<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.6.10) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc rfcprocack="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-6man-rfc8504-bis-01" category="bcp" consensus="true" submissionType="IETF" obsoletes="8504" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>IPv6 Node Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-6man-rfc8504-bis-01"/>
    <seriesInfo name="bcp" value="220"/>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <postal>
          <street>Lumen House, Library Avenue</street>
          <city>Harwell Oxford, Didcot</city>
          <code>OX11 0SG</code>
          <country>United Kingdom</country>
        </postal>
        <email>tim.chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Loughney" fullname="John Loughney">
      <organization>Intel</organization>
      <address>
        <postal>
          <city>Santa Clara, CA</city>
          <country>United States of America</country>
        </postal>
        <phone/>
        <email>john.loughney@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Winters" fullname="Timothy Winters">
      <organization>QA Cafe</organization>
      <address>
        <postal>
          <city>Dover</city>
          <region>NH</region>
          <country>United States of America</country>
        </postal>
        <email>tim@qacafe.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Internet</area>
    <workgroup>IPv6 Maintenance</workgroup>
    <keyword>IPv6</keyword>
    <abstract>
      <?line 185?>

<t>This document defines requirements for IPv6 nodes.  It is
expected that IPv6 will be deployed in a wide range of devices and
situations.  Specifying the requirements for IPv6 nodes allows
IPv6 to function well and interoperate in a large number of
situations and deployments.</t>
      <t>This document obsoletes RFC 8504, and in turn RFC 6434 and its predecessor, RFC 4294.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://timchown.github.io/rfc8504-bis/draft-ietf-6man-rfc8504-bis.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-6man-rfc8504-bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Maintenance Working Group mailing list (<eref target="mailto:ipv6@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipv6/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipv6/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/timchown/rfc8504-bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 196?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines common functionality required by both
IPv6 hosts and routers.  Many IPv6 nodes will implement optional
or additional features, but this document collects and summarizes
requirements from other published Standards Track documents in one
place.</t>
      <t>This document tries to avoid discussion of protocol details
and references RFCs for this purpose.  This document is intended
to be an applicability statement and to provide guidance as to which
IPv6 specifications should be implemented in the general case and
which specifications may be of interest to specific deployment
scenarios. This document does not update any individual protocol
document RFCs.</t>
      <t>Although this document points to different specifications, it
should be noted that in many cases, the granularity of a
particular requirement will be smaller than a single specification,
as many specifications define multiple, independent pieces, some
of which may not be mandatory. In addition, most specifications
define both client and server behavior in the same specification,
while many implementations will be focused on only one of those
roles.</t>
      <t>This document defines a minimal level of requirement needed
for a device to provide useful Internet service and considers a
broad range of device types and deployment scenarios. Because of
the wide range of deployment scenarios, the minimal requirements
specified in this document may not be sufficient for all
deployment scenarios. It is perfectly reasonable (and indeed
expected) for other profiles to define additional or stricter
requirements appropriate for specific usage and deployment
environments. As an example, this document does not mandate that all
clients support DHCP, but some deployment scenarios may deem
it appropriate to make such a requirement. As another example,
NIST has defined profiles for specialized requirements for IPv6
in target environments (see <xref target="USGv6"/>).</t>
      <t>As it is not always possible for an implementer to know the
exact usage of IPv6 in a node, an overriding requirement for IPv6
nodes is that they should adhere to Jon Postel's Robustness
Principle: "Be conservative in what you do, be liberal in what you accept
from others" <xref target="RFC0793"/>.</t>
      <section anchor="scope-of-this-document">
        <name>Scope of This Document</name>
        <t>IPv6 covers many specifications.  It is intended that IPv6
will be deployed in many different situations and environments.
Therefore, it is important to develop requirements for IPv6
nodes to ensure interoperability.</t>
      </section>
      <section anchor="description-of-ipv6-nodes">
        <name>Description of IPv6 Nodes</name>
        <t>From "Internet Protocol, Version 6 (IPv6) Specification" <xref target="RFC8200"/>, we
have the following definitions:</t>
        <artwork><![CDATA[
IPv6 node   - a device that implements IPv6.
IPv6 router - a node that forwards IPv6 packets not explicitly
              addressed to itself.
IPv6 host   - any IPv6 node that is not a router.
]]></artwork>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="abbreviations-used-in-this-document">
      <name>Abbreviations Used in This Document</name>
      <artwork><![CDATA[
AH    Authentication Header
DAD   Duplicate Address Detection
ESP   Encapsulating Security Payload
ICMP  Internet Control Message Protocol
IKE   Internet Key Exchange
MIB   Management Information Base
MLD   Multicast Listener Discovery
MTU   Maximum Transmission Unit
NA    Neighbor Advertisement
NBMA  Non-Broadcast Multi-Access
ND    Neighbor Discovery
NS    Neighbor Solicitation
NUD   Neighbor Unreachability Detection
PPP   Point-to-Point Protocol
]]></artwork>
    </section>
    <section anchor="sub-ip-layer">
      <name>Sub-IP Layer</name>
      <t>An IPv6 node <bcp14>MUST</bcp14> include support for one or more IPv6
link-layer specifications.  Which link-layer specifications an
implementation should include will depend upon what link layers
are supported by the hardware available on the system.  It is
possible for a conformant IPv6 node to support IPv6 on some of its
interfaces and not on others.</t>
      <t>As IPv6 is run over new Layer 2 technologies, it is expected
that new specifications will be issued.  We list here some of
the Layer 2 technologies for which an IPv6 specification has been developed.
It is provided for informational purposes only and may
not be complete.</t>
      <ul spacing="normal">
        <li>
          <t>Transmission of IPv6 Packets over Ethernet Networks <xref target="RFC2464"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over Frame Relay Networks Specification
<xref target="RFC2590"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 1394 Networks <xref target="RFC3146"/></t>
        </li>
        <li>
          <t>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP)
Packets over Fibre Channel <xref target="RFC4338"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 802.15.4 Networks <xref target="RFC4944"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE
802.16 Networks <xref target="RFC5121"/></t>
        </li>
        <li>
          <t>IP version 6 over PPP <xref target="RFC5072"/></t>
        </li>
      </ul>
      <t>In addition to traditional physical link layers, it is also
possible to tunnel IPv6 over other protocols. Examples
include:</t>
      <ul spacing="normal">
        <li>
          <t>Teredo: Tunneling IPv6 over UDP through Network Address Translations
(NATs) <xref target="RFC4380"/></t>
        </li>
        <li>
          <t>Basic Transition Mechanisms for IPv6 Hosts and Routers (see <xref section="3" sectionFormat="of" target="RFC4213"/>)</t>
        </li>
      </ul>
    </section>
    <section anchor="ip-layer">
      <name>IP Layer</name>
      <section anchor="internet-protocol-version-6-rfc-8200">
        <name>Internet Protocol Version 6 - RFC 8200</name>
        <t>The Internet Protocol version 6 is specified in <xref target="RFC8200"/>.  This specification <bcp14>MUST</bcp14> be supported.</t>
        <t>The node <bcp14>MUST</bcp14> follow the packet transmission rules in RFC 8200.</t>
        <t>All conformant IPv6 implementations <bcp14>MUST</bcp14> be
capable of sending and receiving IPv6 packets; forwarding
functionality <bcp14>MAY</bcp14> be supported.
Nodes <bcp14>MUST</bcp14> always be able to send, receive, and process
Fragment headers.</t>
        <t>IPv6 nodes <bcp14>MUST NOT</bcp14> create
overlapping fragments.  Also, when reassembling an IPv6
datagram, if one or more of its constituent fragments is
determined to be an overlapping fragment, the entire datagram
(and any constituent fragments) <bcp14>MUST</bcp14> be silently discarded.
See Section 4.5 of <xref target="RFC8200"/> for more information.</t>
        <t>As recommended in Section 4.5 of <xref target="RFC8200"/>, nodes <bcp14>MUST NOT</bcp14>
generate atomic fragments, i.e., where the fragment is a whole datagram.
As per <xref target="RFC6946"/>, if a receiving node reassembling
a datagram encounters an atomic fragment,
it should be processed as a fully reassembled packet, and
any other fragments that match this packet should be processed independently.</t>
        <t>To mitigate a variety of potential attacks,
nodes <bcp14>SHOULD</bcp14> avoid using predictable Fragment Identification values
in Fragment headers, as discussed in <xref target="RFC7739"/>.</t>
        <t>All nodes <bcp14>SHOULD</bcp14> support the setting and use of the IPv6 Flow
Label field as defined in the IPv6 Flow Label specification <xref target="RFC6437"/>.
Forwarding nodes such as routers and load distributors
<bcp14>MUST NOT</bcp14> depend only on Flow Label values being uniformly
distributed.  It is <bcp14>RECOMMENDED</bcp14> that source hosts support the flow
label by setting the Flow Label field for all packets of a given
flow to the same value chosen from an approximation to a discrete
uniform distribution.</t>
      </section>
      <section anchor="support-for-ipv6-extension-headers">
        <name>Support for IPv6 Extension Headers</name>
        <t>RFC 8200 specifies extension headers and the processing for
these headers.</t>
        <t>Extension headers (except for the Hop-by-Hop Options header) are not
processed, inserted, or deleted by any node along a packet's delivery
path, until the packet reaches the node (or each of the set of nodes,
in the case of multicast) identified in the Destination Address field
of the IPv6 header.</t>
        <t>Any unrecognized extension headers or options <bcp14>MUST</bcp14> be
processed as described in RFC 8200. Note that where
<xref section="4" sectionFormat="of" target="RFC8200"/>
refers to the action to be taken when a Next Header value
in the current header is not recognized by a node, that action
applies whether the value is an unrecognized extension
header or an unrecognized upper-layer protocol (ULP).</t>
        <t>An IPv6 node <bcp14>MUST</bcp14> be able to process these extension headers.  An
exception is Routing Header type 0 (RH0), which was deprecated
by <xref target="RFC5095"/> due to security concerns and
which <bcp14>MUST</bcp14> be treated as an unrecognized routing type.</t>
        <t>Further, <xref target="RFC7045"/> adds specific requirements for
the processing of extension headers, in particular that any forwarding
node along an IPv6 packet's path, which forwards the packet for
any reason, <bcp14>SHOULD</bcp14> do so regardless of any extension headers
that are present.</t>
        <t>As per RFC 8200, when a node fragments an IPv6 datagram,
it <bcp14>MUST</bcp14> include the entire IPv6 Header Chain in the first fragment.
The Per-Fragment headers <bcp14>MUST</bcp14>
consist of the IPv6 header plus any extension headers that <bcp14>MUST</bcp14> be
processed by nodes en route to the destination,
that is, all headers up to and including the Routing
header if present, else the Hop-by-Hop Options header if present,
else no extension headers.  On reassembly,
if the first fragment does not include all headers through an
upper-layer header, then that fragment <bcp14>SHOULD</bcp14> be discarded and
an ICMP Parameter Problem, Code 3, message <bcp14>SHOULD</bcp14> be sent to
the source of the fragment, with the Pointer field set to zero.
See <xref target="RFC7112"/> for a discussion of why oversized
IPv6 Extension Header Chains are avoided.</t>
        <t>Defining new IPv6 extension headers is not recommended, unless there
are no existing IPv6 extension headers that can be used by specifying
a new option for that IPv6 extension header.  A proposal to specify a
new IPv6 extension header <bcp14>MUST</bcp14> include a detailed technical
explanation of why an existing IPv6 extension header can not be used
for the desired new function, and in such cases, it needs to follow the format
described in <xref section="8" sectionFormat="of" target="RFC8200"/>.  For further background
reading on this topic, see <xref target="RFC6564"/>.</t>
      </section>
      <section anchor="protecting-a-node-from-excessive-extension-header-options">
        <name>Protecting a Node from Excessive Extension Header Options</name>
        <t>As per RFC 8200, end hosts are expected to process all extension headers,
destination options, and hop-by-hop options in a packet. Given that
the only limit on the number and size of extension headers is the MTU,
the processing of received packets could be considerable. It is also
conceivable that a long chain of extension headers might be used as a
form of denial-of-service attack. Accordingly, a host <bcp14>MAY</bcp14> implement
<xref target="I-D.ietf-6man-eh-limits"/> has protection from this type of attacks.</t>
      </section>
      <section anchor="ND">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Neighbor Discovery is defined in <xref target="RFC4861"/>; the
definition was updated by <xref target="RFC5942"/>. Neighbor Discovery
<bcp14>MUST</bcp14> be supported with the noted exceptions below.  RFC 4861 states:</t>
        <ul empty="true">
          <li>
            <t>Unless specified otherwise (in a document that covers operating IP
over a particular link type) this document applies to all link types.
However, because ND uses link-layer multicast for some of its
services, it is possible that on some link types (e.g., Non‑Broadcast
Multi-Access (NBMA) links), alternative protocols or mechanisms to
implement those services will be specified (in the appropriate
document covering the operation of IP over a particular link type).
