< draft-azinger-additional-private-ipv4-space-issues-04.txt   draft-azinger-additional-private-ipv4-space-issues-05.txt >
Network Working Group M. Azinger Network Working Group M. Azinger
Internet-Draft Frontier Communications Internet-Draft Frontier Communications
Intended status: Informational Corporation Intended status: Informational Corporation
Expires: October 19, 2010 L. Vegoda Expires: July 8, 2011 L. Vegoda
ICANN ICANN
April 17, 2010 January 4, 2011
Additional Private IPv4 Space Issues Issues Associated with Designating Additional Private IPv4 Address Space
draft-azinger-additional-private-ipv4-space-issues-04 draft-azinger-additional-private-ipv4-space-issues-05
Abstract Abstract
When a private network or internetwork grows very large it is When a private network or internetwork grows very large it is
sometimes not possible to address all interfaces using private IPv4 sometimes not possible to address all interfaces using private IPv4
address space because there are not enough addresses. This document address space because there are not enough addresses. This document
describes the problems faced by those networks, the available options describes the problems faced by those networks, the available options
and the issues involved in assigning a new block of private IPv4 and the issues involved in assigning a new block of private IPv4
address space. address space.
While this informational document does not make a recommendation for While this informational document does not make a recommendation for
action, it documents the issues surrounding the various options that action, it documents the issues surrounding the various options that
have been considered. have been considered.
Status of this Memo Status of this Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF), its areas, and its working groups. Note that
working documents as Internet-Drafts. The list of current Internet- other groups may also distribute working documents as Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 19, 2010. The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
Copyright Notice The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Copyright (c) 2010 IETF Trust and the persons identified as the This Internet-Draft will expire on July 8, 2011.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Large Networks . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Large Networks . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Network Address Translation . . . . . . . . . . . . . . . . . 3 3. Non-Unique Addresses . . . . . . . . . . . . . . . . . . . . . 3
3.1. Subscriber Use Network Address Translation . . . . . . . . 3
3.2. Carrier Grade Network Address Translation . . . . . . . . 4
4. Available Options . . . . . . . . . . . . . . . . . . . . . . 4 4. Available Options . . . . . . . . . . . . . . . . . . . . . . 4
4.1. Unique Globally Scoped IPv6 Unicast Addresses . . . . . . 4 4.1. IPv6 Options . . . . . . . . . . . . . . . . . . . . . . . 4
4.2. Unique Local IPv6 Unicast Addresses . . . . . . . . . . . 4 4.1.1. Unique Globally Scoped IPv6 Unicast Addresses . . . . 4
4.3. Address Transfers or Leases From Organizations with 4.1.2. Unique Local IPv6 Unicast Addresses . . . . . . . . . 4
Available Address Space . . . . . . . . . . . . . . . . . 4 4.2. IPv4 Options . . . . . . . . . . . . . . . . . . . . . . . 5
4.4. Using Unannounced Address Space Allocated to Another 4.2.1. Address Transfers or Leases From Organizations
Organization . . . . . . . . . . . . . . . . . . . . . . . 5 with Available Address Space . . . . . . . . . . . . . 5
4.5. Unique IPv4 Space Registered by an RIR . . . . . . . . . . 5 4.2.2. Using Unannounced Address Space Allocated to
Another Organization . . . . . . . . . . . . . . . . . 5
4.2.3. Unique IPv4 Space Registered by an RIR . . . . . . . . 6
5. Options and Consequences for Defining New Private Use Space . 6 5. Options and Consequences for Defining New Private Use Space . 6
5.1. Redefining Existing Unicast Space as Private Address 5.1. Redefining Existing Unicast Space as Private Address
Space . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Space . . . . . . . . . . . . . . . . . . . . . . . . . . 6
5.2. Unique IPv4 Space Shared by a Group of Operators . . . . . 7 5.2. Unique IPv4 Space Shared by a Group of Operators . . . . . 7
5.3. Potential Consequences of Not Redefining Existing 5.3. Potential Consequences of Not Redefining Existing
Unicast Space as Private Address Space . . . . . . . . . . 7 Unicast Space as Private Address Space . . . . . . . . . . 8
5.4. Redefining Future Use Space as Unicast Address Space . . . 7 5.4. Redefining Future Use Space as Unicast Address Space . . . 8
6. Security Considerations . . . . . . . . . . . . . . . . . . . 8 6. Security Considerations . . . . . . . . . . . . . . . . . . . 8
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 9
8.1. Normative References . . . . . . . . . . . . . . . . . . . 8 8.1. Normative References . . . . . . . . . . . . . . . . . . . 9
8.2. Informative References . . . . . . . . . . . . . . . . . . 8 8.2. Informative References . . . . . . . . . . . . . . . . . . 9
Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . . 10 Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11
1. Introduction 1. Introduction
[RFC1918] sets aside three blocks of IPv4 address space for use in [RFC1918] sets aside three blocks of IPv4 address space for use in
private networks: 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8. private networks: 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8.
