<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc rfcprocack="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-6man-rfc8504-bis-02" category="bcp" consensus="true" submissionType="IETF" obsoletes="8504" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>IPv6 Node Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-6man-rfc8504-bis-02"/>
    <seriesInfo name="bcp" value="220"/>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <postal>
          <street>Lumen House, Library Avenue</street>
          <city>Harwell Oxford, Didcot</city>
          <code>OX11 0SG</code>
          <country>United Kingdom</country>
        </postal>
        <email>tim.chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Loughney" fullname="John Loughney">
      <organization>Intel</organization>
      <address>
        <postal>
          <city>Santa Clara, CA</city>
          <country>United States of America</country>
        </postal>
        <phone/>
        <email>john.loughney@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Winters" fullname="Timothy Winters">
      <organization>QA Cafe</organization>
      <address>
        <postal>
          <city>Dover</city>
          <region>NH</region>
          <country>United States of America</country>
        </postal>
        <email>tim@qacafe.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Internet</area>
    <workgroup>IPv6 Maintenance</workgroup>
    <keyword>IPv6</keyword>
    <abstract>
      <?line 188?>

<t>This document defines requirements for IPv6 nodes.  It is
expected that IPv6 will be deployed in a wide range of devices and
situations.  Specifying the requirements for IPv6 nodes allows
IPv6 to function well and interoperate in a large number of
situations and deployments.</t>
      <t>This document obsoletes RFC 8504, and in turn RFC 6434 and its predecessor, RFC 4294.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://timchown.github.io/rfc8504-bis/draft-ietf-6man-rfc8504-bis.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-6man-rfc8504-bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Maintenance Working Group mailing list (<eref target="mailto:ipv6@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipv6/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipv6/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/timchown/rfc8504-bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 199?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines common functionality required by both
IPv6 hosts and routers.  Many IPv6 nodes will implement optional
or additional features, but this document collects and summarizes
requirements from other published Standards Track documents in one
place.</t>
      <t>This document tries to avoid discussion of protocol details
and references RFCs for this purpose.  This document is intended
to be an applicability statement and to provide guidance as to which
IPv6 specifications should be implemented in the general case and
which specifications may be of interest to specific deployment
scenarios. This document does not update any individual protocol
document RFCs.</t>
      <t>Although this document points to different specifications, it
should be noted that in many cases, the granularity of a
particular requirement will be smaller than a single specification,
as many specifications define multiple, independent pieces, some
of which may not be mandatory. In addition, most specifications
define both client and server behavior in the same specification,
while many implementations will be focused on only one of those
roles.</t>
      <t>This document defines a minimal level of requirement needed
for a device to provide useful Internet service and considers a
broad range of device types and deployment scenarios. Because of
the wide range of deployment scenarios, the minimal requirements
specified in this document may not be sufficient for all
deployment scenarios. It is perfectly reasonable (and indeed
expected) for other profiles to define additional or stricter
requirements appropriate for specific usage and deployment
environments. As an example, this document does not mandate that all
clients support DHCP, but some deployment scenarios may deem
it appropriate to make such a requirement. As another example,
NIST has defined profiles for specialized requirements for IPv6
in target environments (see <xref target="USGv6"/>).</t>
      <t>As it is not always possible for an implementer to know the
exact usage of IPv6 in a node, an overriding requirement for IPv6
nodes is that they should adhere to Jon Postel's Robustness
Principle: "Be conservative in what you do, be liberal in what you accept
from others" <xref target="RFC0793"/>.</t>
      <section anchor="scope-of-this-document">
        <name>Scope of This Document</name>
        <t>IPv6 covers many specifications.  It is intended that IPv6
will be deployed in many different situations and environments.
Therefore, it is important to develop requirements for IPv6
nodes to ensure interoperability.</t>
      </section>
      <section anchor="description-of-ipv6-nodes">
        <name>Description of IPv6 Nodes</name>
        <t>From "Internet Protocol, Version 6 (IPv6) Specification" <xref target="RFC8200"/>, we
have the following definitions:</t>
        <artwork><![CDATA[
IPv6 node   - a device that implements IPv6.
IPv6 router - a node that forwards IPv6 packets not explicitly
              addressed to itself.
IPv6 host   - any IPv6 node that is not a router.
]]></artwork>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="abbreviations-used-in-this-document">
      <name>Abbreviations Used in This Document</name>
      <artwork><![CDATA[
AH    Authentication Header
DAD   Duplicate Address Detection
ESP   Encapsulating Security Payload
ICMP  Internet Control Message Protocol
IKE   Internet Key Exchange
MIB   Management Information Base
MLD   Multicast Listener Discovery
MTU   Maximum Transmission Unit
NA    Neighbor Advertisement
NBMA  Non-Broadcast Multi-Access
ND    Neighbor Discovery
NS    Neighbor Solicitation
NUD   Neighbor Unreachability Detection
PPP   Point-to-Point Protocol
]]></artwork>
    </section>
    <section anchor="sub-ip-layer">
      <name>Sub-IP Layer</name>
      <t>An IPv6 node <bcp14>MUST</bcp14> include support for one or more IPv6
link-layer specifications.  Which link-layer specifications an
implementation should include will depend upon what link layers
are supported by the hardware available on the system.  It is
possible for a conformant IPv6 node to support IPv6 on some of its
interfaces and not on others.</t>
      <t>As IPv6 is run over new Layer 2 technologies, it is expected
that new specifications will be issued.  We list here some of
the Layer 2 technologies for which an IPv6 specification has been developed.
It is provided for informational purposes only and may
not be complete.</t>
      <ul spacing="normal">
        <li>
          <t>Transmission of IPv6 Packets over Ethernet Networks <xref target="RFC2464"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over Frame Relay Networks Specification
<xref target="RFC2590"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 1394 Networks <xref target="RFC3146"/></t>
        </li>
        <li>
          <t>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP)
Packets over Fibre Channel <xref target="RFC4338"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 Packets over IEEE 802.15.4 Networks <xref target="RFC4944"/></t>
        </li>
        <li>
          <t>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE
802.16 Networks <xref target="RFC5121"/></t>
        </li>
        <li>
          <t>IP version 6 over PPP <xref target="RFC5072"/></t>
        </li>
      </ul>
      <t>In addition to traditional physical link layers, it is also
possible to tunnel IPv6 over other protocols. Examples
include:</t>
      <ul spacing="normal">
        <li>
          <t>Teredo: Tunneling IPv6 over UDP through Network Address Translations
(NATs) <xref target="RFC4380"/></t>
        </li>
        <li>
          <t>Basic Transition Mechanisms for IPv6 Hosts and Routers (see <xref section="3" sectionFormat="of" target="RFC4213"/>)</t>
        </li>
      </ul>
    </section>
    <section anchor="ip-layer">
      <name>IP Layer</name>
      <section anchor="internet-protocol-version-6-rfc-8200">
        <name>Internet Protocol Version 6 - RFC 8200</name>
        <t>The Internet Protocol version 6 is specified in <xref target="RFC8200"/>.  This specification <bcp14>MUST</bcp14> be supported.</t>
        <t>The node <bcp14>MUST</bcp14> follow the packet transmission rules in RFC 8200.</t>
        <t>All conformant IPv6 implementations <bcp14>MUST</bcp14> be
capable of sending and receiving IPv6 packets; forwarding
functionality <bcp14>MAY</bcp14> be supported.
Nodes <bcp14>MUST</bcp14> always be able to send, receive, and process
Fragment headers.</t>
        <t>IPv6 nodes <bcp14>MUST NOT</bcp14> create
overlapping fragments.  Also, when reassembling an IPv6
datagram, if one or more of its constituent fragments is
determined to be an overlapping fragment, the entire datagram
(and any constituent fragments) <bcp14>MUST</bcp14> be silently discarded.
See Section 4.5 of <xref target="RFC8200"/> for more information.</t>
        <t>As recommended in Section 4.5 of <xref target="RFC8200"/>, nodes <bcp14>MUST NOT</bcp14>
generate atomic fragments, i.e., where the fragment is a whole datagram.
As per <xref target="RFC6946"/>, if a receiving node reassembling
a datagram encounters an atomic fragment,
it should be processed as a fully reassembled packet, and
any other fragments that match this packet should be processed independently.</t>
        <t>To mitigate a variety of potential attacks,
nodes <bcp14>SHOULD</bcp14> avoid using predictable Fragment Identification values
in Fragment headers, as discussed in <xref target="RFC7739"/>.</t>
        <t>All nodes <bcp14>SHOULD</bcp14> support the setting and use of the IPv6 Flow
Label field as defined in the IPv6 Flow Label specification <xref target="RFC6437"/>.
Forwarding nodes such as routers and load distributors
<bcp14>MUST NOT</bcp14> depend only on Flow Label values being uniformly
distributed.  It is <bcp14>RECOMMENDED</bcp14> that source hosts support the flow
label by setting the Flow Label field for all packets of a given
flow to the same value chosen from an approximation to a discrete
uniform distribution.</t>
      </section>
      <section anchor="support-for-ipv6-extension-headers">
        <name>Support for IPv6 Extension Headers</name>
        <t>RFC 8200 specifies extension headers and the processing for
these headers.</t>
        <t>Extension headers (except for the Hop-by-Hop Options header) are not
processed, inserted, or deleted by any node along a packet's delivery
path, until the packet reaches the node (or each of the set of nodes,
in the case of multicast) identified in the Destination Address field
of the IPv6 header.</t>
        <t>Any unrecognized extension headers or options <bcp14>MUST</bcp14> be
processed as described in RFC 8200. Note that where
<xref section="4" sectionFormat="of" target="RFC8200"/>
refers to the action to be taken when a Next Header value
in the current header is not recognized by a node, that action
applies whether the value is an unrecognized extension
header or an unrecognized upper-layer protocol (ULP).</t>
        <t>An IPv6 node <bcp14>MUST</bcp14> be able to process these extension headers.  An
exception is Routing Header type 0 (RH0), which was deprecated
by <xref target="RFC5095"/> due to security concerns and
which <bcp14>MUST</bcp14> be treated as an unrecognized routing type.</t>
        <t>Further, <xref target="RFC7045"/> adds specific requirements for
the processing of extension headers, in particular that any forwarding
node along an IPv6 packet's path, which forwards the packet for
any reason, <bcp14>SHOULD</bcp14> do so regardless of any extension headers
that are present.  <xref target="RFC9673"/> <bcp14>MUST</bcp14> be supported to processing IPv6 Hop-by-Hop
options in IPv6 routers and hosts to allow for deployment of the option.</t>
        <t>As per RFC 8200, when a node fragments an IPv6 datagram,
it <bcp14>MUST</bcp14> include the entire IPv6 Header Chain in the first fragment.
The Per-Fragment headers <bcp14>MUST</bcp14>
consist of the IPv6 header plus any extension headers that <bcp14>MUST</bcp14> be
processed by nodes en route to the destination,
that is, all headers up to and including the Routing
header if present, else the Hop-by-Hop Options header if present,
else no extension headers.  On reassembly,
if the first fragment does not include all headers through an
upper-layer header, then that fragment <bcp14>SHOULD</bcp14> be discarded and
an ICMP Parameter Problem, Code 3, message <bcp14>SHOULD</bcp14> be sent to
the source of the fragment, with the Pointer field set to zero.
See <xref target="RFC7112"/> for a discussion of why oversized
IPv6 Extension Header Chains are avoided.</t>
        <t>Defining new IPv6 extension headers is not recommended, unless there
are no existing IPv6 extension headers that can be used by specifying
a new option for that IPv6 extension header.  A proposal to specify a
new IPv6 extension header <bcp14>MUST</bcp14> include a detailed technical
explanation of why an existing IPv6 extension header can not be used
for the desired new function, and in such cases, it needs to follow the format
described in <xref section="8" sectionFormat="of" target="RFC8200"/>.  For further background
reading on this topic, see <xref target="RFC6564"/>.</t>
        <t><xref target="RFC9740"/> allows for better visibility on EHs, including identifying root causes of performance degradation and packet drops.</t>
      </section>
      <section anchor="protecting-a-node-from-excessive-extension-header-options">
        <name>Protecting a Node from Excessive Extension Header Options</name>
        <t>As per RFC 8200, end hosts are expected to process all extension headers,
destination options, and hop-by-hop options in a packet. Given that
the only limit on the number and size of extension headers is the MTU,
the processing of received packets could be considerable. It is also
conceivable that a long chain of extension headers might be used as a
form of denial-of-service attack. Accordingly, a host <bcp14>MAY</bcp14> implement
<xref target="I-D.ietf-6man-eh-limits"/> has protection from this type of attacks.</t>
      </section>
      <section anchor="ND">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Neighbor Discovery is defined in <xref target="RFC4861"/>; the
definition was updated by <xref target="RFC5942"/>. Neighbor Discovery
<bcp14>MUST</bcp14> be supported with the noted exceptions below.  RFC 4861 states:</t>
        <ul empty="true">
          <li>
            <t>Unless specified otherwise (in a document that covers operating IP
over a particular link type) this document applies to all link types.
However, because ND uses link-layer multicast for some of its
services, it is possible that on some link types (e.g., Non‑Broadcast
Multi-Access (NBMA) links), alternative protocols or mechanisms to
implement those services will be specified (in the appropriate
document covering the operation of IP over a particular link type).
The services described in this document that are not directly
dependent on multicast, such as Redirects, Next-hop determination,
Neighbor Unreachability Detection, etc., are expected to be provided
as specified in this document.
