP version 6" <xref target="RFC8201"/> <bcp14>SHOULD</bcp14> be
supported.  From <xref target="RFC8200"/>:</t>
          <ul empty="true">
            <li>
              <t>It is strongly recommended that IPv6 nodes implement
Path MTU Discovery <xref target="RFC8201"/>, in order to
discover and
take advantage of path MTUs greater than 1280 octets.
However, a minimal IPv6 implementation (e.g., in a boot
ROM) may simply restrict itself to sending packets no
larger than 1280 octets, and omit implementation of Path
MTU Discovery.</t>
            </li>
          </ul>
          <t>The rules in <xref target="RFC8200"/> and <xref target="RFC5722"/> <bcp14>MUST</bcp14> be followed for packet
fragmentation and reassembly.</t>
          <t>As described in RFC 8201,
nodes implementing Path MTU Discovery and sending packets larger than
the IPv6 minimum link MTU are susceptible to problematic connectivity
if ICMPv6 messages are blocked or not transmitted.  For
example, this will result in connections that complete the TCP
three-way handshake correctly but then hang when data is transferred.  This
state is referred to as a black-hole connection <xref target="RFC2923"/>.  Path MTU
Discovery relies on ICMPv6 Packet Too Big (PTB) to determine the MTU
of the path (and thus these <bcp14>MUST NOT</bcp14> be filtered, as per the
recommendation in <xref target="RFC4890"/>).</t>
          <t>An alternative to Path MTU Discovery defined in RFC 8201 can be
found in <xref target="RFC4821"/>, which defines a method for Packetization
Layer Path MTU Discovery (PLPMTUD) designed for use over paths where
delivery of ICMPv6 messages to a host is not assured.</t>
        </section>
        <section anchor="minimum-mtu-considerations">
          <name>Minimum MTU Considerations</name>
          <t>While an IPv6 link MTU can be set to 1280 bytes,
it is recommended that for IPv6 UDP in particular,
which includes DNS operation, the sender use a
large MTU if they can, in order to avoid gratuitous
fragmentation-caused packet drops.</t>
        </section>
      </section>
      <section anchor="icmp-for-the-internet-protocol-version-6-ipv6-rfc-4443">
        <name>ICMP for the Internet Protocol Version 6 (IPv6) - RFC 4443</name>
        <t>ICMPv6 <xref target="RFC4443"/> <bcp14>MUST</bcp14> be supported. "Extended
ICMP to Support Multi-Part Messages" <xref target="RFC4884"/> <bcp14>MAY</bcp14> be supported.</t>
      </section>
      <section anchor="default-router-preferences-and-more-specific-routes-rfc-4191">
        <name>Default Router Preferences and More-Specific Routes - RFC 4191</name>
        <t>"Default Router Preferences and More-Specific Routes" <xref target="RFC4191"/>
provides support for nodes attached to
multiple (different) networks, each providing routers that
advertise themselves as default routers via Router
Advertisements. In some scenarios, one router may provide
connectivity to destinations that the other router does not, and
choosing the "wrong" default router can result in reachability
failures. In order to resolve this scenario, IPv6 nodes <bcp14>MUST</bcp14> implement
<xref target="RFC4191"/> and <bcp14>MUST</bcp14> implement the Type C host role defined in RFC 4191.</t>
      </section>
      <section anchor="first-hop-router-selection-rfc-8028">
        <name>First-Hop Router Selection - RFC 8028</name>
        <t>In multihomed scenarios, where a host has more than one prefix,
each allocated by an upstream network that is assumed to implement
BCP 38 ingress filtering, the host may have multiple routers to
choose from.</t>
        <t>Hosts that may be deployed in such multihomed environments
<bcp14>SHOULD</bcp14> follow the guidance given in <xref target="RFC8028"/>.</t>
      </section>
      <section anchor="mld">
        <name>Multicast Listener Discovery (MLD) for IPv6 - RFC 3810</name>
        <t>Nodes that need to join multicast groups <bcp14>MUST</bcp14> support MLDv2
<xref target="RFC3810"/>. MLD is needed by any node that is
expected to receive and process multicast traffic; in particular,
MLDv2 is required for support for source-specific multicast (SSM) as
per <xref target="RFC4607"/>.</t>
        <t>Previous versions of this specification only required MLDv1 <xref target="RFC2710"/>
to be implemented
on all nodes.  Since participation of any
MLDv1-only nodes on a link require that all other nodes on the link then
operate in version 1 compatibility mode, the requirement to support MLDv2
on all nodes was upgraded to a <bcp14>MUST</bcp14>. Further, SSM is now the preferred
multicast distribution method, rather than Any-Source Multicast (ASM).</t>
        <t>Note that Neighbor Discovery (as used on most link types -- see <xref target="ND"/>)
depends on multicast and requires that nodes join Solicited Node
multicast addresses.</t>
      </section>
      <section anchor="explicit-congestion-notification-ecn-rfc-3168">
        <name>Explicit Congestion Notification (ECN) - RFC 3168</name>
        <t>An ECN-aware router sets a mark in the IP header in order to signal
impending congestion, rather than dropping a packet. The receiver of
the packet echoes the congestion indication to the sender, which can then
reduce its transmission rate as if it detected a dropped packet.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support ECN <xref target="RFC3168"/> by implementing an interface
for the upper layer to access and by setting the ECN bits in the IP header.
The benefits of using ECN are documented in <xref target="RFC8087"/>.</t>
      </section>
    </section>
    <section anchor="addressing-and-address-configuration">
      <name>Addressing and Address Configuration</name>
      <section anchor="ip-version-6-addressing-architecture-rfc-4291">
        <name>IP Version 6 Addressing Architecture - RFC 4291</name>
        <t>The IPv6 Addressing Architecture <xref target="RFC4291"/> <bcp14>MUST</bcp14> be supported.</t>
        <t>The current IPv6 Address Architecture is based on a 64-bit boundary for subnet
prefixes.
The reasoning behind this decision is documented in <xref target="RFC7421"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> also support the multicast flag updates
documented in <xref target="RFC7371"/>.</t>
      </section>
      <section anchor="host-address-availability-recommendations">
        <name>Host Address Availability Recommendations</name>
        <t>Hosts may be configured with addresses through a variety of methods,
including Stateless Address Autoconfiguration (SLAAC), DHCPv6, or manual
configuration.</t>
        <t><xref target="RFC7934"/> recommends that networks provide general-purpose end hosts
with multiple global IPv6 addresses when they attach, and it describes
the benefits of and the options for doing so.
Routers <bcp14>SHOULD</bcp14> support <xref target="RFC7934"/> for assigning multiple addresses to a
host.
A host <bcp14>SHOULD</bcp14> support assigning multiple addresses as described in
<xref target="RFC7934"/>.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support the capability to be assigned a prefix per host as
documented in <xref target="RFC8273"/>.
Such an approach can offer improved host
isolation and enhanced subscriber management on shared network segments.</t>
      </section>
      <section anchor="ipv6-stateless-address-autoconfiguration-rfc-4862">
        <name>IPv6 Stateless Address Autoconfiguration - RFC 4862</name>
        <t>Hosts <bcp14>MUST</bcp14> support IPv6 Stateless Address Autoconfiguration.
It is <bcp14>RECOMMENDED</bcp14>, as described in <xref target="RFC8064"/>, that unless there
is a specific requirement for Media Access Control (MAC) addresses to be
embedded in
an Interface Identifier (IID), nodes follow the procedure in <xref target="RFC7217"/> to generate SLAAC-based
addresses, rather than use <xref target="RFC4862"/>.
Addresses generated using the method described in <xref target="RFC7217"/> will be the same whenever a given device (re)appears on the
same subnet (with a specific IPv6 prefix), but the IID will vary on
each subnet visited.</t>
        <t>Nodes that are routers <bcp14>MUST</bcp14> be able to generate link-local
addresses as described in <xref target="RFC4862"/>.</t>
        <t>From RFC 4862:</t>
        <ul empty="true">
          <li>
            <!-- Begin DNE text -->
  <t>The autoconfiguration process specified in this document
applies only to hosts and not routers.  Since host
autoconfiguration uses information advertised by routers,
routers will need to be configured by some other means.
However, it is expected that routers will generate link-local
addresses using the mechanism described in this document.  In
addition, routers are expected to successfully pass the
Duplicate Address Detection procedure described in this
document on all addresses prior to assigning them to an
interface.</t>
          </li>
        </ul>
        <t>All nodes <bcp14>MUST</bcp14> implement Duplicate Address Detection. Quoting
from <xref section="5.4" sectionFormat="of" target="RFC4862"/>:</t>
        <ul empty="true">
          <li>
            <t>Duplicate Address Detection <bcp14>MUST</bcp14>
be performed on all unicast addresses prior to assigning them
to an interface, regardless of whether they are obtained
through stateless autoconfiguration, DHCPv6, or manual
configuration, with the following exceptions [noted therein].</t>
          </li>
        </ul>
        <t>"Optimistic Duplicate Address Detection (DAD) for
IPv6" <xref target="RFC4429"/> specifies a mechanism to reduce
delays associated with generating addresses via Stateless
Address Autoconfiguration <xref target="RFC4862"/>.  RFC 4429
was developed in conjunction with Mobile IPv6 in order to reduce
the time needed to acquire and configure addresses as devices
quickly move from one network to another, and it is desirable to
minimize transition delays.  For general purpose devices, RFC 4429 remains
optional at this time.</t>
        <t><xref target="RFC7527"/> discusses enhanced DAD and describes an
algorithm to automate the detection of looped-back IPv6 ND messages
used by DAD. Nodes <bcp14>SHOULD</bcp14> implement this behavior where such
detection is beneficial.</t>
      </section>
      <section anchor="privacy-extensions-for-address-configuration-in-ipv6-rfc-8981">
        <name>Privacy Extensions for Address Configuration in IPv6 - RFC 8981</name>
        <t>A node using Stateless Address
Autoconfiguration <xref target="RFC4862"/> to form a globally
unique IPv6 address that uses its MAC address to generate the IID
will see that the IID remains the same on any visited
network, even though the network prefix part changes.
