<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" consensus="true" docName="draft-ietf-opsec-v6-27" indexInclude="true" ipr="trust200902" number="9099" prepTime="2021-08-13T06:03:34" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-opsec-v6-27" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9099" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="OPsec IPv6">Operational Security Considerations for IPv6 Networks</title>
    <seriesInfo name="RFC" value="9099" stream="IETF"/>
    <author fullname="Éric Vyncke" initials="É" surname="Vyncke">
      <organization showOnFrontPage="true">Cisco</organization>
      <address>
        <postal>
          <street>De Kleetlaan 6a</street>
          <city>Diegem</city>
          <country>Belgium</country>
          <code>1831</code>
        </postal>
        <phone>+32 2 778 4677</phone>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author fullname="Kiran Kumar Chittimaneni" initials="K" surname="Chittimaneni">
      <organization showOnFrontPage="true"/>
      <address>
        <postal/>
        <email>kk.chittimaneni@gmail.com</email>
      </address>
    </author>
    <author fullname="Merike Kaeo" initials="M" surname="Kaeo">
      <organization showOnFrontPage="true">Double Shot Security</organization>
      <address>
        <postal>
          <street>3518 Fremont Ave N 363</street>
          <city>Seattle</city>
          <country>United States of America</country>
          <code>98103</code>
        </postal>
        <phone>+12066696394</phone>
        <email>merike@doubleshotsecurity.com</email>
      </address>
    </author>
    <author fullname="Enno Rey" initials="E" surname="Rey">
      <organization showOnFrontPage="true">ERNW</organization>
      <address>
        <postal>
          <street>Carl-Bosch-Str. 4</street>
          <city>Heidelberg Baden-Wuertemberg</city>
          <code>69115</code>
          <country>Germany</country>
        </postal>
        <phone>+49 6221 480390</phone>
        <email>erey@ernw.de</email>
        <uri/>
      </address>
    </author>
    <date month="08" year="2021"/>
    <area>Operations and Management</area>
    <workgroup>OPSEC</workgroup>
    <keyword>IPv6</keyword>
    <keyword>Security</keyword>
    <keyword>Operational Security</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">Knowledge and experience on how to operate IPv4 networks securely is
      available, whether the operator is an Internet Service Provider (ISP) or an enterprise
      internal network. However, IPv6 presents some new security challenges.
      RFC 4942 describes security issues in the protocol, but network managers
      also need a more practical, operations-minded document to enumerate
      advantages and/or disadvantages of certain choices.</t>
      <t indent="0" pn="section-abstract-2">This document analyzes the operational security issues associated
      with several types of networks and proposes technical and procedural
      mitigation techniques. This document is only applicable to managed
      networks, such as enterprise networks, service provider networks, or
      managed residential networks.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by the
            Internet Engineering Steering Group (IESG).  Not all documents
            approved by the IESG are candidates for any level of Internet
            Standard; see Section 2 of RFC 7841. 
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9099" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-applicability-statement">Applicability Statement</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-generic-security-considerat">Generic Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-addressing">Addressing</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.1.2">
                  <li pn="section-toc.1-1.2.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.1.1"><xref derivedContent="2.1.1" format="counter" sectionFormat="of" target="section-2.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-use-of-ulas">Use of ULAs</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.1.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.2.1"><xref derivedContent="2.1.2" format="counter" sectionFormat="of" target="section-2.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-point-to-point-links">Point-to-Point Links</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.1.2.3">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.3.1"><xref derivedContent="2.1.3" format="counter" sectionFormat="of" target="section-2.1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-loopback-addresses">Loopback Addresses</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.1.2.4">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.4.1"><xref derivedContent="2.1.4" format="counter" sectionFormat="of" target="section-2.1.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-stable-addresses">Stable Addresses</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.1.2.5">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.5.1"><xref derivedContent="2.1.5" format="counter" sectionFormat="of" target="section-2.1.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-temporary-addresses-for-sla">Temporary Addresses for SLAAC</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.1.2.6">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.6.1"><xref derivedContent="2.1.6" format="counter" sectionFormat="of" target="section-2.1.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dhcp-considerations">DHCP Considerations</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.1.2.7">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.7.1"><xref derivedContent="2.1.7" format="counter" sectionFormat="of" target="section-2.1.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dns-considerations">DNS Considerations</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.1.2.8">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.8.1"><xref derivedContent="2.1.8" format="counter" sectionFormat="of" target="section-2.1.8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-using-a-64-per-host">Using a /64 per Host</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.1.2.9">
                    <t indent="0" pn="section-toc.1-1.2.2.1.2.9.1"><xref derivedContent="2.1.9" format="counter" sectionFormat="of" target="section-2.1.9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-consideration-of-ad">Privacy Consideration of Addresses</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-extension-headers">Extension Headers</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.2.2">
                  <li pn="section-toc.1-1.2.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.2.2.1.1"><xref derivedContent="2.2.1" format="counter" sectionFormat="of" target="section-2.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-and-repetition-of-ext">Order and Repetition of Extension Headers</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.2.2.2.1"><xref derivedContent="2.2.2" format="counter" sectionFormat="of" target="section-2.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-hop-by-hop-options-header">Hop-by-Hop Options Header</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.2.2.2.2.3.1"><xref derivedContent="2.2.3" format="counter" sectionFormat="of" target="section-2.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-fragment-header">Fragment Header</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.2.2.4">
                    <t indent="0" pn="section-toc.1-1.2.2.2.2.4.1"><xref derivedContent="2.2.4" format="counter" sectionFormat="of" target="section-2.2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ip-security-extension-heade">IP Security Extension Header</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-link-layer-security">Link-Layer Security</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.3.2">
                  <li pn="section-toc.1-1.2.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.3.2.1.1"><xref derivedContent="2.3.1" format="counter" sectionFormat="of" target="section-2.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-neighbor-solicitation-rate-">Neighbor Solicitation Rate-Limiting</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.3.2.2.1"><xref derivedContent="2.3.2" format="counter" sectionFormat="of" target="section-2.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-router-and-neighbor-adverti">Router and Neighbor Advertisements Filtering</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.3.2.3">
                    <t indent="0" pn="section-toc.1-1.2.2.3.2.3.1"><xref derivedContent="2.3.3" format="counter" sectionFormat="of" target="section-2.3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-securing-dhcp">Securing DHCP</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.3.2.4">
                    <t indent="0" pn="section-toc.1-1.2.2.3.2.4.1"><xref derivedContent="2.3.4" format="counter" sectionFormat="of" target="section-2.3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-3gpp-link-layer-security">3GPP Link-Layer Security</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.3.2.5">
                    <t indent="0" pn="section-toc.1-1.2.2.3.2.5.1"><xref derivedContent="2.3.5" format="counter" sectionFormat="of" target="section-2.3.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-impact-of-multicast-traffic">Impact of Multicast Traffic</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.3.2.6">
                    <t indent="0" pn="section-toc.1-1.2.2.3.2.6.1"><xref derivedContent="2.3.6" format="counter" sectionFormat="of" target="section-2.3.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-send-and-cga">SEND and CGA</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.4">
                <t indent="0" pn="section-toc.1-1.2.2.4.1"><xref derivedContent="2.4" format="counter" sectionFormat="of" target="section-2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-plane-security">Control Plane Security</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.4.2">
                  <li pn="section-toc.1-1.2.2.4.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.1.1"><xref derivedContent="2.4.1" format="counter" sectionFormat="of" target="section-2.4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-protocols">Control Protocols</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.4.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.2.1"><xref derivedContent="2.4.2" format="counter" sectionFormat="of" target="section-2.4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-management-protocols">Management Protocols</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.4.2.3">