These blocks can be used simultaneously in multiple, separately These blocks can be used simultaneously in multiple, separately
managed networks without registration or coordination with IANA or managed networks without registration or coordination with IANA or
any Internet registry. Very large networks can find that they need any Internet registry. Very large networks can find that they need
to connect more interfaces than the number of addresses available in to number more device interfaces than there are available addresses
these three ranges. It has occasionally been suggested that in these three ranges. It has occasionally been suggested that
additional private IPv4 address space should be reserved for use by additional private IPv4 address space should be reserved for use by
these networks. Although such an action might address some of the these networks. Although such an action might address some of the
needs for these very large network operators it is not without needs for these very large network operators it is not without
consequences, particularly as we near the date when the IANA free consequences, particularly as we near the date when the IANA free
pool will be fully allocated. pool will be fully allocated.
2. Large Networks 2. Large Networks
The main categories of very large networks using private address The main categories of very large networks using private address
space are: cable operators, wireless (cell phone) operators, private space are: cable operators, wireless (cell phone) operators, private
internets and VPN service providers. In the case of the first two internets and VPN service providers. In the case of the first two
categories, the complete address space reserved in [RFC1918] tends to categories, the complete address space reserved in [RFC1918] tends to
be used by a single organization. In the case of private internets be used by a single organization. In the case of private internets
and VPN service providers there are multiple independently managed and VPN service providers there are multiple independently managed
and operated networks and the difficulty is in avoiding address and operated networks and the difficulty is in avoiding address
clashes. clashes.
3. Network Address Translation 3. Non-Unique Addresses
3.1. Subscriber Use Network Address Translation
The address space set aside in [RFC1918] is a finite resource which The address space set aside in [RFC1918] is a finite resource which
can be used to provide limited Internet access via Network Address can be used to provide limited Internet access via Network Address
Translation (NAT). A discussion of the advantages and disadvantages Translation (NAT). A discussion of the advantages and disadvantages
of NATs is outside the scope of this document. Nonetheless, it must of NATs is outside the scope of this document but a an analysis of
be acknowledged that NAT is adequate in some situations and not in the advantages, disadvantages and architectural implications can be
others. For instance, it is often technically feasible to use NAT or found in [RFC2993]. Nonetheless, it must be acknowledged that NAT is
even multiple layers of NAT within the networks operated by adequate in some situations and not in others. For instance, it
residential users or corporations where peer to peer communication is might technically feasible to use NAT or even multiple layers of NAT
not needed. Where true peer to peer communication is needed or where within the networks operated by residential users or corporations
services or applications do not work properly behind NAT, globally where only limited Internet access is required. A more detailed
unique address space is required. In other cases, NAT traversal analysis can be found in [RFC3022]. Where true peer to peer
techniques facilitate peer-to-peer like communication for devices communication is needed or where services or applications do not work
behind NATs. properly behind NAT, globally unique address space is required. In
other cases, NAT traversal techniques facilitate peer-to-peer like
communication for devices behind NATs.
In many cases it is possible to use multiple layers of NAT to re-use In many cases it is possible to use multiple layers of NAT to re-use
parts of the address space defined in [RFC1918]. It is not always parts of the address space defined in [RFC1918]. It is not always
possible to rely on CPE devices using any particular range, however. possible to rely on CPE devices using any particular range, however.
In some cases this means that CPE devices can use unallocated address In some cases this means that unorthodox workarounds including
space or address space allocated to other network operators. In assigning CPE devices unallocated address space or address space
other cases, organizations choose to operate multiple separate allocated to other network operators are feasible. In other cases,
routing domains to allow them to re-use the same private address organizations choose to operate multiple separate routing domains to
ranges in multiple contexts. One consequence of this is the added allow them to re-use the same private address ranges in multiple
complexity involved in identifying which system is referred to when contexts. One consequence of this is the added complexity involved
an IP address is identified in a log or management systems. in identifying which system is referred to when an IP address is
identified in a log or management systems.