The services described in this document that are not directly
dependent on multicast, such as Redirects, Next-hop determination,
Neighbor Unreachability Detection, etc., are expected to be provided
as specified in this document.
The details of how one uses ND on
NBMA links are addressed in <xref target="RFC2491"/>.</t>
          </li>
        </ul>
        <t>Some detailed analysis of Neighbor Discovery follows:</t>
        <t>Router Discovery is how hosts locate routers that reside on
an attached link.  Hosts <bcp14>MUST</bcp14> support Router Discovery
functionality.</t>
        <t>Prefix Discovery is how hosts discover the set of address
prefixes that define which destinations are on-link for an
attached link. Hosts <bcp14>MUST</bcp14> support Prefix Discovery.</t>
        <t>Hosts <bcp14>MUST</bcp14> also implement Neighbor Unreachability Detection
(NUD) for all paths between hosts and neighboring nodes.  NUD is
not required for paths between routers.  However, all nodes <bcp14>MUST</bcp14>
respond to unicast Neighbor Solicitation (NS) messages.</t>
        <t><xref target="RFC7048"/> discusses NUD, in particular cases
where it behaves too impatiently. It states that if a node
transmits more than a certain number of packets, then it
<bcp14>SHOULD</bcp14> use the exponential backoff of the retransmit timer,
up to a certain threshold point.</t>
        <t>Hosts <bcp14>MUST</bcp14> support the sending of Router Solicitations and
the receiving of Router Advertisements (RAs).  The ability to
understand individual RA options is dependent
on supporting the functionality making use of the particular
option.</t>
        <t><xref target="RFC7559"/> discusses packet loss resiliency
for Router Solicitations and requires that nodes <bcp14>MUST</bcp14> use
a specific exponential backoff algorithm for retransmission of Router
Solicitations.</t>
        <t>All nodes <bcp14>MUST</bcp14> support the sending and receiving of Neighbor
Solicitation (NS) and Neighbor Advertisement (NA) messages.  NS
and NA messages are required for Duplicate Address Detection
(DAD).</t>
        <t>Hosts <bcp14>SHOULD</bcp14> support the processing of Redirect
functionality.  Routers <bcp14>MUST</bcp14> support the sending of Redirects,
though not necessarily for every individual packet (e.g., due to
rate limiting). Redirects are only useful on networks supporting
hosts. In core networks dominated by routers, Redirects are
typically disabled.  The sending of Redirects <bcp14>SHOULD</bcp14> be disabled
by default on routers intended to be deployed on core networks. They <bcp14>MAY</bcp14>
be enabled by default on routers intended to support hosts on edge networks.</t>
        <t>As specified in <xref target="RFC6980"/>, nodes <bcp14>MUST NOT</bcp14> employ IPv6 fragmentation
for sending any of the following Neighbor Discovery and SEcure
Neighbor Discovery messages: Neighbor Solicitation, Neighbor
Advertisement, Router Solicitation, Router Advertisement, Redirect, or
Certification Path Solicitation.
Nodes <bcp14>MUST</bcp14> silently ignore any of these messages on receipt if
fragmented.
See RFC 6980 for details and motivation.</t>
        <t>"IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> includes additional
recommendations on how to select from a set of available routers.
<xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be supported.</t>
      </section>
      <section anchor="ipv6-router-advertisement-flags-option-rfc-5175">
        <name>IPv6 Router Advertisement Flags Option - RFC 5175</name>
        <t>Router Advertisements include an 8-bit field of single-bit
Router Advertisement flags.  The Router Advertisement Flags
Option extends the number of available flag bits by 48 bits. At
the time of this writing, 6 of the original 8 single-bit flags have
been assigned, while 2 remain available for future
assignment. No flags have been defined that make use of the new
option; thus, strictly speaking, there is no requirement to
implement the option today. However, implementations that are
able to pass unrecognized options to a higher-level entity that
may be able to understand them (e.g., a user-level process using
a "raw socket" facility) <bcp14>MAY</bcp14> take steps to handle the option in
anticipation of a future usage.</t>
      </section>
      <section anchor="path-mtu-discovery-and-packet-size">
        <name>Path MTU Discovery and Packet Size</name>
        <section anchor="path-mtu-discovery-rfc-8201">
          <name>Path MTU Discovery - RFC 8201</name>
          <t>"Support for Path MTU Discovery for IP version 6" <xref target="RFC8201"/> as documented in <xref target="RFC8200"/>:</t>
          <ul empty="true">
            <li>
              <t>It is strongly recommended that IPv6 nodes implement
Path MTU Discovery <xref target="RFC8201"/>, in order to
discover and
take advantage of path MTUs greater than 1280 octets.
However, a minimal IPv6 implementation (e.g., in a boot
ROM) may simply restrict itself to sending packets no
larger than 1280 octets, and omit implementation of Path
MTU Discovery.</t>
            </li>
          </ul>
          <t>The rules in <xref target="RFC8200"/> and <xref target="RFC5722"/> <bcp14>MUST</bcp14> be followed for packet
fragmentation and reassembly.</t>
          <t>As described in RFC 8201,
nodes implementing Path MTU Discovery and sending packets larger than
the IPv6 minimum link MTU are susceptible to problematic connectivity
if ICMPv6 messages are blocked or not transmitted.  For
example, this will result in connections that complete the TCP
three-way handshake correctly but then hang when data is transferred.  This
state is referred to as a black-hole connection <xref target="RFC2923"/>.  Path MTU
Discovery relies on ICMPv6 Packet Too Big (PTB) to determine the MTU
of the path (and thus these <bcp14>MUST NOT</bcp14> be filtered, as per the
recommendation in <xref target="RFC4890"/>).</t>
          <t>An alternative to Path MTU Discovery defined in RFC 8201 can be
found in <xref target="RFC4821"/> and <xref target="RFC8899"/>, which defines a method for Packetization
Layer Path MTU Discovery (PLPMTUD) designed for use over paths where
delivery of ICMPv6 messages to a host is not assured.</t>
          <t>PMTUD and PLPMTUD <bcp14>MUST</bcp14> be implemented and enabled by default, except in minimal IPv6 implementations.</t>
        </section>
        <section anchor="minimum-mtu-considerations">
          <name>Minimum MTU Considerations</name>
          <t>While an IPv6 link MTU can be set to 1280 bytes,
it is recommended that for IPv6 UDP in particular,
which includes DNS operation, the sender use a
large MTU if they can, in order to avoid gratuitous
fragmentation-caused packet drops.</t>
        </section>
      </section>
      <section anchor="icmp-for-the-internet-protocol-version-6-ipv6-rfc-4443">
        <name>ICMP for the Internet Protocol Version 6 (IPv6) - RFC 4443</name>
        <t>ICMPv6 <xref target="RFC4443"/> <bcp14>MUST</bcp14> be supported. "Extended
ICMP to Support Multi-Part Messages" <xref target="RFC4884"/> <bcp14>MAY</bcp14> be supported.</t>
      </section>
      <section anchor="default-router-preferences-and-more-specific-routes-rfc-4191">
        <name>Default Router Preferences and More-Specific Routes - RFC 4191</name>
        <t>"Default Router Preferences and More-Specific Routes" <xref target="RFC4191"/>
provides support for nodes attached to
multiple (different) networks, each providing routers that
advertise themselves as default routers via Router
Advertisements. In some scenarios, one router may provide
connectivity to destinations that the other router does not, and
choosing the "wrong" default router can result in reachability
failures. In order to resolve this scenario, IPv6 nodes <bcp14>MUST</bcp14> implement
<xref target="RFC4191"/> and <bcp14>MUST</bcp14> implement the Type C host role defined in RFC 4191.</t>
      </section>
      <section anchor="first-hop-router-selection-rfc-8028">
        <name>First-Hop Router Selection - RFC 8028</name>
        <t>In multihomed scenarios, where a host has more than one prefix,
each allocated by an upstream network that is assumed to implement
BCP 38 ingress filtering, the host may have multiple routers to
choose from.</t>
        <t>Hosts that may be deployed in such multihomed environments
<bcp14>SHOULD</bcp14> follow the guidance given in <xref target="RFC8028"/>.</t>
      </section>
      <section anchor="mld">
        <name>Multicast Listener Discovery (MLD) for IPv6 - RFC 3810</name>
        <t>Nodes that need to join multicast groups <bcp14>MUST</bcp14> support MLDv2
<xref target="RFC3810"/>. MLD is needed by any node that is
expected to receive and process multicast traffic; in particular,
MLDv2 is required for support for source-specific multicast (SSM) as
per <xref target="RFC4607"/>.</t>
        <t>Previous versions of this specification only required MLDv1 <xref target="RFC2710"/>
to be implemented
on all nodes.  Since participation of any
MLDv1-only nodes on a link require that all other nodes on the link then
operate in version 1 compatibility mode, the requirement to support MLDv2
on all nodes was upgraded to a <bcp14>MUST</bcp14>. Further, SSM is now the preferred
multicast distribution method, rather than Any-Source Multicast (ASM).</t>
        <t>Note that Neighbor Discovery (as used on most link types -- see <xref target="ND"/>)
depends on multicast and requires that nodes join Solicited Node
multicast addresses.</t>
      </section>
      <section anchor="explicit-congestion-notification-ecn-rfc-3168">
        <name>Explicit Congestion Notification (ECN) - RFC 3168</name>
        <t>An ECN-aware router sets a mark in the IP header in order to signal
impending congestion, rather than dropping a packet. The receiver of
the packet echoes the congestion indication to the sender, which can then
reduce its transmission rate as if it detected a dropped packet.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support ECN <xref target="RFC3168"/> by implementing an interface
for the upper layer to access and by setting the ECN bits in the IP header.
The benefits of using ECN are documented in <xref target="RFC8087"/>.</t>
      </section>
    </section>
    <section anchor="addressing-and-address-configuration">
      <name>Addressing and Address Configuration</name>
      <section anchor="ip-version-6-addressing-architecture-rfc-4291">
        <name>IP Version 6 Addressing Architecture - RFC 4291</name>
        <t>The IPv6 Addressing Architecture <xref target="RFC4291"/> <bcp14>MUST</bcp14> be supported.</t>
        <t>The current IPv6 Address Architecture is based on a 64-bit boundary for subnet
prefixes.
The reasoning behind this decision is documented in <xref target="RFC7421"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> also support the multicast flag updates
documented in <xref target="RFC7371"/>.</t>
      </section>
      <section anchor="host-address-availability-recommendations">
        <name>Host Address Availability Recommendations</name>
        <t>Hosts may be configured with addresses through a variety of methods,
including Stateless Address Autoconfiguration (SLAAC), DHCPv6, or manual
configuration.</t>
        <t><xref target="RFC7934"/> recommends that networks provide general-purpose end hosts
with multiple global IPv6 addresses when they attach, and it describes
the benefits of and the options for doing so.
Routers <bcp14>SHOULD</bcp14> support <xref target="RFC7934"/> for assigning multiple addresses to a
host.
A host <bcp14>SHOULD</bcp14> support assigning multiple addresses as described in
<xref target="RFC7934"/>.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support the capability to be assigned a prefix per host as
documented in <xref target="RFC8273"/>.
Such an approach can offer improved host
isolation and enhanced subscriber management on shared network segments.</t>
      </section>
      <section anchor="ipv6-stateless-address-autoconfiguration-rfc-4862">
        <name>IPv6 Stateless Address Autoconfiguration - RFC 4862</name>
        <t>Hosts <bcp14>MUST</bcp14> support IPv6 Stateless Address Autoconfiguration.
It is <bcp14>RECOMMENDED</bcp14>, as described in <xref target="RFC8064"/>, that unless there
is a specific requirement for Media Access Control (MAC) addresses to be
embedded in
an Interface Identifier (IID), nodes follow the procedure in <xref target="RFC7217"/> to generate SLAAC-based
addresses, rather than use <xref target="RFC4862"/>.
Addresses generated using the method described in <xref target="RFC7217"/> will be the same whenever a given device (re)appears on the
same subnet (with a specific IPv6 prefix), but the IID will vary on
each subnet visited.</t>
        <t>Nodes that are routers <bcp14>MUST</bcp14> be able to generate link-local
addresses as described in <xref target="RFC4862"/>.</t>
        <t>From RFC 4862:</t>
        <ul empty="true">
          <li>
            <!-- Begin DNE text -->
  <t>The autoconfiguration process specified in this document
applies only to hosts and not routers.  Since host
autoconfiguration uses information advertised by routers,
routers will need to be configured by some other means.