                    <t indent="0" pn="section-toc.1-1.2.2.4.2.3.1"><xref derivedContent="2.4.3" format="counter" sectionFormat="of" target="section-2.4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-packet-exceptions">Packet Exceptions</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.5">
                <t indent="0" pn="section-toc.1-1.2.2.5.1"><xref derivedContent="2.5" format="counter" sectionFormat="of" target="section-2.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-routing-security">Routing Security</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.5.2">
                  <li pn="section-toc.1-1.2.2.5.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.5.2.1.1"><xref derivedContent="2.5.1" format="counter" sectionFormat="of" target="section-2.5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-bgp-security">BGP Security</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.5.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.5.2.2.1"><xref derivedContent="2.5.2" format="counter" sectionFormat="of" target="section-2.5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-authenticating-ospfv3-neigh">Authenticating OSPFv3 Neighbors</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.5.2.3">
                    <t indent="0" pn="section-toc.1-1.2.2.5.2.3.1"><xref derivedContent="2.5.3" format="counter" sectionFormat="of" target="section-2.5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-securing-routing-updates">Securing Routing Updates</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.5.2.4">
                    <t indent="0" pn="section-toc.1-1.2.2.5.2.4.1"><xref derivedContent="2.5.4" format="counter" sectionFormat="of" target="section-2.5.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-route-filtering">Route Filtering</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.6">
                <t indent="0" pn="section-toc.1-1.2.2.6.1"><xref derivedContent="2.6" format="counter" sectionFormat="of" target="section-2.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-logging-monitoring">Logging/Monitoring</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.6.2">
                  <li pn="section-toc.1-1.2.2.6.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.6.2.1.1"><xref derivedContent="2.6.1" format="counter" sectionFormat="of" target="section-2.6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-sources">Data Sources</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.6.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.6.2.2.1"><xref derivedContent="2.6.2" format="counter" sectionFormat="of" target="section-2.6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-use-of-collected-data">Use of Collected Data</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.6.2.3">
                    <t indent="0" pn="section-toc.1-1.2.2.6.2.3.1"><xref derivedContent="2.6.3" format="counter" sectionFormat="of" target="section-2.6.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-summary">Summary</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.7">
                <t indent="0" pn="section-toc.1-1.2.2.7.1"><xref derivedContent="2.7" format="counter" sectionFormat="of" target="section-2.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-transition-coexistence-tech">Transition/Coexistence Technologies</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2.7.2">
                  <li pn="section-toc.1-1.2.2.7.2.1">
                    <t indent="0" pn="section-toc.1-1.2.2.7.2.1.1"><xref derivedContent="2.7.1" format="counter" sectionFormat="of" target="section-2.7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dual-stack">Dual Stack</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.7.2.2">
                    <t indent="0" pn="section-toc.1-1.2.2.7.2.2.1"><xref derivedContent="2.7.2" format="counter" sectionFormat="of" target="section-2.7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-encapsulation-mechanisms">Encapsulation Mechanisms</xref></t>
                  </li>
                  <li pn="section-toc.1-1.2.2.7.2.3">
                    <t indent="0" pn="section-toc.1-1.2.2.7.2.3.1"><xref derivedContent="2.7.3" format="counter" sectionFormat="of" target="section-2.7.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-translation-mechanisms">Translation Mechanisms</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.2.2.8">
                <t indent="0" pn="section-toc.1-1.2.2.8.1"><xref derivedContent="2.8" format="counter" sectionFormat="of" target="section-2.8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-general-device-hardening">General Device Hardening</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-enterprises-specific-securi">Enterprises-Specific Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-external-security-considera">External Security Considerations</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-internal-security-considera">Internal Security Considerations</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-service-provider-security-c">Service Provider Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-bgp">BGP</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.1.2">
                  <li pn="section-toc.1-1.4.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.1.2.1.1"><xref derivedContent="4.1.1" format="counter" sectionFormat="of" target="section-4.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-remote-triggered-black-hole">Remote Triggered Black Hole Filtering</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-transition-coexistence-mech">Transition/Coexistence Mechanism</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-lawful-intercept">Lawful Intercept</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-residential-users-security-">Residential Users Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-further-reading">Further Reading</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">Running an IPv6 network is new for most operators not only because
      they are not yet used to large-scale IPv6 networks but also because
      there are subtle but critical and important differences between IPv4 and
      IPv6, especially with respect to security. For example, all Layer 2 (L2)
      interactions are now done using the Neighbor Discovery Protocol (NDP) <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> rather than the Address Resolution
      Protocol <xref target="RFC0826" format="default" sectionFormat="of" derivedContent="RFC0826"/>. Also, there is no Network
      Address Port Translation
      (NAPT) defined in <xref target="RFC2663" format="default" sectionFormat="of" derivedContent="RFC2663"/> for IPv6 even if <xref target="RFC6296" format="default" sectionFormat="of" derivedContent="RFC6296"/> specifies an IPv6-to-IPv6 Network Prefix
      Translation
      (NPTv6), which is a 1-to-1 mapping of IPv6 addresses. Another important
      difference is that IPv6 is extensible with the use of extension
      headers.</t>
      <t indent="0" pn="section-1-2">IPv6 networks are deployed using a variety of techniques, each of
      which have their own specific security concerns.</t>
      <t indent="0" pn="section-1-3">This document complements <xref target="RFC4942" format="default" sectionFormat="of" derivedContent="RFC4942"/> by listing
      security issues when operating a network (including various transition
      technologies).
      It also provides operational deployment
      experiences where warranted.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-applicability-statement">Applicability Statement</name>
        <t indent="0" pn="section-1.1-1">This document is applicable to managed networks, i.e., when the
        network is operated by the user organization itself. Indeed, many of
        the recommended mitigation techniques must be configured with detailed
        knowledge of the network (which are the default routers, the switch
        trunk ports, etc.). This covers Service Providers (SPs), enterprise
        networks, and some knowledgeable home-user-managed residential
        networks. This applicability statement especially applies to Sections <xref target="linklayer" format="counter" sectionFormat="of" derivedContent="2.3"/> and <xref target="rfilter" format="counter" sectionFormat="of" derivedContent="2.5.4"/>.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.2">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-1.2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section anchor="generic" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-generic-security-considerat">Generic Security Considerations</name>
      <section anchor="v6addressing" numbered="true" toc="include" removeInRFC="false" pn="section-2.1">
        <name slugifiedName="name-addressing">Addressing</name>
        <t indent="0" pn="section-2.1-1">IPv6 address allocations and overall architecture are important
        parts of securing IPv6. Initial designs, even if intended to be
        temporary, tend to last much longer than expected. Although
        IPv6 was initially thought to make renumbering easy, in practice, it may be
        extremely difficult to renumber without a proper IP Address Management
        (IPAM) system. <xref target="RFC7010" format="default" sectionFormat="of" derivedContent="RFC7010"/> introduces the mechanisms that
        could be utilized for IPv6 site renumbering and tries to cover most of
        the explicit issues and requirements associated with IPv6
        renumbering.</t>
        <t indent="0" pn="section-2.1-2">A key task for a successful IPv6 deployment is to prepare an
        addressing plan. Because an abundance of address space is available,
        structuring an address plan around both services and geographic
        locations allows address space to become a basis for more structured
        security policies to permit or deny services between geographic
        regions. <xref target="RFC6177" format="default" sectionFormat="of" derivedContent="RFC6177"/> documents some operational
        considerations of using different prefix sizes for address assignments
        at end sites.</t>
        <t indent="0" pn="section-2.1-3">A common question is whether companies should use Provider-Independent (PI) or Provider-Aggregated (PA) space <xref target="RFC7381" format="default" sectionFormat="of" derivedContent="RFC7381"/>, but, from a security perspective, there is little
        difference. However, one aspect to keep in mind is who has
        administrative ownership of the address space and who is technically
        responsible if/when there is a need to enforce restrictions on
        routability of the space, e.g., due to malicious criminal activity
        originating from it.
