<?xml version='1.0' encoding='utf-8'?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
    please see http://xml.resource.org/authoring/README.html. -->
<rfc
      xmlns:xi="http://www.w3.org/2001/XInclude"
      category="std"
      consensus="true"
      docName="draft-schoen-intarea-unicast-240-08"
      ipr="trust200902"
      obsoletes=""
      updates="1122, 3704, 6890"
      submissionType="IETF"
      xml:lang="en"
      tocInclude="true"
      tocDepth="4"
      symRefs="true"
      sortRefs="true"
      version="3">
  <!-- xml2rfc v2v3 conversion 2.38.1 -->
  <!-- category values: std, bcp, info, exp, and historic
    ipr values: trust200902, noModificationTrust200902, noDerivativesTrust200902,
       or pre5378Trust200902
    you can add the attributes updates="NNNN" and obsoletes="NNNN"
    they will automatically be output with "(if approved)" -->

 <!-- ***** FRONT MATTER ***** -->

 <front>
    <!-- The abbreviated title is used in the page header - it is only necessary if the
        full title is longer than 39 characters -->

   <title abbrev="Unicast Use of 240/4">Unicast Use of the Formerly Reserved 240/4</title>
    <seriesInfo name="Internet-Draft" value="draft-schoen-intarea-unicast-240-08"/>

   <author fullname="Seth David Schoen" initials="S.D." surname="Schoen">
      <organization>IPv4 Unicast Extensions Project</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->
         <city>San Francisco</city>
	 <region>CA</region>
          <code/>
          <country>US</country>
        </postal>
	<phone />
        <email>schoen@loyalty.org</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>

   <author fullname="John Gilmore" initials="J." surname="Gilmore">
      <organization>IPv4 Unicast Extensions Project</organization>
      <address>
        <postal>
        <street>PO Box 170640-rfc</street>
         <city>San Francisco</city>
         <region>CA</region>
         <code>94117-0640</code>
          <!-- Reorder these if your country does things differently -->
          <country>US</country>
        </postal>
	<phone />
        <email>gnu@rfc.toad.com</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>

   <author fullname="David M. Täht" initials="D." surname="Täht">
      <organization>IPv4 Unicast Extensions Project</organization>
      <address>
      <postal>
      <city>Half Moon Bay</city>
      <region>CA</region>
      <code />
      <country>US</country>
          <!-- Reorder these if your country does things differently -->
      </postal>
	<phone />
        <email>dave@taht.net</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>

    <date year="2024"/>

   <!-- Meta-data Declarations -->

   <area>intarea</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <!-- WG name at the upperleft corner of the doc,
        IETF is fine for individual submissions.
	 If this element is not present, the default is "Network Working Group",
        which is used by the RFC Editor as a nod to the history of the IETF. -->

   <keyword>unicast</keyword>
   <keyword>IPv4</keyword>
   <keyword>240/4</keyword>
   <keyword>class E</keyword>
   <keyword>future use area</keyword>
    <!-- Keywords will be incorporated into HTML output
        files in a meta tag but they have no effect on text or nroff
        output. If you submit your draft to the RFC Editor, the
        keywords will be used for the search engine. -->

   <abstract>
   <t>This document redesignates 240/4, the region of the IPv4 address space historically known as "Experimental," "Future Use," or "Class E" address space, so that this space is no longer reserved. It asks implementers to make addresses in this range fully usable for unicast use on the Internet.</t>
    </abstract>
  </front>
  <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
	   <t>With ever-increasing pressure to conserve IP address space on the Internet, it makes sense to consider where relatively minor changes can be made to fielded practice to improve numbering efficiency.  One such change, proposed by this document, is to
redefine the "Experimental" or "Future Use" 240/4 region (historically
known as "Class E" addresses) as ordinary unicast addresses.  These 268 million IPv4
addresses are already usable for unicast traffic in many popular implementations today.
Standardization as unicast addresses will eventually allow them to be later
deployed by Internet stewardship organizations to relieve address space scarcity.</t>
      <section numbered="true" toc="default">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
       document are to be interpreted as described in <xref target="RFC2119" format="default">RFC 2119</xref>.</t>
      </section>
    </section>
    <section numbered="true" toc="default">
    <name>Background</name>
    <section numbered="true" toc="default">
    <name>History of IPv4 Address Types</name>
    <t>
When the Internet Protocol was being designed, it
was unclear whether it would be a success, or which of its
features might be the key features that led to success.  The bulk of its address
space was dedicated to ordinary "host addresses".  Other
blocks and corners of the address space were reserved, either for particular
protocol functions such as loopback, LAN broadcasting, or host bootstrapping,
or for future definition.  A
major allocation of 268 million addresses was <xref target="RFC0988">later made for multicasting</xref>,
while leaving another 268 million reserved for "future use".  After the invention
of broadcast and multicast,
the original ordinary host addresses were later described as unicast addresses,
which is now the usual terminology.
    </t>
    <t>
With decades of hindsight, we can now see that unicast has been the success story
of the Internet.  Trillions of unicast packets now move around the world daily.
By contrast, the non-unicast addresses are seldom used.  The use of
routable broadcast packets in denial of service
attacks has now <xref target="RFC2644">limited broadcast packets
to local-area networks</xref>, and to critical but highly-specialized protocol
functions such as <xref target="RFC2131">DHCP</xref>, <xref target="RFC1256">routing updates</xref>,
or neighbor discovery.</t>
<t>Wide-area multicast packets had
a brief research heyday, but never reached critical mass.  Today, the overwhelming
majority of multiply-replicated media streams (such as popular songs and videos,
television programs, conference calls, and video meetings) are carried in unicast
packets mediated by application-level replication rather than IP-protocol-level
multicasting or broadcasting.
    </t>
    <t>
The Internet became a rapid worldwide success.  Partly due to the reduction
in experimentation that accompanied that success,
little effort has been paid to looking back at the historical allocations of reserved
addresses.  The success of unicast traffic has led to a huge demand for unicast addresses.
By contrast, there is far more supply of reserved, ignored, loopback, and multicast addresses
than any foreseeable IPv4 Internet will demand.  Most of these historical accidents
were <xref target="RFC4291">not carried forward into the IPv6 protocol</xref>.
We propose simple, compatible changes to existing IPv4 implementations
that will increase the supply of unicast addresses by redesignating
addresses that today are almost completely unused on the Internet.
The best and easiest "future use" of many of today's formerly reserved
IPv4 addresses is as ordinary unicast addresses.
    </t>
</section>
    <section numbered="true" toc="default">
    <name>Reserved IPv4 Addresses in the RFC Series</name>
    <t>
	    The Assigned Numbers RFC series reserved various IP addresses or
	    assigned them special meanings, starting in 1977 and continuing
	    through the early 1990s.
	    The detailed behavioral requirements for
	    IPv4 implementations based on these designations are set out in
	    October 1989's <xref target="RFC1122" format="default">RFC 1122</xref>.
            As other special cases continued to be introduced on occasion,
	    <xref target="RFC3232">RFC 3232</xref> announced that IANA would
	    track such information in an online database; the present-day version
	    of this mechanism is
	    the <xref target="IANA4">IPv4 Special-Purpose Address Registry</xref>,
	    as provided for by <xref target="RFC6890">RFC 6890</xref>.
	    A wide range of host and network software follows these designations
	    by treating these Internet addresses specially.
    </t>
    <t>
	    This document is concerned with the largest special case
	    in RFC 1122: the designation of an entire /4 block for
	    Future Use.  In retrospect, the flexibility offered by
	    keeping these addresses unused was insightful for its time,
	    but since they ended up never being needed for any special
	    purposes, they have become the least productive portion of
	    the Internet address space.
    </t>
    <t>
	    The largest block of
	    original addresses reserved for future use in 1983 was called "Class D"
	    in <xref target="RFC0870">RFC 870</xref>, and contained what
	    would now be called 224/3.  This contained about 536 million addresses, about
	    12.5% of the total available address space.
	    By 1986,
	    <xref target="RFC0988">RFC 988</xref> split the former Class D
	    in half, designating
	    a multicast Class D block, now called 224/4, and a future-use Class E
	    block, now called 240/4.  Following the 1993
	    implementation of <xref target="RFC1519">CIDR</xref> and its
	    <xref target="RFC4632">2006 clarification</xref>, we
	    no longer speak of any IPv4 address as having an "address
	    class," but the reservations of these specific addresses
	that were made by RFC 1122, were
	    unaffected by the CIDR change in terminology and routing technology.
    </t>
</section>
    <section numbered="true" toc="default">
    <name>Attempts to Use the "Future Use" Addresses</name>