However, it is expected that routers will generate link-local
addresses using the mechanism described in this document.  In
addition, routers are expected to successfully pass the
Duplicate Address Detection procedure described in this
document on all addresses prior to assigning them to an
interface.</t>
          </li>
        </ul>
        <t>All nodes <bcp14>MUST</bcp14> implement Duplicate Address Detection. Quoting
from <xref section="5.4" sectionFormat="of" target="RFC4862"/>:</t>
        <ul empty="true">
          <li>
            <t>Duplicate Address Detection <bcp14>MUST</bcp14>
be performed on all unicast addresses prior to assigning them
to an interface, regardless of whether they are obtained
through stateless autoconfiguration, DHCPv6, or manual
configuration, with the following exceptions [noted therein].</t>
          </li>
        </ul>
        <t>"Optimistic Duplicate Address Detection (DAD) for
IPv6" <xref target="RFC4429"/> specifies a mechanism to reduce
delays associated with generating addresses via Stateless
Address Autoconfiguration <xref target="RFC4862"/>.  RFC 4429
was developed in conjunction with Mobile IPv6 in order to reduce
the time needed to acquire and configure addresses as devices
quickly move from one network to another, and it is desirable to
minimize transition delays.  For general purpose devices, RFC 4429 remains
optional at this time.</t>
        <t><xref target="RFC7527"/> discusses enhanced DAD and describes an
algorithm to automate the detection of looped-back IPv6 ND messages
used by DAD. Nodes <bcp14>SHOULD</bcp14> implement this behavior where such
detection is beneficial.</t>
      </section>
      <section anchor="privacy-extensions-for-address-configuration-in-ipv6-rfc-8981">
        <name>Privacy Extensions for Address Configuration in IPv6 - RFC 8981</name>
        <t>A node using Stateless Address
Autoconfiguration <xref target="RFC4862"/> to form a globally
unique IPv6 address that uses its MAC address to generate the IID
will see that the IID remains the same on any visited
network, even though the network prefix part changes.
Thus, it is possible for a third-party device to track the activities of
the node they
communicate, as that node moves around the network.  Privacy Extensions
for Stateless Address
Autoconfiguration <xref target="RFC8981"/> address this
concern by allowing nodes to configure an additional temporary address
where the IID is effectively randomly generated.  Privacy addresses
are then used as source addresses for new communications initiated by the
node.</t>
        <t>General issues regarding privacy issues for IPv6 addressing are discussed
in <xref target="RFC7721"/>.</t>
        <t>RFC 8981 <bcp14>SHOULD</bcp14> be supported.  In some scenarios,
such as dedicated servers in a data
center, it provides limited or no benefit, or it may complicate network management.
Thus, devices implementing this specification <bcp14>MUST</bcp14> provide a way for the
end user to explicitly enable or disable the use of such temporary
addresses.</t>
        <t>Note that RFC 8981 can be used independently of traditional SLAAC or independently
of SLAAC that is based on RFC 7217.</t>
        <t>Implementers of RFC 8981 should be aware that certain
addresses are reserved and should not be chosen for use as
temporary addresses. Consult "Reserved IPv6 Interface
Identifiers" <xref target="RFC5453"/> for more details.</t>
      </section>
      <section anchor="stateful1">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>DHCPv6 <xref target="RFC8415"/> can be used to obtain and
configure addresses. In general, a network may provide for the
configuration of addresses through SLAAC,
DHCPv6, or both.  There will be a wide range of IPv6 deployment
models and differences in address assignment requirements,
some of which may require DHCPv6 for stateful address assignment.
Consequently, all hosts <bcp14>SHOULD</bcp14> implement address configuration
via DHCPv6.</t>
        <t>In the absence of observed Router Advertisement messages, IPv6 nodes
<bcp14>MAY</bcp14> initiate DHCP to obtain IPv6 addresses
and other configuration information, as described in <xref section="5.5.2" sectionFormat="of" target="RFC4862"/>.</t>
        <t>Where devices are likely to be carried by users and attached
to multiple visited networks, DHCPv6 client
anonymity profiles <bcp14>SHOULD</bcp14> be supported as described in <xref target="RFC7844"/> to minimize the disclosure of identifying information.
<xref section="5" sectionFormat="of" target="RFC7844"/> describes operational considerations on the use of
such anonymity profiles.</t>
      </section>
      <section anchor="default-address-selection-for-ipv6-rfc-6724">
        <name>Default Address Selection for IPv6 - RFC 6724</name>
        <t>IPv6 nodes will invariably have multiple addresses configured simultaneously
and thus will need to choose which addresses to use for which communications.
The rules specified in the Default Address Selection for
IPv6 document <xref target="RFC6724"/> <bcp14>MUST</bcp14> be implemented. <xref target="RFC8028"/> updates Rule 5.5 from <xref target="RFC6724"/>; implementations <bcp14>MUST</bcp14> implement this rule.</t>
      </section>
    </section>
    <section anchor="dns">
      <name>DNS</name>
      <t>DNS is described in <xref target="RFC1034"/>, <xref target="RFC1035"/>, <xref target="RFC3363"/>, and <xref target="RFC3596"/>.  Not all nodes will need to resolve names;
those that will never need to resolve DNS names do not need to
implement resolver functionality.  However, the ability to
resolve names is a basic infrastructure capability on which
applications rely, and most nodes will need to provide
support.  All nodes <bcp14>SHOULD</bcp14> implement stub-resolver <xref target="RFC1034"/> functionality, as in Section 5.3.1 of <xref target="RFC1034"/>, with support for:</t>
      <dl>
        <dt>-</dt>
        <dd>
          <t>AAAA type Resource Records <xref target="RFC3596"/>;</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>reverse addressing in ip6.arpa using PTR records <xref target="RFC3596"/>; and</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>Extension Mechanisms for DNS (EDNS(0)) <xref target="RFC6891"/> to allow for DNS packet sizes larger than 512 octets.</t>
        </dd>
      </dl>
      <t>Those nodes are <bcp14>RECOMMENDED</bcp14> to support DNS security extensions <xref target="RFC4033"/>  <xref target="RFC4034"/>  <xref target="RFC4035"/>.</t>
      <t>Discover of encrypted DNS resolvers per <xref target="RFC9463"/> <bcp14>SHOULD</bcp14> be implemented.</t>
      <t>A6 Resource Records <xref target="RFC2874"/> are classified as Historic per <xref target="RFC6563"/>.  These were defined with Experimental status in <xref target="RFC3363"/>.</t>
    </section>
    <section anchor="OtherConfig">
      <name>Configuring Non-address Information</name>
      <section anchor="dhcp-for-other-configuration-information">
        <name>DHCP for Other Configuration Information</name>
        <t>DHCP <xref target="RFC8415"/> specifies a mechanism for IPv6 nodes to obtain
address configuration information (see <xref target="stateful1"/>) and to
obtain additional (non-address) configuration.  If a host
implementation supports applications or other protocols that
require configuration that is only available via DHCP, hosts
<bcp14>SHOULD</bcp14> implement DHCP. For specialized devices on which no
such configuration need is present, DHCP may not be
necessary.</t>
        <t>An IPv6 node can use the subset of DHCP (described in <xref target="RFC8415"/>) to obtain other configuration
information.</t>
        <t>If an IPv6 node implements DHCP, it <bcp14>MUST</bcp14> implement the DNS options <xref target="RFC3646"/> as most deployments will expect that these options are available.</t>
      </section>
      <section anchor="router-advertisements-and-default-gateway">
        <name>Router Advertisements and Default Gateway</name>
        <t>There is no defined DHCPv6 Gateway option.</t>
        <t>Nodes using the Dynamic Host Configuration Protocol for
IPv6 (DHCPv6) are thus expected to determine their default router
information and on-link prefix information from received
Router Advertisements.</t>
      </section>
      <section anchor="ipv6-router-advertisement-options-for-dns-configuration-rfc-8106">
        <name>IPv6 Router Advertisement Options for DNS         Configuration - RFC 8106</name>
        <t>Router Advertisement options have historically been limited to
those that are critical to basic IPv6 functionality. Originally,
DNS configuration was not included as an RA option, and DHCP
was the recommended way to obtain DNS configuration
information. Over time, the thinking surrounding such an
option has evolved. It is now generally recognized that few
nodes can function adequately without having access to a
working DNS resolver; thus, a
Standards Track document has been published to provide this
capability <xref target="RFC8106"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> include support for the DNS RA option <xref target="RFC8106"/>.</t>
      </section>
      <section anchor="dhcp-options-versus-router-advertisement-options-for-host-configuration">
        <name>DHCP Options versus Router Advertisement Options for Host Configuration</name>
        <t>In IPv6, there are two main protocol mechanisms for
propagating configuration information to hosts: RAs and DHCP. RA options
have been
restricted to those deemed essential for basic network
functioning and for which all nodes are configured with exactly
the same information.  Examples include the Prefix Information
Options, the MTU option, etc. On the other hand, DHCP has
generally been preferred for configuration of more general
parameters and for parameters that may be client specific.
Generally speaking, however, there has been a desire
to define only one mechanism for configuring a given option,
rather than defining multiple (different) ways of configuring
the same information.</t>
        <t>One issue with having multiple ways to configure the same
information is that interoperability suffers if a host chooses one
mechanism but the
network operator chooses a different mechanism. For "closed"
environments, where the network operator
has significant influence over what devices connect to the
network and thus what configuration mechanisms they support, the
operator may be able to ensure that a particular mechanism is
supported by all connected hosts. In more open environments,
however, where arbitrary devices may connect (e.g., a Wi-Fi
hotspot), problems can arise. To maximize interoperability in
such environments, hosts would need to implement multiple
configuration mechanisms to ensure interoperability.</t>
      </section>
    </section>
    <section anchor="service-discovery-protocols">
      <name>Service Discovery Protocols</name>
      <t>Multicast DNS (mDNS) and
DNS-based Service Discovery (DNS-SD) are described in <xref target="RFC6762"/> and <xref target="RFC6763"/>, respectively.
These protocols, often collectively referred to as the
'Bonjour' protocols after their naming by Apple, provide
the means for devices to discover services within a local
link and, in the absence of a unicast DNS service, to
exchange naming information.</t>
      <t>Where devices are to be deployed in networks where
service discovery would be beneficial, e.g., for users
seeking to discover printers or display devices, mDNS and
DNS-SD <bcp14>SHOULD</bcp14> be supported.</t>
    </section>
    <section anchor="ipv4-support-and-transition">
      <name>IPv4 Support and Transition</name>
      <t>IPv6 nodes <bcp14>MAY</bcp14> support IPv4.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <section anchor="basic-transition-mechanisms-for-ipv6-hosts-and-routers-rfc4213">
          <name>Basic Transition Mechanisms for IPv6 Hosts and Routers - RFC 4213</name>
          <t>If an IPv6 node implements dual stack and tunneling, then <xref target="RFC4213"/> <bcp14>MUST</bcp14> be supported.</t>
        </section>
        <section anchor="support-for-discovery-of-translation-prefixes">
          <name>Support for discovery of translation prefixes</name>
          <t><xref target="RFC8781"/> describes a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts. In order to support migration to and operation of IPv6-mostly and IPv6-only network environments, it is recommended that all hosts support discovery of NAT64 prefixes as described in RFC 8781.
Nodes <bcp14>MAY</bcp14> also support <xref target="RFC7050"/> as a fallback mechanism for NAT64 prefix discovery.</t>
        </section>
      </section>
    </section>
    <section anchor="application-support">
      <name>Application Support</name>
      <section anchor="textual-representation-of-ipv6-addresses-rfc-5952">
        <name>Textual Representation of IPv6 Addresses - RFC 5952</name>
        <t>Software that allows users and operators to input IPv6
addresses in text form <bcp14>SHOULD</bcp14> support "A Recommendation for
IPv6 Address Text Representation" <xref target="RFC5952"/>.</t>
      </section>
      <section anchor="application-programming-interfaces-apis">
        <name>Application Programming Interfaces (APIs)</name>
        <t>There are a number of IPv6-related APIs. This document does
not mandate the use of any, because the choice of API does not
directly relate to on-the-wire behavior of
protocols. Implementers, however, would be advised to consider
providing a common API or reviewing existing APIs for the type
of functionality they provide to applications.</t>
        <t>"Basic Socket Interface Extensions for IPv6" <xref target="RFC3493"/> provides IPv6 functionality used by
typical applications. Implementers should note that RFC 3493 has
been picked up and further standardized by the Portable Operating System
Interface (POSIX) <xref target="POSIX"/>.</t>
        <t>"Advanced Sockets Application Program Interface (API) for
IPv6" <xref target="RFC3542"/> provides access to
advanced IPv6 features needed by diagnostic and other
more specialized applications.</t>
        <t>"IPv6 Socket API for Source Address Selection" <xref target="RFC5014"/> provides facilities that allow an
application to override the default Source Address Selection
rules of <xref target="RFC6724"/>.</t>
        <t>"Socket Interface Extensions for Multicast Source Filters" <xref target="RFC3678"/> provides support for expressing source
filters on multicast group memberships.</t>
        <t>"Extension to Sockets API for Mobile IPv6" <xref target="RFC4584"/> provides application support for
accessing and enabling Mobile IPv6 <xref target="RFC6275"/> features.</t>
      </section>
    </section>
    <section anchor="sec">
      <name>Security</name>
      <t>This section describes the security specification for IPv6
nodes.</t>
      <t>Achieving security in practice is a complex undertaking.