	Relying on PA address space may also increase the
        perceived need for address translation techniques, such as NPTv6;
        thereby, the complexity of the operations, including the
        security operations, is augmented.</t>
        <t indent="0" pn="section-2.1-4">In <xref target="RFC7934" format="default" sectionFormat="of" derivedContent="RFC7934"/>, it is recommended that IPv6 network
        deployments provide multiple IPv6 addresses from each prefix to
        general-purpose hosts, and it specifically does not recommend limiting
        a host to only one IPv6 address per prefix. It also recommends that
        the network give the host the ability to use new addresses without
        requiring explicit requests (for example, by using Stateless Address
	Autoconfiguration (SLAAC)). Privacy
        extensions, as of <xref target="RFC8981" format="default" sectionFormat="of" derivedContent="RFC8981"/>,
	constitute one of the main scenarios where
        hosts are expected to generate multiple addresses from the same prefix,
        and having multiple IPv6 addresses per interface is a major change
        compared to the unique IPv4 address per interface for hosts (secondary
        IPv4 addresses are not common), especially for audits (see
        <xref target="correlation" format="default" sectionFormat="of" derivedContent="Section 2.6.2.3"/>).</t>
        <section anchor="ula" numbered="true" toc="include" removeInRFC="false" pn="section-2.1.1">
          <name slugifiedName="name-use-of-ulas">Use of ULAs</name>
          <t indent="0" pn="section-2.1.1-1">Unique Local Addresses (ULAs) <xref target="RFC4193" format="default" sectionFormat="of" derivedContent="RFC4193"/> are
          intended for scenarios where interfaces are not globally reachable,
          despite being routed within a domain. They formally have global
          scope, but <xref target="RFC4193" format="default" sectionFormat="of" derivedContent="RFC4193"/> specifies that they must be
          filtered at domain boundaries. ULAs are different from the addresses described in <xref target="RFC1918" format="default" sectionFormat="of" derivedContent="RFC1918"/> and have different use cases. One use
          of ULAs is described in <xref target="RFC4864" format="default" sectionFormat="of" derivedContent="RFC4864"/>; another one is
	  for internal communication stability in networks where external
          connectivity may come and go (e.g., some ISPs provide ULAs in home
          networks connected via a cable modem). It should further be kept in
          mind that ULA /48s from the fd00::/8 space (L=1) <bcp14>MUST</bcp14> be generated
          with a pseudorandom algorithm, per <xref target="RFC4193" sectionFormat="of" section="3.2.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4193#section-3.2.1" derivedContent="RFC4193"/>.</t>
        </section>
        <section anchor="p2p" numbered="true" toc="include" removeInRFC="false" pn="section-2.1.2">
          <name slugifiedName="name-point-to-point-links">Point-to-Point Links</name>
          <t indent="0" pn="section-2.1.2-1"><xref target="RFC6164" sectionFormat="of" section="5.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6164#section-5.1" derivedContent="RFC6164"/> specifies the
	  rationale
          of using /127 for inter-router, point-to-point links to prevent the
          ping-pong issue between routers not correctly implementing <xref target="RFC4443" format="default" sectionFormat="of" derivedContent="RFC4443"/>, and it also prevents a denial-of-service
	  (DoS) attack on the Neighbor Cache. The previous recommendation of <xref target="RFC3627" format="default" sectionFormat="of" derivedContent="RFC3627"/> has
          been obsoleted and marked Historic by <xref target="RFC6547" format="default" sectionFormat="of" derivedContent="RFC6547"/>.</t>
          <t indent="0" pn="section-2.1.2-2">Some environments are also using link-local addressing for
          point-to-point links. While this practice could further reduce the
          attack surface of infrastructure devices, the operational
          disadvantages also need to be carefully considered; see <xref target="RFC7404" format="default" sectionFormat="of" derivedContent="RFC7404"/>.</t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-2.1.3">
          <name slugifiedName="name-loopback-addresses">Loopback Addresses</name>
          <t indent="0" pn="section-2.1.3-1">Many operators reserve a /64 block for all loopback addresses in
          their infrastructure and allocate a /128 out of this reserved /64
          prefix for each loopback interface. This practice facilitates
          configuration of Access Control List (ACL) rules to enforce a
          security policy for those loopback addresses.</t>
        </section>
        <section anchor="static" numbered="true" toc="include" removeInRFC="false" pn="section-2.1.4">
          <name slugifiedName="name-stable-addresses">Stable Addresses</name>
          <t indent="0" pn="section-2.1.4-1">When considering how to assign stable addresses for nodes (either
          by static configuration or by pre-provisioned DHCPv6 lease (<xref target="dhcp" format="default" sectionFormat="of" derivedContent="Section 2.1.6"/>)), it is necessary to take into consideration the
          effectiveness of perimeter security in a given environment.</t>
          <t indent="0" pn="section-2.1.4-2">There is a trade-off between ease of operation (where some
          portions of the IPv6 address could be easily recognizable for
          operational debugging and troubleshooting) versus the risk of
          trivial scanning used for reconnaissance. <xref target="SCANNING" format="default" sectionFormat="of" derivedContent="SCANNING"/>
          shows that there are scientifically based mechanisms that make
          scanning for IPv6-reachable nodes more feasible than expected; see
          <xref target="RFC7707" format="default" sectionFormat="of" derivedContent="RFC7707"/>.</t>
          <t indent="0" pn="section-2.1.4-3">Stable addresses also allow easy enforcement of a security policy
          at the perimeter based on IPv6 addresses. For example, <xref target="RFC8520" format="default" sectionFormat="of" derivedContent="RFC8520">Manufacturer Usage Description (MUD)</xref> is a
          mechanism where the perimeter defense can retrieve the security policy
          template based on the type of internal device and apply the right
          security policy based on the device's IPv6 address.</t>
          <t indent="0" pn="section-2.1.4-4">The use of well-known IPv6 addresses (such as ff02::1 for all
          link-local nodes) or the use of commonly repeated addresses could
          make it easy to figure out which devices are name servers, routers,
          or other critical devices; even a simple traceroute will expose most
          of the routers on a path. There are many scanning techniques
          possible and operators should not rely on the 'impossible to find
          because my address is random' paradigm (a.k.a. "security by
          obscurity") even if it is common practice to have the stable
          addresses randomly distributed across /64 subnets and to always use
          DNS (as IPv6 addresses are hard for human brains to remember).</t>
          <t indent="0" pn="section-2.1.4-5">While, in some environments, obfuscating addresses could be
          considered an added benefit, it should not preclude enforcement of
          perimeter rules. Stable addresses following some logical allocation
          scheme may ease the operation (as simplicity always helps
          security).</t>
          <t indent="0" pn="section-2.1.4-6">Typical deployments will have a mix of stable and non-stable
          addresses; the stable addresses being either predictable (e.g., ::25
          for a mail server) or obfuscated (i.e., appearing as a random 64-bit
          number).</t>
        </section>
        <section anchor="priv" numbered="true" toc="include" removeInRFC="false" pn="section-2.1.5">
          <name slugifiedName="name-temporary-addresses-for-sla">Temporary Addresses for SLAAC</name>
          <t indent="0" pn="section-2.1.5-1">Historically, Stateless Address Autoconfiguration (SLAAC) makes
          up the globally unique IPv6 address based on an automatically
          generated 64-bit interface identifier (IID) based on the 64-bit Extended Unique Identifier (EUI-64) Media Access Control (MAC)
          address combined with the /64 prefix (received in the Prefix
          Information Option (PIO) of the Router Advertisement (RA)). The
          EUI-64 address is generated from the stable 48-bit MAC address and
          does not change even if the host moves to another network; this is
          of course bad for privacy, as a host can be traced from network
          (home) to network (office or Wi-Fi in hotels). <xref target="RFC8064" format="default" sectionFormat="of" derivedContent="RFC8064"/> recommends against the use of EUI-64 addresses,
          and it must be noted that most host operating systems do not use
          EUI-64 addresses anymore and rely on either <xref target="RFC8981" format="default" sectionFormat="of" derivedContent="RFC8981"/>
          or <xref target="RFC8064" format="default" sectionFormat="of" derivedContent="RFC8064"/>.</t>
          <t indent="0" pn="section-2.1.5-2">Randomly generating an interface ID, as described in <xref target="RFC8981" format="default" sectionFormat="of" derivedContent="RFC8981"/>, is part of SLAAC with so-called privacy
          extension addresses and is used to address some privacy concerns.