    <t>
	    Through the 1980s, there were many reasons to suppose that new
	    forms of Internet addressing could emerge, so reserving a
	    substantial number of addresses for them was prudent.</t>
	  
    <t>
	    One likely candidate for some time was
	    protocol translation methods between IP and other protocols
	    using special surrogate IP addresses. This possibility was
	    particularly significant during the time frame when IP coexisted
	    widely on heterogeneous networks with other protocols. Special
	    number ranges could have been used to facilitate interoperability,
	    protocol translation, or encapsulation between IP and non-IP
	    protocols.
    </t>

    <t>
	    This prospect received new salience with the adoption of IPv6,
	    where some deployed or proposed transition mechanisms use
	    special-purpose IPv4 addresses with a distinctive meaning in
	    the context of IPv6 transition, such as <xref target="RFC7050">NAT64</xref>
	    and the deprecated <xref target="RFC3068">6to4</xref>.
	    While IPv6 transition mechanisms could conceivably
	    have used portions of 240/4, they ended up instead using
	    very small amounts of special address space from the IETF Protocol
	    Assignments block 192.0.0.0/24 or elsewhere within the unicast space.</t>

    <t>
	    Another form of addressing that was novel in 1989 is
	    anycast addressing, in which the same address is used to
	    identify servers at physically distinct locations and
	    connected to the Internet at different points. It would
	    have been possible to designate a new "class" of addresses
	    for anycast operations. <xref target="RFC1546">RFC 1546</xref>,
	    which first defined
	    anycast, concluded that this would be a possible and even
	    desirable approach:</t>

	    <blockquote>
   There appear to be a number of ways to support anycast addresses,
   some of which use small pieces of the existing address space, others
   of which require that a special class of IP addresses be assigned.
   [...]
   In the balance it seems wiser to use a separate class of addresses.
   </blockquote>

   <t>
   But anycast services turned out to work fine in most respects by using
   existing unicast routing protocols, existing unicast datagram delivery protocols,
   and ordinary unicast addresses.  They are <xref target="RFC7094">now widely
   used for specific applications</xref> such as the Internet's root nameservers.
    </t>
</section>
    <section numbered="true" toc="default">
    <name>Recent Use as Ordinary Unicast Addresses</name>
    <t>
	    Overall, 30 years of experience have demonstrated that
	    no new addressing mechanism requires the use of 240/4;
	    nor is any likely to require it in the future, particularly
	    in light of the IPv6 transition.  Other explicit reservations
	    such as the IETF Protocol Assignments block at 192.0.0.0/24
	    have been sufficient. While it was reasonable to plan for an
	    unknown future, the reserved block at 240/4 did not ultimately
	    aid Internet innovation or functionality.  The
	    future has arrived, and it wants IPv4 unicast addresses far more
	    than it wants permanently unusable IPv4 addresses.
    </t>
    <t>
	    The idea of making 240/4 addresses available for unicast
	    addressing is not new. It was suggested by Lear on the
	    influential TCP-IP
	    mailing list in 1988 <xref target="Lear" />.  It was
	    formally proposed to IETF more than a decade ago, both by
	    <xref target="FLM">Fuller, Lear, and Mayer</xref>, and by
	    <xref target="WMH">Wilson, Michaelson, and Huston</xref>.
	    While the idea of unicast use of 240/4 was merely being
	    considered at IETF, the "running code"
	    required was simple enough and compatible enough that this behavior
	    change was implemented at that time in several operating systems.
	    Then, when the protocol change was ultimately not standardized,
	    those implementations remained, but were largely forgotten.  (They are
	    summarized in the "Implementation Status" section of this document.)
    </t>
    <t>
	    The unicast support created in about 2008 in those
	    implementations is now running in millions of nodes on the Internet, and has
	    not caused any problems over the past decade.  As a result, the 240/4 space has been
	    attracting "wildcat" use in private networks; see
	    <xref target="VPC" />.
    </t>
    <t>
	    Although software support for unicast use of 240/4 is widespread,
	    it is not yet universal. The present document moves this process
	    further along by confirming the consensus that unicast is the
	    preferred use for 240/4, documenting
	    the exact behavior changes required for maximum interoperability, and
	    calling on all vendors and implementers to adopt this behavior.
	    Doing so will prepare for a future in which use of these addresses is
	    anticipated and unsurprising, so that their allocation can be
	    considered.
    </t>
        <t>Implementations generally treat
	public and private addresses identically, with the differences occurring
	only in how routes, firewalls, and DNS servers are configured.  The
	earlier draft <xref target="WMH" /> suggested designating the unreserved
	240/4 range as <xref target="RFC1918" />-style private address space.
	Like the <xref target="FLM" /> draft, this document does not attempt to
	decide or designate whether future allocations from this address range
	will be public or private addresses.  Both options require that
	both hosts and routers be able to use these addresses, so the next
	section fully defines both host and router behavior.
</t>

    </section>
  </section>

<section numbered="true" toc="default">
	<name>Change in Status of 240/4</name>
	<t>The purpose of this document is to make addresses in the
	range 240/4 available for active unicast use on the public Internet.
	This includes supporting them for numbering and addressing networks
	and hosts, like any other unicast address.</t>

<t>Host and router software SHOULD treat addresses in the 240/4
	range in the same way that they would treat other unicast
	IPv4 addresses.
	Software SHOULD be capable of accepting datagrams from, and
	generating datagrams to, addresses within this range.
	<!-- should these SHOULDs be MUSTs?  Or left as SHOULD for backward compatibility? -->
</t>

<t>
Clients for autoconfiguration mechanisms such as <xref target="RFC2131">DHCP</xref>
SHOULD accept a lease or assignment of an address within 240/4 whenever the
underlying operating system is capable of accepting it.</t>

	<t>Other interoperability details related to address-based
	filtering are discussed in a separate section, below.</t>

<section numbered="true" toc="default">
	<name>Continued Special Treatment for 255.255.255.255/32</name>
	<t>
	The address 255.255.255.255/32 was given a special meaning as a local
	segment limited broadcast address by numerous prior Internet standards,
	starting with <xref target="RFC0919">RFC 919</xref> and continuing
	consistently up to the present day.  For example, 255.255.255.255 is
	used as a network-layer destination address in <xref target="RFC0951">BOOTP</xref>
	and <xref target="RFC2131">DHCP</xref> for
	address autoconfiguration broadcasts by hosts that don't yet know
	anything about the networks to which they are connected.  While
	some newer autoconfiguration or autodiscovery protocols use other
	addresses, the use of 255.255.255.255 remains widespread.
	</t>

