| < draft-baker-6man-multi-homed-host-02.txt | draft-baker-6man-multi-homed-host-03.txt > | |||
|---|---|---|---|---|
| IPv6 Maintenance F. Baker | IPv6 Maintenance F. Baker | |||
| Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
| Intended status: Standards Track B. Carpenter | Updates: 4861 (if approved) B. Carpenter | |||
| Expires: February 22, 2016 Univ. of Auckland | Intended status: Standards Track Univ. of Auckland | |||
| August 21, 2015 | Expires: March 6, 2016 September 3, 2015 | |||
| Host routing in a multi-prefix network | Host routing in a multi-prefix network | |||
| draft-baker-6man-multi-homed-host-02 | draft-baker-6man-multi-homed-host-03 | |||
| Abstract | Abstract | |||
| This note describes expected host behavior in a network that has more | This note describes expected IPv6 host behavior in a network that has | |||
| than one prefix, each allocated by an upstream network that | more than one prefix, each allocated by an upstream network that | |||
| implements BCP 38 filtering, when the host has multiple routers to | implements BCP 38 ingress filtering, when the host has multiple | |||
| choose from. | routers to choose from. It also applies to other scenarios such as | |||
| the usage of stateful firewalls that effectively act as address-based | ||||
| filters. | ||||
| This may interact with source address selection in a given | This host behavior may interact with source address selection in a | |||
| implementation, but logically follows it - given that the network or | given implementation, but logically follows it. Given that the | |||
| host is or appears to be multihomed with PA addresses, the host has | network or host is, or appears to be, multihomed with multiple | |||
| elected to use source address in a given prefix, and some but not all | provider-allocated addresses, that the host has elected to use a | |||
| neighboring routers are advertising that prefix in their RA PIOs, to | source address in a given prefix, and that some but not all | |||
| which router should a host present its transmission? | neighboring routers are advertising that prefix in their Router | |||
| Advertisement Prefix Information Options, this document specifies to | ||||
| which router a host should present its transmission. It updates RFC | ||||
| 4861. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on February 22, 2016. | This Internet-Draft will expire on March 6, 2016. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2015 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction and Applicability . . . . . . . . . . . . . . . 2 | |||
| 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 | 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Sending context expected by the host . . . . . . . . . . . . 3 | 2. Sending context expected by the host . . . . . . . . . . . . 3 | |||
| 2.1. Expectations the host has of the network . . . . . . . . 3 | 2.1. Expectations the host has of the network . . . . . . . . 3 | |||
| 2.2. Expectations of multihomed networks . . . . . . . . . . . 4 | 2.2. Expectations of multihomed networks . . . . . . . . . . . 5 | |||
| 3. Reasonable expectations of the host . . . . . . . . . . . . . 4 | 3. Reasonable expectations of the host . . . . . . . . . . . . . 5 | |||
| 3.1. Default Router Selection . . . . . . . . . . . . . . . . 5 | ||||
| 3.2. Source Address Selection . . . . . . . . . . . . . . . . 5 | ||||
| 3.3. Redirects . . . . . . . . . . . . . . . . . . . . . . . . 6 | ||||
| 3.4. History . . . . . . . . . . . . . . . . . . . . . . . . . 6 | ||||
| 4. Residual issues . . . . . . . . . . . . . . . . . . . . . . . 6 | 4. Residual issues . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 6 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | |||
| 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6 | 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 8.1. Normative References . . . . . . . . . . . . . . . . . . 7 | 8.1. Normative References . . . . . . . . . . . . . . . . . . 7 | |||
| 8.2. Informative References . . . . . . . . . . . . . . . . . 7 | 8.2. Informative References . . . . . . . . . . . . . . . . . 8 | |||
| Appendix A. Change Log . . . . . . . . . . . . . . . . . . . . . 8 | Appendix A. Change Log . . . . . . . . . . . . . . . . . . . . . 9 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 1. Introduction | 1. Introduction and Applicability | |||
| This note describes the expected behavior of an IPv6 [RFC2460] host | This note describes the expected behavior of an IPv6 [RFC2460] host | |||