Thus, it is possible for a third-party device to track the activities of
the node they
communicate, as that node moves around the network.  Privacy Extensions
for Stateless Address
Autoconfiguration <xref target="RFC8981"/> address this
concern by allowing nodes to configure an additional temporary address
where the IID is effectively randomly generated.  Privacy addresses
are then used as source addresses for new communications initiated by the
node.</t>
        <t>General issues regarding privacy issues for IPv6 addressing are discussed
in <xref target="RFC7721"/>.</t>
        <t>RFC 8981 <bcp14>SHOULD</bcp14> be supported.  In some scenarios,
such as dedicated servers in a data
center, it provides limited or no benefit, or it may complicate network management.
Thus, devices implementing this specification <bcp14>MUST</bcp14> provide a way for the
end user to explicitly enable or disable the use of such temporary
addresses.</t>
        <t>Note that RFC 8981 can be used independently of traditional SLAAC or independently
of SLAAC that is based on RFC 7217.</t>
        <t>Implementers of RFC 8981 should be aware that certain
addresses are reserved and should not be chosen for use as
temporary addresses. Consult "Reserved IPv6 Interface
Identifiers" <xref target="RFC5453"/> for more details.</t>
      </section>
      <section anchor="stateful1">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>DHCPv6 <xref target="RFC8415"/> can be used to obtain and
configure addresses. In general, a network may provide for the
configuration of addresses through SLAAC,
DHCPv6, or both.  There will be a wide range of IPv6 deployment
models and differences in address assignment requirements,
some of which may require DHCPv6 for stateful address assignment.
Consequently, all hosts <bcp14>SHOULD</bcp14> implement address configuration
via DHCPv6.</t>
        <t>In the absence of observed Router Advertisement messages, IPv6 nodes
<bcp14>MAY</bcp14> initiate DHCP to obtain IPv6 addresses
and other configuration information, as described in <xref section="5.5.2" sectionFormat="of" target="RFC4862"/>.</t>
        <t>Where devices are likely to be carried by users and attached
to multiple visited networks, DHCPv6 client
anonymity profiles <bcp14>SHOULD</bcp14> be supported as described in <xref target="RFC7844"/> to minimize the disclosure of identifying information.
<xref section="5" sectionFormat="of" target="RFC7844"/> describes operational considerations on the use of
such anonymity profiles.</t>
      </section>
      <section anchor="default-address-selection-for-ipv6-rfc-6724">
        <name>Default Address Selection for IPv6 - RFC 6724</name>
        <t>IPv6 nodes will invariably have multiple addresses configured simultaneously
and thus will need to choose which addresses to use for which communications.
The rules specified in the Default Address Selection for
IPv6 document <xref target="RFC6724"/> <bcp14>MUST</bcp14> be implemented. <xref target="RFC8028"/> updates Rule 5.5 from <xref target="RFC6724"/>; implementations <bcp14>MUST</bcp14> implement this rule.</t>
      </section>
    </section>
    <section anchor="dns">
      <name>DNS</name>
      <t>DNS is described in <xref target="RFC1034"/>, <xref target="RFC1035"/>, <xref target="RFC3363"/>, and <xref target="RFC3596"/>.  Not all nodes will need to resolve names;
those that will never need to resolve DNS names do not need to
implement resolver functionality.  However, the ability to
resolve names is a basic infrastructure capability on which
applications rely, and most nodes will need to provide
support.  All nodes <bcp14>SHOULD</bcp14> implement stub-resolver <xref target="RFC1034"/> functionality, as in Section 5.3.1 of <xref target="RFC1034"/>, with support for:</t>
      <dl>
        <dt>-</dt>
        <dd>
          <t>AAAA type Resource Records <xref target="RFC3596"/>;</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>reverse addressing in ip6.arpa using PTR records <xref target="RFC3596"/>; and</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>Extension Mechanisms for DNS (EDNS(0)) <xref target="RFC6891"/> to allow for DNS packet sizes larger than 512 octets.</t>
        </dd>
      </dl>
      <t>Those nodes are <bcp14>RECOMMENDED</bcp14> to support DNS security extensions <xref target="RFC4033"/>  <xref target="RFC4034"/>  <xref target="RFC4035"/>.</t>
      <t>A6 Resource Records <xref target="RFC2874"/> are classified as Historic per <xref target="RFC6563"/>.  These were defined with Experimental status in <xref target="RFC3363"/>.</t>
    </section>
    <section anchor="OtherConfig">
      <name>Configuring Non-address Information</name>
      <section anchor="dhcp-for-other-configuration-information">
        <name>DHCP for Other Configuration Information</name>
        <t>DHCP <xref target="RFC8415"/> specifies a mechanism for IPv6 nodes to obtain
address configuration information (see <xref target="stateful1"/>) and to
obtain additional (non-address) configuration.  If a host
implementation supports applications or other protocols that
require configuration that is only available via DHCP, hosts
<bcp14>SHOULD</bcp14> implement DHCP. For specialized devices on which no
such configuration need is present, DHCP may not be
necessary.</t>
        <t>An IPv6 node can use the subset of DHCP (described in <xref target="RFC8415"/>) to obtain other configuration
information.</t>
        <t>If an IPv6 node implements DHCP, it <bcp14>MUST</bcp14> implement the DNS options <xref target="RFC3646"/> as most deployments will expect that these options are available.</t>
      </section>
      <section anchor="router-advertisements-and-default-gateway">
        <name>Router Advertisements and Default Gateway</name>
        <t>There is no defined DHCPv6 Gateway option.</t>
        <t>Nodes using the Dynamic Host Configuration Protocol for
IPv6 (DHCPv6) are thus expected to determine their default router
information and on-link prefix information from received
Router Advertisements.</t>
      </section>
      <section anchor="ipv6-router-advertisement-options-for-dns-configuration-rfc-8106">
        <name>IPv6 Router Advertisement Options for DNS         Configuration - RFC 8106</name>
        <t>Router Advertisement options have historically been limited to
those that are critical to basic IPv6 functionality. Originally,
DNS configuration was not included as an RA option, and DHCP
was the recommended way to obtain DNS configuration
information. Over time, the thinking surrounding such an
option has evolved. It is now generally recognized that few
nodes can function adequately without having access to a
working DNS resolver; thus, a
Standards Track document has been published to provide this
capability <xref target="RFC8106"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> include support for the DNS RA option <xref target="RFC8106"/>.</t>
      </section>
      <section anchor="dhcp-options-versus-router-advertisement-options-for-host-configuration">
        <name>DHCP Options versus Router Advertisement Options for Host Configuration</name>
        <t>In IPv6, there are two main protocol mechanisms for
propagating configuration information to hosts: RAs and DHCP. RA options
have been
restricted to those deemed essential for basic network
functioning and for which all nodes are configured with exactly
the same information.  Examples include the Prefix Information
Options, the MTU option, etc. On the other hand, DHCP has
generally been preferred for configuration of more general
parameters and for parameters that may be client specific.
Generally speaking, however, there has been a desire
to define only one mechanism for configuring a given option,
rather than defining multiple (different) ways of configuring
the same information.</t>
        <t>One issue with having multiple ways to configure the same
information is that interoperability suffers if a host chooses one
mechanism but the
network operator chooses a different mechanism. For "closed"
environments, where the network operator
has significant influence over what devices connect to the
network and thus what configuration mechanisms they support, the
operator may be able to ensure that a particular mechanism is
supported by all connected hosts. In more open environments,
however, where arbitrary devices may connect (e.g., a Wi-Fi
hotspot), problems can arise. To maximize interoperability in
such environments, hosts would need to implement multiple
configuration mechanisms to ensure interoperability.</t>
      </section>
    </section>
    <section anchor="service-discovery-protocols">
      <name>Service Discovery Protocols</name>
      <t>Multicast DNS (mDNS) and
DNS-based Service Discovery (DNS-SD) are described in <xref target="RFC6762"/> and <xref target="RFC6763"/>, respectively.
These protocols, often collectively referred to as the
'Bonjour' protocols after their naming by Apple, provide
the means for devices to discover services within a local
link and, in the absence of a unicast DNS service, to
exchange naming information.</t>
      <t>Where devices are to be deployed in networks where
service discovery would be beneficial, e.g., for users
seeking to discover printers or display devices, mDNS and
DNS-SD <bcp14>SHOULD</bcp14> be supported.</t>
    </section>
    <section anchor="ipv4-support-and-transition">
      <name>IPv4 Support and Transition</name>
      <t>IPv6 nodes <bcp14>MAY</bcp14> support IPv4.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <section anchor="basic-transition-mechanisms-for-ipv6-hosts-and-routers-rfc4213">
          <name>Basic Transition Mechanisms for IPv6 Hosts and Routers - RFC 4213</name>
          <t>If an IPv6 node implements dual stack and tunneling, then <xref target="RFC4213"/> <bcp14>MUST</bcp14> be supported.</t>
        </section>
        <section anchor="support-for-discovery-of-translation-prefixes">
          <name>Support for discovery of translation prefixes</name>
          <t><xref target="RFC8781"/> describes a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts. In order to support migration to and operation of IPv6-mostly and IPv6-only network environments, it is recommended that all hosts support discovery of NAT64 prefixes as described in RFC 8781.
Nodes <bcp14>MAY</bcp14> also support <xref target="RFC7050"/> as a fallback mechanism for NAT64 prefix discovery.</t>
        </section>
      </section>
    </section>
    <section anchor="application-support">
      <name>Application Support</name>
      <section anchor="textual-representation-of-ipv6-addresses-rfc-5952">
        <name>Textual Representation of IPv6 Addresses - RFC 5952</name>
        <t>Software that allows users and operators to input IPv6
addresses in text form <bcp14>SHOULD</bcp14> support "A Recommendation for
IPv6 Address Text Representation" <xref target="RFC5952"/>.</t>
      </section>
      <section anchor="application-programming-interfaces-apis">
        <name>Application Programming Interfaces (APIs)</name>
        <t>There are a number of IPv6-related APIs. This document does
not mandate the use of any, because the choice of API does not
directly relate to on-the-wire behavior of
protocols. Implementers, however, would be advised to consider
providing a common API or reviewing existing APIs for the type
of functionality they provide to applications.</t>
        <t>"Basic Socket Interface Extensions for IPv6" <xref target="RFC3493"/> provides IPv6 functionality used by
typical applications. Implementers should note that RFC 3493 has
been picked up and further standardized by the Portable Operating System
Interface (POSIX) <xref target="POSIX"/>.</t>
        <t>"Advanced Sockets Application Program Interface (API) for
IPv6" <xref target="RFC3542"/> provides access to
advanced IPv6 features needed by diagnostic and other
more specialized applications.</t>
        <t>"IPv6 Socket API for Source Address Selection" <xref target="RFC5014"/> provides facilities that allow an
application to override the default Source Address Selection
rules of <xref target="RFC6724"/>.</t>
        <t>"Socket Interface Extensions for Multicast Source Filters" <xref target="RFC3678"/> provides support for expressing source
filters on multicast group memberships.</t>
        <t>"Extension to Sockets API for Mobile IPv6" <xref target="RFC4584"/> provides application support for
accessing and enabling Mobile IPv6 <xref target="RFC6275"/> features.</t>
      </section>
    </section>
    <section anchor="sec">
      <name>Security</name>
      <t>This section describes the security specification for IPv6
nodes.</t>
      <t>Achieving security in practice is a complex undertaking.