3.2. Carrier Grade Network Address Translation
Another option is to share one address across multiple interfaces and Another option is to share one address across multiple interfaces and
in some cases, subscribers. This model breaks the classical model in some cases, subscribers. This model breaks the classical model
used for logging address assignments and creates some risks used for logging address assignments and creates significant risks
[CLAYTON]. This concept is more fully explored in [FORD]. and additional burdens, as described in [CLAYTON] and more fully
discussed in [FORD] and is documented in [DS-LITE].
4. Available Options 4. Available Options
When a network operator has exhausted the private address space set When a network operator has exhausted the private address space set
aside in [RFC1918] but needs to continue operating a single routing aside in [RFC1918] but needs to continue operating a single routing
domain a number of options are available. These include: domain a number of options are available. These include:
4.1. Unique Globally Scoped IPv6 Unicast Addresses 4.1. IPv6 Options
Using unique, globally scoped IPv6 unicast addresses is the preferred 4.1.1. Unique Globally Scoped IPv6 Unicast Addresses
option as it removes any concerns about address scarcity. In some
cases implementing a new network protocol on a very large network Using unique, globally scoped IPv6 unicast addresses is the best
takes more time than is available, based on network growth and the permanent solution as it removes any concerns about address scarcity
within the next few decades. Implementing IPv6 is a major endeavor
for service providers with millions of consumer customers and is
likely to take considerable effort and time. In some cases
implementing a new network protocol on a very large network takes
more time than is available, based on network growth and the
proportion of private space that has already been used. In these proportion of private space that has already been used. In these
cases, there is a call for additional private address space that can cases, there is a call for additional private address space that can
be shared by all network operators. [DAVIES] makes one such case. be shared by all network operators. [DAVIES] makes one such case.
4.2. Unique Local IPv6 Unicast Addresses 4.1.2. Unique Local IPv6 Unicast Addresses
Using the unique, local IPv6 unicast addresses defined in [RFC4193] Using the unique, local IPv6 unicast addresses defined in [RFC4193]
is another approach and does not require coordination with an is another approach and does not require coordination with an
Internet registry. Although the addresses defined in [RFC4193] are Internet registry. Although the addresses defined in [RFC4193] are
probabilistically unique, network operators on private internets and probabilistically unique, network operators on private internets and
those providing VPN services might not want to use them because there those providing VPN services might not want to use them because there
is a very low probability of non-unique locally assigned global IDs is a very low probability of non-unique locally assigned global IDs
being generated by the algorithm. Also, in the case of private being generated by the algorithm. Also, in the case of private
internets, it can be very challenging to coordinate the introduction internets, it can be very challenging to coordinate the introduction
of a new network protocol to support the internet's continued growth. of a new network protocol to support the internet's continued growth.
4.3. Address Transfers or Leases From Organizations with Available 4.2. IPv4 Options
Address Space
4.2.1. Address Transfers or Leases From Organizations with Available
Address Space
The Regional Internet Registry (RIR) communities have recently been The Regional Internet Registry (RIR) communities have recently been
developing policies to allow organizations with available address developing policies to allow organizations with available address
space to transfer such designated space to other organizations space to transfer such designated space to other organizations
[RIR-POLICY]. In other cases, leases might be arranged. This [RIR-POLICY]. In other cases, leases might be arranged. This
approach is only viable for operators of very large networks if approach is only viable for operators of very large networks if
enough address space is made available for transfer or lease and if enough address space is made available for transfer or lease and if
the very large networks are able to pay the costs of these transfers. the very large networks are able to pay the costs of these transfers.
It is not possible to know how much address space will become It is not possible to know how much address space will become
available in this way, when it will be available and how much it will available in this way, when it will be available and how much it will
cost. However, it is unlikely to become available in large cost. However, it is unlikely to become available in large
contiguous blocks and this would add to the network managment burden contiguous blocks and this would add to the network management burden
for the operator. For these reasons, address transfers will not be for the operator as a significant number of small prefixes would
an attractive proposition to many large network operators. Leases inflate the size of the operators routing table at a time when it is
might not be attractive to some organizations if both parties cannot also adding an IPv6 routing table. These reasons will make address
agree a suitable length of time. Also, the lessor might worry about transfers a less attractive proposition to many large network
its own unanticipated needs for additional IPv4 address space. operators. Leases might not be attractive to some organizations if
both parties cannot agree a suitable length of time. Also, the
lessor might worry about its own unanticipated needs for additional
IPv4 address space.