The details of how one uses ND on
NBMA links are addressed in <xref target="RFC2491"/>.</t>
          </li>
        </ul>
        <t>Some detailed analysis of Neighbor Discovery follows:</t>
        <t>Router Discovery is how hosts locate routers that reside on
an attached link.  Hosts <bcp14>MUST</bcp14> support Router Discovery
functionality.</t>
        <t>Prefix Discovery is how hosts discover the set of address
prefixes that define which destinations are on-link for an
attached link. Hosts <bcp14>MUST</bcp14> support Prefix Discovery.</t>
        <t>Hosts <bcp14>MUST</bcp14> also implement Neighbor Unreachability Detection
(NUD) for all paths between hosts and neighboring nodes.  NUD is
not required for paths between routers.  However, all nodes <bcp14>MUST</bcp14>
respond to unicast Neighbor Solicitation (NS) messages.</t>
        <t><xref target="RFC7048"/> discusses NUD, in particular cases
where it behaves too impatiently. It states that if a node
transmits more than a certain number of packets, then it
<bcp14>SHOULD</bcp14> use the exponential backoff of the retransmit timer,
up to a certain threshold point.</t>
        <t>Hosts <bcp14>MUST</bcp14> support the sending of Router Solicitations and
the receiving of Router Advertisements (RAs).  The ability to
understand individual RA options is dependent
on supporting the functionality making use of the particular
option.</t>
        <t><xref target="RFC7559"/> discusses packet loss resiliency
for Router Solicitations and requires that nodes <bcp14>MUST</bcp14> use
a specific exponential backoff algorithm for retransmission of Router
Solicitations.</t>
        <t>All nodes <bcp14>MUST</bcp14> support the sending and receiving of Neighbor
Solicitation (NS) and Neighbor Advertisement (NA) messages.  NS
and NA messages are required for Duplicate Address Detection
(DAD).</t>
        <t>Hosts <bcp14>SHOULD</bcp14> support the processing of Redirect
functionality.  Routers <bcp14>MUST</bcp14> support the sending of Redirects,
though not necessarily for every individual packet (e.g., due to
rate limiting). Redirects are only useful on networks supporting
hosts. In core networks dominated by routers, Redirects are
typically disabled.  The sending of Redirects <bcp14>SHOULD</bcp14> be disabled
by default on routers intended to be deployed on core networks. They <bcp14>MAY</bcp14>
be enabled by default on routers intended to support hosts on edge networks.</t>
        <t>As specified in <xref target="RFC6980"/>, nodes <bcp14>MUST NOT</bcp14> employ IPv6 fragmentation
for sending any of the following Neighbor Discovery and SEcure
Neighbor Discovery messages: Neighbor Solicitation, Neighbor
Advertisement, Router Solicitation, Router Advertisement, Redirect, or
Certification Path Solicitation.
Nodes <bcp14>MUST</bcp14> silently ignore any of these messages on receipt if
fragmented.
See RFC 6980 for details and motivation.</t>
        <t>"IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> includes additional
recommendations on how to select from a set of available routers.
<xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be supported.</t>
      </section>
      <section anchor="ipv6-router-advertisement-flags-option-rfc-5175">
        <name>IPv6 Router Advertisement Flags Option - RFC 5175</name>
        <t>Router Advertisements include an 8-bit field of single-bit
Router Advertisement flags.  The Router Advertisement Flags
Option extends the number of available flag bits by 48 bits. At
the time of this writing, 6 of the original 8 single-bit flags have
been assigned, while 2 remain available for future
assignment. No flags have been defined that make use of the new
option; thus, strictly speaking, there is no requirement to
implement the option today. However, implementations that are
able to pass unrecognized options to a higher-level entity that
may be able to understand them (e.g., a user-level process using
a "raw socket" facility) <bcp14>MAY</bcp14> take steps to handle the option in
anticipation of a future usage.</t>
      </section>
      <section anchor="path-mtu-discovery-and-packet-size">
        <name>Path MTU Discovery and Packet Size</name>
        <section anchor="path-mtu-discovery-rfc-8201">
          <name>Path MTU Discovery - RFC 8201</name>
          <t>"Support for Path MTU Discovery for IP version 6" <xref target="RFC8201"/> as documented in <xref target="RFC8200"/>:</t>
          <ul empty="true">
            <li>
              <t>It is strongly recommended that IPv6 nodes implement
Path MTU Discovery <xref target="RFC8201"/>, in order to
discover and
take advantage of path MTUs greater than 1280 octets.
However, a minimal IPv6 implementation (e.g., in a boot
ROM) may simply restrict itself to sending packets no
larger than 1280 octets, and omit implementation of Path
MTU Discovery.</t>
            </li>
          </ul>
          <t>The rules in <xref target="RFC8200"/> and <xref target="RFC5722"/> <bcp14>MUST</bcp14> be followed for packet
fragmentation and reassembly.</t>
          <t>As described in <xref target="RFC8201"/>,
nodes implementing Path MTU Discovery and sending packets larger than
the IPv6 minimum link MTU are susceptible to problematic connectivity
if ICMPv6 messages are blocked or not transmitted.  For
example, this will result in connections that complete the TCP
three-way handshake correctly but then hang when data is transferred.  This
state is referred to as a black-hole connection <xref target="RFC2923"/>.  Path MTU
Discovery relies on ICMPv6 Packet Too Big (PTB) to determine the MTU
of the path (and thus these <bcp14>MUST NOT</bcp14> be filtered, as per the
recommendation in <xref target="RFC4890"/>).</t>
          <t>An alternative to Path MTU Discovery defined in <xref target="RFC8201"/> can be
found in <xref target="RFC4821"/> and <xref target="RFC8899"/>, which defines a method for Packetization
Layer Path MTU Discovery (PLPMTUD) designed for use over paths where
delivery of ICMPv6 messages to a host is not assured.</t>
          <t>PMTUD and PLPMTUD <bcp14>MUST</bcp14> be implemented and enabled by default, except in minimal IPv6 implementations.</t>
        </section>
        <section anchor="minimum-mtu-considerations">
          <name>Minimum MTU Considerations</name>
          <t>While an IPv6 link MTU can be set to 1280 bytes,
it is recommended that for IPv6 UDP in particular,
which includes DNS operation, the sender use a
large MTU if they can, in order to avoid gratuitous
fragmentation-caused packet drops.</t>
        </section>
      </section>
      <section anchor="icmp-for-the-internet-protocol-version-6-ipv6-rfc-4443">
        <name>ICMP for the Internet Protocol Version 6 (IPv6) - RFC 4443</name>
        <t>ICMPv6 <xref target="RFC4443"/> <bcp14>MUST</bcp14> be supported. "Extended
ICMP to Support Multi-Part Messages" <xref target="RFC4884"/> <bcp14>MAY</bcp14> be supported.</t>
      </section>
      <section anchor="default-router-preferences-and-more-specific-routes-rfc-4191">
        <name>Default Router Preferences and More-Specific Routes - RFC 4191</name>
        <t>"Default Router Preferences and More-Specific Routes" <xref target="RFC4191"/>
provides support for nodes attached to
multiple (different) networks, each providing routers that
advertise themselves as default routers via Router
Advertisements. In some scenarios, one router may provide
connectivity to destinations that the other router does not, and
choosing the "wrong" default router can result in reachability
failures. In order to resolve this scenario, IPv6 nodes <bcp14>MUST</bcp14> implement
<xref target="RFC4191"/> and <bcp14>MUST</bcp14> implement the Type C host role defined in RFC 4191.</t>
      </section>
      <section anchor="first-hop-router-selection-rfc-8028">
        <name>First-Hop Router Selection - RFC 8028</name>
        <t>In multihomed scenarios, where a host has more than one prefix,
each allocated by an upstream network that is assumed to implement
BCP 38 ingress filtering, the host may have multiple routers to
choose from.</t>
        <t>Hosts deployed in multihomed environments <bcp14>MUST</bcp14> follow
the guidance given in <xref target="RFC8028"/> unless this is a constrained host.</t>
      </section>
      <section anchor="mld">
        <name>Multicast Listener Discovery (MLD) for IPv6 - RFC 3810</name>
        <t>Nodes that need to join multicast groups <bcp14>MUST</bcp14> support MLDv2
<xref target="RFC3810"/>. MLD is needed by any node that is
expected to receive and process multicast traffic; in particular,
MLDv2 is required for support for source-specific multicast (SSM) as
per <xref target="RFC4607"/>.</t>
        <t>Previous versions of this specification only required MLDv1 <xref target="RFC2710"/>
to be implemented
on all nodes.  Since participation of any
MLDv1-only nodes on a link require that all other nodes on the link then
operate in version 1 compatibility mode, the requirement to support MLDv2
on all nodes was upgraded to a <bcp14>MUST</bcp14>. Further, SSM is now the preferred
multicast distribution method, rather than Any-Source Multicast (ASM).</t>
        <t>Note that Neighbor Discovery (as used on most link types -- see <xref target="ND"/>)
depends on multicast and requires that nodes join Solicited Node
multicast addresses.</t>
      </section>
      <section anchor="explicit-congestion-notification-ecn-rfc-3168">
        <name>Explicit Congestion Notification (ECN) - RFC 3168</name>
        <t>An ECN-aware router sets a mark in the IP header in order to signal
impending congestion, rather than dropping a packet. The receiver of
the packet echoes the congestion indication to the sender, which can then
reduce its transmission rate as if it detected a dropped packet.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support ECN <xref target="RFC3168"/> by implementing an interface
for the upper layer to access and by setting the ECN bits in the IP header.
The benefits of using ECN are documented in <xref target="RFC8087"/>.</t>
      </section>
    </section>
    <section anchor="addressing-and-address-configuration">
      <name>Addressing and Address Configuration</name>
      <section anchor="ip-version-6-addressing-architecture-rfc-4291">
        <name>IP Version 6 Addressing Architecture - RFC 4291</name>
        <t>The IPv6 Addressing Architecture <xref target="RFC4291"/> <bcp14>MUST</bcp14> be supported.</t>
        <t>The current IPv6 Address Architecture is based on a 64-bit boundary for subnet
prefixes.
The reasoning behind this decision is documented in <xref target="RFC7421"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> also support the multicast flag updates
documented in <xref target="RFC7371"/>.</t>
      </section>
      <section anchor="host-address-availability-recommendations">
        <name>Host Address Availability Recommendations</name>
        <t>Hosts may be configured with addresses through a variety of methods,
including Stateless Address Autoconfiguration (SLAAC), DHCPv6, or manual
configuration.</t>
        <t><xref target="RFC7934"/> recommends that networks provide general-purpose end hosts
with multiple global IPv6 addresses when they attach, and it describes
the benefits of and the options for doing so.
Routers <bcp14>SHOULD</bcp14> support <xref target="RFC7934"/> for assigning multiple addresses to a
host.
A host <bcp14>SHOULD</bcp14> support assigning multiple addresses as described in
<xref target="RFC7934"/>.</t>
        <t>Nodes <bcp14>SHOULD</bcp14> support the capability to be assigned a prefix per host as
documented in <xref target="RFC8273"/> and <xref target="RFC9663"/>.
Such an approach can offer improved host
isolation, enhanced subscriber management, scalibity, and ability to extend the network.</t>
      </section>
      <section anchor="ipv6-stateless-address-autoconfiguration-rfc-4862">
        <name>IPv6 Stateless Address Autoconfiguration - RFC 4862</name>
        <t>Hosts <bcp14>MUST</bcp14> support IPv6 Stateless Address Autoconfiguration.
It is <bcp14>RECOMMENDED</bcp14>, as described in <xref target="RFC8064"/>, that unless there
is a specific requirement for Media Access Control (MAC) addresses to be
embedded in
an Interface Identifier (IID), nodes follow the procedure in <xref target="RFC7217"/> to generate SLAAC-based
addresses, rather than use <xref target="RFC4862"/>.
Addresses generated using the method described in <xref target="RFC7217"/> will be the same whenever a given device (re)appears on the
same subnet (with a specific IPv6 prefix), but the IID will vary on
each subnet visited.</t>
        <t>Nodes that are routers <bcp14>MUST</bcp14> be able to generate link-local
addresses as described in <xref target="RFC4862"/>.</t>
        <t>From RFC 4862:</t>
        <ul empty="true">
          <li>
            <!-- Begin DNE text -->
  <t>The autoconfiguration process specified in this document
applies only to hosts and not routers.  Since host
autoconfiguration uses information advertised by routers,
routers will need to be configured by some other means.
However, it is expected that routers will generate link-local
addresses using the mechanism described in this document.  In
addition, routers are expected to successfully pass the
Duplicate Address Detection procedure described in this
document on all addresses prior to assigning them to an
interface.</t>
          </li>
        </ul>
        <t>All nodes <bcp14>MUST</bcp14> implement Duplicate Address Detection. Quoting
from <xref section="5.4" sectionFormat="of" target="RFC4862"/>:</t>
        <ul empty="true">
          <li>
            <t>Duplicate Address Detection <bcp14>MUST</bcp14>
be performed on all unicast addresses prior to assigning them
to an interface, regardless of whether they are obtained
through stateless autoconfiguration, DHCPv6, or manual
configuration, with the following exceptions [noted therein].</t>
          </li>
        </ul>
        <t>"Optimistic Duplicate Address Detection (DAD) for
IPv6" <xref target="RFC4429"/> specifies a mechanism to reduce
delays associated with generating addresses via Stateless
Address Autoconfiguration <xref target="RFC4862"/>.  RFC 4429
was developed in conjunction with Mobile IPv6 in order to reduce
the time needed to acquire and configure addresses as devices
quickly move from one network to another, and it is desirable to
minimize transition delays.  For general purpose devices, RFC 4429 remains
optional at this time.</t>
        <t><xref target="RFC7527"/> discusses enhanced DAD and describes an
algorithm to automate the detection of looped-back IPv6 ND messages
used by DAD. Nodes <bcp14>SHOULD</bcp14> implement this behavior where such
detection is beneficial.</t>
      </section>
      <section anchor="privacy-extensions-for-address-configuration-in-ipv6-rfc-8981">
        <name>Privacy Extensions for Address Configuration in IPv6 - RFC 8981</name>
        <t>A node using Stateless Address
Autoconfiguration <xref target="RFC4862"/> to form a globally
unique IPv6 address that uses its MAC address to generate the IID
will see that the IID remains the same on any visited
network, even though the network prefix part changes.