	<t>
	The special meaning of 255.255.255.255 was never restricted or affected
	by the reservation of 240/4. Accordingly, the existing distinctive meaning
	of 255.255.255.255 is unchanged by this document.  This single
	address MUST NOT be assigned to an individual host, or interpreted
	as the address of an individual host, even if it would otherwise be
	part of an allocated or announced network block.
	</t>

</section>


</section>

<section numbered="true" toc="default">
	<name>Compatibility and Interoperability</name>

	<t>Merely implementing unicast treatment of addresses in 240/4
	in routers and operating systems, as this
document proposes, does not cause any compatibility nor interoperability
issues.  Hundreds of millions of IPv4 nodes currently contain this
unicast treatment, and all are interoperating successfully with each
other and with non-updated nodes.</t>

	<t>Compatibility and interoperability issues only arise if and
when an address from 240/4 is assigned to an interface on a node,
and then IPv4 packets are exchanged which use such an address as a source
or destination address.  This document does not recommend doing these
things, except for testing purposes.</t>

	<t>Older Internet standards counseled implementations in varying ways
	to reject packets from, and not to generate packets to, addresses
	within 240/4.</t>

	<t><xref target="RFC1122">RFC 1122</xref>,
	section 3.2.1.3, states that a "host MUST silently discard
	an incoming datagram containing an IP source address that is
	invalid by the rules of this section."  The same section
	states that Class E addresses are "reserved" (which might be
	taken, in context, to imply that they are "invalid"); the section
	further treats Class A, B, and C as the only possibly relevant
	address ranges for unicast addressing.</t>

	<t>
	<xref target="RFC1812">RFC1812</xref>, section
	5.3.7, states that a "router SHOULD NOT forward" a packet with
	such a destination address. (If section 4.2.2.11's reference to
	these addresses as "reserved" is taken to imply that they are
	"special," section 5.3.7 would also imply that a "router SHOULD
	NOT forward" a packet with such a source address.)</t>

	<t>
	<xref target="RFC3704">RFC 3704</xref> (BCP 84)
	cites <xref target="RFC2827">RFC 2827</xref> (BCP 38) in
	asking providers to filter based on source address:</t>

	<blockquote>
RFC 2827 recommends that ISPs police their customers' traffic by
dropping traffic entering their networks that is coming from a source
address not legitimately in use by the customer network.  The
filtering includes but is in no way limited to the traffic whose
source address is a so-called "Martian Address" - an address that is
reserved, including any address within 0.0.0.0/8, 10.0.0.0/8,
127.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 224.0.0.0/4, or
240.0.0.0/4.
	</blockquote>

	<t>In this context, RFC 3704 specifies filtering of these addresses
	as source (not destination) addresses at a network ingress point as
	a countermeasure against forged source addresses, limiting forwarded
	packets' source addresses to only the set which have been actually assigned to the
	customer's network.  The RFC's mention of these "Martian Addresses" is
	based on the assumption that they could never be legitimately in use by the
	customer network.</t>

	<t>Because the 240/4 address space is no longer reserved as a
	whole, an address within this space is no longer inherently a
	"Martian" address.  Both hosts and routers MUST NOT hard-code
	a policy of always rejecting such addresses. Hosts and routers
	SHOULD NOT be configured to apply Martian address filtering to
	any packet solely on the basis of its reference to a source (or
	destination) address in 240/4.  Maintainers of lists of "Martian
	addresses" MUST NOT designate addresses from this range as
	"Martian".  As noted elsewhere, the address 255.255.255.255
	retains its special meaning, but is also not a "Martian"
	address.</t>

	<t>The filtering recommended by RFC 3704 is designed for border
	routers, not for hosts.  To the extent that an ISP had allocated an
	address range from within 240/4 to its customer, RFC 3704 would
	already not require packets with those source addresses to be
	filtered out by the ISP's border router.
	</t>

	<t>Since deployed implementations' willingness to accept 240/4
	addresses as valid unicast addresses varies, a host to
	which an address from this range has been assigned may also
	have a varying ability to communicate with other hosts.</t>

	<t>Such a host might be inaccessible by some devices either
	on its local network segment or elsewhere on the Internet, due
	to a combination of host software limitations or reachability
	limitations in the network. IPv4 unicast interoperability with
	240/4 can be expected to improve over time following the
	publication of this document.  Before or after allocations are eventually
	made within this range, "debogonization" efforts
	for allocated ranges can improve reachability to the whole address block.
	Similar efforts have already been done by <xref target="Cloudflare">Cloudflare on 1.1.1.1</xref>,
	and by RIPE Labs on <xref target="RIPElabs18">1/8</xref>,
	<xref target="RIPElabs2a1012">2a10::/12</xref>, and
	<xref target="RIPElabs128016">128.0/16</xref>.
	The Internet community can use network probing with any of
	several measurement-oriented platforms to investigate how usable
	these addresses are at any particular point in time, as well as
	to localize medium-to-large-scale routing problems. (Examples
	are described in <xref target="Huston" />,
	<xref target="NLNOGRing" />, and <xref target="Atlas" />.)
	Any network operator to whom such addresses are made
	available by a future allocation will have to examine the
	situation in detail to determine how well its interoperability
	requirements will be met.</t>
</section>

   <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This memo unreserves the address block 240/4. It therefore
	      requests IANA to update the IANA Special-Purpose Address Registry
	      by removing the entry for 240/4, whose existing authority
	      is RFC 1122, Section 4.  Additionally, it requests IANA
	      to update the IANA IPv4 Address Space Registry by changing the status
	      of each /8 entry from 240/8 through 255/8 from "Future Use, 1981-09,
	      RESERVED" to "Unallocated, [Date of this RFC], UNALLOCATED".
	      Finally, IANA is requested to prepare for this address space
	      to be addressed in the reverse DNS space in in-addr.arpa.</t>
      <t>This memo does not effect a registration, transfer, allocation,
              or authorization for use of these addresses by any specific
              entity. This memo's scope is to require IPv4 software implementations
              to support the ordinary unicast use of addresses in the newly
              unallocated range 240.0.0.0 through 255.255.255.254.  During
              a significant transition period, it would only be prudent for the
              global Internet to use those addresses for experimental purposes
              such as debogonization and testing. After that transition period, a
              responsible entity such as IETF or IANA could later consider
              whether, how and when to allocate those addresses to entities
              or to other protocol functions such as private addresses.</t>