| in a network that has more than one prefix, each allocated by an | in a network that has more than one prefix, each allocated by an | |||
| upstream network that implements BCP 38 [RFC2827] filtering, and in | upstream network that implements BCP 38 [RFC2827] ingress filtering, | |||
| which the host is presented with a choice of routers. It expects | and in which the host is presented with a choice of routers. It | |||
| that the network will implement some form of egress routing, so that | expects that the network will implement some form of egress routing, | |||
| packets sent to a host outside the local network from a given ISP's | so that packets sent to a host outside the local network from a given | |||
| prefix will go to that ISP. If the packet is sent to the wrong | ISP's prefix will go to that ISP. If the packet is sent to the wrong | |||
| egress, it is liable to be discarded by the BCP 38 filter. However, | egress, it is liable to be discarded by the BCP 38 filter. However, | |||
| the mechanics of egress routing once the packet leaves the host are | the mechanics of egress routing once the packet leaves the host are | |||
| out of scope. The question here is how the host interacts with that | out of scope. The question here is how the host interacts with that | |||
| network. | network. | |||
| BCP 38 filtering by ISPs is not the only scenario where such behavior | ||||
| is valuable. The combination of existing recommendations for home | ||||
| gateways [RFC6092] [RFC7084] can also result in such filtering. | ||||
| Another case is when the connections to the upstream networks include | ||||
| stateful firewalls, such that return packets in a stream will be | ||||
| discarded if they do not return via the firewall that created state | ||||
| for the outgoing packets. A similar cause of such discards is | ||||
| unicast reverse path forwarding (uRPF) [RFC3704]. | ||||
| In this document, the term "filter" is used for simplicity to cover | ||||
| all such cases. In any case, one cannot assume the host to be aware | ||||
| whether an ingress filter, a stateful firewall, or any other type of | ||||
| filter is in place. Therefore, the only safe solution is to | ||||
| implement the features defined in this document. | ||||
| Note that, apart from ensuring that a message with a given source | Note that, apart from ensuring that a message with a given source | |||
| address is given to a first-hop router that appears to know about the | address is given to a first-hop router that appears to know about the | |||
| prefix in question, this specification provides no new guidance over | prefix in question, this specification is consistent with [RFC4861]. | |||
| that in [RFC4861]. | Nevertheless, implementers of Sections 5.2, 6.2.3, 6.3.4 and 8 of RFC | |||
| 4861 will need to extend their implementations accordingly. This | ||||
| specification is fully consistent with [RFC6724] and implementers | ||||
| will need to add support for its Rule 5.5. Hosts that do not support | ||||
| these features may fail to communicate in the presence of filters as | ||||
| described above. | ||||
| 1.1. Requirements Language | 1.1. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| 2. Sending context expected by the host | 2. Sending context expected by the host | |||
| 2.1. Expectations the host has of the network | 2.1. Expectations the host has of the network | |||
| skipping to change at page 4, line 26 ¶ | skipping to change at page 4, line 39 ¶ | |||
| +----+----+ +--------+ | +----+----+ +--------+ | |||
| | Host | | | Host | | |||
| +---------+ | +---------+ | |||
| Common LAN Case Disjoint LAN Case | Common LAN Case Disjoint LAN Case | |||
| (Multihomed Network) (Multihomed Host) | (Multihomed Network) (Multihomed Host) | |||
| Figure 1: Two simple networks | Figure 1: Two simple networks | |||
| If there is no routing protocol among those routers, there is no | If there is no routing protocol among those routers, there is no | |||
| mechanism by which packets can be deterministically forwarded between | mechanism by which packets can be deterministically forwarded between | |||
| the routers (as described in BCP 84 [RFC3704]) in order to avoid BCP | the routers (as described in BCP 84 [RFC3704]) in order to avoid | |||
| 38 filters. Even if there was routing, it would result in an | filters. Even if there was routing, it would result in an indirect | |||