Thus, it is possible for a third-party device to track the activities of
the node they
communicate, as that node moves around the network.  Privacy Extensions
for Stateless Address
Autoconfiguration <xref target="RFC8981"/> address this
concern by allowing nodes to configure an additional temporary address
where the IID is effectively randomly generated.  Privacy addresses
are then used as source addresses for new communications initiated by the
node.</t>
        <t>General issues regarding privacy issues for IPv6 addressing are discussed
in <xref target="RFC7721"/>.</t>
        <t>RFC 8981 <bcp14>SHOULD</bcp14> be supported.  In some scenarios,
such as dedicated servers in a data
center, it provides limited or no benefit, or it may complicate network management.
Thus, devices implementing this specification <bcp14>MUST</bcp14> provide a way for the
end user to explicitly enable or disable the use of such temporary
addresses.</t>
        <t>Note that RFC 8981 can be used independently of traditional SLAAC or independently
of SLAAC that is based on RFC 7217.</t>
        <t>Implementers of RFC 8981 should be aware that certain
addresses are reserved and should not be chosen for use as
temporary addresses. Consult "Reserved IPv6 Interface
Identifiers" <xref target="RFC5453"/> for more details.</t>
      </section>
      <section anchor="stateful1">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>DHCPv6 <xref target="RFC8415"/> can be used to obtain and
configure addresses. In general, a network may provide for the
configuration of addresses through SLAAC,
DHCPv6, or both.  There will be a wide range of IPv6 deployment
models and differences in address assignment requirements,
some of which may require DHCPv6 for stateful address assignment.
Consequently, all hosts <bcp14>SHOULD</bcp14> implement address configuration
via DHCPv6.</t>
        <t>In the absence of observed Router Advertisement messages, IPv6 nodes
<bcp14>MAY</bcp14> initiate DHCP to obtain IPv6 addresses
and other configuration information, as described in <xref section="5.5.2" sectionFormat="of" target="RFC4862"/>.</t>
        <t>Where devices are likely to be carried by users and attached
to multiple visited networks, DHCPv6 client
anonymity profiles <bcp14>SHOULD</bcp14> be supported as described in <xref target="RFC7844"/> to minimize the disclosure of identifying information.
<xref section="5" sectionFormat="of" target="RFC7844"/> describes operational considerations on the use of
such anonymity profiles.</t>
      </section>
      <section anchor="default-address-selection-for-ipv6-rfc-6724">
        <name>Default Address Selection for IPv6 - RFC 6724</name>
        <t>IPv6 nodes will invariably have multiple addresses configured simultaneously
and thus will need to choose which addresses to use for which communications.
The rules specified in the Default Address Selection for
IPv6 document <xref target="RFC6724"/> <bcp14>MUST</bcp14> be implemented. <xref target="RFC8028"/> updates Rule 5.5 from <xref target="RFC6724"/>; implementations <bcp14>MUST</bcp14> implement this rule.</t>
      </section>
      <section anchor="prefer-ipv6-only">
        <name>Prefer IPv6-Only</name>
        <t>IPv6 nodes that support IPv6-only operation <bcp14>MAY</bcp14> forego obtaining IPv4 address by using the IPv4
DHCP Option 108 specified in <xref target="RFC8925"/>.</t>
      </section>
    </section>
    <section anchor="dns">
      <name>DNS</name>
      <t>DNS is described in <xref target="RFC1034"/>, <xref target="RFC1035"/>, <xref target="RFC3363"/>, and <xref target="RFC3596"/>.  Not all nodes will need to resolve names;
those that will never need to resolve DNS names do not need to
implement resolver functionality.  However, the ability to
resolve names is a basic infrastructure capability on which
applications rely, and most nodes will need to provide
support.  All nodes <bcp14>SHOULD</bcp14> implement stub-resolver <xref target="RFC1034"/> functionality, as in Section 5.3.1 of <xref target="RFC1034"/>, with support for:</t>
      <dl>
        <dt>-</dt>
        <dd>
          <t>AAAA type Resource Records <xref target="RFC3596"/>;</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>reverse addressing in ip6.arpa using PTR records <xref target="RFC3596"/>; and</t>
        </dd>
        <dt>-</dt>
        <dd>
          <t>Extension Mechanisms for DNS (EDNS(0)) <xref target="RFC6891"/> to allow for DNS packet sizes larger than 512 octets.</t>
        </dd>
      </dl>
      <t>Those nodes are <bcp14>RECOMMENDED</bcp14> to support DNS security extensions <xref target="RFC4033"/>  <xref target="RFC4034"/>  <xref target="RFC4035"/>.</t>
      <t>Discover of encrypted DNS resolvers per <xref target="RFC9463"/> <bcp14>SHOULD</bcp14> be implemented.</t>
      <t>A6 Resource Records <xref target="RFC2874"/> are classified as Historic per <xref target="RFC6563"/>.  These were defined with Experimental status in <xref target="RFC3363"/>.</t>
      <t><xref target="RFC7050"/> <bcp14>SHOULD</bcp14> be support by nodes to perform local IPv6 address synthesis when in IPv6-only environments.</t>
      <t>For a dual-stack node with addresses and routes configured for both IPv4 and IPv6,
any IPv4-mapped IPv6 addresses encountered within the response of a DNS request nodes with the AAAA record <bcp14>MUST</bcp14> be discarded and returned as NXDOMAIN or the "ANY" record <bcp14>MUST</bcp14> be discarded.:W</t>
      <t>A IPv6-only node <bcp14>MUST NOT</bcp14> discard it if it's the only address within the response
otherwise (when also a non IPv4-mapped IPv6-address is returned) the
IPv4-mapped IPv6 address <bcp14>MUST</bcp14> be discarded.</t>
    </section>
    <section anchor="OtherConfig">
      <name>Configuring Non-address Information</name>
      <section anchor="dhcp-for-other-configuration-information">
        <name>DHCP for Other Configuration Information</name>
        <t>DHCP <xref target="RFC8415"/> specifies a mechanism for IPv6 nodes to obtain
address configuration information (see <xref target="stateful1"/>) and to
obtain additional (non-address) configuration.  If a host
implementation supports applications or other protocols that
require configuration that is only available via DHCP, hosts
<bcp14>SHOULD</bcp14> implement DHCP. For specialized devices on which no
such configuration need is present, DHCP may not be
necessary.</t>
        <t>An IPv6 node can use the subset of DHCP (described in <xref target="RFC8415"/>) to obtain other configuration
information.</t>
        <t>If an IPv6 node implements DHCP, it <bcp14>MUST</bcp14> implement the DNS options <xref target="RFC3646"/> as most deployments will expect that these options are available.</t>
      </section>
      <section anchor="router-advertisements-and-default-gateway">
        <name>Router Advertisements and Default Gateway</name>
        <t>There is no defined DHCPv6 Gateway option.</t>
        <t>Nodes using the Dynamic Host Configuration Protocol for
IPv6 (DHCPv6) are thus expected to determine their default router
information and on-link prefix information from received
Router Advertisements.</t>
      </section>
      <section anchor="ipv6-router-advertisement-options-for-dns-configuration-rfc-8106">
        <name>IPv6 Router Advertisement Options for DNS         Configuration - RFC 8106</name>
        <t>Router Advertisement options have historically been limited to
those that are critical to basic IPv6 functionality. Originally,
DNS configuration was not included as an RA option, and DHCP
was the recommended way to obtain DNS configuration
information. Over time, the thinking surrounding such an
option has evolved. It is now generally recognized that few
nodes can function adequately without having access to a
working DNS resolver; thus, a
Standards Track document has been published to provide this
capability <xref target="RFC8106"/>.</t>
        <t>Implementations <bcp14>MUST</bcp14> include support for the DNS RA option <xref target="RFC8106"/>.</t>
      </section>
      <section anchor="dhcp-options-versus-router-advertisement-options-for-host-configuration">
        <name>DHCP Options versus Router Advertisement Options for Host Configuration</name>
        <t>In IPv6, there are two main protocol mechanisms for
propagating configuration information to hosts: RAs and DHCP. RA options
have been
restricted to those deemed essential for basic network
functioning and for which all nodes are configured with exactly
the same information.  Examples include the Prefix Information
Options, the MTU option, etc. On the other hand, DHCP has
generally been preferred for configuration of more general
parameters and for parameters that may be client specific.
Generally speaking, however, there has been a desire
to define only one mechanism for configuring a given option,
rather than defining multiple (different) ways of configuring
the same information.</t>
        <t>One issue with having multiple ways to configure the same
information is that interoperability suffers if a host chooses one
mechanism but the
network operator chooses a different mechanism. For "closed"
environments, where the network operator
has significant influence over what devices connect to the
network and thus what configuration mechanisms they support, the
operator may be able to ensure that a particular mechanism is
supported by all connected hosts. In more open environments,
however, where arbitrary devices may connect (e.g., a Wi-Fi
hotspot), problems can arise. To maximize interoperability in
such environments, hosts would need to implement multiple
configuration mechanisms to ensure interoperability.</t>
      </section>
      <section anchor="port-control-protocol-pcp">
        <name>Port Control Protocol (PCP)</name>
        <t>Hosts <bcp14>SHOULD</bcp14> support <xref target="RFC6887"/>, Port Control Protocol , to allow an IPv6 host to control how
incoming IPv6 packets are forwarded by simple firewalls on routers.</t>
      </section>
    </section>
    <section anchor="service-discovery-protocols">
      <name>Service Discovery Protocols</name>
      <t>Multicast DNS (mDNS) and
DNS-based Service Discovery (DNS-SD) are described in <xref target="RFC6762"/> and <xref target="RFC6763"/>, respectively.
These protocols, often collectively referred to as the
'Bonjour' protocols after their naming by Apple, provide
the means for devices to discover services within a local
link and, in the absence of a unicast DNS service, to
exchange naming information.</t>
      <t>Where devices are to be deployed in networks where
service discovery would be beneficial, e.g., for users
seeking to discover printers or display devices, mDNS and
DNS-SD <bcp14>SHOULD</bcp14> be supported.</t>
    </section>
    <section anchor="ipv4-support-and-transition">
      <name>IPv4 Support and Transition</name>
      <t>IPv6 nodes <bcp14>MAY</bcp14> support IPv4.</t>
      <section anchor="transition-mechanisms">
        <name>Transition Mechanisms</name>
        <section anchor="basic-transition-mechanisms-for-ipv6-hosts-and-routers-rfc4213">
          <name>Basic Transition Mechanisms for IPv6 Hosts and Routers - RFC 4213</name>
          <t>If an IPv6 node implements dual stack and tunneling, then <xref target="RFC4213"/> <bcp14>MUST</bcp14> be supported.</t>
        </section>
        <section anchor="support-for-discovery-of-translation-prefixes">
          <name>Support for discovery of translation prefixes</name>
          <t><xref target="RFC8781"/> describes a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts. In order to support migration to and operation of IPv6-mostly and IPv6-only network environments, it is recommended that all hosts support discovery of NAT64 prefixes as described in <xref target="RFC8781"/>.
Nodes <bcp14>MAY</bcp14> also support <xref target="RFC7050"/> as a fallback mechanism for NAT64 prefix discovery.</t>
        </section>
      </section>
    </section>
    <section anchor="application-support">
      <name>Application Support</name>
      <section anchor="textual-representation-of-ipv6-addresses-rfc-5952">
        <name>Textual Representation of IPv6 Addresses - RFC 5952</name>
        <t>Software that allows users and operators to input IPv6
addresses in text form <bcp14>SHOULD</bcp14> support "A Recommendation for
IPv6 Address Text Representation" <xref target="RFC5952"/>.</t>
      </section>
      <section anchor="application-programming-interfaces-apis">
        <name>Application Programming Interfaces (APIs)</name>
        <t>There are a number of IPv6-related APIs. This document does
not mandate the use of any, because the choice of API does not
directly relate to on-the-wire behavior of
protocols. Implementers, however, would be advised to consider
providing a common API or reviewing existing APIs for the type
of functionality they provide to applications.</t>
        <t>"Basic Socket Interface Extensions for IPv6" <xref target="RFC3493"/> provides IPv6 functionality used by
typical applications. Implementers should note that RFC 3493 has
been picked up and further standardized by the Portable Operating System
Interface (POSIX) <xref target="POSIX"/>.</t>
        <t>"Advanced Sockets Application Program Interface (API) for
IPv6" <xref target="RFC3542"/> provides access to
advanced IPv6 features needed by diagnostic and other
more specialized applications.</t>
        <t>"IPv6 Socket API for Source Address Selection" <xref target="RFC5014"/> provides facilities that allow an
application to override the default Source Address Selection
rules of <xref target="RFC6724"/>.</t>
        <t>"Socket Interface Extensions for Multicast Source Filters" <xref target="RFC3678"/> provides support for expressing source
filters on multicast group memberships.</t>
        <t>"Extension to Sockets API for Mobile IPv6" <xref target="RFC4584"/> provides application support for
accessing and enabling Mobile IPv6 <xref target="RFC6275"/> features.</t>
      </section>
    </section>
    <section anchor="sec">
      <name>Security</name>
      <t>This section describes the security specification for IPv6
nodes.</t>
      <t>Achieving security in practice is a complex undertaking.
Operational procedures, protocols, key distribution mechanisms,
certificate management approaches, etc., are all components that
impact the level of security actually achieved in practice. More
importantly, deficiencies or a poor fit in any one individual
component can significantly reduce the overall effectiveness of a
particular security approach.</t>
      <t>IPsec can provide either end-to-end security between nodes
or channel security (for example, via a site-to-site IPsec
VPN), making it possible to provide secure communication for all (or a subset
of) communication flows at the IP layer between pairs of Internet
nodes.  IPsec has two standard operating modes: Tunnel-mode and Transport-mode.
In Tunnel-mode, IPsec provides network-layer security and protects an entire
IP packet
by encapsulating the original IP packet and then prepending a new IP header.