Operational procedures, protocols, key distribution mechanisms,
certificate management approaches, etc., are all components that
impact the level of security actually achieved in practice. More
importantly, deficiencies or a poor fit in any one individual
component can significantly reduce the overall effectiveness of a
particular security approach.</t>
      <t>IPsec can provide either end-to-end security between nodes
or channel security (for example, via a site-to-site IPsec
VPN), making it possible to provide secure communication for all (or a subset
of) communication flows at the IP layer between pairs of Internet
nodes.  IPsec has two standard operating modes: Tunnel-mode and Transport-mode.
In Tunnel-mode, IPsec provides network-layer security and protects an entire
IP packet
by encapsulating the original IP packet and then prepending a new IP header.
In Transport-mode, IPsec provides security for the transport layer (and above)
by
encapsulating only the transport-layer (and above) portion of the IP packet
(i.e., without adding
a second IP header).</t>
      <t>Although IPsec can be used with manual keying in some cases,
such usage has limited applicability and is not recommended.</t>
      <t>A range of security technologies and approaches proliferate
today (e.g., IPsec, Transport Layer Security (TLS), Secure SHell (SSH), TLS
VPNS, etc.).
No single approach has emerged as
an ideal technology for all needs and environments. Moreover, IPsec
is not viewed as the ideal security technology in all cases and is
unlikely to displace the others.</t>
      <t>Previously, IPv6 mandated implementation of IPsec and
recommended the key-management approach of IKE. RFC 6434 updated that recommendation
by making support of the IPsec
architecture <xref target="RFC4301"/> a <bcp14>SHOULD</bcp14> for all IPv6 nodes, and this document retains that recommendation.
Note that
the IPsec Architecture requires the
implementation of both manual and automatic key management (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).
Currently, the recommended automated key-management protocol to
implement is IKEv2 <xref target="RFC7296"/>.</t>
      <t>This document recognizes that there exists a range of device
types and environments where approaches to security other than
IPsec can be justified. For example, special-purpose devices may
support only a very limited number or type of applications, and an
application-specific security approach may be sufficient for
limited management or configuration capabilities. Alternatively,
some devices may run on extremely constrained hardware (e.g.,
sensors) where the full IPsec Architecture is not justified.</t>
      <t>Because most common platforms now support IPv6 and have it
enabled by default, IPv6 security is an issue for networks
that are ostensibly IPv4 only; see <xref target="RFC7123"/> for guidance on this area.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>"Security Architecture for the Internet Protocol" <xref target="RFC4301"/> <bcp14>SHOULD</bcp14> be supported by all IPv6
nodes. Note that the IPsec Architecture requires the implementation of both
manual and automatic key
management  (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).  Currently, the default automated key-management
protocol to implement is IKEv2. As required in <xref target="RFC4301"/>, IPv6
nodes implementing the IPsec Architecture <bcp14>MUST</bcp14> implement ESP <xref target="RFC4303"/> and <bcp14>MAY</bcp14> implement AH <xref target="RFC4302"/>.</t>
      </section>
      <section anchor="transforms-and-algorithms">
        <name>Transforms and Algorithms</name>
        <t>The current set of mandatory-to-implement algorithms for the
IPsec Architecture are defined in Cryptographic
Algorithm Implementation Requirements for ESP and AH <xref target="RFC8221"/>.  IPv6 nodes implementing the IPsec
Architecture <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8221"/>.
Preferred cryptographic algorithms often change more
frequently than security protocols. Therefore, implementations
<bcp14>MUST</bcp14> allow for migration to new algorithms, as RFC 8221 is
replaced or updated in the future.</t>
        <t>The current set of mandatory-to-implement algorithms for
IKEv2 are defined in Cryptographic Algorithm Implementation
Requirements for ESP and AH <xref target="RFC8247"/>.  IPv6 nodes
implementing IKEv2 <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8247"/> and/or any future
updates or replacements to <xref target="RFC8247"/>.</t>
      </section>
    </section>
    <section anchor="router-specific-functionality">
      <name>Router-Specific Functionality</name>
      <t>This section defines general host considerations for IPv6 nodes
that act as routers.  Currently, this section does not discuss
detailed routing-specific requirements. For the case of typical home routers, <xref target="RFC7084"/> defines basic requirements for customer edge routers.</t>
      <section anchor="ipv6-router-alert-option-rfc-2711">
        <name>IPv6 Router Alert Option - RFC 2711</name>
        <t>The IPv6 Router Alert option <xref target="RFC2711"/> is
an optional IPv6 Hop-by-Hop Header that is used in conjunction
with some protocols (e.g., RSVP <xref target="RFC2205"/> or
Multicast Listener Discovery (MLDv2) <xref target="RFC3810"/>).  The Router Alert option will
need to be implemented whenever such protocols that mandate its
use are implemented.  See <xref target="mld"/>.</t>
      </section>
      <section anchor="neighbor-discovery-for-ipv6-rfc-4861">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Sending Router Advertisements and processing Router
Solicitations <bcp14>MUST</bcp14> be supported.</t>
        <t>Routers <bcp14>SHOULD</bcp14> support <xref target="RFC9131"/> to avoid packet lost.</t>
        <t><xref section="7" sectionFormat="of" target="RFC6275"/> includes some mobility-specific
extensions to Neighbor Discovery.
Routers <bcp14>SHOULD</bcp14> implement
Sections 7.3 and 7.5, even if they do not implement home
agent functionality.</t>
      </section>
      <section anchor="stateful-address-autoconfiguration-dhcpv6-rfc-8415">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>A single DHCP server (<xref target="RFC8415"/> or <xref target="RFC4862"/>) can provide configuration information to
devices directly attached to a shared link, as well as to
devices located elsewhere within a site. Communication between
a client and a DHCP server located on different links requires
the use of DHCP relay agents on routers.</t>
        <t>In simple deployments, consisting of a single router and
either a single LAN or multiple LANs attached to the single
router, together with a WAN connection, a DHCP server
embedded within the router is one common deployment scenario
(e.g., <xref target="RFC7084"/>). There is no need
for relay agents in such scenarios.</t>
        <t>In more complex deployment scenarios, such as within enterprise or service provider networks, the use of DHCP requires some level of configuration, in order to configure relay agents, prefixes for delegation, DHCP servers, etc. In such environments, the DHCP server might even be run on a traditional server, rather than as part of a router.</t>
        <t>Because of the wide range of deployment scenarios, support for DHCP server functionality on routers is optional.  However, routers targeted for deployment within more complex scenarios (as described above) <bcp14>SHOULD</bcp14> support relay agent functionality including support for support DHCPv6-PD as defined in <eref target="?">RFC3633</eref>.  Note that "Basic Requirements for IPv6 Customer Edge Routers" <xref target="RFC7084"/> requires implementation of a DHCPv6 server function in IPv6 Customer Edge (CE) routers.</t>
      </section>
      <section anchor="ipv6-prefix-length-recommendation-for-forwarding-bcp-198">
        <name>IPv6 Prefix Length Recommendation for Forwarding - BCP 198</name>
        <t>Forwarding nodes <bcp14>MUST</bcp14> conform to BCP 198 <xref target="RFC7608"/>;
thus, IPv6 implementations of nodes that may forward packets
<bcp14>MUST</bcp14> conform to the rules specified in <xref section="5.1" sectionFormat="of" target="RFC4632"/>.</t>
      </section>
    </section>
    <section anchor="constrained-devices">
      <name>Constrained Devices</name>
      <t>The focus of this document is general IPv6 nodes. In this section, we briefly
discuss considerations for constrained devices.</t>
      <t>In the case of constrained nodes,
with limited CPU, memory, bandwidth or power, support for certain IPv6 functionality
may need
to be considered due to those limitations.  While the requirements of this
document are
<bcp14>RECOMMENDED</bcp14> for all nodes, including constrained nodes, compromises may need
to be
made in certain cases.  Where such compromises are made, the interoperability
of devices
should be strongly considered, particularly where this may impact other nodes
on the same
link, e.g., only supporting MLDv1 will affect other nodes.</t>
      <t>The IETF 6LowPAN (IPv6 over Low-Power Wireless Personal Area Network) WG
produced six RFCs, including a general
overview and problem statement <xref target="RFC4919"/> (the means by which IPv6 packets
are transmitted over IEEE 802.15.4 networks <xref target="RFC4944"/> and ND optimizations for that medium <xref target="RFC6775"/>).</t>
      <t>IPv6 nodes that are battery powered <bcp14>SHOULD</bcp14> implement the recommendations
in <xref target="RFC7772"/>.</t>
    </section>
    <section anchor="ipv6-node-management">
      <name>IPv6 Node Management</name>
      <t>Network management <bcp14>MAY</bcp14> be supported by IPv6 nodes.  However,
for IPv6 nodes that are embedded devices, network management may
be the only possible way of controlling these nodes.</t>
      <t>Existing network management protocols include SNMP <xref target="RFC3411"/>, NETCONF <xref target="RFC6241"/>, and RESTCONF <xref target="RFC8040"/>.</t>
      <section anchor="management-information-base-mib-modules">
        <name>Management Information Base (MIB) Modules</name>
        <t>The obsoleted status of
various IPv6-specific MIB modules is clarified in <xref target="RFC8096"/>.</t>
        <t>The following two MIB modules <bcp14>SHOULD</bcp14> be supported by nodes that
support an SNMP agent.</t>
        <section anchor="ip-forwarding-table-mib">
          <name>IP Forwarding Table MIB</name>
          <t>The IP Forwarding Table MIB <xref target="RFC4292"/> <bcp14>SHOULD</bcp14> be supported by nodes that support an
SNMP agent.</t>
        </section>
        <section anchor="management-information-base-for-the-internet-protocol-ip">
          <name>Management Information Base for the Internet Protocol (IP)</name>
          <t>The IP MIB <xref target="RFC4293"/> <bcp14>SHOULD</bcp14> be supported by nodes
that support an SNMP agent.</t>
        </section>
        <section anchor="interface-mib">
          <name>Interface MIB</name>
          <t>The Interface MIB <xref target="RFC2863"/> <bcp14>SHOULD</bcp14> be supported by nodes that support
an SNMP agent.</t>
        </section>
      </section>
      <section anchor="yang-data-models">
        <name>YANG Data Models</name>
        <t>The following YANG data models <bcp14>SHOULD</bcp14> be supported by nodes that support
a
NETCONF or RESTCONF agent.</t>
        <section anchor="ip-management-yang-model">
          <name>IP Management YANG Model</name>
          <t>The IP Management YANG Model <xref target="RFC8344"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
        <section anchor="interface-management-yang-model">
          <name>Interface Management YANG Model</name>
          <t>The Interface Management YANG Model <xref target="RFC8343"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not directly affect the security of the
Internet, beyond the security considerations associated with the
individual protocols.</t>
      <t>Security is also discussed in <xref target="sec"/> above.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2710">
          <front>
            <title>Multicast Listener Discovery (MLD) for IPv6</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="W. Fenner" initials="W." surname="Fenner"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This document specifies the protocol used by an IPv6 router to discover the presence of multicast listeners (that is, nodes wishing to receive multicast packets) on its directly attached links, and to discover specifically which multicast addresses are of interest to those neighboring nodes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2710"/>
          <seriesInfo name="DOI" value="10.17487/RFC2710"/>
        </reference>
        <reference anchor="RFC2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <author fullname="A. Jackson" initials="A." surname="Jackson"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC2863">
          <front>
            <title>The Interfaces Group MIB</title>
            <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