    </section>
    <section anchor="Security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The change specified by this document could create a period
	      of ambiguity about historical and future interpretations
	      of the meaning of host and network addresses in 240/4.
	      Some networks and hosts currently discard all IPv4 packets
	      bearing these addresses, pursuant to statements in
	      prior standards that packets containing these addresses have no
	      agreed-upon meaning.
	      Such implementations have protected themselves
	      from possible incompatible future packet formats that might
	      have eventually used these addresses.</t>
	  <t>Disparate filtering processes and rules, both at present, and
	      in response to the adoption of this document, could make
	      it easier for rogue network operators to hijack or
	      spoof portions of this address space in order to send
	      malicious traffic.</t>
      <t>Live traffic, accepted and processed by other devices, may
	      legitimately originate from these addresses in the future.
	      Network operators, firewalls, and intrusion-detection
	      systems may need to take account of this change in
	      various regards, to avoid permitting either
	      more or less traffic from such addresses than they expected.</t>
      <t>Automated systems generating reports, and human beings reading
	      those reports, SHOULD NOT assume that the use of a 240/4
	      source address indicates spoofing, an attack, or a new
	      incompatible packet format.  At the
	      same time, they SHOULD NOT assume that the use of 240/4
	      is impossible or will be precluded by other systems' behavior.</t>
      <t>An important concern about the <xref target="FLM" /> and
      <xref target="WMH" /> drafts was that discrepant behavior
      between systems could create security problems, as when a middlebox
      fails to detect or report an attack or policy violation because it
      believes that an address involved cannot be used or cannot be
      relevant.  Similarly, a logging system could fail to log traffic
      related to 240/4 addresses because it incorporates an assumption
      that no such traffic can ever occur.  Such discrepancies between
      multiple systems' views of communication semantics are a common
      security antipattern.  (Compare <xref target="Sherr" />, exploiting
      discrepancies in telephony equipment's recognition and
      interpretation of DTMF signals.)  Any change to the meaning or
      status of a
      group of addresses can introduce such a discrepancy.</t>
      <t>
      In this case, because 240/4 is already commonly supported by
      several widely-used implementations, and is already used for
      private network communications, such discrepancies are already a
      reality.  If routers follow this document's request to cease
      filtering this address range, they will increase the variety of
      contexts in which implementations may receive ordinary unicast
      packets containing these addresses.  (Such packets are still unlikely
      to arrive from distant hosts until some of these addresses
      are eventually allocated for
      experimental or production use, and until the global routing table
      receives announcements for subnets in this range.)</t>
      <t>
      The adoption of this
      document will converge on an explicitly shared
      understanding that implementations should prepare for this possibility.
      Since unofficial private use of 240/4 addresses is a reality today,
      while any public allocations from this range are still distant and
      contingent on further study, implementers are receiving considerable
      advance notice of this issue.
      </t>
      <section numbered="true" toc="default">
      <name>Existing Unofficial Uses of 240/4</name>
      <t>Some organizations are using portions of 240/4 internally
      as RFC 1918-type private-use address space, for example for internal
      communications within datacenters.  RIPE's ATLAS project experimentally
      detected the use of this address space <xref target="RIPE240">in several large institutions</xref> in 2022.
      Amazon subsequently <xref target="Dale">described</xref> its internal
      use of 240/4 at the NANOG88 conference in 2023. As an Amazon engineer
      explained:</t>

	      <blockquote>
[A]long the way, we actually ran out of RFC 1918, 3330,
every piece of address space out there, so we did something that some
people have noticed. [...]
Some of those hops have class E addresses.  Yeah, we
did do that.  We started numbering things out of Class E.  Now that
was very kind of deliberate in terms of doing that. We had no address
space left.
	      </blockquote>

      <t>
      Google has informally <xref target="VPC">advised hosting
      customers</xref> for several years that they may use this address space
      this way, and in September 2024 <xref target="GKE">made that advice
      more explicit</xref>, saying that customers</t>

      <blockquote>
      can use [240/4] for private use within Google Cloud VPCs, for both
      Compute Engine instances or Kubernetes pods/services in GKE.  [...]
      [These] addresses offer a significantly larger pool of IP addresses
      compared to traditional RFC 1918 private addresses [...]
      </blockquote>

      <t>and providing technical details about how to do so, including
      some information about vendor support. The same document notes
      that Google cloud customer Snap Inc.'s use of 240/4 addresses
      </t>

      <blockquote>
      mitigated IP exhaustion and provided Snap with multiple years
      of IP address scale needed to support future growth and reduce
      operational overhead. In addition, this approach also aligned with
      Snap’s long-term strategy for migrating to IPv6.
      </blockquote>

      <t>
      A Snap engineering manager is quoted as saying that these address
      resources "doubled [Snap's] IP capacity [...] and eliminated
      address exhaustion and subnet management issues".
      </t>

      <t>
      These organizations' use of 240/4 address space provides further
      demonstration that this address space can actually be used in
      practice by many devices and operating systems today, but it also
      represents a failure to coordinate this use with the global
      Internet community. That failure may be harmful in the future.
      For instance, <xref target="GKE">Google predicts</xref> that
      "adoption [of 240/4 addressing]
      is expected to grow as the need for more IP addresses increases",
      but now encourages customers to use them privately for internal
      data center communication without coordination, and confirms that
      large customers are already doing so as of 2024.  Coordination
      could make it more likely that some or all of this address space
      can be used for interdomain or global communications in the
      future without renumbering.
      </t>

      <t>
      Future allocations of 240/4 could result in use of this space on the public Internet
      in ways that overlap these unofficial private-use addresses, creating ambiguity
      about whether a particular host intended to use such an address to refer
      to a private or public network. Among other unintended outcomes,
      hosts or firewalls that have extended greater trust to other hosts based on their
      use of a certain unofficial network number (that was considered to imply presence on
      a LAN or within an organization) may eventually receive legitimate traffic
      from an external network to which this address space has been allocated.
      On the other hand, unofficial private use may reduce the ability of networks
      to successfully communicate with each other in the future if the global
      Internet community publicly allocates address blocks from 240/4 in the
      future.
      </t>

      <t>Operators of networks that are making unofficial uses of portions of 240/4
      may wish to plan to discontinue these uses and renumber their internal
      networks, or to request that IANA formally designate certain ranges as
      additional Private-Use areas.</t>
      </section>
    </section>

    <section anchor="Acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>This document directly builds on prior work by Dave Täht and
      John Gilmore as part of the IPv4 Unicast Extensions Project.</t>
      <t>
      We thank our late colleague Michael J. Karels (1956-2024) for his
      comments on this draft and related FreeBSD implementation efforts.
      </t>
    </section>

  </middle>
  <!--  *****BACK MATTER ***** -->

 <back>

    <!-- References split into informative and normative -->

   <!-- There are 2 ways to insert reference entries from the citation libraries:
    1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
    2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
       (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

    Both are cited textually in the same manner: by using xref elements.
    If you use the PI option, xml2rfc will, by default, try to find included files in the same
    directory as the including file. You can also define the XML_LIBRARY environment variable
    with a value containing a set of directories to search.  These can be either in the local
    filing system or remote ones accessed by http (http://domain/dir/... ).-->

   <references>
      <name>References</name>
      <references>
        <name>Normative References</name>

<reference  anchor='RFC0870' target='https://www.rfc-editor.org/info/rfc870'>
<front>
<title>Assigned numbers</title>
<author initials='J.K.' surname='Reynolds' fullname='J.K. Reynolds'><organization /></author>
<author initials='J.' surname='Postel' fullname='J. Postel'><organization /></author>
<date year='1983' month='October' />
<abstract><t>This RFC documents the list of numbers assigned for networks,    protocols, etc.  Obsoletes RFCs 820, 790, 776, 770, 762, 758, 755,    750, 739, 604.</t></abstract>
</front>
<seriesInfo name='RFC' value='870'/>
<seriesInfo name='DOI' value='10.17487/RFC0870'/>
</reference>