In Transport-mode, IPsec provides security for the transport layer (and above)
by
encapsulating only the transport-layer (and above) portion of the IP packet
(i.e., without adding
a second IP header).</t>
      <t>Although IPsec can be used with manual keying in some cases,
such usage has limited applicability and is not recommended.</t>
      <t>A range of security technologies and approaches proliferate
today (e.g., IPsec, Transport Layer Security (TLS), Secure SHell (SSH), TLS
VPNS, etc.).
No single approach has emerged as
an ideal technology for all needs and environments. Moreover, IPsec
is not viewed as the ideal security technology in all cases and is
unlikely to displace the others.</t>
      <t>Previously, IPv6 mandated implementation of IPsec and
recommended the key-management approach of IKE. RFC 6434 updated that recommendation
by making support of the IPsec
architecture <xref target="RFC4301"/> a <bcp14>SHOULD</bcp14> for all IPv6 nodes, and this document retains that recommendation.
Note that
the IPsec Architecture requires the
implementation of both manual and automatic key management (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).
Currently, the recommended automated key-management protocol to
implement is IKEv2 <xref target="RFC7296"/>.</t>
      <t>This document recognizes that there exists a range of device
types and environments where approaches to security other than
IPsec can be justified. For example, special-purpose devices may
support only a very limited number or type of applications, and an
application-specific security approach may be sufficient for
limited management or configuration capabilities. Alternatively,
some devices may run on extremely constrained hardware (e.g.,
sensors) where the full IPsec Architecture is not justified.</t>
      <t>Because most common platforms now support IPv6 and have it
enabled by default, IPv6 security is an issue for networks
that are ostensibly IPv4 only; see <xref target="RFC7123"/> for guidance on this area.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>"Security Architecture for the Internet Protocol" <xref target="RFC4301"/> <bcp14>SHOULD</bcp14> be supported by all IPv6
nodes. Note that the IPsec Architecture requires the implementation of both
manual and automatic key
management  (e.g., <xref section="4.5" sectionFormat="of" target="RFC4301"/>).  Currently, the default automated key-management
protocol to implement is IKEv2. As required in <xref target="RFC4301"/>, IPv6
nodes implementing the IPsec Architecture <bcp14>MUST</bcp14> implement ESP <xref target="RFC4303"/> and <bcp14>MAY</bcp14> implement AH <xref target="RFC4302"/>.</t>
      </section>
      <section anchor="transforms-and-algorithms">
        <name>Transforms and Algorithms</name>
        <t>The current set of mandatory-to-implement algorithms for the
IPsec Architecture are defined in Cryptographic
Algorithm Implementation Requirements for ESP and AH <xref target="RFC8221"/>.  IPv6 nodes implementing the IPsec
Architecture <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8221"/>.
Preferred cryptographic algorithms often change more
frequently than security protocols. Therefore, implementations
<bcp14>MUST</bcp14> allow for migration to new algorithms, as RFC 8221 is
replaced or updated in the future.</t>
        <t>The current set of mandatory-to-implement algorithms for
IKEv2 are defined in Cryptographic Algorithm Implementation
Requirements for ESP and AH <xref target="RFC8247"/>.  IPv6 nodes
implementing IKEv2 <bcp14>MUST</bcp14> conform to the requirements in <xref target="RFC8247"/> and/or any future
updates or replacements to <xref target="RFC8247"/>.</t>
      </section>
    </section>
    <section anchor="router-specific-functionality">
      <name>Router-Specific Functionality</name>
      <t>This section defines general host considerations for IPv6 nodes
that act as routers.  Currently, this section does not discuss
detailed routing-specific requirements. For the case of typical home routers, <xref target="RFC7084"/> defines basic requirements for customer edge routers.</t>
      <section anchor="ipv6-router-alert-option-rfc-2711">
        <name>IPv6 Router Alert Option - RFC 2711</name>
        <t>The IPv6 Router Alert option <xref target="RFC2711"/> is
an optional IPv6 Hop-by-Hop Header that is used in conjunction
with some protocols (e.g., RSVP <xref target="RFC2205"/> or
Multicast Listener Discovery (MLDv2) <xref target="RFC3810"/>).  The Router Alert option will
need to be implemented whenever such protocols that mandate its
use are implemented.  See <xref target="mld"/>.</t>
      </section>
      <section anchor="neighbor-discovery-for-ipv6-rfc-4861">
        <name>Neighbor Discovery for IPv6 - RFC 4861</name>
        <t>Sending Router Advertisements and processing Router
Solicitations <bcp14>MUST</bcp14> be supported.</t>
        <t>Routers <bcp14>SHOULD</bcp14> support <xref target="RFC9131"/> to avoid packet lost.</t>
        <t><xref section="7" sectionFormat="of" target="RFC6275"/> includes some mobility-specific
extensions to Neighbor Discovery.
Routers <bcp14>SHOULD</bcp14> implement
Sections 7.3 and 7.5, even if they do not implement home
agent functionality.</t>
      </section>
      <section anchor="stateful-address-autoconfiguration-dhcpv6-rfc-8415">
        <name>Stateful Address Autoconfiguration (DHCPv6) - RFC 8415</name>
        <t>A single DHCP server (<xref target="RFC8415"/> or <xref target="RFC4862"/>) can provide configuration information to
devices directly attached to a shared link, as well as to
devices located elsewhere within a site. Communication between
a client and a DHCP server located on different links requires
the use of DHCP relay agents on routers.</t>
        <t>In simple deployments, consisting of a single router and
either a single LAN or multiple LANs attached to the single
router, together with a WAN connection, a DHCP server
embedded within the router is one common deployment scenario
(e.g., <xref target="RFC7084"/>). There is no need
for relay agents in such scenarios.</t>
        <t>In more complex deployment scenarios, such as within enterprise or service provider networks, the use of DHCP requires some level of configuration, in order to configure relay agents, prefixes for delegation, DHCP servers, etc. In such environments, the DHCP server might even be run on a traditional server, rather than as part of a router.</t>
        <t>Because of the wide range of deployment scenarios, support for DHCP server functionality on routers is optional.  However, routers targeted for deployment within more complex scenarios (as described above) <bcp14>SHOULD</bcp14> support relay agent functionality including support for support DHCPv6-PD as defined in <eref target="?">RFC3633</eref>.  Note that "Basic Requirements for IPv6 Customer Edge Routers" <xref target="RFC7084"/> requires implementation of a DHCPv6 server function in IPv6 Customer Edge (CE) routers.</t>
      </section>
      <section anchor="ipv6-prefix-length-recommendation-for-forwarding-bcp-198">
        <name>IPv6 Prefix Length Recommendation for Forwarding - BCP 198</name>
        <t>Forwarding nodes <bcp14>MUST</bcp14> conform to BCP 198 <xref target="RFC7608"/>;
thus, IPv6 implementations of nodes that may forward packets
<bcp14>MUST</bcp14> conform to the rules specified in <xref section="5.1" sectionFormat="of" target="RFC4632"/>.</t>
      </section>
    </section>
    <section anchor="constrained-devices">
      <name>Constrained Devices</name>
      <t>The focus of this document is general IPv6 nodes. In this section, we briefly
discuss considerations for constrained devices.</t>
      <t>In the case of constrained nodes,
with limited CPU, memory, bandwidth or power, support for certain IPv6 functionality
may need
to be considered due to those limitations.  While the requirements of this
document are
<bcp14>RECOMMENDED</bcp14> for all nodes, including constrained nodes, compromises may need
to be
made in certain cases.  Where such compromises are made, the interoperability
of devices
should be strongly considered, particularly where this may impact other nodes
on the same
link, e.g., only supporting MLDv1 will affect other nodes.</t>
      <t>The IETF 6LowPAN (IPv6 over Low-Power Wireless Personal Area Network) WG
produced six RFCs, including a general
overview and problem statement <xref target="RFC4919"/> (the means by which IPv6 packets
are transmitted over IEEE 802.15.4 networks <xref target="RFC4944"/> and ND optimizations for that medium <xref target="RFC6775"/>).</t>
      <t>IPv6 nodes that are battery powered <bcp14>SHOULD</bcp14> implement the recommendations
in <xref target="RFC7772"/>.</t>
    </section>
    <section anchor="ipv6-node-management">
      <name>IPv6 Node Management</name>
      <t>Network management <bcp14>MAY</bcp14> be supported by IPv6 nodes.  However,
for IPv6 nodes that are embedded devices, network management may
be the only possible way of controlling these nodes.</t>
      <t>Existing network management protocols include SNMP <xref target="RFC3411"/>, NETCONF <xref target="RFC6241"/>, and RESTCONF <xref target="RFC8040"/>.</t>
      <section anchor="management-information-base-mib-modules">
        <name>Management Information Base (MIB) Modules</name>
        <t>The obsoleted status of
various IPv6-specific MIB modules is clarified in <xref target="RFC8096"/>.</t>
        <t>The following two MIB modules <bcp14>SHOULD</bcp14> be supported by nodes that
support an SNMP agent.</t>
        <section anchor="ip-forwarding-table-mib">
          <name>IP Forwarding Table MIB</name>
          <t>The IP Forwarding Table MIB <xref target="RFC4292"/> <bcp14>SHOULD</bcp14> be supported by nodes that support an
SNMP agent.</t>
        </section>
        <section anchor="management-information-base-for-the-internet-protocol-ip">
          <name>Management Information Base for the Internet Protocol (IP)</name>
          <t>The IP MIB <xref target="RFC4293"/> <bcp14>SHOULD</bcp14> be supported by nodes
that support an SNMP agent.</t>
        </section>
        <section anchor="interface-mib">
          <name>Interface MIB</name>
          <t>The Interface MIB <xref target="RFC2863"/> <bcp14>SHOULD</bcp14> be supported by nodes that support
an SNMP agent.</t>
        </section>
      </section>
      <section anchor="yang-data-models">
        <name>YANG Data Models</name>
        <t>The following YANG data models <bcp14>SHOULD</bcp14> be supported by nodes that support
a
NETCONF or RESTCONF agent.</t>
        <section anchor="ip-management-yang-model">
          <name>IP Management YANG Model</name>
          <t>The IP Management YANG Model <xref target="RFC8344"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
        <section anchor="interface-management-yang-model">
          <name>Interface Management YANG Model</name>
          <t>The Interface Management YANG Model <xref target="RFC8343"/> <bcp14>SHOULD</bcp14> be supported
by nodes that support NETCONF or RESTCONF.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not directly affect the security of the
Internet, beyond the security considerations associated with the
individual protocols.</t>
      <t>Security is also discussed in <xref target="sec"/> above.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC2710">
          <front>
            <title>Multicast Listener Discovery (MLD) for IPv6</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="W. Fenner" initials="W." surname="Fenner"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This document specifies the protocol used by an IPv6 router to discover the presence of multicast listeners (that is, nodes wishing to receive multicast packets) on its directly attached links, and to discover specifically which multicast addresses are of interest to those neighboring nodes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2710"/>
          <seriesInfo name="DOI" value="10.17487/RFC2710"/>
        </reference>
        <reference anchor="RFC2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <author fullname="A. Jackson" initials="A." surname="Jackson"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC2863">
          <front>
            <title>The Interfaces Group MIB</title>
            <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
            <author fullname="F. Kastenholz" initials="F." surname="Kastenholz"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This memo discusses the 'interfaces' group of MIB-II, especially the experience gained from the definition of numerous media-specific MIB modules for use in conjunction with the 'interfaces' group for managing various sub-layers beneath the internetwork-layer. It specifies clarifications to, and extensions of, the architectural issues within the MIB-II model of the 'interfaces' group. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2863"/>
          <seriesInfo name="DOI" value="10.17487/RFC2863"/>
        </reference>
        <reference anchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC3411">
          <front>
            <title>An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <author fullname="R. Presuhn" initials="R." surname="Presuhn"/>
            <author fullname="B. Wijnen" initials="B." surname="Wijnen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes an architecture for describing Simple Network Management Protocol (SNMP) Management Frameworks. The architecture is designed to be modular to allow the evolution of the SNMP protocol standards over time. The major portions of the architecture are an SNMP engine containing a Message Processing Subsystem, a Security Subsystem and an Access Control Subsystem, and possibly multiple SNMP applications which provide specific functional processing of management data. This document obsoletes RFC 2571. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="62"/>
          <seriesInfo name="RFC" value="3411"/>
          <seriesInfo name="DOI" value="10.17487/RFC3411"/>
        </reference>
        <reference anchor="RFC3596">
          <front>
            <title>DNS Extensions to Support IP Version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="V. Ksinant" initials="V." surname="Ksinant"/>
            <author fullname="M. Souissi" initials="M." surname="Souissi"/>
            <date month="October" year="2003"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="88"/>
          <seriesInfo name="RFC" value="3596"/>
          <seriesInfo name="DOI" value="10.17487/RFC3596"/>
        </reference>
        <reference anchor="RFC3810">
          <front>
            <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
            <author fullname="R. Vida" initials="R." role="editor" surname="Vida"/>
            <author fullname="L. Costa" initials="L." role="editor" surname="Costa"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document updates RFC 2710, and it specifies Version 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links, and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3810"/>
          <seriesInfo name="DOI" value="10.17487/RFC3810"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC4213">
          <front>
            <title>Basic Transition Mechanisms for IPv6 Hosts and Routers</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document specifies IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. Two mechanisms are specified, dual stack and configured tunneling. Dual stack implies providing complete implementations of both versions of the Internet Protocol (IPv4 and IPv6), and configured tunneling provides a means to carry IPv6 packets over unmodified IPv4 routing infrastructures.</t>
              <t>This document obsoletes RFC 2893. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4213"/>
          <seriesInfo name="DOI" value="10.17487/RFC4213"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC4292">
          <front>
            <title>IP Forwarding Table MIB</title>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects related to the forwarding of Internet Protocol (IP) packets in an IP version-independent manner. This document obsoletes RFC 2096. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4292"/>
          <seriesInfo name="DOI" value="10.17487/RFC4292"/>
        </reference>
        <reference anchor="RFC4293">
          <front>
            <title>Management Information Base for the Internet Protocol (IP)</title>
            <author fullname="S. Routhier" initials="S." role="editor" surname="Routhier"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects used for implementations of the Internet Protocol (IP) in an IP version independent manner. This memo obsoletes RFCs 2011, 2465, and 2466. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4293"/>
          <seriesInfo name="DOI" value="10.17487/RFC4293"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4311">
          <front>
            <title>IPv6 Host-to-Router Load Sharing</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>The original IPv6 conceptual sending algorithm does not do load sharing among equivalent IPv6 routers, and suggests schemes that can be problematic in practice. This document updates the conceptual sending algorithm in RFC 2461 so that traffic to different destinations can be distributed among routers in an efficient fashion. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4311"/>
          <seriesInfo name="DOI" value="10.17487/RFC4311"/>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC4607">
          <front>
            <title>Source-Specific Multicast for IP</title>
            <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