4.4. Using Unannounced Address Space Allocated to Another Organization 4.2.2. Using Unannounced Address Space Allocated to Another
Organization
Some network operators have considered using IP address space which Some network operators have considered using IP address space which
is allocated to another organization but is not publicly visible in is allocated to another organization but is not publicly visible in
BGP routing tables. This option is very strongly discouraged as the BGP routing tables. This option is very strongly discouraged as the
fact that an address block is not visible from one view does not mean fact that an address block is not visible from one view does not mean
that it is not visible from another. Furthermore, address usage that it is not visible from another. Furthermore, address usage
tends to leak beyond private network borders in e-mail headers, DNS tends to leak beyond private network borders in e-mail headers, DNS
queries, traceroute output and other ways. The ambiguity this causes queries, traceroute output and other ways. The ambiguity this causes
is problematic for multiple organizations. This issue is addressed is problematic for multiple organizations. This issue is discussed
in [RFC3879], section 2.3. in [RFC3879], section 2.3.
It is also possible that the registrant of the address block might It is also possible that the registrant of the address block might
want to increase its visibility to other networks in the future, want to increase its visibility to other networks in the future,
causing problems for anyone using it unofficially. In some cases causing problems for anyone using it unofficially. In some cases
there might also be legal risks involved in using address space there might also be legal risks involved in using address space
officially allocated to another organization. officially allocated to another organization.
Where this has happened in the past it has caused operational Where this has happened in the past it has caused operational
problems [FASTWEB]. problems [FASTWEB].
4.5. Unique IPv4 Space Registered by an RIR 4.2.3. Unique IPv4 Space Registered by an RIR
The policy framework shared by the RIRs does not discriminate based RIRs policies allow network operators to receive unique IP addresses
on what an address is used to do, just on how efficiently the for use on internal networks. Further, network operators are not
assigned addresses are used. Unique IPv4 addresses registered by an required to have already exhausted the private address space set
RIR are potentially available to organizations whose networks have aside in [RFC1918]. Nonetheless, network operators are naturally
used all the addresses set aside in [RFC1918]. Nonetheless, network disinclined to request unique IPv4 addresses for the private areas of
operators are naturally disinclined to request unique IPv4 addresses their networks as using addresses in this way means they are not
for a purpose that could be met with private addresses were it not available for use by new Internet user connections.
for the size of the network because addresses assigned in this way
are not available for anyone else to use and so their registration
denies them to new entrants, including potential customers.
It is likely to become more difficult for network operators to obtain It is likely to become more difficult for network operators to obtain
large blocks of unique address space as we approach the point where large blocks of unique address space as we approach the point where
all IPv4 unicast /8s have been allocated. Several RIRs already have all IPv4 unicast /8s have been allocated. Several RIRs already have
policies how to allocate from their last /8 [RIR-POLICY-FINAL-8] and policies how to allocate from their last /8 [RIR-POLICY-FINAL-8] and
there have been policy discussions that would reduce the maximum there have been policy discussions that would reduce the maximum
allocation size available to network operators [MAX-ALLOC] or would allocation size available to network operators [MAX-ALLOC] or would
reduce the period of need for which the RIR can allocate reduce the period of need for which the RIR can allocate
[SHORTER-PERIODS]. [SHORTER-PERIODS].
5. Options and Consequences for Defining New Private Use Space 5. Options and Consequences for Defining New Private Use Space
5.1. Redefining Existing Unicast Space as Private Address Space 5.1. Redefining Existing Unicast Space as Private Address Space
It is be possible to re-designate a portion of the current global It is possible to re-designate a portion of the current global
unicast IPv4 address space as private unicast address space. Doing unicast IPv4 address space as private unicast address space. Doing
this could benefit a number of operators of large network for the this could benefit a number of operators of large network for the
short period before they complete their IPv6 roll-out. However, this short period before they complete their IPv6 roll-out. However, this
benefit incurs a cost by reducing the pool of global unicast benefit incurs a cost by reducing the pool of global unicast
addresses available to users in general. addresses available to users in general.