Operational procedures, protocols, key distribution mechanisms,
certificate management approaches, etc., are all components that
impact the level of security actually achieved in practice. More
importantly, deficiencies or a poor fit in any one individual
component can significantly reduce the overall effectiveness of a
particular security approach.</t>
      <t>IPsec can provide either end-to-end security between nodes
or channel security (for example, via a site-to-site IPsec
VPN), making it possible to provide secure communication for all (or a subset
of) communication flows at the IP layer between pairs of Internet
nodes.  IPsec has two standard operating modes: Tunnel-mode and Transport-mode.
In Tunnel-mode, IPsec provides network-layer security and protects an entire
IP packet
by encapsulating the original IP packet and then prepending a new IP header.
In Transport-mode, IPsec provides security for the transport layer (and above)
by
encapsulating only the transport-layer (and above) portion of the IP packet
(i.e., without adding
a second IP header).</t>
      <t>Although IPsec can be used with manual keying in some cases,
such usage has limited applicability and is not recommended.</t>
      <t>A range of security technologies and approaches proliferate
today (e.g., IPsec, Transport Layer Security (TLS), Secure SHell (SSH), TLS
VPNS, etc.).
No single approach has emerged as
an ideal technology for all needs and environments. Moreover, IPsec
is not viewed as the ideal security technology in all cases and is
unlikely to displace the others.</t>
      <t>Previously, IPv6 mandated implementation of IPsec and
recommended the key-management approach of IKE. RFC 6434 updated that recommendation
by making support of the IPsec
architecture <xref target="RFC4301"/> a <bcp14>SHOULD</bcp14> for all IPv6 nodes, and this document retains that recommendation.
Note that
the IPsec Architecture requires the
implementation of both manual and automatic key management (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).
Currently, the recommended automated key-management protocol to
implement is IKEv2 <xref target="RFC7296"/>.</t>
      <t>This document recognizes that there exists a range of device
types and environments where approaches to security other than
IPsec can be justified. For example, special-purpose devices may
support only a very limited number or type of applications, and an
application-specific security approach may be sufficient for
limited management or configuration capabilities. Alternatively,
some devices may run on extremely constrained hardware (e.g.,
sensors) where the full IPsec Architecture is not justified.</t>
      <t>Because most common platforms now support IPv6 and have it
enabled by default, IPv6 security is an issue for networks
that are ostensibly IPv4 only; see <xref target="RFC7123"/> for guidance on this area.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>"Security Architecture for the Internet Protocol" <xref target="RFC4301"/> <bcp14>SHOULD</bcp14> be supported by all IPv6
nodes. Note that the IPsec Architecture requires the implementation of both
manual and automatic key
management  (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).  Currently, the default automated key-management
protocol to implement is IKEv2. As required in <xref target="RFC4301"/>, IPv6
nodes implementing the IPsec Architecture <bcp14>MUST</bcp14> implement ESP <xref target="RFC4303"/> and <bcp14>MAY</bcp14> implement AH <xref target="RFC4302"/>.</t>
      </section>
      <section anchor="transforms-and-algorithms">
        <name>Transforms and Algorithms</name>
        <t>The current set of mandatory-to-implement algorithms for the
IPsec Architecture are defined in Cryptographic
Algorithm Implementation Requirements for ESP and AH <xref target="RFC8221"/>.  IPv6 nodes implementing the IPsec
Architecture <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8221"/>.
Preferred cryptographic algorithms often change more
frequently than security protocols. Therefore, implementations
<bcp14>MUST</bcp14> allow for migration to new algorithms, as RFC 8221 is
replaced or updated in the future.</t>
        <t>The current set of mandatory-to-implement algorithms for
IKEv2 are defined in Cryptographic Algorithm Implementation
Requirements for ESP and AH <xref target="RFC8247"/>.  IPv6 nodes
implementing IKEv2 <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8247"/> and/or any future
updates or replacements to <xref target="RFC8247"/>.</t>
      </section>
    </section>
    <section anchor="router-specific-functionality">
      <name>Router-Specific Functionality</name>
      <t>This section defines general host considerations for IPv6 nodes
that act as routers.  Currently, this section does not discuss
detailed routing-specific requirements. For the case of typical home routers, <xref target="RFC7084"/> defines basic requirements for customer edge routers.</t>
      <section anchor="ipv6-router-alert-option-rfc-2711">
        <name>IPv6 Router Alert Option - RFC 2711</name>
        <t>The IPv6 Router Alert option <xref target="RFC2711"/> is
an optional IPv6 Hop-by-Hop Header that is used in conjunction
with some protocols (e.g., RSVP <xref target="RFC2205"/> or
Multicast Listener Discovery (MLDv2) <xref target="RFC3810"/>).  The Router Alert option will
need to be implemented whenever such protocols that mandate its
use are implemented.  See <xref target="mld"/>.</t>
      </section>
      <section anchor="neighbor-discovery-for-ipv6-rfc-4861">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Sending Router Advertisements and processing Router
Solicitations <bcp14>MUST</bcp14> be supported.</t>
        <t>Routers <bcp14>SHOULD</bcp14> support <xref target="RFC9131"/> to avoid packet lost.</t>
        <t><xref section="7" sectionFormat="of" target="RFC6275"/> includes some mobility-specific
extensions to Neighbor Discovery.
Routers <bcp14>SHOULD</bcp14> implement
Sections 7.3 and 7.5, even if they do not implement home
agent functionality.</t>
      </section>
      <section anchor="stateful-address-autoconfiguration-dhcpv6-rfc-8415">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>A single DHCP server (<xref target="RFC8415"/> or <xref target="RFC4862"/>) can provide configuration information to
devices directly attached to a shared link, as well as to
devices located elsewhere within a site. Communication between
a client and a DHCP server located on different links requires
the use of DHCP relay agents on routers.</t>
        <t>In simple deployments, consisting of a single router and
either a single LAN or multiple LANs attached to the single
router, together with a WAN connection, a DHCP server
embedded within the router is one common deployment scenario
(e.g., <xref target="RFC7084"/>). There is no need
for relay agents in such scenarios.</t>
        <t>In more complex deployment scenarios, such as within enterprise or service provider networks, the use of DHCP requires some level of configuration, in order to configure relay agents, prefixes for delegation, DHCP servers, etc. In such environments, the DHCP server might even be run on a traditional server, rather than as part of a router.</t>
        <t>Because of the wide range of deployment scenarios, support for DHCP server functionality on routers is optional.  However, routers targeted for deployment within more complex scenarios (as described above) <bcp14>SHOULD</bcp14> support relay agent functionality including support for support DHCPv6-PD as defined in <eref target="?">RFC3633</eref>.  Note that "Basic Requirements for IPv6 Customer Edge Routers" <xref target="RFC7084"/> requires implementation of a DHCPv6 server function in IPv6 Customer Edge (CE) routers.</t>
      </section>
      <section anchor="ipv6-prefix-length-recommendation-for-forwarding-bcp-198">
        <name>IPv6 Prefix Length Recommendation for Forwarding - BCP 198</name>
        <t>Forwarding nodes <bcp14>MUST</bcp14> conform to BCP 198 <xref target="RFC7608"/>;
thus, IPv6 implementations of nodes that may forward packets
<bcp14>MUST</bcp14> conform to the rules specified in <xref section="5.1" sectionFormat="of" target="RFC4632"/>.</t>
      </section>
    </section>
    <section anchor="constrained-devices">
      <name>Constrained Devices</name>
      <t>The focus of this document is general IPv6 nodes. In this section, we briefly
discuss considerations for constrained devices.</t>
      <t>In the case of constrained nodes,
with limited CPU, memory, bandwidth or power, support for certain IPv6 functionality
may need
to be considered due to those limitations.  While the requirements of this
document are
<bcp14>RECOMMENDED</bcp14> for all nodes, including constrained nodes, compromises may need
to be
made in certain cases.  Where such compromises are made, the interoperability
of devices
should be strongly considered, particularly where this may impact other nodes
on the same
link, e.g., only supporting MLDv1 will affect other nodes.</t>
      <t>The IETF 6LowPAN (IPv6 over Low-Power Wireless Personal Area Network) WG
produced six RFCs, including a general
overview and problem statement <xref target="RFC4919"/> (the means by which IPv6 packets
are transmitted over IEEE 802.15.4 networks <xref target="RFC4944"/> and ND optimizations for that medium <xref target="RFC6775"/>).</t>
      <t>IPv6 nodes that are battery powered <bcp14>SHOULD</bcp14> implement the recommendations
in <xref target="RFC7772"/>.</t>
    </section>
    <section anchor="ipv6-node-management">
      <name>IPv6 Node Management</name>
      <t>Network management <bcp14>MAY</bcp14> be supported by IPv6 nodes.  However,
for IPv6 nodes that are embedded devices, network management may
be the only possible way of controlling these nodes.</t>
      <t>Existing network management protocols include SNMP <xref target="RFC3411"/>, NETCONF <xref target="RFC6241"/>, and RESTCONF <xref target="RFC8040"/>.</t>
      <section anchor="management-information-base-mib-modules">
        <name>Management Information Base (MIB) Modules</name>
        <t>The obsoleted status of
various IPv6-specific MIB modules is clarified in <xref target="RFC8096"/>.</t>
        <t>The following two MIB modules <bcp14>SHOULD</bcp14> be supported by nodes that
support an SNMP agent.</t>
        <section anchor="ip-forwarding-table-mib">
          <name>IP Forwarding Table MIB</name>
          <t>The IP Forwarding Table MIB <xref target="RFC4292"/> <bcp14>SHOULD</bcp14> be supported by nodes that support an
SNMP agent.</t>
        </section>
        <section anchor="management-information-base-for-the-internet-protocol-ip">
          <name>Management Information Base for the Internet Protocol (IP)</name>
          <t>The IP MIB <xref target="RFC4293"/> <bcp14>SHOULD</bcp14> be supported by nodes
that support an SNMP agent.</t>
        </section>
        <section anchor="interface-mib">
          <name>Interface MIB</name>
          <t>The Interface MIB <xref target="RFC2863"/> <bcp14>SHOULD</bcp14> be supported by nodes that support
an SNMP agent.</t>
        </section>
      </section>
      <section anchor="yang-data-models">
        <name>YANG Data Models</name>
        <t>The following YANG data models <bcp14>SHOULD</bcp14> be supported by nodes that support
a
NETCONF or RESTCONF agent.</t>
        <section anchor="ip-management-yang-model">
          <name>IP Management YANG Model</name>
          <t>The IP Management YANG Model <xref target="RFC8344"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
        <section anchor="interface-management-yang-model">
          <name>Interface Management YANG Model</name>
          <t>The Interface Management YANG Model <xref target="RFC8343"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not directly affect the security of the
Internet, beyond the security considerations associated with the
individual protocols.</t>
      <t>Security is also discussed in <xref target="sec"/> above.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2710">
          <front>
            <title>Multicast Listener Discovery (MLD) for IPv6</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="W. Fenner" initials="W." surname="Fenner"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This document specifies the protocol used by an IPv6 router to discover the presence of multicast listeners (that is, nodes wishing to receive multicast packets) on its directly attached links, and to discover specifically which multicast addresses are of interest to those neighboring nodes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2710"/>
          <seriesInfo name="DOI" value="10.17487/RFC2710"/>
        </reference>
        <reference anchor="RFC2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <author fullname="A. Jackson" initials="A." surname="Jackson"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC2863">
          <front>
            <title>The Interfaces Group MIB</title>
            <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
            <author fullname="F. Kastenholz" initials="F." surname="Kastenholz"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This memo discusses the 'interfaces' group of MIB-II, especially the experience gained from the definition of numerous media-specific MIB modules for use in conjunction with the 'interfaces' group for managing various sub-layers beneath the internetwork-layer. It specifies clarifications to, and extensions of, the architectural issues within the MIB-II model of the 'interfaces' group. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2863"/>
          <seriesInfo name="DOI" value="10.17487/RFC2863"/>
        </reference>
        <reference anchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC3411">
          <front>
            <title>An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="R. Presuhn" initials="R." surname="Presuhn"/>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes an architecture for describing Simple Network Management Protocol (SNMP) Management Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing a Message Processing Subsystem, a Security Subsystem and an Access Control Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data. This document obsoletes RFC 2571. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3411"/>
          <seriesInfo name="DOI" value="10.17487/RFC3411"/>
        </reference>
        <reference anchor="RFC3596">
          <front>
            <title>DNS Extensions to Support IP Version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="V. Ksinant" initials="V." surname="Ksinant"/>
            <author fullname="M. Souissi" initials="M." surname="Souissi"/>
            <date month="October" year="2003"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="88"/>
          <seriesInfo name="RFC" value="3596"/>
          <seriesInfo name="DOI" value="10.17487/RFC3596"/>
        </reference>
        <reference anchor="RFC3810">
          <front>
            <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
            <author fullname="R. Vida" initials="R." role="editor" surname="Vida"/>
            <author fullname="L. Costa" initials="L." role="editor" surname="Costa"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document updates RFC 2710, and it specifies Version 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links, and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3810"/>
          <seriesInfo name="DOI" value="10.17487/RFC3810"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC4213">
          <front>
            <title>Basic Transition Mechanisms for IPv6 Hosts and Routers</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. Two mechanisms are specified, dual stack and configured tunneling. Dual stack implies providing complete implementations of both versions of the Internet Protocol (IPv4 and IPv6), and configured tunneling provides a means to carry IPv6 packets over unmodified IPv4 routing infrastructures.</t>
              <t>This document obsoletes RFC 2893. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4213"/>
          <seriesInfo name="DOI" value="10.17487/RFC4213"/>
        </reference>
        <reference anchor="RFC4291" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4291.xml">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC4292">
          <front>
            <title>IP Forwarding Table MIB</title>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects related to the forwarding of Internet Protocol (IP) packets in an IP version-independent manner. This document obsoletes RFC 2096. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4292"/>