            <author fullname="B. Cain" initials="B." surname="Cain"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>IP version 4 (IPv4) addresses in the 232/8 (232.0.0.0 to 232.255.255.255) range are designated as source-specific multicast (SSM) destination addresses and are reserved for use by source-specific applications and protocols. For IP version 6 (IPv6), the address prefix FF3x::/32 is reserved for source-specific multicast use. This document defines an extension to the Internet network service that applies to datagrams sent to SSM addresses and defines the host and router requirements to support this extension. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4607"/>
          <seriesInfo name="DOI" value="10.17487/RFC4607"/>
        </reference>
        <reference anchor="RFC4632">
          <front>
            <title>Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan</title>
            <author fullname="V. Fuller" initials="V." surname="Fuller"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This memo discusses the strategy for address assignment of the existing 32-bit IPv4 address space with a view toward conserving the address space and limiting the growth rate of global routing state. This document obsoletes the original Classless Inter-domain Routing (CIDR) spec in RFC 1519, with changes made both to clarify the concepts it introduced and, after more than twelve years, to update the Internet community on the results of deploying the technology described. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="122"/>
          <seriesInfo name="RFC" value="4632"/>
          <seriesInfo name="DOI" value="10.17487/RFC4632"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4862">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC5453">
          <front>
            <title>Reserved IPv6 Interface Identifiers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>Interface identifiers in IPv6 unicast addresses are used to identify interfaces on a link. They are required to be unique within a subnet. Several RFCs have specified interface identifiers or identifier ranges that have a special meaning attached to them. An IPv6 node autoconfiguring an interface identifier in these ranges will encounter unexpected consequences. Since there is no centralized repository for such reserved identifiers, this document aims to create one. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5453"/>
          <seriesInfo name="DOI" value="10.17487/RFC5453"/>
        </reference>
        <reference anchor="RFC5722">
          <front>
            <title>Handling of Overlapping IPv6 Fragments</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="December" year="2009"/>
            <abstract>
              <t>The fragmentation and reassembly algorithm specified in the base IPv6 specification allows fragments to overlap. This document demonstrates the security issues associated with allowing overlapping fragments and updates the IPv6 specification to explicitly forbid overlapping fragments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5722"/>
          <seriesInfo name="DOI" value="10.17487/RFC5722"/>
        </reference>
        <reference anchor="RFC5790">
          <front>
            <title>Lightweight Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Version 2 (MLDv2) Protocols</title>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <author fullname="W. Cao" initials="W." surname="Cao"/>
            <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>This document describes lightweight IGMPv3 and MLDv2 protocols (LW- IGMPv3 and LW-MLDv2), which simplify the standard (full) versions of IGMPv3 and MLDv2. The interoperability with the full versions and the previous versions of IGMP and MLD is also taken into account. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5790"/>
          <seriesInfo name="DOI" value="10.17487/RFC5790"/>
        </reference>
        <reference anchor="RFC5942">
          <front>
            <title>IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>IPv6 specifies a model of a subnet that is different than the IPv4 subnet model. The subtlety of the differences has resulted in incorrect implementations that do not interoperate. This document spells out the most important difference: that an IPv6 address isn't automatically associated with an IPv6 on-link prefix. This document also updates (partially due to security concerns caused by incorrect implementations) a part of the definition of "on-link" from RFC 4861. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5942"/>
          <seriesInfo name="DOI" value="10.17487/RFC5942"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6437">
          <front>
            <title>IPv6 Flow Label Specification</title>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="J. Rajahalme" initials="J." surname="Rajahalme"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods. Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.</t>
              <t>The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6437"/>
          <seriesInfo name="DOI" value="10.17487/RFC6437"/>
        </reference>
        <reference anchor="RFC6564">
          <front>
            <title>A Uniform Format for IPv6 Extension Headers</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="J. Woodyatt" initials="J." surname="Woodyatt"/>
            <author fullname="E. Kline" initials="E." surname="Kline"/>
            <author fullname="J. Hoagland" initials="J." surname="Hoagland"/>
            <author fullname="M. Bhatia" initials="M." surname="Bhatia"/>
            <date month="April" year="2012"/>
            <abstract>
              <t>In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the transport-layer header. There are a small number of such extension headers currently defined. This document describes the issues that can arise when defining new extension headers and discusses the alternate extension mechanisms in IPv6. It also provides a common format for defining any new IPv6 extension headers, if they are needed. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6564"/>
          <seriesInfo name="DOI" value="10.17487/RFC6564"/>
        </reference>
        <reference anchor="RFC6724">
          <front>
            <title>Default Address Selection for Internet Protocol Version 6 (IPv6)</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="A. Matsumoto" initials="A." surname="Matsumoto"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document describes two algorithms, one for source address selection and one for destination address selection. The algorithms specify default behavior for all Internet Protocol version 6 (IPv6) implementations. They do not override choices made by applications or upper-layer protocols, nor do they preclude the development of more advanced mechanisms for address selection. The two algorithms share a common context, including an optional mechanism for allowing administrators to provide policy that can override the default behavior. In dual-stack implementations, the destination address selection algorithm can consider both IPv4 and IPv6 addresses -- depending on the available source addresses, the algorithm might prefer IPv6 addresses over IPv4 addresses, or vice versa.</t>
              <t>Default address selection as defined in this specification applies to all IPv6 nodes, including both hosts and routers. This document obsoletes RFC 3484. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6724"/>
          <seriesInfo name="DOI" value="10.17487/RFC6724"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC6775">
          <front>
            <title>Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4. This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation. In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links. IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network. This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks. The document thus updates RFC 4944 to specify the use of the optimizations defined here. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6775"/>
          <seriesInfo name="DOI" value="10.17487/RFC6775"/>
        </reference>
        <reference anchor="RFC6887">
          <front>
            <title>Port Control Protocol (PCP)</title>
            <author fullname="D. Wing" initials="D." role="editor" surname="Wing"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="R. Penno" initials="R." surname="Penno"/>
            <author fullname="P. Selkirk" initials="P." surname="Selkirk"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Port Control Protocol allows an IPv6 or IPv4 host to control how incoming IPv6 or IPv4 packets are translated and forwarded by a Network Address Translator (NAT) or simple firewall, and also allows a host to optimize its outgoing NAT keepalive messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6887"/>
          <seriesInfo name="DOI" value="10.17487/RFC6887"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC6946">
          <front>
            <title>Processing of IPv6 "Atomic" Fragments</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The IPv6 specification allows packets to contain a Fragment Header without the packet being actually fragmented into multiple pieces (we refer to these packets as "atomic fragments"). Such packets are typically sent by hosts that have received an ICMPv6 "Packet Too Big" error message that advertises a Next-Hop MTU smaller than 1280 bytes, and are currently processed by some implementations as normal "fragmented traffic" (i.e., they are "reassembled" with any other queued fragments that supposedly correspond to the same original packet). Thus, an attacker can cause hosts to employ atomic fragments by forging ICMPv6 "Packet Too Big" error messages, and then launch any fragmentation-based attacks against such traffic. This document discusses the generation of the aforementioned atomic fragments and the corresponding security implications. Additionally, this document formally updates RFC 2460 and RFC 5722, such that IPv6 atomic fragments are processed independently of any other fragments, thus completely eliminating the aforementioned attack vector.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6946"/>
          <seriesInfo name="DOI" value="10.17487/RFC6946"/>
        </reference>
        <reference anchor="RFC7045">
          <front>
            <title>Transmission and Processing of IPv6 Extension Headers</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <date month="December" year="2013"/>
            <abstract>
              <t>Various IPv6 extension headers have been standardised since the IPv6 standard was first published. This document updates RFC 2460 to clarify how intermediate nodes should deal with such extension headers and with any that are defined in the future. It also specifies how extension headers should be registered by IANA, with a corresponding minor update to RFC 2780.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7045"/>
          <seriesInfo name="DOI" value="10.17487/RFC7045"/>
        </reference>
        <reference anchor="RFC7048">
          <front>
            <title>Neighbor Unreachability Detection Is Too Impatient</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="I. Gashinsky" initials="I." surname="Gashinsky"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>IPv6 Neighbor Discovery includes Neighbor Unreachability Detection. That function is very useful when a host has an alternative neighbor -- for instance, when there are multiple default routers -- since it allows the host to switch to the alternative neighbor in a short time. By default, this time is 3 seconds after the node starts probing. However, if there are no alternative neighbors, this timeout behavior is far too impatient. This document specifies relaxed rules for Neighbor Discovery retransmissions that allow an implementation to choose different timeout behavior based on whether or not there are alternative neighbors. This document updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7048"/>
          <seriesInfo name="DOI" value="10.17487/RFC7048"/>
        </reference>
        <reference anchor="RFC7112">
          <front>
            <title>Implications of Oversized IPv6 Header Chains</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="V. Manral" initials="V." surname="Manral"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>The IPv6 specification allows IPv6 Header Chains of an arbitrary size. The specification also allows options that can, in turn, extend each of the headers. In those scenarios in which the IPv6 Header Chain or options are unusually long and packets are fragmented, or scenarios in which the fragment size is very small, the First Fragment of a packet may fail to include the entire IPv6 Header Chain. This document discusses the interoperability and security problems of such traffic, and updates RFC 2460 such that the First Fragment of a packet is required to contain the entire IPv6 Header Chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7112"/>
          <seriesInfo name="DOI" value="10.17487/RFC7112"/>
        </reference>
        <reference anchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another. This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users. The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7527">
          <front>
            <title>Enhanced Duplicate Address Detection</title>
            <author fullname="R. Asati" initials="R." surname="Asati"/>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <author fullname="E. Dart" initials="E." surname="Dart"/>
            <author fullname="W. George" initials="W." surname="George"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of RFC 4862. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. Several service provider communities have expressed a need for automated detection of looped back Neighbor Discovery (ND) messages used by DAD. This document includes mitigation techniques and outlines the Enhanced DAD algorithm to automate the detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks, this document automates resolving a specific duplicate address conflict. This document updates RFCs 4429, 4861, and 4862.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7527"/>
          <seriesInfo name="DOI" value="10.17487/RFC7527"/>
        </reference>
        <reference anchor="RFC7559">
          <front>
            <title>Packet-Loss Resiliency for Router Solicitations</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="D. Anipko" initials="D." surname="Anipko"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>When an interface on a host is initialized, the host transmits Router Solicitations in order to minimize the amount of time it needs to wait until the next unsolicited multicast Router Advertisement is received. In certain scenarios, these Router Solicitations transmitted by the host might be lost. This document specifies a mechanism for hosts to cope with the loss of the initial Router Solicitations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7559"/>
          <seriesInfo name="DOI" value="10.17487/RFC7559"/>
        </reference>
        <reference anchor="RFC7608">
          <front>
            <title>IPv6 Prefix Length Recommendation for Forwarding</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>IPv6 prefix length, as in IPv4, is a parameter conveyed and used in IPv6 routing and forwarding processes in accordance with the Classless Inter-domain Routing (CIDR) architecture. The length of an IPv6 prefix may be any number from zero to 128, although subnets using stateless address autoconfiguration (SLAAC) for address allocation conventionally use a /64 prefix. Hardware and software implementations of routing and forwarding should therefore impose no rules on prefix length, but implement longest-match-first on prefixes of any valid length.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="198"/>
          <seriesInfo name="RFC" value="7608"/>
          <seriesInfo name="DOI" value="10.17487/RFC7608"/>
        </reference>
        <reference anchor="RFC8028">
          <front>
            <title>First-Hop Router Selection by Hosts in a Multi-Prefix Network</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document describes expected IPv6 host behavior in a scenario that has more than one prefix, each allocated by an upstream network that is assumed to implement BCP 38 ingress filtering, when the host has multiple routers to choose from. It also applies to other scenarios such as the usage of stateful firewalls that effectively act as address-based filters. Host behavior in choosing a first-hop router may interact with source address selection in a given implementation. However, the selection of the source address for a packet is done before the first-hop router for that packet is chosen. Given that the network or host is, or appears to be, multihomed with multiple provider-allocated addresses, that the host has elected to use a source address in a given prefix, and that some but not all neighboring routers are advertising that prefix in their Router Advertisement Prefix Information Options, this document specifies to which router a host should present its transmission. It updates RFC 4861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8028"/>
          <seriesInfo name="DOI" value="10.17487/RFC8028"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8064">
          <front>