| indirect route, rather than a direct route originating with the host; | route, rather than a direct route originating with the host; this is | |||
| this is not "wrong", but can be inefficient. Therefore the host | not "wrong", but can be inefficient. Therefore the host would do | |||
| would do well to select the appropriate router itself. | well to select the appropriate router itself. | |||
| Since the host derives fundamental default routing information from | Since the host derives fundamental default routing information from | |||
| the Router Advertisement, this implies that, in any network with | the Router Advertisement, this implies that, in any network with | |||
| hosts using multiple prefixes, each prefix SHOULD be advertised via a | hosts using multiple prefixes, each prefix SHOULD be advertised via a | |||
| Prefix Information Option (PIO) [RFC4861] by one of the attached | Prefix Information Option (PIO) [RFC4861] by one of the attached | |||
| routers, even if addresses are being assigned using DHCPv6. A router | routers, even if addresses are being assigned using DHCPv6. A router | |||
| that advertises a prefix indicates that it is able to appropriately | that advertises a prefix indicates that it is able to appropriately | |||
| route packets with source addresses within that prefix, regardless of | route packets with source addresses within that prefix, regardless of | |||
| the setting of the L and A flags in the PIO. In some circumstances | the setting of the L and A flags in the PIO. In some circumstances | |||
| both L and A might be zero. | both L and A might be zero. | |||
| Although this does not violate the existing standard [RFC4861], such | ||||
| a PIO has not previously been common, and it is possible that | ||||
| existing host implementations simply ignore such a PIO or that a | ||||
| router implementation rejects such a PIO as a configuration error. | ||||
| Newer implementations that support this mechanism will need to be | ||||
| updated accordingly: a host SHOULD NOT ignore a PIO simply because | ||||
| both L and A flags are cleared; a router SHOULD be able to send such | ||||
| a PIO. | ||||
| 2.2. Expectations of multihomed networks | 2.2. Expectations of multihomed networks | |||
| The direct implication of Section 2.1 is that routing protocols used | The direct implication of Section 2.1 is that routing protocols used | |||
| in multihomed networks SHOULD be capable of source-prefix based | in multihomed networks SHOULD be capable of source-prefix based | |||
| egress routing, and that multihomed networks SHOULD deploy them. | egress routing, and that multihomed networks SHOULD deploy them. | |||
| 3. Reasonable expectations of the host | 3. Reasonable expectations of the host | |||
| Modern hosts maintain a fair bit of history, in terms of what has | 3.1. Default Router Selection | |||
| historically worked or not worked for a given address or prefix and | ||||
| in some cases the effective window and MSS values for TCP or other | ||||
| protocols. This includes a next hop address for use when a packet is | ||||
| sent to the indicated address. | ||||
| When a host makes a successful exchange with a remote destination | ||||
| using a particular source address, and the host has received a PIO | ||||
| that matches that source address in an RA, then the host SHOULD | ||||
| include the prefix in such history, whatever the setting of the L and | ||||
| A flags in the PIO. On subsequent attempts to communicate with that | ||||
| destination, if it has an address in that prefix at that time, a host | ||||
| MAY use an address in the remembered prefix for the session. | ||||
| Default Router Selection is modified as follows: A host SHOULD select | Default Router Selection is modified as follows: A host SHOULD select | |||
| default routers for each prefix it is assigned an address in. | default routers for each prefix it is assigned an address in. | |||
| Routers that have advertised the prefix in its Router Advertisement | Routers that have advertised the prefix in its Router Advertisement | |||
| message SHOULD be preferred over routers that do not advertise the | message SHOULD be preferred over routers that do not advertise the | |||
| prefix. | prefix. | |||
| As a result of doing so, when a host sends a packet using a source | As a result of doing so, when a host sends a packet using a source | |||