     <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>

<reference  anchor='RFC1122' target='https://www.rfc-editor.org/info/rfc1122'>
<front>
<title>Requirements for Internet Hosts - Communication Layers</title>
<author initials='R.' surname='Braden' fullname='R. Braden' role='editor'><organization /></author>
<date year='1989' month='October' />
<abstract><t>This RFC is an official specification for the Internet community.  It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='3'/>
<seriesInfo name='RFC' value='1122'/>
<seriesInfo name='DOI' value='10.17487/RFC1122'/>
</reference>

<reference  anchor='RFC1812' target='https://www.rfc-editor.org/info/rfc1812'>
<front>
<title>Requirements for IP Version 4 Routers</title>
<author initials='F.' surname='Baker' fullname='F. Baker' role='editor'><organization /></author>
<date year='1995' month='June' />
<abstract><t>This memo defines and discusses requirements for devices that perform the network layer forwarding function of the Internet protocol suite. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1812'/>
<seriesInfo name='DOI' value='10.17487/RFC1812'/>
</reference>

<reference  anchor='RFC1918' target='https://www.rfc-editor.org/info/rfc1918'>
<front>
<title>Address Allocation for Private Internets</title>
<author initials='Y.' surname='Rekhter' fullname='Y. Rekhter'><organization /></author>
<author initials='B.' surname='Moskowitz' fullname='B. Moskowitz'><organization /></author>
<author initials='D.' surname='Karrenberg' fullname='D. Karrenberg'><organization /></author>
<author initials='G. J.' surname='de Groot' fullname='G. J. de Groot'><organization /></author>
<author initials='E.' surname='Lear' fullname='E. Lear'><organization /></author>
<date year='1996' month='February' />
<abstract><t>This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='5'/>
<seriesInfo name='RFC' value='1918'/>
<seriesInfo name='DOI' value='10.17487/RFC1918'/>
</reference>

<reference  anchor='RFC4632' target='https://www.rfc-editor.org/info/rfc4632'>
<front>
<title>Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan</title>
<author initials='V.' surname='Fuller' fullname='V. Fuller'><organization /></author>
<author initials='T.' surname='Li' fullname='T. Li'><organization /></author>
<date year='2006' month='August' />
<abstract><t>This memo discusses the strategy for address assignment of the existing 32-bit IPv4 address space with a view toward conserving the address space and limiting the growth rate of global routing state. This document obsoletes the original Classless Inter-domain Routing (CIDR) spec in RFC 1519, with changes made both to clarify the concepts it introduced and, after more than twelve years, to update the Internet community on the results of deploying the technology described.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='122'/>
<seriesInfo name='RFC' value='4632'/>
<seriesInfo name='DOI' value='10.17487/RFC4632'/>
</reference>


<reference  anchor='RFC2827' target='https://www.rfc-editor.org/info/rfc2827'>
<front>
<title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
<author initials='P.' surname='Ferguson' fullname='P. Ferguson'><organization /></author>
<author initials='D.' surname='Senie' fullname='D. Senie'><organization /></author>
<date year='2000' month='May' />
<abstract><t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='38'/>
<seriesInfo name='RFC' value='2827'/>
<seriesInfo name='DOI' value='10.17487/RFC2827'/>
</reference>

<reference  anchor='RFC3704' target='https://www.rfc-editor.org/info/rfc3704'>
<front>
<title>Ingress Filtering for Multihomed Networks</title>
<author initials='F.' surname='Baker' fullname='F. Baker'><organization /></author>
<author initials='P.' surname='Savola' fullname='P. Savola'><organization /></author>
<date year='2004' month='March' />
<abstract><t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='84'/>
<seriesInfo name='RFC' value='3704'/>
<seriesInfo name='DOI' value='10.17487/RFC3704'/>
</reference>


<reference  anchor='RFC6890' target='https://www.rfc-editor.org/info/rfc6890'>
<front>
<title>Special-Purpose IP Address Registries</title>
<author initials='M.' surname='Cotton' fullname='M. Cotton'><organization /></author>
<author initials='L.' surname='Vegoda' fullname='L. Vegoda'><organization /></author>
<author initials='R.' surname='Bonica' fullname='R. Bonica' role='editor'><organization /></author>
<author initials='B.' surname='Haberman' fullname='B. Haberman'><organization /></author>
<date year='2013' month='April' />
<abstract><t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA.  It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries.  Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t></abstract>
</front>
<seriesInfo name='BCP' value='153'/>
<seriesInfo name='RFC' value='6890'/>
<seriesInfo name='DOI' value='10.17487/RFC6890'/>
</reference>

<reference anchor="IANA4" target="https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml">
		<front>
			<title>IANA IPv4 Special-Purpose Address Registry</title>
			<author>
				<organization>Internet Assigned Numbers Authority</organization>
			</author>
		</front>
</reference>

<reference  anchor='RFC7050' target='https://www.rfc-editor.org/info/rfc7050'>
<front>
<title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
<author initials='T.' surname='Savolainen' fullname='T. Savolainen'><organization /></author>
<author initials='J.' surname='Korhonen' fullname='J. Korhonen'><organization /></author>
<author initials='D.' surname='Wing' fullname='D. Wing'><organization /></author>
<date year='2013' month='November' />
<abstract><t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network.  The method depends on the existence of a well-known IPv4-only fully qualified domain name &quot;ipv4only.arpa.&quot;.  The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7050'/>
<seriesInfo name='DOI' value='10.17487/RFC7050'/>
</reference>

      </references>

        <references>
        <name>Informative References</name>

<reference anchor="Sherr" target="https://www.mattblaze.org/papers/wiretap.pdf">
	<front>
		<title>Signaling vulnerabilities in wiretapping systems</title>
		<author fullname="Micah Sherr" />
		<author fullname="Eric Cronin" />
		<author fullname="Sandy Clark" />
		<author fullname="Matt Blaze" />
		<!--	<date year='2005' month='November' /> -->
	</front>
	<seriesInfo name='IEEE Security &amp; Privacy' value='November-December 2005' />
</reference>

<reference anchor="Cloudflare" target="https://blog.cloudflare.com/fixing-reachability-to-1-1-1-1-globally/">
	<front>
		<title>Fixing reachability to 1.1.1.1, GLOBALLY!</title>
		<author fullname='Marty Strong'><organization>Cloudflare</organization></author>
		<date year='2018' month='April' day='4' />
	</front>
</reference>

<reference anchor="Huston" target="https://labs.ripe.net/author/gih/detecting-ip-address-filters/">
	<front>
		<title>Detecting IP Address Filters</title>
		<author initials='G.' surname='Huston' fullname='Geoff Huston'><organization>APNIC</organization></author>
		<date year='2012' month='January' day='13'/>
	</front>
</reference>

<reference anchor="NLNOGRing" target="https://ring.nlnog.net/post/10-years-of-nlnog-ring/">
	<front>
		<title>10 Years of NLNOG RING</title>
		<author><organization>NLNOG RING</organization></author>
	</front>
</reference>

<reference anchor="Atlas" target="https://atlas.ripe.net/">
	<front>
		<title>RIPE Atlas</title>
		<author><organization>RIPE Network Coordination Centre</organization></author>
	</front>
</reference>

<reference anchor="RIPE240" target="https://labs.ripe.net/author/qasim-lone/2404-as-seen-by-ripe-atlas/">
	<front>
		<title>240/4 As Seen by RIPE Atlas</title>
		<author initials='Q.' surname='Lone' fullname='Qasim Lone'><organization>RIPE Network Coordination Centre</organization></author>
		<date year='2022' month='August' day='23'/>
	</front>
</reference>