            <title>Recommendation on Stable IPv6 Interface Identifiers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document changes the recommended default Interface Identifier (IID) generation scheme for cases where Stateless Address Autoconfiguration (SLAAC) is used to generate a stable IPv6 address. It recommends using the mechanism specified in RFC 7217 in such cases, and recommends against embedding stable link-layer addresses in IPv6 IIDs. It formally updates RFC 2464, RFC 2467, RFC 2470, RFC 2491, RFC 2492, RFC 2497, RFC 2590, RFC 3146, RFC 3572, RFC 4291, RFC 4338, RFC 4391, RFC 5072, and RFC 5121. This document does not change any existing recommendations concerning the use of temporary addresses as specified in RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8064"/>
          <seriesInfo name="DOI" value="10.17487/RFC8064"/>
        </reference>
        <reference anchor="RFC8106">
          <front>
            <title>IPv6 Router Advertisement Options for DNS Configuration</title>
            <author fullname="J. Jeong" initials="J." surname="Jeong"/>
            <author fullname="S. Park" initials="S." surname="Park"/>
            <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
              <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8106"/>
          <seriesInfo name="DOI" value="10.17487/RFC8106"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="RFC8221">
          <front>
            <title>Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)</title>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document replaces RFC 7321, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)". The goal of this document is to enable ESP and AH to benefit from cryptography that is up to date while making IPsec interoperable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8221"/>
          <seriesInfo name="DOI" value="10.17487/RFC8221"/>
        </reference>
        <reference anchor="RFC8247">
          <front>
            <title>Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The Internet Key Exchange (IKE) protocol is used to negotiate the IPsec Security Association (IPsec SA) parameters, such as which algorithms should be used. To ensure interoperability between different implementations, it is necessary to specify a set of algorithm implementation requirements and usage guidance to ensure that there is at least one algorithm that all implementations support. This document updates RFC 7296 and obsoletes RFC 4307 in defining the current algorithm implementation requirements and usage guidance for IKEv2, and does minor cleaning up of the IKEv2 IANA registry. This document does not update the algorithms used for packet encryption using IPsec Encapsulating Security Payload (ESP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8247"/>
          <seriesInfo name="DOI" value="10.17487/RFC8247"/>
        </reference>
        <reference anchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC8344">
          <front>
            <title>A YANG Data Model for IP Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for management of IP implementations. The data model includes configuration and system state.</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7277.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8344"/>
          <seriesInfo name="DOI" value="10.17487/RFC8344"/>
        </reference>
        <reference anchor="RFC8415">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="November" year="2018"/>
            <abstract>
              <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
        </reference>
        <reference anchor="RFC8899">
          <front>
            <title>Packetization Layer Path MTU Discovery for Datagram Transports</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="T. Jones" initials="T." surname="Jones"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="I. Rüngeler" initials="I." surname="Rüngeler"/>
            <author fullname="T. Völker" initials="T." surname="Völker"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram Packetization Layers (PLs). It allows a PL, or a datagram application that uses a PL, to discover whether a network path can support the current size of datagram. This can be used to detect and reduce the message size when a sender encounters a packet black hole. It can also probe a network path to discover whether the maximum packet size can be increased. This provides functionality for datagram transports that is equivalent to the PLPMTUD specification for TCP, specified in RFC 4821, which it updates. It also updates the UDP Usage Guidelines to refer to this method for use with UDP datagrams and updates SCTP.</t>
              <t>The document provides implementation notes for incorporating Datagram PMTUD into IETF datagram transports or applications that use datagram transports.</t>
              <t>This specification updates RFC 4960, RFC 4821, RFC 6951, RFC 8085, and RFC 8261.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8899"/>
          <seriesInfo name="DOI" value="10.17487/RFC8899"/>
        </reference>
        <reference anchor="RFC8925">
          <front>
            <title>IPv6-Only Preferred Option for DHCPv4</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document specifies a DHCPv4 option to indicate that a host supports an IPv6-only mode and is willing to forgo obtaining an IPv4 address if the network provides IPv6 connectivity. It also updates RFC 2563 to specify DHCPv4 server behavior when the server receives a DHCPDISCOVER not containing the Auto-Configure option but containing the new option defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8925"/>
          <seriesInfo name="DOI" value="10.17487/RFC8925"/>
        </reference>
        <reference anchor="RFC8981">
          <front>
            <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8981"/>
          <seriesInfo name="DOI" value="10.17487/RFC8981"/>
        </reference>
        <reference anchor="RFC9131">
          <front>
            <title>Gratuitous Neighbor Discovery: Creating Neighbor Cache Entries on First-Hop Routers</title>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>Neighbor Discovery (RFC 4861) is used by IPv6 nodes to determine the link-layer addresses of neighboring nodes as well as to discover and maintain reachability information. This document updates RFC 4861 to allow routers to proactively create a Neighbor Cache entry when a new IPv6 address is assigned to a node. It also updates RFC 4861 and recommends that nodes send unsolicited Neighbor Advertisements upon assigning a new IPv6 address. These changes will minimize the delay and packet loss when a node initiates connections to an off-link destination from a new IPv6 address.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9131"/>
          <seriesInfo name="DOI" value="10.17487/RFC9131"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9663">
          <front>
            <title>Using DHCPv6 Prefix Delegation (DHCPv6-PD) to Allocate Unique IPv6 Prefixes per Client in Large Broadcast Networks</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." role="editor" surname="Linkova"/>
            <author fullname="X. Ma" initials="X." role="editor" surname="Ma"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document discusses an IPv6 deployment scenario when individual nodes connected to large broadcast networks (such as enterprise networks or public Wi-Fi networks) are allocated unique prefixes via DHCPv6 Prefix Delegation (DHCPv6-PD), as specified in RFC 8415.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9663"/>
          <seriesInfo name="DOI" value="10.17487/RFC9663"/>
        </reference>
        <reference anchor="RFC9673">
          <front>
            <title>IPv6 Hop-by-Hop Options Processing Procedures</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>This document specifies procedures for processing IPv6 Hop-by-Hop options in IPv6 routers and hosts. It modifies the procedures specified in the IPv6 Protocol Specification (RFC 8200) to make processing of the IPv6 Hop-by-Hop Options header practical with the goal of making IPv6 Hop-by-Hop options useful to deploy and use at IPv6 routers and hosts. This document updates RFC 8200.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9673"/>
          <seriesInfo name="DOI" value="10.17487/RFC9673"/>
        </reference>
        <reference anchor="RFC9740">
          <front>
            <title>New IPFIX Information Elements for TCP Options and IPv6 Extension Headers</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document specifies new IP Flow Information Export (IPFIX) Information Elements (IEs) to solve issues with existing ipv6ExtensionHeaders and tcpOptions IPFIX IEs, especially the ability to export any observed IPv6 extension headers or TCP options.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9740"/>
          <seriesInfo name="DOI" value="10.17487/RFC9740"/>
        </reference>
        <reference anchor="I-D.ietf-6man-eh-limits">
          <front>
            <title>Limits on Sending and Processing IPv6 Extension Headers</title>
            <author fullname="Tom Herbert" initials="T." surname="Herbert">
         </author>
            <date day="27" month="February" year="2025"/>
            <abstract>
              <t>   This document defines various limits that may be applied to
   receiving, sending, and otherwise processing packets that contain
   IPv6 extension headers.  Limits are pragmatic to facilitate
   interoperability amongst hosts and routers, thereby increasing the
   deployability of extension headers.  The limits described herein
   establish the minimum baseline of support for use of extension
   headers on the Internet.  If it is known that all communicating
   parties for a particular communication, including destination hosts
   and any routers in the path, are capable of supporting more than the
   baseline then these default limits may be freely exceeded.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6man-eh-limits-19"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC0793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC2205">
          <front>
            <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <author fullname="S. Berson" initials="S." surname="Berson"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="S. Jamin" initials="S." surname="Jamin"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2205"/>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
        </reference>
        <reference anchor="RFC2464">
          <front>
            <title>Transmission of IPv6 Packets over Ethernet Networks</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document specifies the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Ethernet networks. It also specifies the content of the Source/Target Link-layer Address option used in Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement and Redirect messages when those messages are transmitted on an Ethernet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2464"/>
          <seriesInfo name="DOI" value="10.17487/RFC2464"/>
        </reference>
        <reference anchor="RFC2491">
          <front>
            <title>IPv6 over Non-Broadcast Multiple Access (NBMA) networks</title>
            <author fullname="G. Armitage" initials="G." surname="Armitage"/>
            <author fullname="P. Schulter" initials="P." surname="Schulter"/>
            <author fullname="M. Jork" initials="M." surname="Jork"/>
            <author fullname="G. Harter" initials="G." surname="Harter"/>
            <date month="January" year="1999"/>
            <abstract>
              <t>This document describes a general architecture for IPv6 over NBMA networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2491"/>
          <seriesInfo name="DOI" value="10.17487/RFC2491"/>
        </reference>
        <reference anchor="RFC2590">
          <front>
            <title>Transmission of IPv6 Packets over Frame Relay Networks Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="A. Malis" initials="A." surname="Malis"/>
            <author fullname="M. Mueller" initials="M." surname="Mueller"/>
            <date month="May" year="1999"/>
            <abstract>
              <t>This memo describes mechanisms for the transmission of IPv6 packets over Frame Relay networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2590"/>
          <seriesInfo name="DOI" value="10.17487/RFC2590"/>
        </reference>
        <reference anchor="RFC2874">
          <front>
            <title>DNS Extensions to Support IPv6 Address Aggregation and Renumbering</title>
            <author fullname="M. Crawford" initials="M." surname="Crawford"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="July" year="2000"/>
            <abstract>
              <t>This document defines changes to the Domain Name System to support renumberable and aggregatable IPv6 addressing. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2874"/>
          <seriesInfo name="DOI" value="10.17487/RFC2874"/>
        </reference>
        <reference anchor="RFC2923">
          <front>
            <title>TCP Problems with Path MTU Discovery</title>
            <author fullname="K. Lahey" initials="K." surname="Lahey"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This memo catalogs several known Transmission Control Protocol (TCP) implementation problems dealing with Path Maximum Transmission Unit Discovery (PMTUD), including the long-standing black hole problem, stretch acknowlegements (ACKs) due to confusion between Maximum Segment Size (MSS) and segment size, and MSS advertisement based on PMTU. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2923"/>
          <seriesInfo name="DOI" value="10.17487/RFC2923"/>
        </reference>
        <reference anchor="RFC3146">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 1394 Networks</title>
            <author fullname="K. Fujisawa" initials="K." surname="Fujisawa"/>
            <author fullname="A. Onoe" initials="A." surname="Onoe"/>
            <date month="October" year="2001"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE1394 networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3146"/>
          <seriesInfo name="DOI" value="10.17487/RFC3146"/>
        </reference>
        <reference anchor="RFC3363">
          <front>
            <title>Representing Internet Protocol version 6 (IPv6) Addresses in the Domain Name System (DNS)</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="B. Fink" initials="B." surname="Fink"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="T. Hain" initials="T." surname="Hain"/>
            <date month="August" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3363"/>
          <seriesInfo name="DOI" value="10.17487/RFC3363"/>
        </reference>
        <reference anchor="RFC3493">
          <front>
            <title>Basic Socket Interface Extensions for IPv6</title>
            <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="J. Bound" initials="J." surname="Bound"/>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <date month="February" year="2003"/>
            <abstract>
              <t>The de facto standard Application Program Interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to support IPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required by TCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3493"/>
          <seriesInfo name="DOI" value="10.17487/RFC3493"/>
        </reference>
        <reference anchor="RFC3542">
          <front>
            <title>Advanced Sockets Application Program Interface (API) for IPv6</title>
            <author fullname="W. Stevens" initials="W." surname="Stevens"/>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="May" year="2003"/>
            <abstract>
              <t>This document provides sockets Application Program Interface (API) to support "advanced" IPv6 applications, as a supplement to a separate specification, RFC 3493. The expected applications include Ping, Traceroute, routing daemons and the like, which typically use raw sockets to access IPv6 or ICMPv6 header fields. This document proposes some portable interfaces for applications that use raw sockets under IPv6. There are other features of IPv6 that some applications will need to access: interface identification (specifying the outgoing interface and determining the incoming interface), IPv6 extension headers, and path Maximum Transmission Unit (MTU) information. This document provides API access to these features too. Additionally, some extended interfaces to libraries for the "r" commands are defined. The extension will provide better backward compatibility to existing implementations that are not IPv6-capable. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3542"/>
          <seriesInfo name="DOI" value="10.17487/RFC3542"/>
        </reference>
        <reference anchor="RFC3646">
          <front>
            <title>DNS Configuration options for Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="R. Droms" initials="R." role="editor" surname="Droms"/>
            <date month="December" year="2003"/>
            <abstract>
              <t>This document describes Dynamic Host Configuration Protocol for IPv6 (DHCPv6) options for passing a list of available DNS recursive name servers and a domain search list to a client.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3646"/>
          <seriesInfo name="DOI" value="10.17487/RFC3646"/>
        </reference>
        <reference anchor="RFC3678">
          <front>
            <title>Socket Interface Extensions for Multicast Source Filters</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>The Internet Group Management Protocol (IGMPv3) for IPv4 and the Multicast Listener Discovery (MLDv2) for IPv6 add the capability for applications to express source filters on multicast group memberships, which allows receiver applications to determine the set of senders (sources) from which to accept multicast traffic. This capability also simplifies support of one-to-many type multicast applications. This document specifies new socket options and functions to manage source filters for IP Multicast group memberships. It also defines the socket structures to provide input and output arguments to these new application program interfaces (APIs). These extensions are designed to provide access to the source filtering features, while introducing a minimum of change into the system and providing complete compatibility for existing multicast applications.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3678"/>