            <author fullname="F. Kastenholz" initials="F." surname="Kastenholz"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This memo discusses the 'interfaces' group of MIB-II, especially the experience gained from the definition of numerous media-specific MIB modules for use in conjunction with the 'interfaces' group for managing various sub-layers beneath the internetwork-layer. It specifies clarifications to, and extensions of, the architectural issues within the MIB-II model of the 'interfaces' group. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2863"/>
          <seriesInfo name="DOI" value="10.17487/RFC2863"/>
        </reference>
        <reference anchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC3411">
          <front>
            <title>An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="R. Presuhn" initials="R." surname="Presuhn"/>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes an architecture for describing Simple Network Management Protocol (SNMP) Management Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing a Message Processing Subsystem, a Security Subsystem and an Access Control Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data. This document obsoletes RFC 2571. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3411"/>
          <seriesInfo name="DOI" value="10.17487/RFC3411"/>
        </reference>
        <reference anchor="RFC3596">
          <front>
            <title>DNS Extensions to Support IP Version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="V. Ksinant" initials="V." surname="Ksinant"/>
            <author fullname="M. Souissi" initials="M." surname="Souissi"/>
            <date month="October" year="2003"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="88"/>
          <seriesInfo name="RFC" value="3596"/>
          <seriesInfo name="DOI" value="10.17487/RFC3596"/>
        </reference>
        <reference anchor="RFC3810">
          <front>
            <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
            <author fullname="R. Vida" initials="R." role="editor" surname="Vida"/>
            <author fullname="L. Costa" initials="L." role="editor" surname="Costa"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document updates RFC 2710, and it specifies Version 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links, and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3810"/>
          <seriesInfo name="DOI" value="10.17487/RFC3810"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC4213">
          <front>
            <title>Basic Transition Mechanisms for IPv6 Hosts and Routers</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. Two mechanisms are specified, dual stack and configured tunneling. Dual stack implies providing complete implementations of both versions of the Internet Protocol (IPv4 and IPv6), and configured tunneling provides a means to carry IPv6 packets over unmodified IPv4 routing infrastructures.</t>
              <t>This document obsoletes RFC 2893. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4213"/>
          <seriesInfo name="DOI" value="10.17487/RFC4213"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC4292">
          <front>
            <title>IP Forwarding Table MIB</title>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects related to the forwarding of Internet Protocol (IP) packets in an IP version-independent manner. This document obsoletes RFC 2096. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4292"/>
          <seriesInfo name="DOI" value="10.17487/RFC4292"/>
        </reference>
        <reference anchor="RFC4293">
          <front>
            <title>Management Information Base for the Internet Protocol (IP)</title>
            <author fullname="S. Routhier" initials="S." role="editor" surname="Routhier"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for implementations of the Internet Protocol (IP) in an IP version independent manner. This memo obsoletes RFCs 2011, 2465, and 2466. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4293"/>
          <seriesInfo name="DOI" value="10.17487/RFC4293"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4311">
          <front>
            <title>IPv6 Host-to-Router Load Sharing</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>The original IPv6 conceptual sending algorithm does not do load sharing among equivalent IPv6 routers, and suggests schemes that can be problematic in practice. This document updates the conceptual sending algorithm in RFC 2461 so that traffic to different destinations can be distributed among routers in an efficient fashion. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4311"/>
          <seriesInfo name="DOI" value="10.17487/RFC4311"/>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC4607">
          <front>
            <title>Source-Specific Multicast for IP</title>
            <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
            <author fullname="B. Cain" initials="B." surname="Cain"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>IP version 4 (IPv4) addresses in the 232/8 (232.0.0.0 to 232.255.255.255) range are designated as source-specific multicast (SSM) destination addresses and are reserved for use by source-specific applications and protocols. For IP version 6 (IPv6), the address prefix FF3x::/32 is reserved for source-specific multicast use. This document defines an extension to the Internet network service that applies to datagrams sent to SSM addresses and defines the host and router requirements to support this extension. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4607"/>
          <seriesInfo name="DOI" value="10.17487/RFC4607"/>
        </reference>
        <reference anchor="RFC4632">
          <front>
            <title>Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan</title>
            <author fullname="V. Fuller" initials="V." surname="Fuller"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This memo discusses the strategy for address assignment of the existing 32-bit IPv4 address space with a view toward conserving the address space and limiting the growth rate of global routing state. This document obsoletes the original Classless Inter-domain Routing (CIDR) spec in RFC 1519, with changes made both to clarify the concepts it introduced and, after more than twelve years, to update the Internet community on the results of deploying the technology described. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="122"/>
          <seriesInfo name="RFC" value="4632"/>
          <seriesInfo name="DOI" value="10.17487/RFC4632"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4862">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC5453">
          <front>
            <title>Reserved IPv6 Interface Identifiers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>Interface identifiers in IPv6 unicast addresses are used to identify interfaces on a link. They are required to be unique within a subnet. Several RFCs have specified interface identifiers or identifier ranges that have a special meaning attached to them. An IPv6 node autoconfiguring an interface identifier in these ranges will encounter unexpected consequences. Since there is no centralized repository for such reserved identifiers, this document aims to create one. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5453"/>
          <seriesInfo name="DOI" value="10.17487/RFC5453"/>
        </reference>
        <reference anchor="RFC5722">
          <front>
            <title>Handling of Overlapping IPv6 Fragments</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="December" year="2009"/>
            <abstract>
              <t>The fragmentation and reassembly algorithm specified in the base IPv6 specification allows fragments to overlap. This document demonstrates the security issues associated with allowing overlapping fragments and updates the IPv6 specification to explicitly forbid overlapping fragments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5722"/>
          <seriesInfo name="DOI" value="10.17487/RFC5722"/>
        </reference>
        <reference anchor="RFC5790">
          <front>
            <title>Lightweight Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Version 2 (MLDv2) Protocols</title>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <author fullname="W. Cao" initials="W." surname="Cao"/>
            <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>This document describes lightweight IGMPv3 and MLDv2 protocols (LW- IGMPv3 and LW-MLDv2), which simplify the standard (full) versions of IGMPv3 and MLDv2. The interoperability with the full versions and the previous versions of IGMP and MLD is also taken into account. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5790"/>
          <seriesInfo name="DOI" value="10.17487/RFC5790"/>
        </reference>
        <reference anchor="RFC5942">
          <front>
            <title>IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>IPv6 specifies a model of a subnet that is different than the IPv4 subnet model. The subtlety of the differences has resulted in incorrect implementations that do not interoperate. This document spells out the most important difference: that an IPv6 address isn't automatically associated with an IPv6 on-link prefix. This document also updates (partially due to security concerns caused by incorrect implementations) a part of the definition of "on-link" from RFC 4861. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5942"/>
          <seriesInfo name="DOI" value="10.17487/RFC5942"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6437">
          <front>
            <title>IPv6 Flow Label Specification</title>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="J. Rajahalme" initials="J." surname="Rajahalme"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods. Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.</t>
              <t>The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6437"/>
          <seriesInfo name="DOI" value="10.17487/RFC6437"/>
        </reference>
        <reference anchor="RFC6564">
          <front>
            <title>A Uniform Format for IPv6 Extension Headers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="J. Woodyatt" initials="J." surname="Woodyatt"/>
            <author fullname="E. Kline" initials="E." surname="Kline"/>
            <author fullname="J. Hoagland" initials="J." surname="Hoagland"/>
            <author fullname="M. Bhatia" initials="M." surname="Bhatia"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the transport-layer header. There are a small number of such extension headers currently defined. This document describes the issues that can arise when defining new extension headers and discusses the alternate extension mechanisms in IPv6. It also provides a common format for defining any new IPv6 extension headers, if they are needed. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6564"/>
          <seriesInfo name="DOI" value="10.17487/RFC6564"/>
        </reference>
        <reference anchor="RFC6724">
          <front>
            <title>Default Address Selection for Internet Protocol Version 6 (IPv6)</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="A. Matsumoto" initials="A." surname="Matsumoto"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document describes two algorithms, one for source address selection and one for destination address selection. The algorithms specify default behavior for all Internet Protocol version 6 (IPv6) implementations. They do not override choices made by applications or upper-layer protocols, nor do they preclude the development of more advanced mechanisms for address selection. The two algorithms share a common context, including an optional mechanism for allowing administrators to provide policy that can override the default behavior. In dual-stack implementations, the destination address selection algorithm can consider both IPv4 and IPv6 addresses -- depending on the available source addresses, the algorithm might prefer IPv6 addresses over IPv4 addresses, or vice versa.</t>
              <t>Default address selection as defined in this specification applies to all IPv6 nodes, including both hosts and routers. This document obsoletes RFC 3484. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6724"/>
          <seriesInfo name="DOI" value="10.17487/RFC6724"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC6775">
          <front>
            <title>Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4. This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation. In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links. IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network. This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks. The document thus updates RFC 4944 to specify the use of the optimizations defined here. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6775"/>
          <seriesInfo name="DOI" value="10.17487/RFC6775"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC6946">
          <front>