		<!--	    https://web.archive.org/web/20120514082839/http://www-mice.cs.ucl.ac.uk/multimedia/misc/tcp_ip/8813.mm.www/0146.html -->



<reference  anchor='RFC0919' target='https://www.rfc-editor.org/info/rfc919'>
<front>
<title>Broadcasting Internet Datagrams</title>
<author initials='J.C.' surname='Mogul' fullname='J.C. Mogul'><organization /></author>
<date year='1984' month='October' />
<abstract><t>This RFC proposes simple rules for broadcasting Internet datagrams on    local networks that support broadcast, for addressing broadcasts, and    for how gateways should handle them.  This RFC suggests a proposed    protocol for the ARPA-Internet community, and requests discussion and    suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='STD' value='5'/>
<seriesInfo name='RFC' value='919'/>
<seriesInfo name='DOI' value='10.17487/RFC0919'/>
</reference>


<reference  anchor='RFC0951' target='https://www.rfc-editor.org/info/rfc951'>
<front>
<title>Bootstrap Protocol</title>
<author initials='W.J.' surname='Croft' fullname='W.J. Croft'><organization /></author>
<author initials='J.' surname='Gilmore' fullname='J. Gilmore'><organization /></author>
<date year='1985' month='September' />
<abstract><t>This RFC describes an IP/UDP bootstrap protocol (BOOTP) which allows a    diskless client machine to discover its own IP address, the address of a    server host, and the name of a file to be loaded into memory and    executed.  The bootstrap operation can be thought of as consisting of    TWO PHASES.  This RFC describes the first phase, which could be labeled    `address determination and bootfile selection'.  After this address and    filename information is obtained, control passes to the second phase of    the bootstrap where a file transfer occurs.  The file transfer will    typically use the TFTP protocol, since it is intended that both phases    reside in PROM on the client.  However BOOTP could also work with other    protocols such as SFTP or FTP.  This RFC suggests a proposed protocol    for the ARPA-Internet community, and requests discussion and suggestions    for improvements.</t></abstract>
</front>
<seriesInfo name='RFC' value='951'/>
<seriesInfo name='DOI' value='10.17487/RFC0951'/>
</reference>

<reference  anchor='RFC0988' target='https://www.rfc-editor.org/info/rfc988'>
<front>
<title>Host extensions for IP multicasting</title>
<author initials='S.E.' surname='Deering' fullname='S.E. Deering'><organization /></author>
<date year='1986' month='July' />
<abstract><t>This memo specifies the extensions required of a host implementation of    the Internet Protocol (IP) to support internetwork multicasting.  This    specification supersedes that given in RFC-966, and constitutes a    proposed protocol standard for IP multicasting in the ARPA-Internet.    The reader is directed to RFC-966 for a discussion of the motivation and    rationale behind the multicasting extension specified here.</t></abstract>
</front>
<seriesInfo name='RFC' value='988'/>
<seriesInfo name='DOI' value='10.17487/RFC0988'/>
</reference>

<reference  anchor='RFC1256' target='https://www.rfc-editor.org/info/rfc1256'>
<front>
<title>ICMP Router Discovery Messages</title>
<author initials='S.' surname='Deering' fullname='S. Deering' role='editor'><organization /></author>
<date year='1991' month='September' />
<abstract><t>This document specifies an extension of the Internet Control Message Protocol (ICMP) to enable hosts attached to multicast or broadcast networks to discover the IP addresses of their neighboring routers. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1256'/>
<seriesInfo name='DOI' value='10.17487/RFC1256'/>
</reference>

<reference  anchor='RFC1519' target='https://www.rfc-editor.org/info/rfc1519'>
<front>
<title>Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy</title>
<author initials='V.' surname='Fuller' fullname='V. Fuller'><organization /></author>
<author initials='T.' surname='Li' fullname='T. Li'><organization /></author>
<author initials='J.' surname='Yu' fullname='J. Yu'><organization /></author>
<author initials='K.' surname='Varadhan' fullname='K. Varadhan'><organization /></author>
<date year='1993' month='September' />
<abstract><t>This memo discusses strategies for address assignment of the existing IP address space with a view to conserve the address space and stem the explosive growth of routing tables in default-route-free routers. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1519'/>
<seriesInfo name='DOI' value='10.17487/RFC1519'/>
</reference>

<reference  anchor='RFC1546' target='https://www.rfc-editor.org/info/rfc1546'>
<front>
<title>Host Anycasting Service</title>
<author initials='C.' surname='Partridge' fullname='C. Partridge'><organization /></author>
<author initials='T.' surname='Mendez' fullname='T. Mendez'><organization /></author>
<author initials='W.' surname='Milliken' fullname='W. Milliken'><organization /></author>
<date year='1993' month='November' />
<abstract><t>This RFC describes an internet anycasting service for IP.  The primary purpose of this memo is to establish the semantics of an anycasting service within an IP internet. This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1546'/>
<seriesInfo name='DOI' value='10.17487/RFC1546'/>
</reference>

<reference  anchor='RFC2131' target='https://www.rfc-editor.org/info/rfc2131'>
<front>
<title>Dynamic Host Configuration Protocol</title>
<author initials='R.' surname='Droms' fullname='R. Droms'><organization /></author>
<date year='1997' month='March' />
<abstract><t>The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCPIP network.  DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional configuration options.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2131'/>
<seriesInfo name='DOI' value='10.17487/RFC2131'/>
</reference>

<reference  anchor='RFC2644' target='https://www.rfc-editor.org/info/rfc2644'>
<front>
<title>Changing the Default for Directed Broadcasts in Routers</title>
<author initials='D.' surname='Senie' fullname='D. Senie'><organization /></author>
<date year='1999' month='August' />
<abstract><t>This document discusses and defines a number of tests that may be used to describe the performance characteristics of a network interconnecting device.  In addition to defining the tests this document also describes specific formats for reporting the results of the tests.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='BCP' value='34'/>
<seriesInfo name='RFC' value='2644'/>
<seriesInfo name='DOI' value='10.17487/RFC2644'/>
</reference>

<reference  anchor='RFC3068' target='https://www.rfc-editor.org/info/rfc3068'>
<front>
<title>An Anycast Prefix for 6to4 Relay Routers</title>
<author initials='C.' surname='Huitema' fullname='C. Huitema'><organization /></author>
<date year='2001' month='June' />
<abstract><t>This memo introduces a &quot;6to4 anycast address&quot; in order to simplify the configuration of 6to4 routers.  It also defines how this address will be used by 6to4 relay routers, how the corresponding &quot;6to4 anycast prefix&quot; will be advertised in the IGP and in the EGP.  The memo documents the reservation by IANA (Internet Assigned Numbers Authority) of the &quot;6to4 relay anycast prefix.&quot;  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3068'/>
<seriesInfo name='DOI' value='10.17487/RFC3068'/>
</reference>

<reference  anchor='RFC3232' target='https://www.rfc-editor.org/info/rfc3232'>
<front>
<title>Assigned Numbers: RFC 1700 is Replaced by an On-line Database</title>
<author initials='J.' surname='Reynolds' fullname='J. Reynolds' role='editor'><organization /></author>
<date year='2002' month='January' />
<abstract><t>This memo obsoletes RFC 1700 (STD 2) &quot;Assigned Numbers&quot;, which contained an October 1994 snapshot of assigned Internet protocol parameters.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3232'/>
<seriesInfo name='DOI' value='10.17487/RFC3232'/>
</reference>