          Privacy extension addresses, a.k.a. temporary addresses, may help to
          mitigate the correlation of activities of a node within the same
          network and may also reduce the attack exposure window. But using
           privacy extension addresses as described in  <xref target="RFC8981" format="default" sectionFormat="of" derivedContent="RFC8981"/> might
	  prevent the operator from building host-specific access control lists
          (ACLs). These privacy extension addresses
          could also be used to obfuscate some malevolent activities, and
          specific user attribution/accountability procedures should be put in
          place, as described in <xref target="log" format="default" sectionFormat="of" derivedContent="Section 2.6"/>.</t>
          <t indent="0" pn="section-2.1.5-3"><xref target="RFC8064" format="default" sectionFormat="of" derivedContent="RFC8064"/> combined with the address generation
          mechanism of <xref target="RFC7217" format="default" sectionFormat="of" derivedContent="RFC7217"/> specifies another way to
          generate an address while still keeping the same IID for each
          network prefix; this allows SLAAC nodes to always have the same
          stable IPv6 address on a specific network while having different
          IPv6 addresses on different networks.</t>
          <t indent="0" pn="section-2.1.5-4">In some specific use cases where user accountability is more
          important than user privacy, network operators may consider
          disabling SLAAC and relying only on DHCPv6; however, not all operating
          systems support DHCPv6, so some hosts will not get any IPv6
          connectivity. Disabling SLAAC and privacy extension addresses can be
          done for most operating systems by sending RA messages with a hint
          to get addresses via DHCPv6 by setting the M-bit and disabling SLAAC
          by resetting all A-bits in all PIOs. However,
          attackers could still find ways to bypass this mechanism if it is not
          enforced at the switch/router level.</t>
          <t indent="0" pn="section-2.1.5-5">However, in scenarios where anonymity is a strong desire
          (protecting user privacy is more important than user attribution),
          privacy extension addresses should be used. When mechanisms
          recommended by <xref target="RFC8064" format="default" sectionFormat="of" derivedContent="RFC8064"/> are available, the stable
          privacy address is probably a good balance between privacy (among
          different networks) and security/user attribution (within a
          network).</t>
        </section>
        <section anchor="dhcp" numbered="true" toc="include" removeInRFC="false" pn="section-2.1.6">
          <name slugifiedName="name-dhcp-considerations">DHCP Considerations</name>
          <t indent="0" pn="section-2.1.6-1">Some environments use DHCPv6 to provision addresses and other
          parameters in order to ensure auditability and traceability (see
          <xref target="stateful_dhcp" format="default" sectionFormat="of" derivedContent="Section 2.6.1.5"/> for the limitations of DHCPv6 for
          auditability).</t>
          <t indent="0" pn="section-2.1.6-2">A main security concern is the ability to detect and counteract
          rogue DHCP servers (<xref target="snoop" format="default" sectionFormat="of" derivedContent="Section 2.3.3"/>). It must be noted
	  that, as opposed to DHCPv4, DHCPv6 can lease several IPv6 addresses per
          client. For DHCPv4, the lease is bound to the 'client identifier',
          which may contain a hardware address or another type
          of identifier, such as a DNS name. For DHCPv6, the lease is bound to
          the client DHCP Unique Identifier (DUID), which may or may not be bound to
          the client L2 address. <xref target="RFC7824" format="default" sectionFormat="of" derivedContent="RFC7824"/> describes
          the privacy issues associated with the use of DHCPv6 by Internet
          users. The anonymity profiles <xref target="RFC7844" format="default" sectionFormat="of" derivedContent="RFC7844"/> are designed
          for clients that wish to remain anonymous to the visited network.
          <xref target="RFC7707" format="default" sectionFormat="of" derivedContent="RFC7707"/> recommends that DHCPv6 servers issue
          addresses randomly from a large pool.</t>
        </section>
        <section anchor="dns" numbered="true" toc="include" removeInRFC="false" pn="section-2.1.7">
          <name slugifiedName="name-dns-considerations">DNS Considerations</name>
          <t indent="0" pn="section-2.1.7-1">While the security concerns of DNS are not fundamentally
          different between IPv4 and IPv6, there are specific considerations
          in DNS64 <xref target="RFC6147" format="default" sectionFormat="of" derivedContent="RFC6147"/> environments that need to be
          understood. Specifically, the interactions and the potential of
          interference with DNSSEC <xref target="RFC4033" format="default" sectionFormat="of" derivedContent="RFC4033"/> implementation
          need to be understood -- these are pointed out in more detail in
          <xref target="nat64" format="default" sectionFormat="of" derivedContent="Section 2.7.3.2"/>.</t>
        </section>
        <section anchor="sixty4perhost" numbered="true" toc="include" removeInRFC="false" pn="section-2.1.8">
          <name slugifiedName="name-using-a-64-per-host">Using a /64 per Host</name>
          <t indent="0" pn="section-2.1.8-1">An interesting approach is using a /64 per host, as proposed in
          <xref target="RFC8273" format="default" sectionFormat="of" derivedContent="RFC8273"/>, especially in a shared environment.