          <seriesInfo name="DOI" value="10.17487/RFC3678"/>
        </reference>
        <reference anchor="RFC4191">
          <front>
            <title>Default Router Preferences and More-Specific Routes</title>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>This document describes an optional extension to Router Advertisement messages for communicating default router preferences and more-specific routes from routers to hosts. This improves the ability of hosts to pick an appropriate router, especially when the host is multi-homed and the routers are on different links. The preference values and specific routes advertised to hosts require administrative configuration; they are not automatically derived from routing tables. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4191"/>
          <seriesInfo name="DOI" value="10.17487/RFC4191"/>
        </reference>
        <reference anchor="RFC4294">
          <front>
            <title>IPv6 Node Requirements</title>
            <author fullname="J. Loughney" initials="J." role="editor" surname="Loughney"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4294"/>
          <seriesInfo name="DOI" value="10.17487/RFC4294"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4338">
          <front>
            <title>Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP) Packets over Fibre Channel</title>
            <author fullname="C. DeSanti" initials="C." surname="DeSanti"/>
            <author fullname="C. Carlson" initials="C." surname="Carlson"/>
            <author fullname="R. Nixon" initials="R." surname="Nixon"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies the way of encapsulating IPv6, IPv4, and Address Resolution Protocol (ARP) packets over Fibre Channel. This document also specifies the method of forming IPv6 link-local addresses and statelessly autoconfigured IPv6 addresses on Fibre Channel networks, and a mechanism to perform IPv4 address resolution over Fibre Channel networks.</t>
              <t>This document obsoletes RFC 2625 and RFC 3831. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4338"/>
          <seriesInfo name="DOI" value="10.17487/RFC4338"/>
        </reference>
        <reference anchor="RFC4380">
          <front>
            <title>Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP; we call this the Teredo service. Running the service requires the help of "Teredo servers" and "Teredo relays". The Teredo servers are stateless, and only have to manage a small fraction of the traffic between Teredo clients; the Teredo relays act as IPv6 routers between the Teredo service and the "native" IPv6 Internet. The relays can also provide interoperability with hosts using other transition mechanisms such as "6to4". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4380"/>
          <seriesInfo name="DOI" value="10.17487/RFC4380"/>
        </reference>
        <reference anchor="RFC4429">
          <front>
            <title>Optimistic Duplicate Address Detection (DAD) for IPv6</title>
            <author fullname="N. Moore" initials="N." surname="Moore"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>Optimistic Duplicate Address Detection is an interoperable modification of the existing IPv6 Neighbor Discovery (RFC 2461) and Stateless Address Autoconfiguration (RFC 2462) processes. The intention is to minimize address configuration delays in the successful case, to reduce disruption as far as possible in the failure case, and to remain interoperable with unmodified hosts and routers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4429"/>
          <seriesInfo name="DOI" value="10.17487/RFC4429"/>
        </reference>
        <reference anchor="RFC4584">
          <front>
            <title>Extension to Sockets API for Mobile IPv6</title>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <date month="July" year="2006"/>
            <abstract>
              <t>This document describes data structures and API support for Mobile IPv6 as an extension to the Advanced Socket API for IPv6.</t>
              <t>Just as the Advanced Sockets API for IPv6 gives access to various extension headers and the ICMPv6 protocol, this document specifies the same level of access for Mobile IPv6 components. It specifies a mechanism for applications to retrieve and set information for Mobility Header messages, Home Address destination options, and Routing Header Type 2 extension headers. It also specifies the common data structures and definitions that might be used by certain advanced Mobile IPv6 socket applications. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4584"/>
          <seriesInfo name="DOI" value="10.17487/RFC4584"/>
        </reference>
        <reference anchor="RFC4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="RFC4884">
          <front>
            <title>Extended ICMP to Support Multi-Part Messages</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2007"/>
            <abstract>
              <t>This document redefines selected ICMP messages to support multi-part operation. A multi-part ICMP message carries all of the information that ICMP messages carried previously, as well as additional information that applications may require.</t>
              <t>Multi-part messages are supported by an ICMP extension structure. The extension structure is situated at the end of the ICMP message. It includes an extension header followed by one or more extension objects. Each extension object contains an object header and object payload. All object headers share a common format.</t>
              <t>This document further redefines the above mentioned ICMP messages by specifying a length attribute. All of the currently defined ICMP messages to which an extension structure can be appended include an "original datagram" field. The "original datagram" field contains the initial octets of the datagram that elicited the ICMP error message. Although the original datagram field is of variable length, the ICMP message does not include a field that specifies its length. Therefore, in order to facilitate message parsing, this document allocates eight previously reserved bits to reflect the length of the "original datagram" field.</t>
              <t>The proposed modifications change the requirements for ICMP compliance. The impact of these changes on compliant implementations is discussed, and new requirements for future implementations are presented.</t>
              <t>This memo updates RFC 792 and RFC 4443. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4884"/>
          <seriesInfo name="DOI" value="10.17487/RFC4884"/>
        </reference>
        <reference anchor="RFC4890">
          <front>
            <title>Recommendations for Filtering ICMPv6 Messages in Firewalls</title>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="May" year="2007"/>
            <abstract>
              <t>In networks supporting IPv6, the Internet Control Message Protocol version 6 (ICMPv6) plays a fundamental role with a large number of functions, and a correspondingly large number of message types and options. ICMPv6 is essential to the functioning of IPv6, but there are a number of security risks associated with uncontrolled forwarding of ICMPv6 messages. Filtering strategies designed for the corresponding protocol, ICMP, in IPv4 networks are not directly applicable, because these strategies are intended to accommodate a useful auxiliary protocol that may not be required for correct functioning.</t>
              <t>This document provides some recommendations for ICMPv6 firewall filter configuration that will allow propagation of ICMPv6 messages that are needed to maintain the functioning of the network but drop messages that are potential security risks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4890"/>
          <seriesInfo name="DOI" value="10.17487/RFC4890"/>
        </reference>
        <reference anchor="RFC4919">
          <front>
            <title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="C. Schumacher" initials="C." surname="Schumacher"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks. The set of goals enumerated in this document form an initial set only. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4919"/>
          <seriesInfo name="DOI" value="10.17487/RFC4919"/>
        </reference>
        <reference anchor="RFC4944">
          <front>
            <title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro"/>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="D. Culler" initials="D." surname="Culler"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4944"/>
          <seriesInfo name="DOI" value="10.17487/RFC4944"/>
        </reference>
        <reference anchor="RFC5014">
          <front>
            <title>IPv6 Socket API for Source Address Selection</title>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="J. Laganier" initials="J." surname="Laganier"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The IPv6 default address selection document (RFC 3484) describes the rules for selecting source and destination IPv6 addresses, and indicates that applications should be able to reverse the sense of some of the address selection rules through some unspecified API. However, no such socket API exists in the basic (RFC 3493) or advanced (RFC 3542) IPv6 socket API documents. This document fills that gap partially by specifying new socket-level options for source address selection and flags for the getaddrinfo() API to specify address selection based on the source address preference in accordance with the socket-level options that modify the default source address selection algorithm. The socket API described in this document will be particularly useful for IPv6 applications that want to choose between temporary and public addresses, and for Mobile IPv6 aware applications that want to use the care-of address for communication. It also specifies socket options and flags for selecting Cryptographically Generated Address (CGA) or non-CGA source addresses. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5014"/>
          <seriesInfo name="DOI" value="10.17487/RFC5014"/>
        </reference>
        <reference anchor="RFC5072">
          <front>
            <title>IP Version 6 over PPP</title>
            <author fullname="S. Varada" initials="S." role="editor" surname="Varada"/>
            <author fullname="D. Haskins" initials="D." surname="Haskins"/>
            <author fullname="E. Allen" initials="E." surname="Allen"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method of encapsulating network-layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.</t>
              <t>This document defines the method for sending IPv6 packets over PPP links, the NCP for establishing and configuring the IPv6 over PPP, and the method for forming IPv6 link-local addresses on PPP links.</t>
              <t>It also specifies the conditions for performing Duplicate Address Detection on IPv6 global unicast addresses configured for PPP links either through stateful or stateless address autoconfiguration.</t>
              <t>This document obsoletes RFC 2472. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5072"/>
          <seriesInfo name="DOI" value="10.17487/RFC5072"/>
        </reference>
        <reference anchor="RFC5121">
          <front>
            <title>Transmission of IPv6 via the IPv6 Convergence Sublayer over IEEE 802.16 Networks</title>
            <author fullname="B. Patil" initials="B." surname="Patil"/>
            <author fullname="F. Xia" initials="F." surname="Xia"/>
            <author fullname="B. Sarikaya" initials="B." surname="Sarikaya"/>
            <author fullname="JH. Choi" initials="JH." surname="Choi"/>
            <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>IEEE Std 802.16 is an air interface specification for fixed and mobile Broadband Wireless Access Systems. Service-specific convergence sublayers to which upper-layer protocols interface are a part of the IEEE 802.16 MAC (Medium Access Control). The Packet convergence sublayer (CS) is used for the transport of all packet- based protocols such as Internet Protocol (IP) and IEEE 802.3 LAN/MAN CSMA/CD Access Method (Ethernet). IPv6 packets can be sent and received via the IP-specific part of the Packet CS. This document specifies the addressing and operation of IPv6 over the IP-specific part of the Packet CS for hosts served by a network that utilizes the IEEE Std 802.16 air interface. It recommends the assignment of a unique prefix (or prefixes) to each host and allows the host to use multiple identifiers within that prefix, including support for randomly generated interface identifiers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5121"/>
          <seriesInfo name="DOI" value="10.17487/RFC5121"/>
        </reference>
        <reference anchor="RFC6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins"/>
            <author fullname="D. Johnson" initials="D." surname="Johnson"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address. The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address. To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option. All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes. This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6275"/>
          <seriesInfo name="DOI" value="10.17487/RFC6275"/>
        </reference>
        <reference anchor="RFC6563">
          <front>
            <title>Moving A6 to Historic Status</title>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="D. Conrad" initials="D." surname="Conrad"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>This document provides a summary of issues related to the use of A6 records, discusses the current status, and moves RFC 2874 to Historic status, providing clarity to implementers and operators. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6563"/>
          <seriesInfo name="DOI" value="10.17487/RFC6563"/>
        </reference>
        <reference anchor="RFC6980">
          <front>
            <title>Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document analyzes the security implications of employing IPv6 fragmentation with Neighbor Discovery (ND) messages. It updates RFC 4861 such that use of the IPv6 Fragmentation Header is forbidden in all Neighbor Discovery messages, thus allowing for simple and effective countermeasures for Neighbor Discovery attacks. Finally, it discusses the security implications of using IPv6 fragmentation with SEcure Neighbor Discovery (SEND) and formally updates RFC 3971 to provide advice regarding how the aforementioned security implications can be mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6980"/>
          <seriesInfo name="DOI" value="10.17487/RFC6980"/>
        </reference>
        <reference anchor="RFC7084">
          <front>
            <title>Basic Requirements for IPv6 Customer Edge Routers</title>
            <author fullname="H. Singh" initials="H." surname="Singh"/>
            <author fullname="W. Beebee" initials="W." surname="Beebee"/>
            <author fullname="C. Donley" initials="C." surname="Donley"/>
            <author fullname="B. Stark" initials="B." surname="Stark"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document specifies requirements for an IPv6 Customer Edge (CE) router. Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it. The document also covers IP transition technologies. Two transition technologies in RFC 5969's IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) and RFC 6333's Dual-Stack Lite (DS-Lite) are covered in the document. The document obsoletes RFC 6204.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7084"/>
          <seriesInfo name="DOI" value="10.17487/RFC7084"/>
        </reference>
        <reference anchor="RFC7123">
          <front>
            <title>Security Implications of IPv6 on IPv4 Networks</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2014"/>
            <abstract>
              <t>This document discusses the security implications of native IPv6 support and IPv6 transition/coexistence technologies on "IPv4-only" networks and describes possible mitigations for the aforementioned issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7123"/>
          <seriesInfo name="DOI" value="10.17487/RFC7123"/>
        </reference>
        <reference anchor="RFC7371">
          <front>
            <title>Updates to the IPv6 Multicast Addressing Architecture</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document updates the IPv6 multicast addressing architecture by redefining the reserved bits as generic flag bits. The document also provides some clarifications related to the use of these flag bits.</t>
              <t>This document updates RFCs 3956, 3306, and 4291.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7371"/>
          <seriesInfo name="DOI" value="10.17487/RFC7371"/>
        </reference>
        <reference anchor="RFC7421">
          <front>
            <title>Analysis of the 64-bit Boundary in IPv6 Addressing</title>