            <title>Processing of IPv6 "Atomic" Fragments</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The IPv6 specification allows packets to contain a Fragment Header without the packet being actually fragmented into multiple pieces (we refer to these packets as "atomic fragments"). Such packets are typically sent by hosts that have received an ICMPv6 "Packet Too Big" error message that advertises a Next-Hop MTU smaller than 1280 bytes, and are currently processed by some implementations as normal "fragmented traffic" (i.e., they are "reassembled" with any other queued fragments that supposedly correspond to the same original packet). Thus, an attacker can cause hosts to employ atomic fragments by forging ICMPv6 "Packet Too Big" error messages, and then launch any fragmentation-based attacks against such traffic. This document discusses the generation of the aforementioned atomic fragments and the corresponding security implications. Additionally, this document formally updates RFC 2460 and RFC 5722, such that IPv6 atomic fragments are processed independently of any other fragments, thus completely eliminating the aforementioned attack vector.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6946"/>
          <seriesInfo name="DOI" value="10.17487/RFC6946"/>
        </reference>
        <reference anchor="RFC7045">
          <front>
            <title>Transmission and Processing of IPv6 Extension Headers</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <date month="December" year="2013"/>
            <abstract>
              <t>Various IPv6 extension headers have been standardised since the IPv6 standard was first published. This document updates RFC 2460 to clarify how intermediate nodes should deal with such extension headers and with any that are defined in the future. It also specifies how extension headers should be registered by IANA, with a corresponding minor update to RFC 2780.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7045"/>
          <seriesInfo name="DOI" value="10.17487/RFC7045"/>
        </reference>
        <reference anchor="RFC7048">
          <front>
            <title>Neighbor Unreachability Detection Is Too Impatient</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="I. Gashinsky" initials="I." surname="Gashinsky"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>IPv6 Neighbor Discovery includes Neighbor Unreachability Detection. That function is very useful when a host has an alternative neighbor -- for instance, when there are multiple default routers -- since it allows the host to switch to the alternative neighbor in a short time. By default, this time is 3 seconds after the node starts probing. However, if there are no alternative neighbors, this timeout behavior is far too impatient. This document specifies relaxed rules for Neighbor Discovery retransmissions that allow an implementation to choose different timeout behavior based on whether or not there are alternative neighbors. This document updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7048"/>
          <seriesInfo name="DOI" value="10.17487/RFC7048"/>
        </reference>
        <reference anchor="RFC7112">
          <front>
            <title>Implications of Oversized IPv6 Header Chains</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="V. Manral" initials="V." surname="Manral"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>The IPv6 specification allows IPv6 Header Chains of an arbitrary size. The specification also allows options that can, in turn, extend each of the headers. In those scenarios in which the IPv6 Header Chain or options are unusually long and packets are fragmented, or scenarios in which the fragment size is very small, the First Fragment of a packet may fail to include the entire IPv6 Header Chain. This document discusses the interoperability and security problems of such traffic, and updates RFC 2460 such that the First Fragment of a packet is required to contain the entire IPv6 Header Chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7112"/>
          <seriesInfo name="DOI" value="10.17487/RFC7112"/>
        </reference>
        <reference anchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another. This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users. The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7527">
          <front>
            <title>Enhanced Duplicate Address Detection</title>
            <author fullname="R. Asati" initials="R." surname="Asati"/>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <author fullname="E. Dart" initials="E." surname="Dart"/>
            <author fullname="W. George" initials="W." surname="George"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of RFC 4862. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. Several service provider communities have expressed a need for automated detection of looped back Neighbor Discovery (ND) messages used by DAD. This document includes mitigation techniques and outlines the Enhanced DAD algorithm to automate the detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks, this document automates resolving a specific duplicate address conflict. This document updates RFCs 4429, 4861, and 4862.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7527"/>
          <seriesInfo name="DOI" value="10.17487/RFC7527"/>
        </reference>
        <reference anchor="RFC7559">
          <front>
            <title>Packet-Loss Resiliency for Router Solicitations</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="D. Anipko" initials="D." surname="Anipko"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>When an interface on a host is initialized, the host transmits Router Solicitations in order to minimize the amount of time it needs to wait until the next unsolicited multicast Router Advertisement is received. In certain scenarios, these Router Solicitations transmitted by the host might be lost. This document specifies a mechanism for hosts to cope with the loss of the initial Router Solicitations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7559"/>
          <seriesInfo name="DOI" value="10.17487/RFC7559"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC8028">
          <front>
            <title>First-Hop Router Selection by Hosts in a Multi-Prefix Network</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document describes expected IPv6 host behavior in a scenario that has more than one prefix, each allocated by an upstream network that is assumed to implement BCP 38 ingress filtering, when the host has multiple routers to choose from. It also applies to other scenarios such as the usage of stateful firewalls that effectively act as address-based filters. Host behavior in choosing a first-hop router may interact with source address selection in a given implementation. However, the selection of the source address for a packet is done before the first-hop router for that packet is chosen. Given that the network or host is, or appears to be, multihomed with multiple provider-allocated addresses, that the host has elected to use a source address in a given prefix, and that some but not all neighboring routers are advertising that prefix in their Router Advertisement Prefix Information Options, this document specifies to which router a host should present its transmission. It updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8028"/>
          <seriesInfo name="DOI" value="10.17487/RFC8028"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8064">
          <front>
            <title>Recommendation on Stable IPv6 Interface Identifiers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document changes the recommended default Interface Identifier (IID) generation scheme for cases where Stateless Address Autoconfiguration (SLAAC) is used to generate a stable IPv6 address. It recommends using the mechanism specified in RFC 7217 in such cases, and recommends against embedding stable link-layer addresses in IPv6 IIDs. It formally updates RFC 2464, RFC 2467, RFC 2470, RFC 2491, RFC 2492, RFC 2497, RFC 2590, RFC 3146, RFC 3572, RFC 4291, RFC 4338, RFC 4391, RFC 5072, and RFC 5121. This document does not change any existing recommendations concerning the use of temporary addresses as specified in RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8064"/>
          <seriesInfo name="DOI" value="10.17487/RFC8064"/>
        </reference>
        <reference anchor="RFC8106">
          <front>
            <title>IPv6 Router Advertisement Options for DNS Configuration</title>
            <author fullname="J. Jeong" initials="J." surname="Jeong"/>
            <author fullname="S. Park" initials="S." surname="Park"/>
            <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
              <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8106"/>
          <seriesInfo name="DOI" value="10.17487/RFC8106"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="RFC8221">
          <front>
            <title>Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document replaces RFC 7321, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)". The goal of this document is to enable ESP and AH to benefit from cryptography that is up to date while making IPsec interoperable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8221"/>
          <seriesInfo name="DOI" value="10.17487/RFC8221"/>
        </reference>
        <reference anchor="RFC8247">
          <front>
            <title>Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The Internet Key Exchange (IKE) protocol is used to negotiate the IPsec Security Association (IPsec SA) parameters, such as which algorithms should be used. To ensure interoperability between different implementations, it is necessary to specify a set of algorithm implementation requirements and usage guidance to ensure that there is at least one algorithm that all implementations support. This document updates RFC 7296 and obsoletes RFC 4307 in defining the current algorithm implementation requirements and usage guidance for IKEv2, and does minor cleaning up of the IKEv2 IANA registry. This document does not update the algorithms used for packet encryption using IPsec Encapsulating Security Payload (ESP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8247"/>
          <seriesInfo name="DOI" value="10.17487/RFC8247"/>
        </reference>
        <reference anchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC8344">
          <front>
            <title>A YANG Data Model for IP Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for management of IP implementations. The data model includes configuration and system state.</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7277.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8344"/>
          <seriesInfo name="DOI" value="10.17487/RFC8344"/>
        </reference>
        <reference anchor="RFC8415">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="November" year="2018"/>
            <abstract>
              <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
        </reference>
        <reference anchor="RFC8981">
          <front>
            <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8981"/>
          <seriesInfo name="DOI" value="10.17487/RFC8981"/>
        </reference>
        <reference anchor="RFC9131">
          <front>
            <title>Gratuitous Neighbor Discovery: Creating Neighbor Cache Entries on First-Hop Routers</title>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>Neighbor Discovery (RFC 4861) is used by IPv6 nodes to determine the link-layer addresses of neighboring nodes as well as to discover and maintain reachability information. This document updates RFC 4861 to allow routers to proactively create a Neighbor Cache entry when a new IPv6 address is assigned to a node. It also updates RFC 4861 and recommends that nodes send unsolicited Neighbor Advertisements upon assigning a new IPv6 address. These changes will minimize the delay and packet loss when a node initiates connections to an off-link destination from a new IPv6 address.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9131"/>
          <seriesInfo name="DOI" value="10.17487/RFC9131"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC0793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2205">
          <front>
            <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <author fullname="S. Berson" initials="S." surname="Berson"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="S. Jamin" initials="S." surname="Jamin"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2205"/>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
        </reference>
        <reference anchor="RFC2464">
          <front>
            <title>Transmission of IPv6 Packets over Ethernet Networks</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document specifies the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Ethernet networks. It also specifies the content of the Source/Target Link-layer Address option used in Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement and Redirect messages when those messages are transmitted on an Ethernet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2464"/>
          <seriesInfo name="DOI" value="10.17487/RFC2464"/>
        </reference>
        <reference anchor="RFC2491">
          <front>
            <title>IPv6 over Non-Broadcast Multiple Access (NBMA) networks</title>