	  This allows for easier user attribution (typically based on the host MAC
          address), as its /64 prefix is stable, even if applications within the
          host can change their IPv6 address within this /64 prefix.</t>
          <t indent="0" pn="section-2.1.8-2">This can also be useful for the generation of ACLs once
          individual systems (e.g., admin workstations) have their own
          prefixes.</t>
        </section>
        <section anchor="privacy" numbered="true" toc="include" removeInRFC="false" pn="section-2.1.9">
          <name slugifiedName="name-privacy-consideration-of-ad">Privacy Consideration of Addresses</name>
          <t indent="0" pn="section-2.1.9-1">In addition to the security aspects of IPv6 addresses, there are also
          privacy considerations: mainly because they are of global scope and
          visible globally. <xref target="RFC7721" format="default" sectionFormat="of" derivedContent="RFC7721"/> goes into more detail on
          the privacy considerations for IPv6 addresses by comparing the
          manually configured IPv6 address, DHCPv6, and SLAAC.</t>
        </section>
      </section>
      <section anchor="ext_headers" numbered="true" toc="include" removeInRFC="false" pn="section-2.2">
        <name slugifiedName="name-extension-headers">Extension Headers</name>
        <t indent="0" pn="section-2.2-1">Extension headers are an important difference between IPv4 and
        IPv6. In IPv4-based packets, it's trivial to find the upper-layer
        protocol type and protocol header, while, in IPv6, it is more complex
        since the extension header chain must be parsed completely (even if
        not processed) in order to find the upper-layer protocol header. IANA
        has closed the existing empty "Next Header Types" registry to new
        entries and is redirecting its users to the "IPv6 Extension Header
        Types" registry, per <xref target="RFC7045" format="default" sectionFormat="of" derivedContent="RFC7045"/>.</t>
        <t indent="0" pn="section-2.2-2">Extension headers have also become a very controversial topic since
        forwarding nodes that discard packets containing extension headers are
        known to cause connectivity failures and deployment problems <xref target="RFC7872" format="default" sectionFormat="of" derivedContent="RFC7872"/>. Understanding the role of various extension
        headers is important, and this section enumerates the ones that need
        careful consideration.</t>
        <t indent="0" pn="section-2.2-3">A clarification on how intermediate nodes should handle packets
        with existing or future extension headers is found in <xref target="RFC7045" format="default" sectionFormat="of" derivedContent="RFC7045"/>. The uniform TLV format to be used for defining
        future extension headers is described in <xref target="RFC6564" format="default" sectionFormat="of" derivedContent="RFC6564"/>.
        Sections <xref target="RFC8504" sectionFormat="bare" section="5.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8504#section-5.2" derivedContent="RFC8504"/> and 
	<xref target="RFC8504" sectionFormat="bare" section="5.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8504#section-5.3" derivedContent="RFC8504"/> of <xref target="RFC8504" format="default" sectionFormat="of" derivedContent="RFC8504"/>
	provide more
        information on the processing of extension headers by IPv6 nodes.</t>
        <t indent="0" pn="section-2.2-4">Vendors of filtering solutions and operations personnel responsible
        for implementing packet filtering rules should be aware that the 'Next
        Header' field in an IPv6 header can both point to an IPv6 extension
        header or to an upper-layer protocol header. This has to be considered
        when designing the user interface of filtering solutions or during the
        creation of filtering rule sets.</t>
        <t indent="0" pn="section-2.2-5"><xref target="I-D.ietf-opsec-ipv6-eh-filtering" format="default" sectionFormat="of" derivedContent="IPV6-EH-FILTERING"/> discusses filtering rules for those
        extension headers at transit routers.</t>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2.1">
          <name slugifiedName="name-order-and-repetition-of-ext">Order and Repetition of Extension Headers</name>
          <t indent="0" pn="section-2.2.1-1">While <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/> recommends the order and the
          maximum repetition of extension headers, at the time of writing, there are still IPv6
          implementations that support an
          order of headers that is not recommended (such as Encapsulating Security Payload (ESP)
	  before routing) or an
          illegal repetition of headers (such as multiple routing headers).
          The same applies for options contained in the extension headers (see
          <xref target="I-D.kampanakis-6man-ipv6-eh-parsing" format="default" sectionFormat="of" derivedContent="IPV6-EH-PARSING"/>). In some
          cases, it has led to nodes crashing when receiving or forwarding
          wrongly formatted packets.</t>
          <t indent="0" pn="section-2.2.1-2">A firewall or edge device should be used to enforce the
          recommended order and the maximum occurrences of extension headers
          by dropping nonconforming packets.</t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2.2">
          <name slugifiedName="name-hop-by-hop-options-header">Hop-by-Hop Options Header</name>
          <t indent="0" pn="section-2.2.2-1">In the previous IPv6 specification <xref target="RFC2460" format="default" sectionFormat="of" derivedContent="RFC2460"/>,
	  the hop-by-hop options header, when present in an IPv6 packet, forced
          all nodes to inspect and possibly process this header. This enabled
          denial-of-service attacks as most, if not all, routers cannot
          process this type of packet in hardware; they have to process these
          packets in software and, hence, this task competes with other software tasks,
          such as handling the control and management plane processing.</t>
          <t indent="0" pn="section-2.2.2-2"><xref target="RFC8200" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8200#section-4.3" derivedContent="RFC8200"/>, the
	  current Internet Standard for IPv6, has taken this attack vector into account and
          made the processing of hop-by-hop options headers by intermediate
          routers explicitly configurable.</t>
        </section>
        <section anchor="fragments" numbered="true" toc="include" removeInRFC="false" pn="section-2.2.3">
          <name slugifiedName="name-fragment-header">Fragment Header</name>
          <t indent="0" pn="section-2.2.3-1">The fragment header is used by the source (and only the source)
          when it has to fragment packets. <xref target="RFC7112" format="default" sectionFormat="of" derivedContent="RFC7112"/> and
          <xref target="RFC8200" sectionFormat="of" section="4.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8200#section-4.5" derivedContent="RFC8200"/> explain why it is
	  important that:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.2.3-2">
            <li pn="section-2.2.3-2.1">Firewall and security devices should drop first fragments
              that do not contain the entire IPv6 header chain (including the
              transport-layer header).</li>
            <li pn="section-2.2.3-2.2">Destination nodes should discard first fragments that do not
              contain the entire IPv6 header chain (including the
              transport-layer header).</li>
          </ul>
          <t indent="0" pn="section-2.2.3-3">If those requirements are not met, stateless filtering could be
          bypassed by a hostile party. <xref target="RFC6980" format="default" sectionFormat="of" derivedContent="RFC6980"/> applies a
          stricter rule to NDP by enforcing the
          drop of fragmented NDP packets (except for "Certification Path
          Advertisement" messages, as noted in section <xref target="rafiltering" format="default" sectionFormat="of" derivedContent="Section 2.3.2.1"/>). <xref target="RFC7113" format="default" sectionFormat="of" derivedContent="RFC7113"/> describes how the
          RA-Guard function described in <xref target="RFC6105" format="default" sectionFormat="of" derivedContent="RFC6105"/> should
          behave in the presence of fragmented RA packets.</t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2.4">
          <name slugifiedName="name-ip-security-extension-heade">IP Security Extension Header</name>
          <t indent="0" pn="section-2.2.4-1">The <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301">IPsec</xref> extension headers (<xref target="RFC4302" format="default" sectionFormat="of" derivedContent="RFC4302">Authentication Header (AH)</xref> and <xref target="RFC4303" format="default" sectionFormat="of" derivedContent="RFC4303">ESP</xref>)
          are required if IPsec is to be utilized for network-level security.