When considering re-designating a portion of the current global When discussing re-designating a portion of the current global
unicast IPv4 address space as private unicast address space it is unicast IPv4 address space as private unicast address space it is
important to consider how much space would be used and for how long important to consider how much space would be used and for how long
it would be sufficient. Not all of the large networks making full it would be sufficient. Not all of the large networks making full
use of the space defined in [RFC1918] would have their needs met with use of the space defined in [RFC1918] would have their needs met with
a single /8. In 2005, [HAIN] suggested reserving three /8s for this a single /8. In 2005, [HAIN] suggested reserving three /8s for this
purpose while in 2009 [DAVIES] suggested a single /10 would be purpose while in 2009 [DAVIES] suggested a single /10 would be
sufficient. There does not seem to be a consensus for a particular sufficient. There does not seem to be a consensus for a particular
prefix length nor an agreed basis for deciding what is sufficient. prefix length nor an agreed basis for deciding what is sufficient.
The problem is exacerbated by the continually changing needs of ever The problem is exacerbated by the continually changing needs of ever
expanding networks. expanding networks.
skipping to change at page 8, line 28 skipping to change at page 9, line 4
6. Security Considerations 6. Security Considerations
This document has no security implications. This document has no security implications.
7. IANA Considerations 7. IANA Considerations
This document makes no request of IANA. This document makes no request of IANA.
8. References 8. References
8.1. Normative References 8.1. Normative References
[RFC1918] Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and [RFC1918] Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and
E. Lear, "Address Allocation for Private Internets", E. Lear, "Address Allocation for Private Internets",
BCP 5, RFC 1918, February 1996. BCP 5, RFC 1918, February 1996.
[RFC2860] Carpenter, B., Baker, F., and M. Roberts, "Memorandum of [RFC2993] Hain, T., "Architectural Implications of NAT", RFC 2993,
Understanding Concerning the Technical Work of the November 2000.
Internet Assigned Numbers Authority", RFC 2860, June 2000.
[RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network
Address Translator (Traditional NAT)", RFC 3022,
January 2001.
[RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast [RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast
Addresses", RFC 4193, October 2005. Addresses", RFC 4193, October 2005.
8.2. Informative References 8.2. Informative References
[RFC3879] Huitema, C. and B. Carpenter, "Deprecating Site Local [RFC3879] Huitema, C. and B. Carpenter, "Deprecating Site Local
Addresses", RFC 3879, September 2004. Addresses", RFC 3879, September 2004.
[RFC4423] Moskowitz, R. and P. Nikander, "Host Identity Protocol [RFC4423] Moskowitz, R. and P. Nikander, "Host Identity Protocol
skipping to change at page 9, line 16 skipping to change at page 9, line 39
<http://www.anonet.org/>. <http://www.anonet.org/>.
[CLAYTON] Clayton, R., "Practical mobile Internet access [CLAYTON] Clayton, R., "Practical mobile Internet access
traceability", January 2010, <http:// traceability", January 2010, <http://
www.lightbluetouchpaper.org/2010/01/13/ www.lightbluetouchpaper.org/2010/01/13/
practical-mobile-internet-access-traceability/>. practical-mobile-internet-access-traceability/>.
[CYMRU] Greene, B., "The Bogon Reference", [CYMRU] Greene, B., "The Bogon Reference",
<http://www.team-cymru.org/Services/Bogons/>. <http://www.team-cymru.org/Services/Bogons/>.
[DAVIES] Davies, G. and C. Liljenstolpe, "Transitional non- [DAVIES] Davies, G. and C. Liljenstolpe, "Work in Progress:
conflicting reusable IPv4 address block", November 2009, < Transitional non-conflicting reusable IPv4 address block",
http://tools.ietf.org/html/ November 2009, <http://tools.ietf.org/html/
draft-davies-reusable-ipv4-address-block-00>. draft-davies-reusable-ipv4-address-block-00>.
[DS-LITE] Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Work in
Progress: Dual-Stack Lite Broadband Deployments Following
IPv4 Exhaustion", August 2010, <http://tools.ietf.org/
html/draft-ietf-softwire-dual-stack-lite-06>.
[FASTWEB] Aina, A., "41/8 announcement", May 2006, [FASTWEB] Aina, A., "41/8 announcement", May 2006,
<http://www.afnog.org/archives/2006-May/002117.html>. <http://www.afnog.org/archives/2006-May/002117.html>.
[FORD] Ford, M., Boucadair, M., Durand, A., Levis, P., and P. [FORD] Ford, M., Boucadair, M., Durand, A., Levis, P., and P.
Roberts, "Issues with IP Address Sharing", March 2010, <ht Roberts, "Work in Progress: Issues with IP Address
tp://tools.ietf.org/html/ Sharing", March 2010, <http://tools.ietf.org/html/
draft-ford-shared-addressing-issues-02>. draft-ford-shared-addressing-issues-02>.