            <author fullname="G. Armitage" initials="G." surname="Armitage"/>
            <author fullname="P. Schulter" initials="P." surname="Schulter"/>
            <author fullname="M. Jork" initials="M." surname="Jork"/>
            <author fullname="G. Harter" initials="G." surname="Harter"/>
            <date month="January" year="1999"/>
            <abstract>
              <t>This document describes a general architecture for IPv6 over NBMA networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2491"/>
          <seriesInfo name="DOI" value="10.17487/RFC2491"/>
        </reference>
        <reference anchor="RFC2590">
          <front>
            <title>Transmission of IPv6 Packets over Frame Relay Networks Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="A. Malis" initials="A." surname="Malis"/>
            <author fullname="M. Mueller" initials="M." surname="Mueller"/>
            <date month="May" year="1999"/>
            <abstract>
              <t>This memo describes mechanisms for the transmission of IPv6 packets over Frame Relay networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2590"/>
          <seriesInfo name="DOI" value="10.17487/RFC2590"/>
        </reference>
        <reference anchor="RFC2874">
          <front>
            <title>DNS Extensions to Support IPv6 Address Aggregation and Renumbering</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="July" year="2000"/>
            <abstract>
              <t>This document defines changes to the Domain Name System to support renumberable and aggregatable IPv6 addressing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2874"/>
          <seriesInfo name="DOI" value="10.17487/RFC2874"/>
        </reference>
        <reference anchor="RFC2923">
          <front>
            <title>TCP Problems with Path MTU Discovery</title>
            <author fullname="K. Lahey" initials="K." surname="Lahey"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This memo catalogs several known Transmission Control Protocol (TCP) implementation problems dealing with Path Maximum Transmission Unit Discovery (PMTUD), including the long-standing black hole problem, stretch acknowlegements (ACKs) due to confusion between Maximum Segment Size (MSS) and segment size, and MSS advertisement based on PMTU. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2923"/>
          <seriesInfo name="DOI" value="10.17487/RFC2923"/>
        </reference>
        <reference anchor="RFC3146">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 1394 Networks</title>
            <author fullname="K. Fujisawa" initials="K." surname="Fujisawa"/>
            <author fullname="A. Onoe" initials="A." surname="Onoe"/>
            <date month="October" year="2001"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE1394 networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3146"/>
          <seriesInfo name="DOI" value="10.17487/RFC3146"/>
        </reference>
        <reference anchor="RFC3363">
          <front>
            <title>Representing Internet Protocol version 6 (IPv6) Addresses in the Domain Name System (DNS)</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="B. Fink" initials="B." surname="Fink"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="T. Hain" initials="T." surname="Hain"/>
            <date month="August" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3363"/>
          <seriesInfo name="DOI" value="10.17487/RFC3363"/>
        </reference>
        <reference anchor="RFC3493">
          <front>
            <title>Basic Socket Interface Extensions for IPv6</title>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <date month="February" year="2003"/>
            <abstract>
              <t>The de facto standard Application Program Interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to support IPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required by TCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3493"/>
          <seriesInfo name="DOI" value="10.17487/RFC3493"/>
        </reference>
        <reference anchor="RFC3542">
          <front>
            <title>Advanced Sockets Application Program Interface (API) for IPv6</title>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="May" year="2003"/>
            <abstract>
              <t>This document provides sockets Application Program Interface (API) to support "advanced" IPv6 applications, as a supplement to a separate specification, RFC 3493. The expected applications include Ping, Traceroute, routing daemons and the like, which typically use raw sockets to access IPv6 or ICMPv6 header fields. This document proposes some portable interfaces for applications that use raw sockets under IPv6. There are other features of IPv6 that some applications will need to access: interface identification (specifying the outgoing interface and determining the incoming interface), IPv6 extension headers, and path Maximum Transmission Unit (MTU) information. This document provides API access to these features too. Additionally, some extended interfaces to libraries for the "r" commands are defined. The extension will provide better backward compatibility to existing implementations that are not IPv6-capable. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3542"/>
          <seriesInfo name="DOI" value="10.17487/RFC3542"/>
        </reference>
        <reference anchor="RFC3646">
          <front>
            <title>DNS Configuration options for Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="R. Droms" initials="R." role="editor" surname="Droms"/>
            <date month="December" year="2003"/>
            <abstract>
              <t>This document describes Dynamic Host Configuration Protocol for IPv6 (DHCPv6) options for passing a list of available DNS recursive name servers and a domain search list to a client.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3646"/>
          <seriesInfo name="DOI" value="10.17487/RFC3646"/>
        </reference>
        <reference anchor="RFC3678">
          <front>
            <title>Socket Interface Extensions for Multicast Source Filters</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>The Internet Group Management Protocol (IGMPv3) for IPv4 and the Multicast Listener Discovery (MLDv2) for IPv6 add the capability for applications to express source filters on multicast group memberships, which allows receiver applications to determine the set of senders (sources) from which to accept multicast traffic. This capability also simplifies support of one-to-many type multicast applications. This document specifies new socket options and functions to manage source filters for IP Multicast group memberships. It also defines the socket structures to provide input and output arguments to these new application program interfaces (APIs). These extensions are designed to provide access to the source filtering features, while introducing a minimum of change into the system and providing complete compatibility for existing multicast applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3678"/>
          <seriesInfo name="DOI" value="10.17487/RFC3678"/>
        </reference>
        <reference anchor="RFC4191">
          <front>
            <title>Default Router Preferences and More-Specific Routes</title>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>This document describes an optional extension to Router Advertisement messages for communicating default router preferences and more-specific routes from routers to hosts. This improves the ability of hosts to pick an appropriate router, especially when the host is multi-homed and the routers are on different links. The preference values and specific routes advertised to hosts require administrative configuration; they are not automatically derived from routing tables. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4191"/>
          <seriesInfo name="DOI" value="10.17487/RFC4191"/>
        </reference>
        <reference anchor="RFC4294">
          <front>
            <title>IPv6 Node Requirements</title>
            <author fullname="J. Loughney" initials="J." role="editor" surname="Loughney"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4294"/>
          <seriesInfo name="DOI" value="10.17487/RFC4294"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4338">
          <front>
            <title>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP) Packets over Fibre Channel</title>
            <author fullname="C. DeSanti" initials="C." surname="DeSanti"/>
            <author fullname="C. Carlson" initials="C." surname="Carlson"/>
            <author fullname="R. Nixon" initials="R." surname="Nixon"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies the way of encapsulating IPv6, IPv4, and Address Resolution Protocol (ARP) packets over Fibre Channel. This document also specifies the method of forming IPv6 link-local addresses and statelessly autoconfigured IPv6 addresses on Fibre Channel networks, and a mechanism to perform IPv4 address resolution over Fibre Channel networks.</t>
              <t>This document obsoletes RFC 2625 and RFC 3831. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4338"/>
          <seriesInfo name="DOI" value="10.17487/RFC4338"/>
        </reference>
        <reference anchor="RFC4380">
          <front>
            <title>Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP; we call this the Teredo service. Running the service requires the help of "Teredo servers" and "Teredo relays". The Teredo servers are stateless, and only have to manage a small fraction of the traffic between Teredo clients; the Teredo relays act as IPv6 routers between the Teredo service and the "native" IPv6 Internet. The relays can also provide interoperability with hosts using other transition mechanisms such as "6to4". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4380"/>
          <seriesInfo name="DOI" value="10.17487/RFC4380"/>
        </reference>
        <reference anchor="RFC4429">
          <front>
            <title>Optimistic Duplicate Address Detection (DAD) for IPv6</title>
            <author fullname="N. Moore" initials="N." surname="Moore"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>Optimistic Duplicate Address Detection is an interoperable modification of the existing IPv6 Neighbor Discovery (RFC 2461) and Stateless Address Autoconfiguration (RFC 2462) processes. The intention is to minimize address configuration delays in the successful case, to reduce disruption as far as possible in the failure case, and to remain interoperable with unmodified hosts and routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4429"/>
          <seriesInfo name="DOI" value="10.17487/RFC4429"/>
        </reference>
        <reference anchor="RFC4584">
          <front>
            <title>Extension to Sockets API for Mobile IPv6</title>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2006"/>
            <abstract>
              <t>This document describes data structures and API support for Mobile IPv6 as an extension to the Advanced Socket API for IPv6.</t>
              <t>Just as the Advanced Sockets API for IPv6 gives access to various extension headers and the ICMPv6 protocol, this document specifies the same level of access for Mobile IPv6 components. It specifies a mechanism for applications to retrieve and set information for Mobility Header messages, Home Address destination options, and Routing Header Type 2 extension headers. It also specifies the common data structures and definitions that might be used by certain advanced Mobile IPv6 socket applications. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4584"/>
          <seriesInfo name="DOI" value="10.17487/RFC4584"/>
        </reference>
        <reference anchor="RFC4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="RFC4884">
          <front>
            <title>Extended ICMP to Support Multi-Part Messages</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document redefines selected ICMP messages to support multi-part operation. A multi-part ICMP message carries all of the information that ICMP messages carried previously, as well as additional information that applications may require.</t>
              <t>Multi-part messages are supported by an ICMP extension structure. The extension structure is situated at the end of the ICMP message. It includes an extension header followed by one or more extension objects. Each extension object contains an object header and object payload. All object headers share a common format.</t>
              <t>This document further redefines the above mentioned ICMP messages by specifying a length attribute. All of the currently defined ICMP messages to which an extension structure can be appended include an "original datagram" field. The "original datagram" field contains the initial octets of the datagram that elicited the ICMP error message. Although the original datagram field is of variable length, the ICMP message does not include a field that specifies its length. Therefore, in order to facilitate message parsing, this document allocates eight previously reserved bits to reflect the length of the "original datagram" field.</t>