<reference  anchor='RFC4291' target='https://www.rfc-editor.org/info/rfc4291'>
<front>
<title>IP Version 6 Addressing Architecture</title>
<author initials='R.' surname='Hinden' fullname='R. Hinden'><organization /></author>
<author initials='S.' surname='Deering' fullname='S. Deering'><organization /></author>
<date year='2006' month='February' />
<abstract><t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol.  The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t><t>This document obsoletes RFC 3513, &quot;IP Version 6 Addressing Architecture&quot;.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4291'/>
<seriesInfo name='DOI' value='10.17487/RFC4291'/>
</reference>

<reference  anchor='RFC7094' target='https://www.rfc-editor.org/info/rfc7094'>
<front>
<title>Architectural Considerations of IP Anycast</title>
<author initials='D.' surname='McPherson' fullname='D. McPherson'><organization /></author>
<author initials='D.' surname='Oran' fullname='D. Oran'><organization /></author>
<author initials='D.' surname='Thaler' fullname='D. Thaler'><organization /></author>
<author initials='E.' surname='Osterweil' fullname='E. Osterweil'><organization /></author>
<date year='2014' month='January' />
<abstract><t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t></abstract>
</front>
<seriesInfo name='RFC' value='7094'/>
<seriesInfo name='DOI' value='10.17487/RFC7094'/>
</reference>

<reference anchor="JUNOS-release-notes-9.6" target="https://www.juniper.net/documentation/en_US/junos9.6/information-products/topic-collections/release-notes/9.6/junos-release-notes-9.6.pdf">
	<front>
		<title>Juniper Networks JUNOS 9.6 Software Release Notes</title>
		<author><organization>Juniper Networks</organization></author>
		<date year='2010' month='June' day='1' />
	</front>
</reference>

<reference anchor="JUNOS-routing-properties" target="https://www.juniper.net/documentation/us/en/software/junos/static-routing/static-routing.pdf">
	<front>
		<title>JUNOS OS: Protocol-Independent Routing Properties User Guide</title>
		<author><organization>Juniper Networks</organization></author>
		<date year='2022' month='03' day='14' />
	</front>
</reference>

<reference anchor="Arista-user-manual" target="https://www.arista.com/en/um-eos/eos-ipv4#ipv4_routable_240.0.0.0_4">
	<front>
		<title>EOS 4.28.1F User Manual</title>
		<author><organization>Arista Networks</organization></author>
		<date year='2022' month='April' day='18' />
	</front>
</reference>

<reference anchor="RIPElabs18" target="https://labs.ripe.net/author/franz/pollution-in-18/">
	<front>
		<title>Pollution in 1/8</title>
		<author fullname='Franz Schwarzinger'><organization>RIPE Labs</organization></author>
		<date year='2010' month='February' day='3' />
	</front>
</reference>

<reference anchor="RIPElabs2a1012" target="https://labs.ripe.net/author/emileaben/the-debogonisation-of-2a1012/">
	<front>
		<title>The Debogonisation of 2a10::/12</title>
		<author fullname='Emile Aben'><organization>RIPE Labs</organization></author>
		<date year='2020' month='January' day='17' />
	</front>
</reference>

<reference anchor="RIPElabs128016" target="https://labs.ripe.net/author/emileaben/the-curious-case-of-128016/">
	<front>
		<title>The Curious Case of 128.0/16</title>
		<author fullname='Emile Aben'><organization>RIPE Labs</organization></author>
		<date year='2011' month='December' day='6' />
	</front>
</reference>

<!-- https://web.archive.org/web/20210728142935/https://cloud.google.com/vpc/docs/vpc#valid-ranges captures it in case they change it. -->
<reference anchor="VPC" target="https://cloud.google.com/vpc/docs/subnets">
	<front>
		<title>Virtual Private Cloud: Subnets overview: Valid IPv4 ranges</title>
		<author><organization>Google Inc.</organization></author>
	</front>
</reference>

<reference anchor="GKE" target="https://cloud.google.com/blog/products/containers-kubernetes/how-class-e-addresses-solve-for-ip-address-exhaustion-in-gke/">
	<front>
		<title>Leveraging Class E IPv4 Address space to mitigate IPv4 exhaustion issues in GKE</title>
		<author fullname="Basant Amarkhed">
			<organization>Google</organization>
		</author>
		<author fullname="Gopinath Balakrishnan">
			<organization>Google</organization>
		</author>
		<date year="2024" month="September" day="26" />
	</front>
</reference>

<reference anchor="Cox" target="https://ripe88.ripe.net/archives/video/1367/">
	<front>
		<title>On "Reclaiming" 240.0.0.0/4</title>
		<author fullname="Ben Cartwright-Cox" />
		<author fullname="Zbyněk Pospíchal" />
		<date year="2024" month="May" day="23" />
		<!-- RIPE 88 Presentation, Kraków, Poland -->
	</front>
</reference>

<reference anchor='WMH'>
<front>
<title>Redesignation of 240/4 from "Future Use" to "Private Use"</title>

<author initials='P' surname='Wilson' fullname='Paul Wilson'>
    <organization />
</author>

<author initials='G' surname='Michaelson' fullname='George Michaelson'>
    <organization />
</author>

<author initials='G' surname='Huston' fullname='Geoff Huston'>
    <organization />
</author>

<date month='September' day='29' year='2008' />

<abstract><t>This document directs the IANA to designate the block of IPv4 addresses from 240.0.0.0 to 255.255.255.255 (240.0.0.0/4) as unicast address space for Private Use.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-wilson-class-e-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-wilson-class-e-02.txt' />
</reference>

<reference anchor="Dale" target="https://www.youtube.com/watch?v=0tcR-iQce7s&amp;t=1709s">
   <front>
      <title>Dive Deep on AWS Networking Infrastructure (presentation)</title>
      <author initials="L." surname="Dale" fullname="Lincoln Dale">
	      <organization>Amazon Web Services</organization>
      </author>
      <author initials="F." surname="Korsbäck" fullname="Fredrik Korsbäck">
	      <organization>Amazon Web Services</organization>
      </author>
      <date month="June" year="2023" />
   </front>
   <refcontent>NANOG88</refcontent>
</reference>

<reference anchor="FLM">
   <front>
      <title>Reclassifying 240/4 as usable unicast address space</title>
      <author initials="V." surname="Fuller" fullname="Vince Fuller">
	      <organization>Cisco Systems</organization>
      </author>
      <author initials="E." surname="Lear" fullname="Eliot Lear">
	      <organization>Cisco Systems</organization>
      </author>
      <author initials="D." surname="Meyer" fullname="David Meyer">
	      <organization>Cisco Systems</organization>
      </author>
      <date month="March" day="25" year="2008" />
      <abstract>
	 <t>This memo reclassifies the address block 240.0.0.0/4 as usable
   address space.  While the community has not concluded whether the
   block should be considered public or private, given the current
   consumption rate, it is clear that the block should not be left
   unused.  This document also makes several recommendations on ways
   that current implementations of the IP protocol stack will need to be
   modified to make this address space usable.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-fuller-240space-02" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-fuller-240space-02.txt" />
</reference>