| address in one of those prefixes and has no history directing it | address in one of those prefixes and has no history directing it | |||
| otherwise, it SHOULD send it to the indicated default router. In the | otherwise, it SHOULD send it to the indicated default router. In the | |||
| skipping to change at page 5, line 36 ¶ | skipping to change at page 5, line 47 ¶ | |||
| This will also apply in more complex networks, even when more than | This will also apply in more complex networks, even when more than | |||
| one physical or virtual interface is involved. | one physical or virtual interface is involved. | |||
| In more complex cases, wherein routers advertise RAs for multiple | In more complex cases, wherein routers advertise RAs for multiple | |||
| prefixes whether or not they have direct or isolated upstream | prefixes whether or not they have direct or isolated upstream | |||
| connectivity, the host is dependent on the routing system already. | connectivity, the host is dependent on the routing system already. | |||
| If the host gives the packet to a router advertising its source | If the host gives the packet to a router advertising its source | |||
| prefix, it should be able to depend on the router to do the right | prefix, it should be able to depend on the router to do the right | |||
| thing. | thing. | |||
| 3.2. Source Address Selection | ||||
| There is an interaction with Default Address Selection [RFC6724]. | There is an interaction with Default Address Selection [RFC6724]. | |||
| Rule 5.5 of that specification states that the source address used to | Rule 5.5 of that specification states that the source address used to | |||
| send to a given destination address should if possible be chosen from | send to a given destination address should if possible be chosen from | |||
| a prefix known to be advertised by the first-hop router for that | a prefix known to be advertised by the first-hop router for that | |||
| destination. This selection rule would be applicable in a host | destination. This selection rule would be applicable in a host | |||
| following the recommendation in the previous paragraph. | following the recommendation in the previous paragraph. | |||
| 3.3. Redirects | ||||
| There is potential for adverse interaction with any off-link Redirect | There is potential for adverse interaction with any off-link Redirect | |||
| (Redirect for a GUA destination that is not on-link) message sent by | (Redirect for a GUA destination that is not on-link) message sent by | |||
| a router in accordance with Section 8 of [RFC4861]. Hosts SHOULD | a router in accordance with Section 8 of [RFC4861]. Hosts SHOULD | |||
| apply off-link redirects only for the specific pair of source and | apply off-link redirects only for the specific pair of source and | |||
| destination addresses concerned, so the host's Destination Cache may | destination addresses concerned, so the host's Destination Cache may | |||
| need to contain appropriate source-specific entries. | need to contain appropriate source-specific entries. | |||
| 3.4. History | ||||
| Some modern hosts maintain history, in terms of what has previously | ||||
| worked or not worked for a given address or prefix and in some cases | ||||
| the effective window and MSS values for TCP or other protocols. This | ||||
| might include a next hop address for use when a packet is sent to the | ||||
| indicated address. | ||||
| When such a host makes a successful exchange with a remote | ||||
| destination using a particular address pair, and the host has | ||||
| previously received a PIO that matches the source address, then the | ||||
| host SHOULD include the prefix in such history, whatever the setting | ||||
| of the L and A flags in the PIO. On subsequent attempts to | ||||
| communicate with that destination, if it has an address in that | ||||
| prefix at that time, a host MAY use an address in the remembered | ||||
| prefix for the session. | ||||
| 4. Residual issues | 4. Residual issues | |||
| In a network where routers on a link run a routing protocol and are | Consider a network where routers on a link run a routing protocol and | |||
| configured with the same information. That is on each link all | are configured with the same information. Thus, on each link all | |||
| routers advertise all prefixes on the link, the assumption that | routers advertise all prefixes on the link. The assumption that | |||