          <seriesInfo name="DOI" value="10.17487/RFC4292"/>
        </reference>
        <reference anchor="RFC4293">
          <front>
            <title>Management Information Base for the Internet Protocol (IP)</title>
            <author fullname="S. Routhier" initials="S." role="editor" surname="Routhier"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for implementations of the Internet Protocol (IP) in an IP version independent manner. This memo obsoletes RFCs 2011, 2465, and 2466. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4293"/>
          <seriesInfo name="DOI" value="10.17487/RFC4293"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4311">
          <front>
            <title>IPv6 Host-to-Router Load Sharing</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>The original IPv6 conceptual sending algorithm does not do load sharing among equivalent IPv6 routers, and suggests schemes that can be problematic in practice. This document updates the conceptual sending algorithm in RFC 2461 so that traffic to different destinations can be distributed among routers in an efficient fashion. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4311"/>
          <seriesInfo name="DOI" value="10.17487/RFC4311"/>
        </reference>
        <reference anchor="RFC4443" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4443.xml">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC4607">
          <front>
            <title>Source-Specific Multicast for IP</title>
            <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
            <author fullname="B. Cain" initials="B." surname="Cain"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>IP version 4 (IPv4) addresses in the 232/8 (232.0.0.0 to 232.255.255.255) range are designated as source-specific multicast (SSM) destination addresses and are reserved for use by source-specific applications and protocols. For IP version 6 (IPv6), the address prefix FF3x::/32 is reserved for source-specific multicast use. This document defines an extension to the Internet network service that applies to datagrams sent to SSM addresses and defines the host and router requirements to support this extension. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4607"/>
          <seriesInfo name="DOI" value="10.17487/RFC4607"/>
        </reference>
        <reference anchor="RFC4632" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4632.xml">
          <front>
            <title>Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan</title>
            <author fullname="V. Fuller" initials="V." surname="Fuller"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This memo discusses the strategy for address assignment of the existing 32-bit IPv4 address space with a view toward conserving the address space and limiting the growth rate of global routing state. This document obsoletes the original Classless Inter-domain Routing (CIDR) spec in RFC 1519, with changes made both to clarify the concepts it introduced and, after more than twelve years, to update the Internet community on the results of deploying the technology described. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="122"/>
          <seriesInfo name="RFC" value="4632"/>
          <seriesInfo name="DOI" value="10.17487/RFC4632"/>
        </reference>
        <reference anchor="RFC4861" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4861.xml">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4862" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4862.xml">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC5453">
          <front>
            <title>Reserved IPv6 Interface Identifiers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>Interface identifiers in IPv6 unicast addresses are used to identify interfaces on a link. They are required to be unique within a subnet. Several RFCs have specified interface identifiers or identifier ranges that have a special meaning attached to them. An IPv6 node autoconfiguring an interface identifier in these ranges will encounter unexpected consequences. Since there is no centralized repository for such reserved identifiers, this document aims to create one. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5453"/>
          <seriesInfo name="DOI" value="10.17487/RFC5453"/>
        </reference>
        <reference anchor="RFC5722">
          <front>
            <title>Handling of Overlapping IPv6 Fragments</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="December" year="2009"/>
            <abstract>
              <t>The fragmentation and reassembly algorithm specified in the base IPv6 specification allows fragments to overlap. This document demonstrates the security issues associated with allowing overlapping fragments and updates the IPv6 specification to explicitly forbid overlapping fragments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5722"/>
          <seriesInfo name="DOI" value="10.17487/RFC5722"/>
        </reference>
        <reference anchor="RFC5790">
          <front>
            <title>Lightweight Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Version 2 (MLDv2) Protocols</title>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <author fullname="W. Cao" initials="W." surname="Cao"/>
            <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>This document describes lightweight IGMPv3 and MLDv2 protocols (LW- IGMPv3 and LW-MLDv2), which simplify the standard (full) versions of IGMPv3 and MLDv2. The interoperability with the full versions and the previous versions of IGMP and MLD is also taken into account. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5790"/>
          <seriesInfo name="DOI" value="10.17487/RFC5790"/>
        </reference>
        <reference anchor="RFC5942" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5942.xml">
          <front>
            <title>IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>IPv6 specifies a model of a subnet that is different than the IPv4 subnet model. The subtlety of the differences has resulted in incorrect implementations that do not interoperate. This document spells out the most important difference: that an IPv6 address isn't automatically associated with an IPv6 on-link prefix. This document also updates (partially due to security concerns caused by incorrect implementations) a part of the definition of "on-link" from RFC 4861. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5942"/>
          <seriesInfo name="DOI" value="10.17487/RFC5942"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6437">
          <front>
            <title>IPv6 Flow Label Specification</title>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="J. Rajahalme" initials="J." surname="Rajahalme"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods. Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.</t>
              <t>The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6437"/>
          <seriesInfo name="DOI" value="10.17487/RFC6437"/>
        </reference>
        <reference anchor="RFC6564">
          <front>
            <title>A Uniform Format for IPv6 Extension Headers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="J. Woodyatt" initials="J." surname="Woodyatt"/>
            <author fullname="E. Kline" initials="E." surname="Kline"/>
            <author fullname="J. Hoagland" initials="J." surname="Hoagland"/>
            <author fullname="M. Bhatia" initials="M." surname="Bhatia"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the transport-layer header. There are a small number of such extension headers currently defined. This document describes the issues that can arise when defining new extension headers and discusses the alternate extension mechanisms in IPv6. It also provides a common format for defining any new IPv6 extension headers, if they are needed. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6564"/>
          <seriesInfo name="DOI" value="10.17487/RFC6564"/>
        </reference>
        <reference anchor="RFC6724">
          <front>
            <title>Default Address Selection for Internet Protocol Version 6 (IPv6)</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="A. Matsumoto" initials="A." surname="Matsumoto"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document describes two algorithms, one for source address selection and one for destination address selection. The algorithms specify default behavior for all Internet Protocol version 6 (IPv6) implementations. They do not override choices made by applications or upper-layer protocols, nor do they preclude the development of more advanced mechanisms for address selection. The two algorithms share a common context, including an optional mechanism for allowing administrators to provide policy that can override the default behavior. In dual-stack implementations, the destination address selection algorithm can consider both IPv4 and IPv6 addresses -- depending on the available source addresses, the algorithm might prefer IPv6 addresses over IPv4 addresses, or vice versa.</t>
              <t>Default address selection as defined in this specification applies to all IPv6 nodes, including both hosts and routers. This document obsoletes RFC 3484. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6724"/>
          <seriesInfo name="DOI" value="10.17487/RFC6724"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC6775">
          <front>
            <title>Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4. This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation. In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links. IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network. This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks. The document thus updates RFC 4944 to specify the use of the optimizations defined here. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6775"/>
          <seriesInfo name="DOI" value="10.17487/RFC6775"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC6946">
          <front>
            <title>Processing of IPv6 "Atomic" Fragments</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The IPv6 specification allows packets to contain a Fragment Header without the packet being actually fragmented into multiple pieces (we refer to these packets as "atomic fragments"). Such packets are typically sent by hosts that have received an ICMPv6 "Packet Too Big" error message that advertises a Next-Hop MTU smaller than 1280 bytes, and are currently processed by some implementations as normal "fragmented traffic" (i.e., they are "reassembled" with any other queued fragments that supposedly correspond to the same original packet). Thus, an attacker can cause hosts to employ atomic fragments by forging ICMPv6 "Packet Too Big" error messages, and then launch any fragmentation-based attacks against such traffic. This document discusses the generation of the aforementioned atomic fragments and the corresponding security implications. Additionally, this document formally updates RFC 2460 and RFC 5722, such that IPv6 atomic fragments are processed independently of any other fragments, thus completely eliminating the aforementioned attack vector.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6946"/>
          <seriesInfo name="DOI" value="10.17487/RFC6946"/>
        </reference>
        <reference anchor="RFC7045">
          <front>
            <title>Transmission and Processing of IPv6 Extension Headers</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <date month="December" year="2013"/>
            <abstract>
              <t>Various IPv6 extension headers have been standardised since the IPv6 standard was first published. This document updates RFC 2460 to clarify how intermediate nodes should deal with such extension headers and with any that are defined in the future. It also specifies how extension headers should be registered by IANA, with a corresponding minor update to RFC 2780.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7045"/>
          <seriesInfo name="DOI" value="10.17487/RFC7045"/>
        </reference>
        <reference anchor="RFC7048">
          <front>
            <title>Neighbor Unreachability Detection Is Too Impatient</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="I. Gashinsky" initials="I." surname="Gashinsky"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>IPv6 Neighbor Discovery includes Neighbor Unreachability Detection. That function is very useful when a host has an alternative neighbor -- for instance, when there are multiple default routers -- since it allows the host to switch to the alternative neighbor in a short time. By default, this time is 3 seconds after the node starts probing. However, if there are no alternative neighbors, this timeout behavior is far too impatient. This document specifies relaxed rules for Neighbor Discovery retransmissions that allow an implementation to choose different timeout behavior based on whether or not there are alternative neighbors. This document updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7048"/>
          <seriesInfo name="DOI" value="10.17487/RFC7048"/>
        </reference>
        <reference anchor="RFC7112">
          <front>
            <title>Implications of Oversized IPv6 Header Chains</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="V. Manral" initials="V." surname="Manral"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>The IPv6 specification allows IPv6 Header Chains of an arbitrary size. The specification also allows options that can, in turn, extend each of the headers. In those scenarios in which the IPv6 Header Chain or options are unusually long and packets are fragmented, or scenarios in which the fragment size is very small, the First Fragment of a packet may fail to include the entire IPv6 Header Chain. This document discusses the interoperability and security problems of such traffic, and updates RFC 2460 such that the First Fragment of a packet is required to contain the entire IPv6 Header Chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7112"/>
          <seriesInfo name="DOI" value="10.17487/RFC7112"/>
        </reference>
        <reference anchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another. This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users. The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7527">
          <front>
            <title>Enhanced Duplicate Address Detection</title>
            <author fullname="R. Asati" initials="R." surname="Asati"/>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <author fullname="E. Dart" initials="E." surname="Dart"/>
            <author fullname="W. George" initials="W." surname="George"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of RFC 4862. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. Several service provider communities have expressed a need for automated detection of looped back Neighbor Discovery (ND) messages used by DAD. This document includes mitigation techniques and outlines the Enhanced DAD algorithm to automate the detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks, this document automates resolving a specific duplicate address conflict. This document updates RFCs 4429, 4861, and 4862.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7527"/>
          <seriesInfo name="DOI" value="10.17487/RFC7527"/>
        </reference>
        <reference anchor="RFC7559">
          <front>
            <title>Packet-Loss Resiliency for Router Solicitations</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="D. Anipko" initials="D." surname="Anipko"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>When an interface on a host is initialized, the host transmits Router Solicitations in order to minimize the amount of time it needs to wait until the next unsolicited multicast Router Advertisement is received. In certain scenarios, these Router Solicitations transmitted by the host might be lost. This document specifies a mechanism for hosts to cope with the loss of the initial Router Solicitations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7559"/>
          <seriesInfo name="DOI" value="10.17487/RFC7559"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC8028">
          <front>