              <t>The proposed modifications change the requirements for ICMP compliance. The impact of these changes on compliant implementations is discussed, and new requirements for future implementations are presented.</t>
              <t>This memo updates RFC 792 and RFC 4443. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4884"/>
          <seriesInfo name="DOI" value="10.17487/RFC4884"/>
        </reference>
        <reference anchor="RFC4890">
          <front>
            <title>Recommendations for Filtering ICMPv6 Messages in Firewalls</title>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="May" year="2007"/>
            <abstract>
              <t>In networks supporting IPv6, the Internet Control Message Protocol version 6 (ICMPv6) plays a fundamental role with a large number of functions, and a correspondingly large number of message types and options. ICMPv6 is essential to the functioning of IPv6, but there are a number of security risks associated with uncontrolled forwarding of ICMPv6 messages. Filtering strategies designed for the corresponding protocol, ICMP, in IPv4 networks are not directly applicable, because these strategies are intended to accommodate a useful auxiliary protocol that may not be required for correct functioning.</t>
              <t>This document provides some recommendations for ICMPv6 firewall filter configuration that will allow propagation of ICMPv6 messages that are needed to maintain the functioning of the network but drop messages that are potential security risks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4890"/>
          <seriesInfo name="DOI" value="10.17487/RFC4890"/>
        </reference>
        <reference anchor="RFC4919">
          <front>
            <title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="C. Schumacher" initials="C." surname="Schumacher"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks. The set of goals enumerated in this document form an initial set only. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4919"/>
          <seriesInfo name="DOI" value="10.17487/RFC4919"/>
        </reference>
        <reference anchor="RFC4944">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="D. Culler" initials="D." surname="Culler"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4944"/>
          <seriesInfo name="DOI" value="10.17487/RFC4944"/>
        </reference>
        <reference anchor="RFC5014">
          <front>
            <title>IPv6 Socket API for Source Address Selection</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="J. Laganier" initials="J." surname="Laganier"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The IPv6 default address selection document (RFC 3484) describes the rules for selecting source and destination IPv6 addresses, and indicates that applications should be able to reverse the sense of some of the address selection rules through some unspecified API. However, no such socket API exists in the basic (RFC 3493) or advanced (RFC 3542) IPv6 socket API documents. This document fills that gap partially by specifying new socket-level options for source address selection and flags for the getaddrinfo() API to specify address selection based on the source address preference in accordance with the socket-level options that modify the default source address selection algorithm. The socket API described in this document will be particularly useful for IPv6 applications that want to choose between temporary and public addresses, and for Mobile IPv6 aware applications that want to use the care-of address for communication. It also specifies socket options and flags for selecting Cryptographically Generated Address (CGA) or non-CGA source addresses. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5014"/>
          <seriesInfo name="DOI" value="10.17487/RFC5014"/>
        </reference>
        <reference anchor="RFC5072">
          <front>
            <title>IP Version 6 over PPP</title>
            <author fullname="S. Varada" initials="S." role="editor" surname="Varada"/>
            <author fullname="D. Haskins" initials="D." surname="Haskins"/>
            <author fullname="E. Allen" initials="E." surname="Allen"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method of encapsulating network-layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.</t>
              <t>This document defines the method for sending IPv6 packets over PPP links, the NCP for establishing and configuring the IPv6 over PPP, and the method for forming IPv6 link-local addresses on PPP links.</t>
              <t>It also specifies the conditions for performing Duplicate Address Detection on IPv6 global unicast addresses configured for PPP links either through stateful or stateless address autoconfiguration.</t>
              <t>This document obsoletes RFC 2472. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5072"/>
          <seriesInfo name="DOI" value="10.17487/RFC5072"/>
        </reference>
        <reference anchor="RFC5121">
          <front>
            <title>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE 802.16 Networks</title>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="F. Xia" initials="F." surname="Xia"/>
            <author fullname="B. Sarikaya" initials="B." surname="Sarikaya"/>
            <author fullname="JH. Choi" initials="JH." surname="Choi"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>IEEE Std 802.16 is an air interface specification for fixed and mobile Broadband Wireless Access Systems. Service-specific convergence sublayers to which upper-layer protocols interface are a part of the IEEE 802.16 MAC (Medium Access Control). The Packet convergence sublayer (CS) is used for the transport of all packet- based protocols such as Internet Protocol (IP) and IEEE 802.3 LAN/MAN CSMA/CD Access Method (Ethernet). IPv6 packets can be sent and received via the IP-specific part of the Packet CS. This document specifies the addressing and operation of IPv6 over the IP-specific part of the Packet CS for hosts served by a network that utilizes the IEEE Std 802.16 air interface. It recommends the assignment of a unique prefix (or prefixes) to each host and allows the host to use multiple identifiers within that prefix, including support for randomly generated interface identifiers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5121"/>
          <seriesInfo name="DOI" value="10.17487/RFC5121"/>
        </reference>
        <reference anchor="RFC6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins"/>
            <author fullname="D. Johnson" initials="D." surname="Johnson"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address. The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address. To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option. All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes. This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6275"/>
          <seriesInfo name="DOI" value="10.17487/RFC6275"/>
        </reference>
        <reference anchor="RFC6563">
          <front>
            <title>Moving A6 to Historic Status</title>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="D. Conrad" initials="D." surname="Conrad"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>This document provides a summary of issues related to the use of A6 records, discusses the current status, and moves RFC 2874 to Historic status, providing clarity to implementers and operators. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6563"/>
          <seriesInfo name="DOI" value="10.17487/RFC6563"/>
        </reference>
        <reference anchor="RFC6980">
          <front>
            <title>Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document analyzes the security implications of employing IPv6 fragmentation with Neighbor Discovery (ND) messages. It updates RFC 4861 such that use of the IPv6 Fragmentation Header is forbidden in all Neighbor Discovery messages, thus allowing for simple and effective countermeasures for Neighbor Discovery attacks. Finally, it discusses the security implications of using IPv6 fragmentation with SEcure Neighbor Discovery (SEND) and formally updates RFC 3971 to provide advice regarding how the aforementioned security implications can be mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6980"/>
          <seriesInfo name="DOI" value="10.17487/RFC6980"/>
        </reference>
        <reference anchor="RFC7084">
          <front>
            <title>Basic Requirements for IPv6 Customer Edge Routers</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="B. Stark" initials="B." surname="Stark"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies requirements for an IPv6 Customer Edge (CE) router. Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it. The document also covers IP transition technologies. Two transition technologies in RFC 5969's IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) and RFC 6333's Dual-Stack Lite (DS-Lite) are covered in the document. The document obsoletes RFC 6204.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7084"/>
          <seriesInfo name="DOI" value="10.17487/RFC7084"/>
        </reference>
        <reference anchor="RFC7123">
          <front>
            <title>Security Implications of IPv6 on IPv4 Networks</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2014"/>
            <abstract>
              <t>This document discusses the security implications of native IPv6 support and IPv6 transition/coexistence technologies on "IPv4-only" networks and describes possible mitigations for the aforementioned issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7123"/>
          <seriesInfo name="DOI" value="10.17487/RFC7123"/>
        </reference>
        <reference anchor="RFC7371">
          <front>
            <title>Updates to the IPv6 Multicast Addressing Architecture</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document updates the IPv6 multicast addressing architecture by redefining the reserved bits as generic flag bits. The document also provides some clarifications related to the use of these flag bits.</t>
              <t>This document updates RFCs 3956, 3306, and 4291.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7371"/>
          <seriesInfo name="DOI" value="10.17487/RFC7371"/>
        </reference>
        <reference anchor="RFC7421">
          <front>
            <title>Analysis of the 64-bit Boundary in IPv6 Addressing</title>
            <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The IPv6 unicast addressing format includes a separation between the prefix used to route packets to a subnet and the interface identifier used to specify a given interface connected to that subnet. Currently, the interface identifier is defined as 64 bits long for almost every case, leaving 64 bits for the subnet prefix. This document describes the advantages of this fixed boundary and analyzes the issues that would be involved in treating it as a variable boundary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7421"/>
          <seriesInfo name="DOI" value="10.17487/RFC7421"/>
        </reference>
        <reference anchor="RFC7721">
          <front>
            <title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized. It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7721"/>
          <seriesInfo name="DOI" value="10.17487/RFC7721"/>
        </reference>
        <reference anchor="RFC7739">
          <front>
            <title>Security Implications of Predictable Fragment Identification Values</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>IPv6 specifies the Fragment Header, which is employed for the fragmentation and reassembly mechanisms. The Fragment Header contains an "Identification" field that, together with the IPv6 Source Address and the IPv6 Destination Address of a packet, identifies fragments that correspond to the same original datagram, such that they can be reassembled together by the receiving host. The only requirement for setting the Identification field is that the corresponding value must be different than that employed for any other fragmented datagram sent recently with the same Source Address and Destination Address. Some implementations use a simple global counter for setting the Identification field, thus leading to predictable Identification values. This document analyzes the security implications of predictable Identification values, and provides implementation guidance for setting the Identification field of the Fragment Header, such that the aforementioned security implications are mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7739"/>
          <seriesInfo name="DOI" value="10.17487/RFC7739"/>
        </reference>
        <reference anchor="RFC7772">
          <front>
            <title>Reducing Energy Consumption of Router Advertisements</title>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>Frequent Router Advertisement messages can severely impact host power consumption. This document recommends operational practices to avoid such impact.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="202"/>
          <seriesInfo name="RFC" value="7772"/>