| packets will be forwarded to the appropriate egress by the local | packets will be forwarded to the appropriate egress by the local | |||
| routing system might cause at least one extra hop in the local | routing system might cause at least one extra hop in the local | |||
| network (from the host to the wrong router, and from there to another | network (from the host to the wrong router, and from there to another | |||
| router on the same link). | router on the same link). | |||
| In a slightly more complex situation such as the disjoint LAN case of | In a slightly more complex situation such as the disjoint LAN case of | |||
| Figure 1, which happens to be one of the authors' home plus corporate | Figure 1, which happens to be one of the authors' home plus corporate | |||
| home-office configuration, the two upstream routers might be on | home-office configuration, the two upstream routers might be on | |||
| different LANs and therefore different subnets (e.g., the host is | different LANs and therefore different subnets (e.g., the host is | |||
| itself multi-homed). In that case, there is no way for the "wrong" | itself multi-homed). In that case, there is no way for the "wrong" | |||
| skipping to change at page 6, line 34 ¶ | skipping to change at page 7, line 16 ¶ | |||
| responsibility to memorize and select the best first-hop as described | responsibility to memorize and select the best first-hop as described | |||
| in Section 3. | in Section 3. | |||
| 5. IANA Considerations | 5. IANA Considerations | |||
| This memo asks the IANA for no new parameters. | This memo asks the IANA for no new parameters. | |||
| 6. Security Considerations | 6. Security Considerations | |||
| This document does not create any new security or privacy exposures. | This document does not create any new security or privacy exposures. | |||
| It is intended to avoid connectivity issues in the presence of BCP 38 | ||||
| ingress filters or stateful firewalls combined with multihoming. | ||||
| There might be a small privacy improvement, however: with the current | There might be a small privacy improvement, however: with the current | |||
| practice, a multihomed host that sends packets with the wrong address | practice, a multihomed host that sends packets with the wrong address | |||
| to an upstream router or network discloses the prefix of one upstream | to an upstream router or network discloses the prefix of one upstream | |||
| to the other upstream network. This practice reduces the probability | to the other upstream network. This practice reduces the probability | |||
| of that occurrence. | of that occurrence. | |||
| 7. Acknowledgements | 7. Acknowledgements | |||
| Comments were received from Jinmei Tatuya and Ole Troan, who have | Comments were received from Jinmei Tatuya and Ole Troan, who have | |||
| suggested important text, plus Mikael Abrahamsson, Steven Barth, | suggested important text, plus Mikael Abrahamsson, Steven Barth, | |||
| Juliusz Chroboczek, Toerless Eckert, Pierre Pfister, Mark Smith, and | Juliusz Chroboczek, Toerless Eckert, David Farmer, Pierre Pfister, | |||
| Dusan Mudric. | Mark Smith, Dusan Mudric, and James Woodyatt. | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/ | Requirement Levels", BCP 14, RFC 2119, | |||
| RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <http://www.rfc-editor.org/info/rfc2119>. | <http://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, | (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, | |||
| December 1998, <http://www.rfc-editor.org/info/rfc2460>. | December 1998, <http://www.rfc-editor.org/info/rfc2460>. | |||
| [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | ||||
| "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | ||||
| DOI 10.17487/RFC4861, September 2007, | ||||
| <http://www.rfc-editor.org/info/rfc4861>. | ||||
| [RFC6724] Thaler, D., Ed., Draves, R., Matsumoto, A., and T. Chown, | ||||
| "Default Address Selection for Internet Protocol Version 6 | ||||
| (IPv6)", RFC 6724, DOI 10.17487/RFC6724, September 2012, | ||||
| <http://www.rfc-editor.org/info/rfc6724>. | ||||
| 8.2. Informative References | 8.2. Informative References | |||
| [RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: | [RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: | |||
| Defeating Denial of Service Attacks which employ IP Source | Defeating Denial of Service Attacks which employ IP Source | |||
| Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827, | Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827, | |||