            <title>First-Hop Router Selection by Hosts in a Multi-Prefix Network</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document describes expected IPv6 host behavior in a scenario that has more than one prefix, each allocated by an upstream network that is assumed to implement BCP 38 ingress filtering, when the host has multiple routers to choose from. It also applies to other scenarios such as the usage of stateful firewalls that effectively act as address-based filters. Host behavior in choosing a first-hop router may interact with source address selection in a given implementation. However, the selection of the source address for a packet is done before the first-hop router for that packet is chosen. Given that the network or host is, or appears to be, multihomed with multiple provider-allocated addresses, that the host has elected to use a source address in a given prefix, and that some but not all neighboring routers are advertising that prefix in their Router Advertisement Prefix Information Options, this document specifies to which router a host should present its transmission. It updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8028"/>
          <seriesInfo name="DOI" value="10.17487/RFC8028"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8064" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8064.xml">
          <front>
            <title>Recommendation on Stable IPv6 Interface Identifiers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document changes the recommended default Interface Identifier (IID) generation scheme for cases where Stateless Address Autoconfiguration (SLAAC) is used to generate a stable IPv6 address. It recommends using the mechanism specified in RFC 7217 in such cases, and recommends against embedding stable link-layer addresses in IPv6 IIDs. It formally updates RFC 2464, RFC 2467, RFC 2470, RFC 2491, RFC 2492, RFC 2497, RFC 2590, RFC 3146, RFC 3572, RFC 4291, RFC 4338, RFC 4391, RFC 5072, and RFC 5121. This document does not change any existing recommendations concerning the use of temporary addresses as specified in RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8064"/>
          <seriesInfo name="DOI" value="10.17487/RFC8064"/>
        </reference>
        <reference anchor="RFC8106" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8106.xml">
          <front>
            <title>IPv6 Router Advertisement Options for DNS Configuration</title>
            <author fullname="J. Jeong" initials="J." surname="Jeong"/>
            <author fullname="S. Park" initials="S." surname="Park"/>
            <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
              <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8106"/>
          <seriesInfo name="DOI" value="10.17487/RFC8106"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="RFC8221">
          <front>
            <title>Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document replaces RFC 7321, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)". The goal of this document is to enable ESP and AH to benefit from cryptography that is up to date while making IPsec interoperable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8221"/>
          <seriesInfo name="DOI" value="10.17487/RFC8221"/>
        </reference>
        <reference anchor="RFC8247">
          <front>
            <title>Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The Internet Key Exchange (IKE) protocol is used to negotiate the IPsec Security Association (IPsec SA) parameters, such as which algorithms should be used. To ensure interoperability between different implementations, it is necessary to specify a set of algorithm implementation requirements and usage guidance to ensure that there is at least one algorithm that all implementations support. This document updates RFC 7296 and obsoletes RFC 4307 in defining the current algorithm implementation requirements and usage guidance for IKEv2, and does minor cleaning up of the IKEv2 IANA registry. This document does not update the algorithms used for packet encryption using IPsec Encapsulating Security Payload (ESP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8247"/>
          <seriesInfo name="DOI" value="10.17487/RFC8247"/>
        </reference>
        <reference anchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC8344">
          <front>
            <title>A YANG Data Model for IP Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for management of IP implementations. The data model includes configuration and system state.</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7277.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8344"/>
          <seriesInfo name="DOI" value="10.17487/RFC8344"/>
        </reference>
        <reference anchor="RFC8415" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8415.xml">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="November" year="2018"/>
            <abstract>
              <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
        </reference>
        <reference anchor="RFC8899">
          <front>
            <title>Packetization Layer Path MTU Discovery for Datagram Transports</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="T. Jones" initials="T." surname="Jones"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="I. Rüngeler" initials="I." surname="Rüngeler"/>
            <author fullname="T. Völker" initials="T." surname="Völker"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram Packetization Layers (PLs). It allows a PL, or a datagram application that uses a PL, to discover whether a network path can support the current size of datagram. This can be used to detect and reduce the message size when a sender encounters a packet black hole. It can also probe a network path to discover whether the maximum packet size can be increased. This provides functionality for datagram transports that is equivalent to the PLPMTUD specification for TCP, specified in RFC 4821, which it updates. It also updates the UDP Usage Guidelines to refer to this method for use with UDP datagrams and updates SCTP.</t>
              <t>The document provides implementation notes for incorporating Datagram PMTUD into IETF datagram transports or applications that use datagram transports.</t>
              <t>This specification updates RFC 4960, RFC 4821, RFC 6951, RFC 8085, and RFC 8261.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8899"/>
          <seriesInfo name="DOI" value="10.17487/RFC8899"/>
        </reference>
        <reference anchor="RFC8981">
          <front>
            <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8981"/>
          <seriesInfo name="DOI" value="10.17487/RFC8981"/>
        </reference>
        <reference anchor="RFC9131" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9131.xml">
          <front>
            <title>Gratuitous Neighbor Discovery: Creating Neighbor Cache Entries on First-Hop Routers</title>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>Neighbor Discovery (RFC 4861) is used by IPv6 nodes to determine the link-layer addresses of neighboring nodes as well as to discover and maintain reachability information. This document updates RFC 4861 to allow routers to proactively create a Neighbor Cache entry when a new IPv6 address is assigned to a node. It also updates RFC 4861 and recommends that nodes send unsolicited Neighbor Advertisements upon assigning a new IPv6 address. These changes will minimize the delay and packet loss when a node initiates connections to an off-link destination from a new IPv6 address.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9131"/>
          <seriesInfo name="DOI" value="10.17487/RFC9131"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="I-D.ietf-6man-eh-limits">
          <front>
            <title>Limits on Sending and Processing IPv6 Extension Headers</title>
            <author fullname="Tom Herbert" initials="T." surname="Herbert">
         </author>
            <date day="27" month="February" year="2025"/>
            <abstract>
              <t>   This document defines various limits that may be applied to
   receiving, sending, and otherwise processing packets that contain
   IPv6 extension headers.  Limits are pragmatic to facilitate
   interoperability amongst hosts and routers, thereby increasing the
   deployability of extension headers.  The limits described herein
   establish the minimum baseline of support for use of extension
   headers on the Internet.  If it is known that all communicating
   parties for a particular communication, including destination hosts
   and any routers in the path, are capable of supporting more than the
   baseline then these default limits may be freely exceeded.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6man-eh-limits-19"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC0793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2205">
          <front>
            <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <author fullname="S. Berson" initials="S." surname="Berson"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="S. Jamin" initials="S." surname="Jamin"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2205"/>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
        </reference>
        <reference anchor="RFC2464" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2464.xml">
          <front>
            <title>Transmission of IPv6 Packets over Ethernet Networks</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document specifies the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Ethernet networks. It also specifies the content of the Source/Target Link-layer Address option used in Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement and Redirect messages when those messages are transmitted on an Ethernet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2464"/>
          <seriesInfo name="DOI" value="10.17487/RFC2464"/>
        </reference>
        <reference anchor="RFC2491">
          <front>
            <title>IPv6 over Non-Broadcast Multiple Access (NBMA) networks</title>
            <author fullname="G. Armitage" initials="G." surname="Armitage"/>
            <author fullname="P. Schulter" initials="P." surname="Schulter"/>
            <author fullname="M. Jork" initials="M." surname="Jork"/>
            <author fullname="G. Harter" initials="G." surname="Harter"/>
            <date month="January" year="1999"/>
            <abstract>
              <t>This document describes a general architecture for IPv6 over NBMA networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2491"/>
          <seriesInfo name="DOI" value="10.17487/RFC2491"/>
        </reference>
        <reference anchor="RFC2590">
          <front>
            <title>Transmission of IPv6 Packets over Frame Relay Networks Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="A. Malis" initials="A." surname="Malis"/>
            <author fullname="M. Mueller" initials="M." surname="Mueller"/>
            <date month="May" year="1999"/>
            <abstract>
              <t>This memo describes mechanisms for the transmission of IPv6 packets over Frame Relay networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2590"/>
          <seriesInfo name="DOI" value="10.17487/RFC2590"/>
        </reference>
        <reference anchor="RFC2874">
          <front>
            <title>DNS Extensions to Support IPv6 Address Aggregation and Renumbering</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="July" year="2000"/>
            <abstract>
              <t>This document defines changes to the Domain Name System to support renumberable and aggregatable IPv6 addressing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2874"/>
          <seriesInfo name="DOI" value="10.17487/RFC2874"/>
        </reference>
        <reference anchor="RFC2923">
          <front>
            <title>TCP Problems with Path MTU Discovery</title>
            <author fullname="K. Lahey" initials="K." surname="Lahey"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This memo catalogs several known Transmission Control Protocol (TCP) implementation problems dealing with Path Maximum Transmission Unit Discovery (PMTUD), including the long-standing black hole problem, stretch acknowlegements (ACKs) due to confusion between Maximum Segment Size (MSS) and segment size, and MSS advertisement based on PMTU. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2923"/>
          <seriesInfo name="DOI" value="10.17487/RFC2923"/>
        </reference>
        <reference anchor="RFC3146">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 1394 Networks</title>
            <author fullname="K. Fujisawa" initials="K." surname="Fujisawa"/>
            <author fullname="A. Onoe" initials="A." surname="Onoe"/>
            <date month="October" year="2001"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE1394 networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3146"/>
          <seriesInfo name="DOI" value="10.17487/RFC3146"/>
        </reference>
        <reference anchor="RFC3363">
          <front>
            <title>Representing Internet Protocol version 6 (IPv6) Addresses in the Domain Name System (DNS)</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="B. Fink" initials="B." surname="Fink"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="T. Hain" initials="T." surname="Hain"/>
            <date month="August" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3363"/>
          <seriesInfo name="DOI" value="10.17487/RFC3363"/>
        </reference>
        <reference anchor="RFC3493">
          <front>
            <title>Basic Socket Interface Extensions for IPv6</title>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <date month="February" year="2003"/>
            <abstract>
              <t>The de facto standard Application Program Interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to support IPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required by TCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3493"/>
          <seriesInfo name="DOI" value="10.17487/RFC3493"/>
        </reference>
        <reference anchor="RFC3542">
          <front>
            <title>Advanced Sockets Application Program Interface (API) for IPv6</title>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="May" year="2003"/>
            <abstract>
              <t>This document provides sockets Application Program Interface (API) to support "advanced" IPv6 applications, as a supplement to a separate specification, RFC 3493. The expected applications include Ping, Traceroute, routing daemons and the like, which typically use raw sockets to access IPv6 or ICMPv6 header fields. This document proposes some portable interfaces for applications that use raw sockets under IPv6. There are other features of IPv6 that some applications will need to access: interface identification (specifying the outgoing interface and determining the incoming interface), IPv6 extension headers, and path Maximum Transmission Unit (MTU) information. This document provides API access to these features too. Additionally, some extended interfaces to libraries for the "r" commands are defined. The extension will provide better backward compatibility to existing implementations that are not IPv6-capable. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3542"/>
          <seriesInfo name="DOI" value="10.17487/RFC3542"/>
        </reference>
        <reference anchor="RFC3646" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3646.xml">
          <front>
            <title>DNS Configuration options for Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="R. Droms" initials="R." role="editor" surname="Droms"/>
            <date month="December" year="2003"/>
            <abstract>
              <t>This document describes Dynamic Host Configuration Protocol for IPv6 (DHCPv6) options for passing a list of available DNS recursive name servers and a domain search list to a client.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3646"/>
          <seriesInfo name="DOI" value="10.17487/RFC3646"/>
        </reference>
        <reference anchor="RFC3678">
          <front>
            <title>Socket Interface Extensions for Multicast Source Filters</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>The Internet Group Management Protocol (IGMPv3) for IPv4 and the Multicast Listener Discovery (MLDv2) for IPv6 add the capability for applications to express source filters on multicast group memberships, which allows receiver applications to determine the set of senders (sources) from which to accept multicast traffic. This capability also simplifies support of one-to-many type multicast applications. This document specifies new socket options and functions to manage source filters for IP Multicast group memberships. It also defines the socket structures to provide input and output arguments to these new application program interfaces (APIs). These extensions are designed to provide access to the source filtering features, while introducing a minimum of change into the system and providing complete compatibility for existing multicast applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3678"/>