          Previously, IPv6 mandated implementation of IPsec, but <xref target="RFC6434" format="default" sectionFormat="of" derivedContent="RFC6434"/> updated that recommendation by making support of
          the IPsec architecture <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301"/> a
	  '<bcp14>SHOULD</bcp14>' for all
          IPv6 nodes that are also retained in the latest IPv6 Nodes
          Requirement standard <xref target="RFC8504" format="default" sectionFormat="of" derivedContent="RFC8504"/>.</t>
        </section>
      </section>
      <section anchor="linklayer" numbered="true" toc="include" removeInRFC="false" pn="section-2.3">
        <name slugifiedName="name-link-layer-security">Link-Layer Security</name>
        <t indent="0" pn="section-2.3-1">IPv6 relies heavily on NDP <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> to perform a
        variety of link operations, such as discovering other nodes on the
        link, resolving their link-layer addresses, and finding routers on the
        link. If not secured, NDP is vulnerable to various attacks, such as
        router/neighbor message spoofing, redirect attacks, Duplicate Address
        Detection (DAD) DoS attacks, etc. Many of these security threats to
        NDP have been documented in "IPv6 Neighbor Discovery (ND) Trust Models and Threats"
	<xref target="RFC3756" format="default" sectionFormat="of" derivedContent="RFC3756"/> and in "Operational Neighbor Discovery
	Problems" <xref target="RFC6583" format="default" sectionFormat="of" derivedContent="RFC6583"/>.</t>
        <t indent="0" pn="section-2.3-2">Most of the issues are only applicable when the attacker is on the
        same link, but NDP also has security issues when the attacker is
        off link; see <xref target="ratelim" format="default" sectionFormat="of" derivedContent="Section 2.3.1"/> below.</t>
        <section anchor="ratelim" numbered="true" toc="include" removeInRFC="false" pn="section-2.3.1">
          <name slugifiedName="name-neighbor-solicitation-rate-">Neighbor Solicitation Rate-Limiting</name>
          <t indent="0" pn="section-2.3.1-1">NDP can be vulnerable to remote DoS attacks,
          for example, when a router is forced to perform address resolution
          for a large number of unassigned addresses, i.e., when a prefix is
          scanned by an attacker in a fast manner. This can keep new devices
          from joining the network or render the last-hop router ineffective
          due to high CPU usage. Easy mitigative steps include rate limiting
          Neighbor Solicitations, restricting the amount of state reserved for
          unresolved solicitations, and cleverly managing the cache/timer.</t>
          <t indent="0" pn="section-2.3.1-2"><xref target="RFC6583" format="default" sectionFormat="of" derivedContent="RFC6583"/> discusses the potential for off-link DoS
          in detail and suggests implementation improvements and operational
          mitigation techniques that may be used to mitigate or alleviate the
          impact of such attacks. Here are some feasible mitigation options
          that can be employed by network operators today:</t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.3.1-3">
            <li pn="section-2.3.1-3.1">Ingress filtering of unused addresses by ACL. These require
              stable configuration of the addresses, e.g., allocating
              the addresses out of a /120 and using a specific ACL to only
              allow traffic to this /120 (of course, the actual hosts are
              configured with a /64 prefix for the link).</li>
            <li pn="section-2.3.1-3.2">Tuning of NDP process (where supported), e.g., enforcing
              limits on data structures, such as the number of Neighbor Cache
              entries in 'incomplete' state (e.g., 256 incomplete entries per
              interface) or the rate of NA per interface (e.g., 100 NA per
              second).</li>
            <li pn="section-2.3.1-3.3">Using a /127 on a point-to-point link, per <xref target="RFC6164" format="default" sectionFormat="of" derivedContent="RFC6164"/>.</li>
            <li pn="section-2.3.1-3.4">Using only link-local addresses on links where there are only
              routers; see <xref target="RFC7404" format="default" sectionFormat="of" derivedContent="RFC7404"/>.</li>
          </ul>
        </section>
        <section anchor="filter" numbered="true" toc="include" removeInRFC="false" pn="section-2.3.2">
          <name slugifiedName="name-router-and-neighbor-adverti">Router and Neighbor Advertisements Filtering</name>
          <section anchor="rafiltering" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.3.2.1">
            <name slugifiedName="name-router-advertisement-filter">Router Advertisement Filtering</name>
            <t indent="0" pn="section-2.3.2.1-1">Router Advertisement spoofing is a well-known, on-link attack
            vector and has been extensively documented. The presence of rogue
            RAs, either unintentional or malicious, can cause partial or
            complete failure of operation of hosts on an IPv6 link. For
            example, a node can select an incorrect router address, which can
            then be used for an on-path attack, or the node can assume wrong
            prefixes to be used for SLAAC. <xref target="RFC6104" format="default" sectionFormat="of" derivedContent="RFC6104"/>
	    summarizes
            the scenarios in which rogue RAs may be observed and presents a
            list of possible solutions to the problem. <xref target="RFC6105" format="default" sectionFormat="of" derivedContent="RFC6105"/> (RA-Guard) describes a solution framework for
            the rogue RA problem where network segments are designed around
            switching devices that are capable of identifying invalid RAs and
            blocking them before the attack packets actually reach the target
            nodes.</t>
            <t indent="0" pn="section-2.3.2.1-2">However, several evasion techniques that circumvent the
            protection provided by RA-Guard have surfaced. A key challenge to
            this mitigation technique is introduced by IPv6 fragmentation.
            Attackers can conceal their attack by fragmenting their packets
            into multiple fragments such that the switching device that is
            responsible for blocking invalid RAs cannot find all the necessary
            information to perform packet filtering of the same packet. <xref target="RFC7113" format="default" sectionFormat="of" derivedContent="RFC7113"/> describes such evasion techniques and provides
            advice to RA-Guard implementers such that the aforementioned
            evasion vectors can be eliminated.</t>
            <t indent="0" pn="section-2.3.2.1-3">Given that the IPv6 Fragmentation Header can be leveraged to
            circumvent some implementations of RA-Guard, <xref target="RFC6980" format="default" sectionFormat="of" derivedContent="RFC6980"/> updates <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> such that use
            of the IPv6 Fragmentation Header is forbidden in all Neighbor
            Discovery messages, except "Certification Path Advertisement", thus
            allowing for simple and effective measures to counter fragmented
            NDP attacks.</t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-2.3.2.2">
            <name slugifiedName="name-neighbor-advertisement-filt">Neighbor Advertisement Filtering</name>
            <t indent="0" pn="section-2.3.2.2-1">The Source Address Validation Improvements (savi) Working Group
            has worked on other ways to mitigate the effects of such attacks.