<reference anchor="Lear" target="https://web.archive.org/web/20120514082839/http://www-mice.cs.ucl.ac.uk/multimedia/misc/tcp_ip/8813.mm.www/0146.html">
   <front>
      <title>Re: Running out of Internet addresses?</title>
      <author initials="E." surname="Lear" fullname="Eliot Lear">
      </author>
      <date month="November" day="27" year="1988" />
   </front>
   <refcontent>TCP-IP mailing list</refcontent>
</reference>

	</references>
    </references>

   <section anchor="implem" numbered="true" toc="default">
      <name>Implementation Status</name>
      <t>The IPv4 protocol update proposed by this document has already
been implemented in a variety of widely-used software platforms.  In many
cases, implementers were persuaded of the value of the suggestions contained
in <xref target="FLM" /> and <xref target="WMH"/>.</t>

<t>All known TCP/IP implementations either interoperate properly with packets
with sources or destinations in the 240/4 range, or ignore these packets
entirely, except FreeBSD and NetBSD, which have support for 240/4 for some
purposes while blocking it for others.</t>

    <section><name>Operating systems</name>
    <t>240/4 has been supported for transmitting and receiving ordinary
    unicast packets in Linux kernels since linux-2.6.25 was released in
    January 2008.  Creating
    interfaces in the 240/4 range also worked fine using the iproute2 api
    (as used by the "ip" command) in that release.
    A kernel patch that allows properly configuring
    interfaces in the 240/4 range using the busybox ifconfig command was
    released in linux-4.20 and linux-5.0 in December 2018.</t>

    <t>240/4 as unicast was released in Fedora 9 in May 2008, and
    in Ubuntu 8.10 in October 2008.</t>
    <t>240/4 has been supported as ordinary unicast
    in the Android mobile operating system since Android 1.5 Cupcake (April
    2009, using linux-2.6.27).</t>
    <t>240/4 has been supported as ordinary unicast
    in the OpenWRT router OS since OpenWRT 8.09
    (September 2008, using linux-2.6.26).  A December 2018 kernel patch that
    allows properly configuring
    interfaces in the 240/4 range using the ifconfig command was merged
    into OpenWRT 19.01, along with two other patches to netifd and bcp38
    that improve support for 240/4.</t>
    <t>240/4 has been supported as ordinary unicast in Apple's macOS (formerly
    OS X) operating system and iOS mobile operating system since about 2008.</t>
    <t>240/4 has been supported as ordinary unicast in Sun's Solaris operating
    system since about 2008.</t>

    <t>240/4 traffic has been partly supported in OpenBSD for many years and
    is substantially fully supported since OpenBSD 7.2 (released October 20,
    2022).</t>

    <t>240/4 traffic is partly supported for local interface assignment in the FreeBSD
    operating system.  However, ICMP and packet forwarding are not supported by
    default.  Full support for 240/4 addresses is disabled by default, but
    can be enabled by "sysctl net.inet.ip.allow_net240=1".  This option is
    included in FreeBSD 14.0, released in November 2023, and was available in
    development versions since July 13, 2022.</t>

    <t>We have prepared a patch which enables 240/4 support this on NetBSD. It
    has not been merged as of December 2023.</t>

    <t>240/4 traffic is blocked by default in all versions of the Microsoft Windows
    operating system.  Windows will not assign an interface address in this range,
    if one is offered by DHCP.</t>
    </section>

    <section><name>Routers and Switches</name>


    <t>Unless otherwise noted, support in this section reflects interface
    assignment and packet-forwarding support, not BGP support, which may
    involve separate bogon logic.</t>

    <t>240/4 has been tested to interoperate as ordinary unicast in 2019 in
    a Cisco router using IOS release-XR 6.5.2.28I, which was also released in
    2019.  Older and newer releases are also likely to work.  Cisco also has
    two other router OS variants which have not been tested.</t>

    <t>240/4 traffic is blocked by default in Juniper's router operating system,
    but can be enabled with a simple configuration switch, starting from
    the JUNOS 9.6 release in June 2010.  See page 50 of
    <xref target="JUNOS-release-notes-9.6" />.
    It notes, "The JUNOS Software now allows Class E
    addresses to be
    configured on interfaces. To allow Class E addresses to be configured on
    interfaces, remove the Class E prefix from the list of martian addresses by
    including the [edit routing-options martians 240/4 orlonger allow]
    configuration statement."  See also chapter 5, "Martian Addresses" on
    page 129 through 136 of the 2022 documentation
    <xref target="JUNOS-routing-properties" />.  It includes a completely
    worked example on "Removing the Class E Prefix on Martian Addresses".</t>

    <t>Arista switches running EOS 4.25.2F (from February 2021),
    and later releases, include the command "ipv4 routable 240.0.0.0/4"
    which enables the use of 240/4 addresses on interfaces and in
    packet routing.  The default is to disable this ability.
    <xref target="Arista-user-manual" /></t>

    <t>The Belkin AX3200 router (with firmware 1.0.01 build 101415 Oct 14, 2020)
    cannot use addresses from 240/4 locally, but is happy to route packets
    to such addresses elsewhere in the Internet.</t>

    <t>A <xref target="Cox">2024 presentation by Ben Cartwright-Cox</xref>
    reported on his experiments on support for 240/4 in several router
    environments (including BGP). According to Cartwright-Cox, RouterOS 7.7
    and IOS XR fully support 240/4.  Arista(v)EOS 4.29.0.2F allows opting
    in to 240/4 support and is believed to work when this is enabled,
    although it could not be fully tested in Cartwright-Cox's virtualized
    environment.  JunOS 22.X similarly allows opting in to 240/4 support,
    and can properly use and route addresses in this range statically and
    dynamically, although its built-in DHCP server is not willing to assign
    them to other devices on a locally attached network.  Finally,
    EXOS 31.1.1.6-1, IOS XE, Nokia SR-OS, and Huawei VRP generally did
    not support using or routing 240/4, while the latter three exhibited an
    apparent bug in which they would ostensibly accept dynamic routes within
    240/4 but not actually apply these into the RIB or FIB.
    </t>
    <t>
    Huawei VRP 5.160 (released 2014) does not allow addresses from the 240/4 range to
    be manually applied to a router interface.
    </t>
    </section>

    <section numbered="true" toc="default"><name>DHCP implementations</name>

    <t>Support for 240/4 addressing may be typical of many DHCP
    implementations (because the 240/4 address assignment special case
    has often been handled at the kernel level). If the underlying
    operating system supports 240/4 assignment to an interface, the
    final official ISC DHCP release (4.4.3) supports 240/4 allocation as
    both client and server, as do Busybox DHCP udhcpc/udhcpd (release
    1.1.15), and ISC Kea (which currently includes only a DHCP server
    implementation).</t>

    </section>

    <section numbered="true" toc="default"><name>Other implementations</name>
    <t>Routing of subnets in the 240/4 range is fully supported by the Babel
       routing protocol and by its main implementation, as of 2020 (or earlier).
       </t>
    <t>Routing of subnets in the 240/4 range is supported by the Gobgp routing
       daemon, as of release 3.0.0 in 2022-03 (or earlier).</t>
    <t>Routing of subnets in the 240/4 range is supported by the BIRD routing
       daemon, as of release 2.0.10 in 2022-06.</t>
    </section>
    <section numbered="true" toc="default"><name>Internet of Things</name>
    <t>Popular embedded Internet-of-Things environments such as RIOT and FreeRTOS
    already support 240/4 as unicast.</t>
    </section>
   </section>
 </back>
</rfc>