          <seriesInfo name="DOI" value="10.17487/RFC3678"/>
        </reference>
        <reference anchor="RFC4191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4191.xml">
          <front>
            <title>Default Router Preferences and More-Specific Routes</title>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>This document describes an optional extension to Router Advertisement messages for communicating default router preferences and more-specific routes from routers to hosts. This improves the ability of hosts to pick an appropriate router, especially when the host is multi-homed and the routers are on different links. The preference values and specific routes advertised to hosts require administrative configuration; they are not automatically derived from routing tables. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4191"/>
          <seriesInfo name="DOI" value="10.17487/RFC4191"/>
        </reference>
        <reference anchor="RFC4294">
          <front>
            <title>IPv6 Node Requirements</title>
            <author fullname="J. Loughney" initials="J." role="editor" surname="Loughney"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4294"/>
          <seriesInfo name="DOI" value="10.17487/RFC4294"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4338">
          <front>
            <title>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP) Packets over Fibre Channel</title>
            <author fullname="C. DeSanti" initials="C." surname="DeSanti"/>
            <author fullname="C. Carlson" initials="C." surname="Carlson"/>
            <author fullname="R. Nixon" initials="R." surname="Nixon"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies the way of encapsulating IPv6, IPv4, and Address Resolution Protocol (ARP) packets over Fibre Channel. This document also specifies the method of forming IPv6 link-local addresses and statelessly autoconfigured IPv6 addresses on Fibre Channel networks, and a mechanism to perform IPv4 address resolution over Fibre Channel networks.</t>
              <t>This document obsoletes RFC 2625 and RFC 3831. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4338"/>
          <seriesInfo name="DOI" value="10.17487/RFC4338"/>
        </reference>
        <reference anchor="RFC4380">
          <front>
            <title>Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP; we call this the Teredo service. Running the service requires the help of "Teredo servers" and "Teredo relays". The Teredo servers are stateless, and only have to manage a small fraction of the traffic between Teredo clients; the Teredo relays act as IPv6 routers between the Teredo service and the "native" IPv6 Internet. The relays can also provide interoperability with hosts using other transition mechanisms such as "6to4". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4380"/>
          <seriesInfo name="DOI" value="10.17487/RFC4380"/>
        </reference>
        <reference anchor="RFC4429">
          <front>
            <title>Optimistic Duplicate Address Detection (DAD) for IPv6</title>
            <author fullname="N. Moore" initials="N." surname="Moore"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>Optimistic Duplicate Address Detection is an interoperable modification of the existing IPv6 Neighbor Discovery (RFC 2461) and Stateless Address Autoconfiguration (RFC 2462) processes. The intention is to minimize address configuration delays in the successful case, to reduce disruption as far as possible in the failure case, and to remain interoperable with unmodified hosts and routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4429"/>
          <seriesInfo name="DOI" value="10.17487/RFC4429"/>
        </reference>
        <reference anchor="RFC4584">
          <front>
            <title>Extension to Sockets API for Mobile IPv6</title>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2006"/>
            <abstract>
              <t>This document describes data structures and API support for Mobile IPv6 as an extension to the Advanced Socket API for IPv6.</t>
              <t>Just as the Advanced Sockets API for IPv6 gives access to various extension headers and the ICMPv6 protocol, this document specifies the same level of access for Mobile IPv6 components. It specifies a mechanism for applications to retrieve and set information for Mobility Header messages, Home Address destination options, and Routing Header Type 2 extension headers. It also specifies the common data structures and definitions that might be used by certain advanced Mobile IPv6 socket applications. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4584"/>
          <seriesInfo name="DOI" value="10.17487/RFC4584"/>
        </reference>
        <reference anchor="RFC4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="RFC4884">
          <front>
            <title>Extended ICMP to Support Multi-Part Messages</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document redefines selected ICMP messages to support multi-part operation. A multi-part ICMP message carries all of the information that ICMP messages carried previously, as well as additional information that applications may require.</t>
              <t>Multi-part messages are supported by an ICMP extension structure. The extension structure is situated at the end of the ICMP message. It includes an extension header followed by one or more extension objects. Each extension object contains an object header and object payload. All object headers share a common format.</t>
              <t>This document further redefines the above mentioned ICMP messages by specifying a length attribute. All of the currently defined ICMP messages to which an extension structure can be appended include an "original datagram" field. The "original datagram" field contains the initial octets of the datagram that elicited the ICMP error message. Although the original datagram field is of variable length, the ICMP message does not include a field that specifies its length. Therefore, in order to facilitate message parsing, this document allocates eight previously reserved bits to reflect the length of the "original datagram" field.</t>
              <t>The proposed modifications change the requirements for ICMP compliance. The impact of these changes on compliant implementations is discussed, and new requirements for future implementations are presented.</t>
              <t>This memo updates RFC 792 and RFC 4443. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4884"/>
          <seriesInfo name="DOI" value="10.17487/RFC4884"/>
        </reference>
        <reference anchor="RFC4890">
          <front>
            <title>Recommendations for Filtering ICMPv6 Messages in Firewalls</title>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="May" year="2007"/>
            <abstract>
              <t>In networks supporting IPv6, the Internet Control Message Protocol version 6 (ICMPv6) plays a fundamental role with a large number of functions, and a correspondingly large number of message types and options. ICMPv6 is essential to the functioning of IPv6, but there are a number of security risks associated with uncontrolled forwarding of ICMPv6 messages. Filtering strategies designed for the corresponding protocol, ICMP, in IPv4 networks are not directly applicable, because these strategies are intended to accommodate a useful auxiliary protocol that may not be required for correct functioning.</t>
              <t>This document provides some recommendations for ICMPv6 firewall filter configuration that will allow propagation of ICMPv6 messages that are needed to maintain the functioning of the network but drop messages that are potential security risks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4890"/>
          <seriesInfo name="DOI" value="10.17487/RFC4890"/>
        </reference>
        <reference anchor="RFC4919">
          <front>
            <title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="C. Schumacher" initials="C." surname="Schumacher"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks. The set of goals enumerated in this document form an initial set only. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4919"/>
          <seriesInfo name="DOI" value="10.17487/RFC4919"/>
        </reference>
        <reference anchor="RFC4944">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="D. Culler" initials="D." surname="Culler"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4944"/>
          <seriesInfo name="DOI" value="10.17487/RFC4944"/>
        </reference>
        <reference anchor="RFC5014">
          <front>
            <title>IPv6 Socket API for Source Address Selection</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="J. Laganier" initials="J." surname="Laganier"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The IPv6 default address selection document (RFC 3484) describes the rules for selecting source and destination IPv6 addresses, and indicates that applications should be able to reverse the sense of some of the address selection rules through some unspecified API. However, no such socket API exists in the basic (RFC 3493) or advanced (RFC 3542) IPv6 socket API documents. This document fills that gap partially by specifying new socket-level options for source address selection and flags for the getaddrinfo() API to specify address selection based on the source address preference in accordance with the socket-level options that modify the default source address selection algorithm. The socket API described in this document will be particularly useful for IPv6 applications that want to choose between temporary and public addresses, and for Mobile IPv6 aware applications that want to use the care-of address for communication. It also specifies socket options and flags for selecting Cryptographically Generated Address (CGA) or non-CGA source addresses. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5014"/>
          <seriesInfo name="DOI" value="10.17487/RFC5014"/>
        </reference>
        <reference anchor="RFC5072" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5072.xml">
          <front>
            <title>IP Version 6 over PPP</title>
            <author fullname="S. Varada" initials="S." role="editor" surname="Varada"/>
            <author fullname="D. Haskins" initials="D." surname="Haskins"/>
            <author fullname="E. Allen" initials="E." surname="Allen"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method of encapsulating network-layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.</t>
              <t>This document defines the method for sending IPv6 packets over PPP links, the NCP for establishing and configuring the IPv6 over PPP, and the method for forming IPv6 link-local addresses on PPP links.</t>
              <t>It also specifies the conditions for performing Duplicate Address Detection on IPv6 global unicast addresses configured for PPP links either through stateful or stateless address autoconfiguration.</t>
              <t>This document obsoletes RFC 2472. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5072"/>
          <seriesInfo name="DOI" value="10.17487/RFC5072"/>
        </reference>
        <reference anchor="RFC5121">
          <front>
            <title>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE 802.16 Networks</title>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="F. Xia" initials="F." surname="Xia"/>
            <author fullname="B. Sarikaya" initials="B." surname="Sarikaya"/>
            <author fullname="JH. Choi" initials="JH." surname="Choi"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>IEEE Std 802.16 is an air interface specification for fixed and mobile Broadband Wireless Access Systems. Service-specific convergence sublayers to which upper-layer protocols interface are a part of the IEEE 802.16 MAC (Medium Access Control). The Packet convergence sublayer (CS) is used for the transport of all packet- based protocols such as Internet Protocol (IP) and IEEE 802.3 LAN/MAN CSMA/CD Access Method (Ethernet). IPv6 packets can be sent and received via the IP-specific part of the Packet CS. This document specifies the addressing and operation of IPv6 over the IP-specific part of the Packet CS for hosts served by a network that utilizes the IEEE Std 802.16 air interface. It recommends the assignment of a unique prefix (or prefixes) to each host and allows the host to use multiple identifiers within that prefix, including support for randomly generated interface identifiers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5121"/>
          <seriesInfo name="DOI" value="10.17487/RFC5121"/>
        </reference>
        <reference anchor="RFC6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins"/>
            <author fullname="D. Johnson" initials="D." surname="Johnson"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address. The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address. To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option. All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes. This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6275"/>
          <seriesInfo name="DOI" value="10.17487/RFC6275"/>
        </reference>
        <reference anchor="RFC6563">
          <front>
            <title>Moving A6 to Historic Status</title>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="D. Conrad" initials="D." surname="Conrad"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>This document provides a summary of issues related to the use of A6 records, discusses the current status, and moves RFC 2874 to Historic status, providing clarity to implementers and operators. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6563"/>
          <seriesInfo name="DOI" value="10.17487/RFC6563"/>
        </reference>
        <reference anchor="RFC6980">
          <front>
            <title>Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document analyzes the security implications of employing IPv6 fragmentation with Neighbor Discovery (ND) messages. It updates RFC 4861 such that use of the IPv6 Fragmentation Header is forbidden in all Neighbor Discovery messages, thus allowing for simple and effective countermeasures for Neighbor Discovery attacks. Finally, it discusses the security implications of using IPv6 fragmentation with SEcure Neighbor Discovery (SEND) and formally updates RFC 3971 to provide advice regarding how the aforementioned security implications can be mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6980"/>
          <seriesInfo name="DOI" value="10.17487/RFC6980"/>
        </reference>
        <reference anchor="RFC7084">
          <front>
            <title>Basic Requirements for IPv6 Customer Edge Routers</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="B. Stark" initials="B." surname="Stark"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies requirements for an IPv6 Customer Edge (CE) router. Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it. The document also covers IP transition technologies. Two transition technologies in RFC 5969's IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) and RFC 6333's Dual-Stack Lite (DS-Lite) are covered in the document. The document obsoletes RFC 6204.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7084"/>
          <seriesInfo name="DOI" value="10.17487/RFC7084"/>
        </reference>
        <reference anchor="RFC7123">
          <front>
            <title>Security Implications of IPv6 on IPv4 Networks</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2014"/>
            <abstract>
              <t>This document discusses the security implications of native IPv6 support and IPv6 transition/coexistence technologies on "IPv4-only" networks and describes possible mitigations for the aforementioned issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7123"/>
          <seriesInfo name="DOI" value="10.17487/RFC7123"/>
        </reference>
        <reference anchor="RFC7371">
          <front>
            <title>Updates to the IPv6 Multicast Addressing Architecture</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document updates the IPv6 multicast addressing architecture by redefining the reserved bits as generic flag bits. The document also provides some clarifications related to the use of these flag bits.</t>
              <t>This document updates RFCs 3956, 3306, and 4291.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7371"/>