            <xref target="RFC7513" format="default" sectionFormat="of" derivedContent="RFC7513"/> helps in creating bindings between a
	    source IP address assigned to
            DHCPv4 <xref target="RFC2131" format="default" sectionFormat="of" derivedContent="RFC2131"/> or DHCPv6 <xref target="RFC8415" format="default" sectionFormat="of" derivedContent="RFC8415"/>
             and a binding anchor <xref target="RFC7039" format="default" sectionFormat="of" derivedContent="RFC7039"/> on a SAVI
	     device. Also, <xref target="RFC6620" format="default" sectionFormat="of" derivedContent="RFC6620"/> describes how to
	     glean similar bindings when
            DHCP is not used. The bindings can be used to filter packets
            generated on the local link with forged source IP addresses.</t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-2.3.2.3">
            <name slugifiedName="name-host-isolation">Host Isolation</name>
            <t indent="0" pn="section-2.3.2.3-1">Isolating hosts for the NDP traffic can be done by using a /64
            per host, refer to <xref target="sixty4perhost" format="default" sectionFormat="of" derivedContent="Section 2.1.8"/>, as NDP is
	    only relevant within a /64 on-link prefix; 3GPP (<xref target="threegpp" format="default" sectionFormat="of" derivedContent="Section 2.3.4"/>) uses a similar mechanism.</t>
            <t indent="0" pn="section-2.3.2.3-2">A more drastic technique to prevent all NDP attacks is based on
            isolation of all hosts with specific configurations. In such a
            scenario, hosts (i.e., all nodes that are not routers) are unable
            to send data-link layer frames to other hosts; therefore, no
            host-to-host attacks can happen. This specific setup can be
            established on some switches or Wi-Fi access points. This is not
            always feasible when hosts need to communicate with other hosts in
            the same subnet, e.g., for access to file shares.</t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-2.3.2.4">
            <name slugifiedName="name-ndp-recommendations">NDP Recommendations</name>
            <t indent="0" pn="section-2.3.2.4-1">It is still recommended that RA-Guard and SAVI be employed as a
            first line of defense against common attack vectors, including
            misconfigured hosts. This recommendation also applies when DHCPv6
            is used, as RA messages are used to discover the default router(s)
            and for on-link prefix determination. This line of defense is most
            effective when incomplete fragments are dropped by routers and
            L2 switches, as described in <xref target="fragments" format="default" sectionFormat="of" derivedContent="Section 2.2.3"/>. The
	    generated log should also be analyzed to identify and act on violations.</t>
            <t indent="0" pn="section-2.3.2.4-2">Network operators should be aware that RA-Guard and SAVI do not
            work as expected or could even be harmful in specific network
            configurations (notably when there could be multiple routers).</t>
            <t indent="0" pn="section-2.3.2.4-3">Enabling RA-Guard by default in managed networks (e.g., Wi-Fi
            networks, enterprise campus networks, etc.) should be strongly
            considered except for specific use cases, such as in the presence of
            homenet devices emitting router advertisements.</t>
          </section>
        </section>
        <section anchor="snoop" numbered="true" toc="include" removeInRFC="false" pn="section-2.3.3">
          <name slugifiedName="name-securing-dhcp">Securing DHCP</name>
          <t indent="0" pn="section-2.3.3-1">The Dynamic Host Configuration Protocol for IPv6 (DHCPv6), as
          described in <xref target="RFC8415" format="default" sectionFormat="of" derivedContent="RFC8415"/>, enables DHCP servers to pass
          configuration parameters, such as IPv6 network addresses and other
          configuration information, to IPv6 nodes. DHCP plays an important
          role in most large networks by providing robust stateful
          configuration in the context of automated system provisioning.</t>
          <t indent="0" pn="section-2.3.3-2">The two most common threats to DHCP clients come from malicious
          (a.k.a. rogue) or unintentionally misconfigured DHCP servers. In
          these scenarios, a malicious DHCP server is established with the
          intent of providing incorrect configuration information to the
          clients to cause a denial-of-service attack or to mount an on-path
          attack. While unintentional, a misconfigured DHCP server can have
          the same impact. Additional threats against DHCP are discussed in
          the security considerations section of <xref target="RFC8415" format="default" sectionFormat="of" derivedContent="RFC8415"/>.</t>
          <t indent="0" pn="section-2.3.3-3"><xref target="RFC7610" format="default" sectionFormat="of" derivedContent="RFC7610">DHCPv6-Shield</xref> specifies a
          mechanism for protecting connected DHCPv6 clients against rogue
          DHCPv6 servers. This mechanism is based on DHCPv6 packet filtering
          at the L2 device, i.e., the administrator specifies the
          interfaces connected to DHCPv6 servers. However, extension headers
          could be leveraged to bypass DHCPv6-Shield unless <xref target="RFC7112" format="default" sectionFormat="of" derivedContent="RFC7112"/> is enforced.</t>
          <t indent="0" pn="section-2.3.3-4">It is recommended to use DHCPv6-Shield and to analyze the
          corresponding log messages.</t>
        </section>
        <section anchor="threegpp" numbered="true" toc="include" removeInRFC="false" pn="section-2.3.4">
          <name slugifiedName="name-3gpp-link-layer-security">3GPP Link-Layer Security</name>
          <t indent="0" pn="section-2.3.4-1">The 3GPP link is a point-to-point-like link that has no
          link-layer address. This implies there can only be one end host (the
          mobile handset) and the first-hop router (i.e., a Gateway GPRS
          Support Node (GGSN) or a Packet Data Network Gateway (PGW)) on that link. The
          GGSN/PGW never configures a non-link-local address on the link using
          the advertised /64 prefix on it; see <xref target="sixty4perhost" format="default" sectionFormat="of" derivedContent="Section 2.1.8"/>.
          The advertised prefix must not be used for on-link determination.
          There is no need for address resolution on the 3GPP link, since
          there are no link-layer addresses. Furthermore, the GGSN/PGW assigns
          a prefix that is unique within each 3GPP link that uses IPv6
          Stateless Address Autoconfiguration. This avoids the necessity to
          perform DAD at the network level for every address generated by the
          mobile host. The GGSN/PGW always provides an IID to the cellular
          host for the purpose of configuring the link-local address and
          ensures the uniqueness of the IID on the link (i.e., no collisions
          between its own link-local address and the mobile host's
          address).</t>
          <t indent="0" pn="section-2.3.4-2">The 3GPP link model itself mitigates most of the known
          NDP-related DoS attacks. In practice, the GGSN/PGW
          only needs to route all traffic to the mobile host that falls under
          the prefix assigned to it. As there is also a single host on the
          3GPP link, there is no need to defend that IPv6 address.</t>
          <t indent="0" pn="section-2.3.4-3">See <xref target="RFC6459" sectionFormat="of" section="5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6459#section-5" derivedContent="RFC6459"/> for a more detailed
          discussion on the 3GPP link model, NDP, and the address
          configuration details. In some mobile networks, DHCPv6 and DHCP Prefix Delegation
	  (DHCP-PD) are also used.</t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-2.3.5">
          <name slugifiedName="name-impact-of-multicast-traffic">Impact of Multicast Traffic</name>
          <t indent="0" pn="section-2.3.5-1">IPv6 uses multicast extensively for signaling messages on the
          local link to avoid broadcast messages for on-the-wire
          efficiency.</t>
          <t indent="0" pn="section-2.3.5-2">The use of multicast has some side effects on wireless networks,
          such as a negative impact on battery life of smartphones and other
          battery-operated devices that are connected to such networks. <xref target="RFC7772" format="default" sectionFormat="of" derivedContent="RFC7772"/> and <xref target="RFC6775" format="default" sectionFormat="of" derivedContent="RFC6775"/> (for specific
          wireless networks) discuss methods to rate-limit RAs and other ND
          messages on wireless networks in order to address this issue.</t>
          <t indent="0" pn="section-2.3.5-3">The use of link-layer multicast addresses (e.g., ff02::1 for the
          all nodes link-local multicast address) could also be misused for an
          amplification attack. Imagine a hostile node sending an ICMPv6
          ECHO_REQUEST to ff02::1 with a spoofed source address, then all
          link-local nodes will reply with ICMPv6 ECHO_REPLY packets to the
          source address. This could be a DoS attack for the address owner.