[FULLER] Fuller, V., Lear, E., and D. Meyer, "Reclassifying 240/4 [FULLER] Fuller, V., Lear, E., and D. Meyer, "Work in Progress:
as usable unicast address space", March 2008, Reclassifying 240/4 as usable unicast address space",
March 2008,
<http://tools.ietf.org/html/draft-fuller-240space-02>. <http://tools.ietf.org/html/draft-fuller-240space-02>.
[HAIN] Hain, T., "Expanded Address Allocation for Private [HAIN] Hain, T., "Work in Progress: Expanded Address Allocation
Internets", January 2005, for Private Internets", January 2005,
<http://tools.ietf.org/html/draft-hain-1918bis-01>. <http://tools.ietf.org/html/draft-hain-1918bis-01>.
[LEWIS] Lewis, J., "This system has been setup for testing [LEWIS] Lewis, J., "This system has been setup for testing
purposes for 69/8 address space", March 2003, purposes for 69/8 address space", March 2003,
<http://69box.atlantic.net/>. <http://69box.atlantic.net/>.
[MAX-ALLOC] [MAX-ALLOC]
Spenceley, J. and J. Martin, "prop-070: Maximum IPv4 Spenceley, J. and J. Martin, "prop-070: Maximum IPv4
allocation size", January 2009, allocation size", January 2009,
<http://www.apnic.net/policy/proposals/prop-070>. <http://www.apnic.net/policy/proposals/prop-070>.
skipping to change at page 10, line 40 skipping to change at page 11, line 21
ipj_10-3/103_awkward.html>. ipj_10-3/103_awkward.html>.
[WESSELS] Wessels, D., "Searching for Evidence of Unallocated [WESSELS] Wessels, D., "Searching for Evidence of Unallocated
Address Space Usage in DITL 2008 Data", June 2008, <https: Address Space Usage in DITL 2008 Data", June 2008, <https:
//www.dns-oarc.net/files/dnsops-2008/ //www.dns-oarc.net/files/dnsops-2008/
Wessels-Unused-space.pdf>. Wessels-Unused-space.pdf>.
[WIANA] WIANA, "The Wireless Internet Assigned Numbers Authority", [WIANA] WIANA, "The Wireless Internet Assigned Numbers Authority",
<http://www.wiana.org/>. <http://www.wiana.org/>.
[WILSON] Wilson, P., Michaelson, G., and G. Huston, "Redesignation [WILSON] Wilson, P., Michaelson, G., and G. Huston, "Work in
of 240/4 from "Future Use" to "Private Use"", Progress: Redesignation of 240/4 from "Future Use" to
"Private Use"",
<http://tools.ietf.org/html/draft-wilson-class-e-02>. <http://tools.ietf.org/html/draft-wilson-class-e-02>.
Appendix A. Acknowledgments Appendix A. Acknowledgments
The authors would also like to thank Ron Bonica, Michelle Cotton, Lee The authors would also like to thank Ron Bonica, Michelle Cotton, Lee
Howard and Barbara Roseman for their assistance in early discussions Howard and Barbara Roseman for their assistance in early discussions
of this document and to Alex Bligh, Maria Blackmore, Ricardo Patara of this document and to Maria Blackmore, Alex Bligh, Mat Ford, Thomas
and Mat Ford for improvement suggestions. Narten, Ricardo Patara and for improvement suggestions.
Authors' Addresses Authors' Addresses
Marla Azinger Marla Azinger
Frontier Communications Corporation Frontier Communications Corporation
Vancouver, WA Vancouver, WA
United States of America United States of America
Email: marla.azinger@frontiercorp.com Email: marla.azinger@ftr.com
URI: http://www.frontiercorp.com/ URI: http://www.frontiercorp.com/
Leo Vegoda Leo Vegoda
Internet Corporation for Assigned Names and Numbers Internet Corporation for Assigned Names and Numbers
4676 Admiralty Way, Suite 330 4676 Admiralty Way, Suite 330
Marina del Rey, CA 90292 Marina del Rey, CA 90292
United States of America United States of America
Phone: +1-310-823-9358 Phone: +1-310-823-9358
Email: leo.vegoda@icann.org Email: leo.vegoda@icann.org
URI: http://www.iana.org/ URI: http://www.iana.org/
 End of changes. 40 change blocks. 
96 lines changed or deleted 129 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/