          <seriesInfo name="DOI" value="10.17487/RFC7772"/>
        </reference>
        <reference anchor="RFC7844">
          <front>
            <title>Anonymity Profiles for DHCP Clients</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>Some DHCP options carry unique identifiers. These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses. The anonymity profiles are designed for clients that wish to remain anonymous to the visited network. The profiles provide guidelines on the composition of DHCP or DHCPv6 messages, designed to minimize disclosure of identifying information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7844"/>
          <seriesInfo name="DOI" value="10.17487/RFC7844"/>
        </reference>
        <reference anchor="RFC7934">
          <front>
            <title>Host Address Availability Recommendations</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="V. Cerf" initials="V." surname="Cerf"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document recommends that networks provide general-purpose end hosts with multiple global IPv6 addresses when they attach, and it describes the benefits of and the options for doing so.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="204"/>
          <seriesInfo name="RFC" value="7934"/>
          <seriesInfo name="DOI" value="10.17487/RFC7934"/>
        </reference>
        <reference anchor="RFC8087">
          <front>
            <title>The Benefits of Using Explicit Congestion Notification (ECN)</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="M. Welzl" initials="M." surname="Welzl"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The goal of this document is to describe the potential benefits of applications using a transport that enables Explicit Congestion Notification (ECN). The document outlines the principal gains in terms of increased throughput, reduced delay, and other benefits when ECN is used over a network path that includes equipment that supports Congestion Experienced (CE) marking. It also discusses challenges for successful deployment of ECN. It does not propose new algorithms to use ECN nor does it describe the details of implementation of ECN in endpoint devices (Internet hosts), routers, or other network devices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8087"/>
          <seriesInfo name="DOI" value="10.17487/RFC8087"/>
        </reference>
        <reference anchor="RFC8096">
          <front>
            <title>The IPv6-Specific MIB Modules Are Obsolete</title>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>In 2005-2006, the IPv6 MIB update group published updated versions of the IP-MIB, UDP-MIB, TCP-MIB, and IP-FORWARD-MIB modules, which use the InetAddressType/InetAddress construct to handle IPv4 and IPv6 in the same table. This document contains versions of the obsoleted IPV6-MIB, IPV6-TC, IPV6-ICMP-MIB, IPV6-TCP-MIB, and IPV6-UDP-MIB modules for the purpose of updating MIB module repositories. This document obsoletes RFCs 2452, 2454, 2465, and 2466 (i.e., the RFCs containing these MIBs) and reclassifies them as Historic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8096"/>
          <seriesInfo name="DOI" value="10.17487/RFC8096"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="POSIX" target="https://ieeexplore.ieee.org/document/8277153">
          <front>
            <title>Information Technology -- Portable Operating System Interface (POSIX(R)) Base Specifications, Issue 7</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="January"/>
          </front>
          <seriesInfo name="IEEE Std" value="1003.1-2017"/>
          <seriesInfo name="DOI:" value="10.1109/IEEESTD.2018.8277153"/>
        </reference>
        <reference anchor="USGv6" target="https://www.nist.gov/programs-projects/usgv6-program">
          <front>
            <title>A Profile for IPv6 in the U.S. Government - Version 1.0</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2008" month="July"/>
          </front>
          <seriesInfo name="NIST" value="SP500-267"/>
        </reference>
      </references>
    </references>
    <?line 1272?>

<section anchor="changes-from-rfc-8504">
      <name>Changes from RFC 8504</name>
      <t>This section highlights the changes since RFC 8504.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated obsoleted RFCs including 3315 and 3736 (both to 8415) and 4941 to 8981. RFC 793 has been obsoleted by 9293 but the latter does not include the the robustness principle for which RFC 793 is cited in this document.</t>
        </li>
        <li>
          <t>Added support for RFC 9131.</t>
        </li>
        <li>
          <t>Type C host from RFC 4191 is went from a <bcp14>SHOULD</bcp14> to <bcp14>MUST</bcp14>.</t>
        </li>
        <li>
          <t>Removed the Mobility Section.</t>
        </li>
        <li>
          <t>Removed the SEND Section.</t>
        </li>
        <li>
          <t>Added Discovery of translation prefixes Section.</t>
        </li>
        <li>
          <t>Added <bcp14>MUST</bcp14> requirement for Rul 5.5 in RFC 6724.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-6434-to-rfc-8504">
      <name>Changes from RFC 6434 to RFC 8504</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Restructured sections.</t>
        </li>
        <li>
          <t>Added 6LoWPAN to link layers as it has some deployment.</t>
        </li>
        <li>
          <t>Removed the Downstream-on-Demand (DoD) IPv6 Profile as it hasn't been updated.</t>
        </li>
        <li>
          <t>Updated MLDv2 support to a <bcp14>MUST</bcp14> since nodes are restricted if MLDv1 is used.</t>
        </li>
        <li>
          <t>Required DNS RA options so SLAAC-only devices can get DNS; RFC 8106 is a
  <bcp14>MUST</bcp14>.</t>
        </li>
        <li>
          <t>Required RFC 3646 DNS Options for DHCPv6 implementations.</t>
        </li>
        <li>
          <t>Added RESTCONF and NETCONF as possible options to network management.</t>
        </li>
        <li>
          <t>Added a section on constrained devices.</t>
        </li>
        <li>
          <t>Added text on RFC 7934 to address availability to hosts (<bcp14>SHOULD</bcp14>).</t>
        </li>
        <li>
          <t>Added text on RFC 7844 for anonymity profiles for DHCPv6 clients.</t>
        </li>
        <li>
          <t>Added mDNS and DNS-SD as updated service discovery.</t>
        </li>
        <li>
          <t>Added RFC 8028 as a <bcp14>SHOULD</bcp14> as a method for solving a multi-prefix network.</t>
        </li>
        <li>
          <t>Added ECN RFC 3168 as a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added reference to RFC 7123 for security over IPv4-only networks.</t>
        </li>
        <li>
          <t>Removed Jumbograms (RFC 2675) as they aren't deployed.</t>
        </li>
        <li>
          <t>Updated obsoleted RFCs to the new version of the RFC, including RFCs 2460,
  1981, 7321, and 4307.</t>
        </li>
        <li>
          <t>Added RFC 7772 for power consumptions considerations.</t>
        </li>
        <li>
          <t>Added why /64 boundaries for more detail --- RFC 7421.</t>
        </li>
        <li>
          <t>Added a unique IPv6 prefix per host to support currently deployed IPv6 networks.</t>
        </li>
        <li>
          <t>Clarified RFC 7066 was a snapshot for 3GPP.</t>
        </li>
        <li>
          <t>Updated RFC 4191 as a <bcp14>MUST</bcp14> and the Type C Host as a <bcp14>SHOULD</bcp14> as they help solve
  multi-prefix problems.</t>
        </li>
        <li>
          <t>Removed IPv6 over ATM since there aren't many deployments.</t>
        </li>
        <li>
          <t>Added a note in Section 6.6 for Rule 5.5 from RFC 6724.</t>
        </li>
        <li>
          <t>Added <bcp14>MUST</bcp14> for BCP 198 for forwarding IPv6 packets.</t>
        </li>
        <li>
          <t>Added a reference to RFC 8064 for stable address creation.</t>
        </li>
        <li>
          <t>Added text on the protection from excessive extension header options.</t>
        </li>
        <li>
          <t>Added text on the dangers of 1280 MTU UDP, especially with regard to DNS
  traffic.</t>
        </li>
        <li>
          <t>Added text to clarify RFC 8200 behavior for unrecognized extension headers
  or unrecognized ULPs.</t>
        </li>
        <li>
          <t>Removed dated email addresses from design team acknowledgements for <xref target="RFC4294"/>.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-4294-to-rfc-6434">
      <name>Changes from RFC 4294 to RFC 6434</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated the Introduction to indicate that this document is an
  applicability statement and is aimed at
  general nodes.</t>
        </li>
        <li>
          <t>Significantly updated the section on mobility protocols;
  added references and downgraded previous SHOULDs to MAYs.</t>
        </li>
        <li>
          <t>Changed the Sub-IP Layer section to just list relevant RFCs, and
  added some more RFCs.</t>
        </li>
        <li>
          <t>Added a section on SEND (it is a <bcp14>MAY</bcp14>).</t>
        </li>
        <li>
          <t>Revised the section on Privacy Extensions to add more
  nuance to the recommendation.</t>
        </li>
        <li>
          <t>Completely revised the IPsec/IKEv2 section, downgrading the overall
  recommendation to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Upgraded recommendation of DHCPv6 to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added a background section on DHCP versus RA options, added
  a <bcp14>SHOULD</bcp14> recommendation for DNS configuration via RAs (RFC 6106), and cleaned
  up the DHCP recommendations.</t>
        </li>
        <li>
          <t>Added the recommendation that routers implement Sections 7.3 and
  7.5 of <xref target="RFC6275"/>.</t>
        </li>
        <li>
          <t>Added a pointer to subnet clarification document <xref target="RFC5942"/>.</t>
        </li>
        <li>
          <t>Added text that "IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be implemented.</t>
        </li>
        <li>
          <t>Added reference to <xref target="RFC5722"/> (Overlapping Fragments),
  and made it a <bcp14>MUST</bcp14> to implement.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Removed the mention of delegation name (DNAME) from the discussion about <xref target="RFC3363"/>.</t>
        </li>
        <li>
          <t>Numerous updates to reflect newer versions of IPv6
  documents, including <xref target="RFC3596"/>, <xref target="RFC4213"/>, <xref target="RFC4291"/>, and <xref target="RFC4443"/>.</t>
        </li>
        <li>
          <t>Removed discussion of "Managed" and "Other" flags in
  RAs. There is no consensus at present on how to process these
  flags, and discussion of their semantics was removed in the most
  recent update of Stateless Address Autoconfiguration <xref target="RFC4862"/>.</t>
        </li>
        <li>
          <t>Added many more references to optional IPv6 documents.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Updated the MLD section to include reference to Lightweight MLD <xref target="RFC5790"/>.</t>
        </li>
        <li>
          <t>Added a <bcp14>SHOULD</bcp14> recommendation for "Default Router Preferences
  and More-Specific Routes" <xref target="RFC4191"/>.</t>
        </li>
        <li>
          <t>Made "IPv6 Flow Label Specification" <xref target="RFC6437"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Acknowledgements from (Current Documents)  </t>
          <t>
The authors would like to thank Nick Buraglio, Brian Carpenter, and Jeremy Duncan
for their contributions and many members of the 6man WG for the inputs they gave.</t>
        </li>
        <li>
          <t>Acknowledgments from RFC 8504  </t>
          <t>
The authors would like to thank
Brian Carpenter, Dave Thaler,
Tom Herbert, Erik Kline, Mohamed Boucadair, and Michayla Newcombe
for their contributions and many members of the 6man WG for the inputs they
gave.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 6434  </t>
          <t>
RFC 6434 was authored by Ed Jankiewicz, John Loughney, and Thomas Narten.  </t>
          <t>
The authors of RFC 6434 thank Hitoshi Asaeda, Brian Carpenter, Tim Chown,
Ralph
Droms, Sheila Frankel, Sam Hartman, Bob Hinden, Paul Hoffman, Pekka
Savola, Yaron Sheffer, and Dave Thaler for their comments.  In addition,
the authors thank Mark Andrews for comments and corrections on DNS
text and Alfred Hoenes for tracking the updates to various RFCs.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 4294  </t>
          <t>
RFC 4294 was written by
the IPv6 Node Requirements design team, which had the following members:
Jari Arkko,
Marc Blanchet,
Samita Chakrabarti,
Alain Durand,
Gerard Gastaud,
Jun-ichiro Itojun Hagino,
Atsushi Inoue,
Masahiro Ishiyama,
John Loughney,
Rajiv Raghunarayan,
Shoichi Sakane,
Dave Thaler, and Juha Wiljakka.  </t>
          <t>
The authors of RFC 4294 thank Ran Atkinson, Jim Bound, Brian Carpenter, Ralph
Droms,
Christian Huitema, Adam Machalek, Thomas Narten, Juha Ollila, and Pekka
Savola for their comments.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