          <seriesInfo name="DOI" value="10.17487/RFC7371"/>
        </reference>
        <reference anchor="RFC7421">
          <front>
            <title>Analysis of the 64-bit Boundary in IPv6 Addressing</title>
            <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The IPv6 unicast addressing format includes a separation between the prefix used to route packets to a subnet and the interface identifier used to specify a given interface connected to that subnet. Currently, the interface identifier is defined as 64 bits long for almost every case, leaving 64 bits for the subnet prefix. This document describes the advantages of this fixed boundary and analyzes the issues that would be involved in treating it as a variable boundary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7421"/>
          <seriesInfo name="DOI" value="10.17487/RFC7421"/>
        </reference>
        <reference anchor="RFC7721" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7721.xml">
          <front>
            <title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized. It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7721"/>
          <seriesInfo name="DOI" value="10.17487/RFC7721"/>
        </reference>
        <reference anchor="RFC7739">
          <front>
            <title>Security Implications of Predictable Fragment Identification Values</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>IPv6 specifies the Fragment Header, which is employed for the fragmentation and reassembly mechanisms. The Fragment Header contains an "Identification" field that, together with the IPv6 Source Address and the IPv6 Destination Address of a packet, identifies fragments that correspond to the same original datagram, such that they can be reassembled together by the receiving host. The only requirement for setting the Identification field is that the corresponding value must be different than that employed for any other fragmented datagram sent recently with the same Source Address and Destination Address. Some implementations use a simple global counter for setting the Identification field, thus leading to predictable Identification values. This document analyzes the security implications of predictable Identification values, and provides implementation guidance for setting the Identification field of the Fragment Header, such that the aforementioned security implications are mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7739"/>
          <seriesInfo name="DOI" value="10.17487/RFC7739"/>
        </reference>
        <reference anchor="RFC7772" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7772.xml">
          <front>
            <title>Reducing Energy Consumption of Router Advertisements</title>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>Frequent Router Advertisement messages can severely impact host power consumption. This document recommends operational practices to avoid such impact.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="202"/>
          <seriesInfo name="RFC" value="7772"/>
          <seriesInfo name="DOI" value="10.17487/RFC7772"/>
        </reference>
        <reference anchor="RFC7844" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7844.xml">
          <front>
            <title>Anonymity Profiles for DHCP Clients</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>Some DHCP options carry unique identifiers. These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses. The anonymity profiles are designed for clients that wish to remain anonymous to the visited network. The profiles provide guidelines on the composition of DHCP or DHCPv6 messages, designed to minimize disclosure of identifying information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7844"/>
          <seriesInfo name="DOI" value="10.17487/RFC7844"/>
        </reference>
        <reference anchor="RFC7934">
          <front>
            <title>Host Address Availability Recommendations</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="V. Cerf" initials="V." surname="Cerf"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document recommends that networks provide general-purpose end hosts with multiple global IPv6 addresses when they attach, and it describes the benefits of and the options for doing so.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="204"/>
          <seriesInfo name="RFC" value="7934"/>
          <seriesInfo name="DOI" value="10.17487/RFC7934"/>
        </reference>
        <reference anchor="RFC8087">
          <front>
            <title>The Benefits of Using Explicit Congestion Notification (ECN)</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="M. Welzl" initials="M." surname="Welzl"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The goal of this document is to describe the potential benefits of applications using a transport that enables Explicit Congestion Notification (ECN). The document outlines the principal gains in terms of increased throughput, reduced delay, and other benefits when ECN is used over a network path that includes equipment that supports Congestion Experienced (CE) marking. It also discusses challenges for successful deployment of ECN. It does not propose new algorithms to use ECN nor does it describe the details of implementation of ECN in endpoint devices (Internet hosts), routers, or other network devices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8087"/>
          <seriesInfo name="DOI" value="10.17487/RFC8087"/>
        </reference>
        <reference anchor="RFC8096">
          <front>
            <title>The IPv6-Specific MIB Modules Are Obsolete</title>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>In 2005-2006, the IPv6 MIB update group published updated versions of the IP-MIB, UDP-MIB, TCP-MIB, and IP-FORWARD-MIB modules, which use the InetAddressType/InetAddress construct to handle IPv4 and IPv6 in the same table. This document contains versions of the obsoleted IPV6-MIB, IPV6-TC, IPV6-ICMP-MIB, IPV6-TCP-MIB, and IPV6-UDP-MIB modules for the purpose of updating MIB module repositories. This document obsoletes RFCs 2452, 2454, 2465, and 2466 (i.e., the RFCs containing these MIBs) and reclassifies them as Historic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8096"/>
          <seriesInfo name="DOI" value="10.17487/RFC8096"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="POSIX" target="https://ieeexplore.ieee.org/document/8277153">
          <front>
            <title>Information Technology -- Portable Operating System Interface (POSIX(R)) Base Specifications, Issue 7</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="January"/>
          </front>
          <seriesInfo name="IEEE Std" value="1003.1-2017"/>
          <seriesInfo name="DOI:" value="10.1109/IEEESTD.2018.8277153"/>
        </reference>
        <reference anchor="USGv6" target="https://www.nist.gov/programs-projects/usgv6-program">
          <front>
            <title>A Profile for IPv6 in the U.S. Government - Version 1.0</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2008" month="July"/>
          </front>
          <seriesInfo name="NIST" value="SP500-267"/>
        </reference>
      </references>
    </references>
    <?line 1239?>

<section anchor="changes-from-rfc-8504">
      <name>Changes from RFC 8504</name>
      <t>This section highlights the changes since RFC 8504.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated obsoleted RFCs including 3315 and 3736 (both to 8415) and 4941 to 8981. RFC 793 has been obsoleted by 9293 but the latter does not include the the robustness principle for which RFC 793 is cited in this document.</t>
        </li>
        <li>
          <t>Added support for RFC 9131.</t>
        </li>
        <li>
          <t>Type C host from RFC 4191 is went from a <bcp14>SHOULD</bcp14> to <bcp14>MUST</bcp14>.</t>
        </li>
        <li>
          <t>Removed the Mobility Section.</t>
        </li>
        <li>
          <t>Removed the SEND Section.</t>
        </li>
        <li>
          <t>Added Discovery of translation prefixes Section.</t>
        </li>
        <li>
          <t>Added <bcp14>MUST</bcp14> requirement for Rul 5.5 in RFC 6724.</t>
        </li>
        <li>
          <t>Added Discovery of encrypted DNS resolver, RFC 9463.</t>
        </li>
        <li>
          <t>Added requirement to support PMTUD and PLPMTUD.</t>
        </li>
        <li>
          <t>Removed Extension Header protection text to utilize draft-ietf-6man-eh-limits.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-6434-to-rfc-8504">
      <name>Changes from RFC 6434 to RFC 8504</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Restructured sections.</t>
        </li>
        <li>
          <t>Added 6LoWPAN to link layers as it has some deployment.</t>
        </li>
        <li>
          <t>Removed the Downstream-on-Demand (DoD) IPv6 Profile as it hasn't been updated.</t>
        </li>
        <li>
          <t>Updated MLDv2 support to a <bcp14>MUST</bcp14> since nodes are restricted if MLDv1 is used.</t>
        </li>
        <li>
          <t>Required DNS RA options so SLAAC-only devices can get DNS; RFC 8106 is a
  <bcp14>MUST</bcp14>.</t>
        </li>
        <li>
          <t>Required RFC 3646 DNS Options for DHCPv6 implementations.</t>
        </li>
        <li>
          <t>Added RESTCONF and NETCONF as possible options to network management.</t>
        </li>
        <li>
          <t>Added a section on constrained devices.</t>
        </li>
        <li>
          <t>Added text on RFC 7934 to address availability to hosts (<bcp14>SHOULD</bcp14>).</t>
        </li>
        <li>
          <t>Added text on RFC 7844 for anonymity profiles for DHCPv6 clients.</t>
        </li>
        <li>
          <t>Added mDNS and DNS-SD as updated service discovery.</t>
        </li>
        <li>
          <t>Added RFC 8028 as a <bcp14>SHOULD</bcp14> as a method for solving a multi-prefix network.</t>
        </li>
        <li>
          <t>Added ECN RFC 3168 as a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added reference to RFC 7123 for security over IPv4-only networks.</t>
        </li>
        <li>
          <t>Removed Jumbograms (RFC 2675) as they aren't deployed.</t>
        </li>
        <li>
          <t>Updated obsoleted RFCs to the new version of the RFC, including RFCs 2460,
  1981, 7321, and 4307.</t>
        </li>
        <li>
          <t>Added RFC 7772 for power consumptions considerations.</t>
        </li>
        <li>
          <t>Added why /64 boundaries for more detail --- RFC 7421.</t>
        </li>
        <li>
          <t>Added a unique IPv6 prefix per host to support currently deployed IPv6 networks.</t>
        </li>
        <li>
          <t>Clarified RFC 7066 was a snapshot for 3GPP.</t>
        </li>
        <li>
          <t>Updated RFC 4191 as a <bcp14>MUST</bcp14> and the Type C Host as a <bcp14>SHOULD</bcp14> as they help solve
  multi-prefix problems.</t>
        </li>
        <li>
          <t>Removed IPv6 over ATM since there aren't many deployments.</t>
        </li>
        <li>
          <t>Added a note in Section 6.6 for Rule 5.5 from RFC 6724.</t>
        </li>
        <li>
          <t>Added <bcp14>MUST</bcp14> for BCP 198 for forwarding IPv6 packets.</t>
        </li>
        <li>
          <t>Added a reference to RFC 8064 for stable address creation.</t>
        </li>
        <li>
          <t>Added text on the protection from excessive extension header options.</t>
        </li>
        <li>
          <t>Added text on the dangers of 1280 MTU UDP, especially with regard to DNS
  traffic.</t>
        </li>
        <li>
          <t>Added text to clarify RFC 8200 behavior for unrecognized extension headers
  or unrecognized ULPs.</t>
        </li>
        <li>
          <t>Removed dated email addresses from design team acknowledgements for <xref target="RFC4294"/>.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-4294-to-rfc-6434">
      <name>Changes from RFC 4294 to RFC 6434</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated the Introduction to indicate that this document is an
  applicability statement and is aimed at
  general nodes.</t>
        </li>
        <li>
          <t>Significantly updated the section on mobility protocols;
  added references and downgraded previous SHOULDs to MAYs.</t>
        </li>
        <li>
          <t>Changed the Sub-IP Layer section to just list relevant RFCs, and
  added some more RFCs.</t>
        </li>
        <li>
          <t>Added a section on SEND (it is a <bcp14>MAY</bcp14>).</t>
        </li>
        <li>
          <t>Revised the section on Privacy Extensions to add more
  nuance to the recommendation.</t>
        </li>
        <li>
          <t>Completely revised the IPsec/IKEv2 section, downgrading the overall
  recommendation to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Upgraded recommendation of DHCPv6 to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added a background section on DHCP versus RA options, added
  a <bcp14>SHOULD</bcp14> recommendation for DNS configuration via RAs (RFC 6106), and cleaned
  up the DHCP recommendations.</t>
        </li>
        <li>
          <t>Added the recommendation that routers implement Sections 7.3 and
  7.5 of <xref target="RFC6275"/>.</t>
        </li>
        <li>
          <t>Added a pointer to subnet clarification document <xref target="RFC5942"/>.</t>
        </li>
        <li>
          <t>Added text that "IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be implemented.</t>
        </li>
        <li>
          <t>Added reference to <xref target="RFC5722"/> (Overlapping Fragments),
  and made it a <bcp14>MUST</bcp14> to implement.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Removed the mention of delegation name (DNAME) from the discussion about <xref target="RFC3363"/>.</t>
        </li>
        <li>
          <t>Numerous updates to reflect newer versions of IPv6
  documents, including <xref target="RFC3596"/>, <xref target="RFC4213"/>, <xref target="RFC4291"/>, and <xref target="RFC4443"/>.</t>
        </li>
        <li>
          <t>Removed discussion of "Managed" and "Other" flags in
  RAs. There is no consensus at present on how to process these
  flags, and discussion of their semantics was removed in the most
  recent update of Stateless Address Autoconfiguration <xref target="RFC4862"/>.</t>
        </li>
        <li>
          <t>Added many more references to optional IPv6 documents.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Updated the MLD section to include reference to Lightweight MLD <xref target="RFC5790"/>.</t>
        </li>
        <li>
          <t>Added a <bcp14>SHOULD</bcp14> recommendation for "Default Router Preferences
  and More-Specific Routes" <xref target="RFC4191"/>.</t>
        </li>
        <li>
          <t>Made "IPv6 Flow Label Specification" <xref target="RFC6437"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Acknowledgements from (Current Documents)  </t>
          <t>
The authors would like to thank Nick Buraglio, Brian Carpenter, and Jeremy Duncan
for their contributions and many members of the 6man WG for the inputs they gave.</t>
        </li>
        <li>
          <t>Acknowledgments from RFC 8504  </t>
          <t>
The authors would like to thank
Brian Carpenter, Dave Thaler,
Tom Herbert, Erik Kline, Mohamed Boucadair, and Michayla Newcombe
for their contributions and many members of the 6man WG for the inputs they
gave.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 6434  </t>
          <t>
RFC 6434 was authored by Ed Jankiewicz, John Loughney, and Thomas Narten.  </t>
          <t>
The authors of RFC 6434 thank Hitoshi Asaeda, Brian Carpenter, Tim Chown,
Ralph
Droms, Sheila Frankel, Sam Hartman, Bob Hinden, Paul Hoffman, Pekka
Savola, Yaron Sheffer, and Dave Thaler for their comments.  In addition,
the authors thank Mark Andrews for comments and corrections on DNS
text and Alfred Hoenes for tracking the updates to various RFCs.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 4294  </t>
          <t>
RFC 4294 was written by
the IPv6 Node Requirements design team, which had the following members:
Jari Arkko,
Marc Blanchet,
Samita Chakrabarti,
Alain Durand,
Gerard Gastaud,
Jun-ichiro Itojun Hagino,
Atsushi Inoue,
Masahiro Ishiyama,
John Loughney,
Rajiv Raghunarayan,
Shoichi Sakane,
Dave Thaler, and Juha Wiljakka.  </t>
          <t>
The authors of RFC 4294 thank Ran Atkinson, Jim Bound, Brian Carpenter, Ralph
Droms,
Christian Huitema, Adam Machalek, Thomas Narten, Juha Ollila, and Pekka
Savola for their comments.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