            <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The IPv6 unicast addressing format includes a separation between the prefix used to route packets to a subnet and the interface identifier used to specify a given interface connected to that subnet. Currently, the interface identifier is defined as 64 bits long for almost every case, leaving 64 bits for the subnet prefix. This document describes the advantages of this fixed boundary and analyzes the issues that would be involved in treating it as a variable boundary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7421"/>
          <seriesInfo name="DOI" value="10.17487/RFC7421"/>
        </reference>
        <reference anchor="RFC7721">
          <front>
            <title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized. It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7721"/>
          <seriesInfo name="DOI" value="10.17487/RFC7721"/>
        </reference>
        <reference anchor="RFC7739">
          <front>
            <title>Security Implications of Predictable Fragment Identification Values</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>IPv6 specifies the Fragment Header, which is employed for the fragmentation and reassembly mechanisms. The Fragment Header contains an "Identification" field that, together with the IPv6 Source Address and the IPv6 Destination Address of a packet, identifies fragments that correspond to the same original datagram, such that they can be reassembled together by the receiving host. The only requirement for setting the Identification field is that the corresponding value must be different than that employed for any other fragmented datagram sent recently with the same Source Address and Destination Address. Some implementations use a simple global counter for setting the Identification field, thus leading to predictable Identification values. This document analyzes the security implications of predictable Identification values, and provides implementation guidance for setting the Identification field of the Fragment Header, such that the aforementioned security implications are mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7739"/>
          <seriesInfo name="DOI" value="10.17487/RFC7739"/>
        </reference>
        <reference anchor="RFC7772">
          <front>
            <title>Reducing Energy Consumption of Router Advertisements</title>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <date month="February" year="2016"/>
            <abstract>
              <t>Frequent Router Advertisement messages can severely impact host power consumption. This document recommends operational practices to avoid such impact.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="202"/>
          <seriesInfo name="RFC" value="7772"/>
          <seriesInfo name="DOI" value="10.17487/RFC7772"/>
        </reference>
        <reference anchor="RFC7844">
          <front>
            <title>Anonymity Profiles for DHCP Clients</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>Some DHCP options carry unique identifiers. These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses. The anonymity profiles are designed for clients that wish to remain anonymous to the visited network. The profiles provide guidelines on the composition of DHCP or DHCPv6 messages, designed to minimize disclosure of identifying information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7844"/>
          <seriesInfo name="DOI" value="10.17487/RFC7844"/>
        </reference>
        <reference anchor="RFC7934">
          <front>
            <title>Host Address Availability Recommendations</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="V. Cerf" initials="V." surname="Cerf"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document recommends that networks provide general-purpose end hosts with multiple global IPv6 addresses when they attach, and it describes the benefits of and the options for doing so.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="204"/>
          <seriesInfo name="RFC" value="7934"/>
          <seriesInfo name="DOI" value="10.17487/RFC7934"/>
        </reference>
        <reference anchor="RFC8087">
          <front>
            <title>The Benefits of Using Explicit Congestion Notification (ECN)</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="M. Welzl" initials="M." surname="Welzl"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The goal of this document is to describe the potential benefits of applications using a transport that enables Explicit Congestion Notification (ECN). The document outlines the principal gains in terms of increased throughput, reduced delay, and other benefits when ECN is used over a network path that includes equipment that supports Congestion Experienced (CE) marking. It also discusses challenges for successful deployment of ECN. It does not propose new algorithms to use ECN nor does it describe the details of implementation of ECN in endpoint devices (Internet hosts), routers, or other network devices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8087"/>
          <seriesInfo name="DOI" value="10.17487/RFC8087"/>
        </reference>
        <reference anchor="RFC8096">
          <front>
            <title>The IPv6-Specific MIB Modules Are Obsolete</title>
            <author fullname="B. Fenner" initials="B." surname="Fenner"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>In 2005-2006, the IPv6 MIB update group published updated versions of the IP-MIB, UDP-MIB, TCP-MIB, and IP-FORWARD-MIB modules, which use the InetAddressType/InetAddress construct to handle IPv4 and IPv6 in the same table. This document contains versions of the obsoleted IPV6-MIB, IPV6-TC, IPV6-ICMP-MIB, IPV6-TCP-MIB, and IPV6-UDP-MIB modules for the purpose of updating MIB module repositories. This document obsoletes RFCs 2452, 2454, 2465, and 2466 (i.e., the RFCs containing these MIBs) and reclassifies them as Historic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8096"/>
          <seriesInfo name="DOI" value="10.17487/RFC8096"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="POSIX" target="https://ieeexplore.ieee.org/document/8277153">
          <front>
            <title>Information Technology -- Portable Operating System Interface (POSIX(R)) Base Specifications, Issue 7</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="January"/>
          </front>
          <seriesInfo name="IEEE Std" value="1003.1-2017"/>
          <seriesInfo name="DOI:" value="10.1109/IEEESTD.2018.8277153"/>
        </reference>
        <reference anchor="USGv6" target="https://www.nist.gov/programs-projects/usgv6-program">
          <front>
            <title>A Profile for IPv6 in the U.S. Government - Version 1.0</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2008" month="July"/>
          </front>
          <seriesInfo name="NIST" value="SP500-267"/>
        </reference>
      </references>
    </references>
    <?line 1258?>

<section anchor="changes-from-rfc-8504">
      <name>Changes from RFC 8504</name>
      <t>This section highlights the changes since RFC 8504.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated obsoleted RFCs including 3315 and 3736 (both to 8415) and 4941 to 8981. RFC 793 has been obsoleted by 9293 but the latter does not include the the robustness principle for which RFC 793 is cited in this document.</t>
        </li>
        <li>
          <t>Added support for Gratuitous Neighbor Discovery Creating Neighbor Cache Entries on First‑Hop Routers, RFC 9131.</t>
        </li>
        <li>
          <t>Type C host from RFC 4191 was updated from a <bcp14>SHOULD</bcp14> to <bcp14>MUST</bcp14>.</t>
        </li>
        <li>
          <t>Removed the Mobility Section due to lack of known deployment.</t>
        </li>
        <li>
          <t>Removed the SEND Section due to limited use.</t>
        </li>
        <li>
          <t>Added Discovery of translation prefixes section (10.1.2) which includes RFC 8781 and 7050.</t>
        </li>
        <li>
          <t>Added <bcp14>MUST</bcp14> requirement for Rule 5.5 in RFC 6724 and 8208.</t>
        </li>
        <li>
          <t>Added Discovery of encrypted DNS resolver, RFC 9463.</t>
        </li>
        <li>
          <t>Added requirement to support PMTUD (RFC 8201) and PLPMTUD (RFC 4821 and 8899).</t>
        </li>
        <li>
          <t>Removed Extension Header protection text to utilize draft-ietf-6man-eh-limits.</t>
        </li>
        <li>
          <t>Added Hop by Hop Processing (RFC 9673)</t>
        </li>
        <li>
          <t>Added Port Control Protocol (PCP) to allow for IPv6 host to control incoming IPv6 packets with simple firewalls.</t>
        </li>
        <li>
          <t>Added using DHCPv6 Prefix Delegation to allocated IPv6 prefxies to hosts.</t>
        </li>
        <li>
          <t>Added RFC 7050 for discovery of IPv6 prefix for IPv6 address synthesis.</t>
        </li>
        <li>
          <t>Added DHCPv4 Option 108 for allowing hosts to specify support for IPv6-only networks.</t>
        </li>
        <li>
          <t>Added additional text for supporting IPv4-mapped DNS entries.</t>
        </li>
        <li>
          <t>Added RFC 9740 for better visiblity with extension headers in networks.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-6434-to-rfc-8504">
      <name>Changes from RFC 6434 to RFC 8504</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Restructured sections.</t>
        </li>
        <li>
          <t>Added 6LoWPAN to link layers as it has some deployment.</t>
        </li>
        <li>
          <t>Removed the Downstream-on-Demand (DoD) IPv6 Profile as it hasn't been updated.</t>
        </li>
        <li>
          <t>Updated MLDv2 support to a <bcp14>MUST</bcp14> since nodes are restricted if MLDv1 is used.</t>
        </li>
        <li>
          <t>Required DNS RA options so SLAAC-only devices can get DNS; RFC 8106 is a
  <bcp14>MUST</bcp14>.</t>
        </li>
        <li>
          <t>Required RFC 3646 DNS Options for DHCPv6 implementations.</t>
        </li>
        <li>
          <t>Added RESTCONF and NETCONF as possible options to network management.</t>
        </li>
        <li>
          <t>Added a section on constrained devices.</t>
        </li>
        <li>
          <t>Added text on RFC 7934 to address availability to hosts (<bcp14>SHOULD</bcp14>).</t>
        </li>
        <li>
          <t>Added text on RFC 7844 for anonymity profiles for DHCPv6 clients.</t>
        </li>
        <li>
          <t>Added mDNS and DNS-SD as updated service discovery.</t>
        </li>
        <li>
          <t>Added RFC 8028 as a <bcp14>SHOULD</bcp14> as a method for solving a multi-prefix network.</t>
        </li>
        <li>
          <t>Added ECN RFC 3168 as a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added reference to RFC 7123 for security over IPv4-only networks.</t>
        </li>
        <li>
          <t>Removed Jumbograms (RFC 2675) as they aren't deployed.</t>
        </li>
        <li>
          <t>Updated obsoleted RFCs to the new version of the RFC, including RFCs 2460,
  1981, 7321, and 4307.</t>
        </li>
        <li>
          <t>Added RFC 7772 for power consumptions considerations.</t>
        </li>
        <li>
          <t>Added why /64 boundaries for more detail --- RFC 7421.</t>
        </li>
        <li>
          <t>Added a unique IPv6 prefix per host to support currently deployed IPv6 networks.</t>
        </li>
        <li>
          <t>Clarified RFC 7066 was a snapshot for 3GPP.</t>
        </li>
        <li>
          <t>Updated RFC 4191 as a <bcp14>MUST</bcp14> and the Type C Host as a <bcp14>SHOULD</bcp14> as they help solve
  multi-prefix problems.</t>
        </li>
        <li>
          <t>Removed IPv6 over ATM since there aren't many deployments.</t>
        </li>
        <li>
          <t>Added a note in Section 6.6 for Rule 5.5 from RFC 6724.</t>
        </li>
        <li>
          <t>Added <bcp14>MUST</bcp14> for BCP 198 for forwarding IPv6 packets.</t>
        </li>
        <li>
          <t>Added a reference to RFC 8064 for stable address creation.</t>
        </li>
        <li>
          <t>Added text on the protection from excessive extension header options.</t>
        </li>
        <li>
          <t>Added text on the dangers of 1280 MTU UDP, especially with regard to DNS
  traffic.</t>
        </li>
        <li>
          <t>Added text to clarify RFC 8200 behavior for unrecognized extension headers
  or unrecognized ULPs.</t>
        </li>
        <li>
          <t>Removed dated email addresses from design team acknowledgements for <xref target="RFC4294"/>.</t>
        </li>
      </ol>
    </section>
    <section anchor="changes-from-rfc-4294-to-rfc-6434">
      <name>Changes from RFC 4294 to RFC 6434</name>
      <t>There have been many editorial clarifications as well as
significant additions and updates. While this section highlights
some of the changes, readers should not rely on this section for a
comprehensive list of all changes.</t>
      <ol spacing="normal" type="1"><li>
          <t>Updated the Introduction to indicate that this document is an
  applicability statement and is aimed at
  general nodes.</t>
        </li>
        <li>
          <t>Significantly updated the section on mobility protocols;
  added references and downgraded previous SHOULDs to MAYs.</t>
        </li>
        <li>
          <t>Changed the Sub-IP Layer section to just list relevant RFCs, and
  added some more RFCs.</t>
        </li>
        <li>
          <t>Added a section on SEND (it is a <bcp14>MAY</bcp14>).</t>
        </li>
        <li>
          <t>Revised the section on Privacy Extensions to add more
  nuance to the recommendation.</t>
        </li>
        <li>
          <t>Completely revised the IPsec/IKEv2 section, downgrading the overall
  recommendation to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Upgraded recommendation of DHCPv6 to a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Added a background section on DHCP versus RA options, added
  a <bcp14>SHOULD</bcp14> recommendation for DNS configuration via RAs (RFC 6106), and cleaned
  up the DHCP recommendations.</t>
        </li>
        <li>
          <t>Added the recommendation that routers implement Sections 7.3 and
  7.5 of <xref target="RFC6275"/>.</t>
        </li>
        <li>
          <t>Added a pointer to subnet clarification document <xref target="RFC5942"/>.</t>
        </li>
        <li>
          <t>Added text that "IPv6 Host-to-Router Load Sharing" <xref target="RFC4311"/> <bcp14>SHOULD</bcp14> be implemented.</t>
        </li>
        <li>
          <t>Added reference to <xref target="RFC5722"/> (Overlapping Fragments),
  and made it a <bcp14>MUST</bcp14> to implement.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Removed the mention of delegation name (DNAME) from the discussion about <xref target="RFC3363"/>.</t>
        </li>
        <li>
          <t>Numerous updates to reflect newer versions of IPv6
  documents, including <xref target="RFC3596"/>, <xref target="RFC4213"/>, <xref target="RFC4291"/>, and <xref target="RFC4443"/>.</t>
        </li>
        <li>
          <t>Removed discussion of "Managed" and "Other" flags in
  RAs. There is no consensus at present on how to process these
  flags, and discussion of their semantics was removed in the most
  recent update of Stateless Address Autoconfiguration <xref target="RFC4862"/>.</t>
        </li>
        <li>
          <t>Added many more references to optional IPv6 documents.</t>
        </li>
        <li>
          <t>Made "A Recommendation for IPv6 Address Text Representation" <xref target="RFC5952"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
        <li>
          <t>Updated the MLD section to include reference to Lightweight MLD <xref target="RFC5790"/>.</t>
        </li>
        <li>
          <t>Added a <bcp14>SHOULD</bcp14> recommendation for "Default Router Preferences
  and More-Specific Routes" <xref target="RFC4191"/>.</t>
        </li>
        <li>
          <t>Made "IPv6 Flow Label Specification" <xref target="RFC6437"/> a <bcp14>SHOULD</bcp14>.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <ul spacing="normal">
        <li>
          <t>Acknowledgements from (Current Documents)  </t>
          <t>
The authors would like to thank Mohamed Boucadair, Nick Buraglio, Brian Carpenter, Jeremy Duncan, and
Klaus Frank, Fernando Gont, and Bob Hinden, for their contributions and many members of the
6man WG for the inputs they gave.</t>
        </li>
        <li>
          <t>Acknowledgments from RFC 8504  </t>
          <t>
The authors would like to thank
Brian Carpenter, Dave Thaler,
Tom Herbert, Erik Kline, Mohamed Boucadair, and Michayla Newcombe
for their contributions and many members of the 6man WG for the inputs they
gave.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 6434  </t>
          <t>
RFC 6434 was authored by Ed Jankiewicz, John Loughney, and Thomas Narten.  </t>
          <t>
The authors of RFC 6434 thank Hitoshi Asaeda, Brian Carpenter, Tim Chown,
Ralph
Droms, Sheila Frankel, Sam Hartman, Bob Hinden, Paul Hoffman, Pekka
Savola, Yaron Sheffer, and Dave Thaler for their comments.  In addition,
the authors thank Mark Andrews for comments and corrections on DNS
text and Alfred Hoenes for tracking the updates to various RFCs.</t>
        </li>
        <li>
          <t>Authors and Acknowledgments from RFC 4294  </t>
          <t>
RFC 4294 was written by
the IPv6 Node Requirements design team, which had the following members:
Jari Arkko,
Marc Blanchet,
Samita Chakrabarti,
Alain Durand,
Gerard Gastaud,
Jun-ichiro Itojun Hagino,
Atsushi Inoue,
Masahiro Ishiyama,
John Loughney,
Rajiv Raghunarayan,
Shoichi Sakane,
Dave Thaler, and Juha Wiljakka.  </t>
          <t>
The authors of RFC 4294 thank Ran Atkinson, Jim Bound, Brian Carpenter, Ralph
Droms,
Christian Huitema, Adam Machalek, Thomas Narten, Juha Ollila, and Pekka
Savola for their comments.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