| May 2000, <http://www.rfc-editor.org/info/rfc2827>. | May 2000, <http://www.rfc-editor.org/info/rfc2827>. | |||
| [RFC3315] Droms, R., Ed., Bound, J., Volz, B., Lemon, T., Perkins, | [RFC3315] Droms, R., Ed., Bound, J., Volz, B., Lemon, T., Perkins, | |||
| C., and M. Carney, "Dynamic Host Configuration Protocol | C., and M. Carney, "Dynamic Host Configuration Protocol | |||
| for IPv6 (DHCPv6)", RFC 3315, DOI 10.17487/RFC3315, July | for IPv6 (DHCPv6)", RFC 3315, DOI 10.17487/RFC3315, July | |||
| 2003, <http://www.rfc-editor.org/info/rfc3315>. | 2003, <http://www.rfc-editor.org/info/rfc3315>. | |||
| [RFC3704] Baker, F. and P. Savola, "Ingress Filtering for Multihomed | [RFC3704] Baker, F. and P. Savola, "Ingress Filtering for Multihomed | |||
| Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March | Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March | |||
| 2004, <http://www.rfc-editor.org/info/rfc3704>. | 2004, <http://www.rfc-editor.org/info/rfc3704>. | |||
| [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | ||||
| "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | ||||
| DOI 10.17487/RFC4861, September 2007, | ||||
| <http://www.rfc-editor.org/info/rfc4861>. | ||||
| [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless | [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless | |||
| Address Autoconfiguration", RFC 4862, DOI 10.17487/ | Address Autoconfiguration", RFC 4862, | |||
| RFC4862, September 2007, | DOI 10.17487/RFC4862, September 2007, | |||
| <http://www.rfc-editor.org/info/rfc4862>. | <http://www.rfc-editor.org/info/rfc4862>. | |||
| [RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy | [RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy | |||
| Extensions for Stateless Address Autoconfiguration in | Extensions for Stateless Address Autoconfiguration in | |||
| IPv6", RFC 4941, DOI 10.17487/RFC4941, September 2007, | IPv6", RFC 4941, DOI 10.17487/RFC4941, September 2007, | |||
| <http://www.rfc-editor.org/info/rfc4941>. | <http://www.rfc-editor.org/info/rfc4941>. | |||
| [RFC6724] Thaler, D., Ed., Draves, R., Matsumoto, A., and T. Chown, | [RFC6092] Woodyatt, J., Ed., "Recommended Simple Security | |||
| "Default Address Selection for Internet Protocol Version 6 | Capabilities in Customer Premises Equipment (CPE) for | |||
| (IPv6)", RFC 6724, DOI 10.17487/RFC6724, September 2012, | Providing Residential IPv6 Internet Service", RFC 6092, | |||
| <http://www.rfc-editor.org/info/rfc6724>. | DOI 10.17487/RFC6092, January 2011, | |||
| <http://www.rfc-editor.org/info/rfc6092>. | ||||
| [RFC7084] Singh, H., Beebee, W., Donley, C., and B. Stark, "Basic | ||||
| Requirements for IPv6 Customer Edge Routers", RFC 7084, | ||||
| DOI 10.17487/RFC7084, November 2013, | ||||
| <http://www.rfc-editor.org/info/rfc7084>. | ||||
| [RFC7217] Gont, F., "A Method for Generating Semantically Opaque | [RFC7217] Gont, F., "A Method for Generating Semantically Opaque | |||
| Interface Identifiers with IPv6 Stateless Address | Interface Identifiers with IPv6 Stateless Address | |||
| Autoconfiguration (SLAAC)", RFC 7217, DOI 10.17487/ | Autoconfiguration (SLAAC)", RFC 7217, | |||
| RFC7217, April 2014, | DOI 10.17487/RFC7217, April 2014, | |||
| <http://www.rfc-editor.org/info/rfc7217>. | <http://www.rfc-editor.org/info/rfc7217>. | |||
| Appendix A. Change Log | Appendix A. Change Log | |||
| Initial Version: 2015-08-05 | Initial Version: 2015-08-05 | |||
| Version 01: Update text on PIOs, added text on Redirects, and | Version 01: Update text on PIOs, added text on Redirects, and | |||
| clarified the concept of a "simple" network, 2015-08-13. | clarified the concept of a "simple" network, 2015-08-13. | |||
| Version 02: Clarifications after WG discussions, 2015-08-19. | Version 02: Clarifications after WG discussions, 2015-08-19. | |||
| Version 03: More clarifications after more WG discussions, | ||||
| especially adding stateful firewalls, uRPF, and more precise | ||||
| discussion of RFC 4861, 2015-09-03. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Fred Baker | Fred Baker | |||
| Cisco Systems | Cisco Systems | |||
| Santa Barbara, California 93117 | Santa Barbara, California 93117 | |||
| USA | USA | |||
| Email: fred@cisco.com | Email: fred@cisco.com | |||
| Brian Carpenter | Brian Carpenter | |||
| End of changes. 30 change blocks. | ||||
| 71 lines changed or deleted | 136 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||