          This attack is purely local to the L2 network, as packets with a
          link-local destination are never forwarded by an IPv6 router.</t>
          <t indent="0" pn="section-2.3.5-4">This is the reason why large Wi-Fi network deployments often
          limit the use of link-layer multicast, either from or to the uplink
          of the Wi-Fi access point, i.e., Wi-Fi stations are prevented to
          send link-local multicast to their direct neighboring Wi-Fi
          stations; this policy also blocks service discovery via Multicast DNS (mDNS)
	  <xref target="RFC6762" format="default" sectionFormat="of" derivedContent="RFC6762"/> and Link-Local Multicast Name
	  Resolution (LLMNR) <xref target="RFC4795" format="default" sectionFormat="of" derivedContent="RFC4795"/>.</t>
        </section>
        <section anchor="send" numbered="true" toc="include" removeInRFC="false" pn="section-2.3.6">
          <name slugifiedName="name-send-and-cga">SEND and CGA</name>
          <t indent="0" pn="section-2.3.6-1">SEcure Neighbor Discovery (SEND), as described in <xref target="RFC3971" format="default" sectionFormat="of" derivedContent="RFC3971"/>, is a mechanism that was designed to secure ND
          messages. This approach involves the use of new NDP options to carry
          public-key-based signatures. Cryptographically Generated Addresses
          (CGA), as described in <xref target="RFC3972" format="default" sectionFormat="of" derivedContent="RFC3972"/>, are used to ensure
          that the sender of a Neighbor Discovery message is the actual
          "owner" of the claimed IPv6 address. A new NDP option, the CGA
          option, was introduced and is used to carry the public key and
          associated parameters. Another NDP option, the RSA Signature option,
          is used to protect all messages relating to neighbor and router
          discovery.</t>
          <t indent="0" pn="section-2.3.6-2">SEND protects against: </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.3.6-3">
            <li pn="section-2.3.6-3.1">Neighbor Solicitation/Advertisement Spoofing</li>
            <li pn="section-2.3.6-3.2">Neighbor Unreachability Detection Failure</li>
            <li pn="section-2.3.6-3.3">Duplicate Address Detection DoS Attack</li>
            <li pn="section-2.3.6-3.4">Router Solicitation and Advertisement Attacks</li>
            <li pn="section-2.3.6-3.5">Replay Attacks</li>
            <li pn="section-2.3.6-3.6">Neighbor Discovery DoS Attacks</li>
          </ul>
          <t indent="0" pn="section-2.3.6-4">SEND does NOT: </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.3.6-5">
            <li pn="section-2.3.6-5.1">protect statically configured addresses</li>
            <li pn="section-2.3.6-5.2">protect addresses configured using fixed identifiers (i.e.,
              EUI-64)</li>
            <li pn="section-2.3.6-5.3">provide confidentiality for NDP communications</li>
            <li pn="section-2.3.6-5.4">compensate for an unsecured link -- SEND does not require that
              the addresses on the link and Neighbor Advertisements
              correspond</li>
          </ul>
          <t indent="0" pn="section-2.3.6-6">However, at this time and over a decade since their original
          specifications, CGA and SEND do not have support from widely
          deployed IPv6 devices; hence, their usefulness is limited and should
          not be relied upon.</t>
        </section>
      </section>
      <section anchor="copp" numbered="true" toc="include" removeInRFC="false" pn="section-2.4">
        <name slugifiedName="name-control-plane-security">Control Plane Security</name>
        <t indent="0" pn="section-2.4-1"><xref target="RFC6192" format="default" sectionFormat="of" derivedContent="RFC6192"/> defines the router control plane and
        provides detailed guidance to secure it for IPv4 and IPv6 networks.
        This definition is repeated here for the reader's convenience. Please
        note that the definition is completely protocol-version agnostic (most
        of this section applies to IPv6 in the same way as to IPv4).</t>
        <aside pn="section-2.4-2">
          <t indent="0" pn="section-2.4-2.1">Preamble: IPv6 control plane security is vastly congruent with its
        IPv4 equivalent, with the exception of OSPFv3 authentication (<xref target="control" format="default" sectionFormat="of" derivedContent="Section 2.4.1"/>) and some packet exceptions (see <xref target="exception" format="default" sectionFormat="of" derivedContent="Section 2.4.3"/>) that are specific to IPv6.</t>
        </aside>
        <t indent="0" pn="section-2.4-3">Modern router architecture design maintains a strict separation of
        forwarding and router control plane hardware and software. The router
        control plane supports routing and management functions. It is
        generally described as the router architecture hardware and software
        components for handling packets destined to the device itself as well
        as building and sending packets originated locally on the device. The
        forwarding plane is typically described as the router architecture
        hardware and software components responsible for receiving a packet on
        an incoming interface, performing a lookup to identify the packet's IP
        next hop and best outgoing interface towards the destination, and
        forwarding the packet through the appropriate outgoing interface.</t>
        <t indent="0" pn="section-2.4-4">While the forwarding plane is usually implemented in high-speed
        hardware, the control plane is implemented by a generic processor
        (referred to as the routing processor (RP)) and cannot process packets
        at a high rate. Hence, this processor can be attacked by flooding its
        input queue with more packets than it can process. The control plane
        processor is then unable to process valid control packets and the
        router can lose IGP or BGP adjacencies, which can cause a severe
        network disruption.</t>
        <t indent="0" pn="section-2.4-5"><xref target="RFC6192" format="default" sectionFormat="of" derivedContent="RFC6192"/> provides detailed guidance to protect the
        router control plane in IPv6 networks. The rest of this section
        contains simplified guidance.</t>
        <t indent="0" pn="section-2.4-6">The mitigation techniques are: </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.4-7">
          <li pn="section-2.4-7.1">to drop illegitimate or potentially harmful control packets before
            they are queued to the RP (this can be done by a forwarding plane
            ACL) and</li>
          <li pn="section-2.4-7.2">to rate-limit the remaining packets to a rate that the RP can
            sustain. Protocol-specific protection should also be done (for
            example, a spoofed OSPFv3 packet could trigger the execution of
            the Dijkstra algorithm; therefore, the frequency of Dijkstra
            calculations should also be rate limited).</li>
        </ul>
        <t indent="0" pn="section-2.4-8">This section will consider several classes of control packets:
        </t>
        <dl newline="true" spacing="normal" indent="3" pn="section-2.4-9">
          <dt pn="section-2.4-9.1">Control protocols:</dt>
          <dd pn="section-2.4-9.2">routing protocols, such as OSPFv3, BGP,
            Routing Information Protocol Next Generation (RIPng), and, by extension, NDP and
	  ICMP</dd>
          <dt pn="section-2.4-9.3">Management protocols:</dt>
          <dd pn="section-2.4-9.4">Secure Shell (SSH), SNMP, Network Configuration Protocol (NETCONF), RESTCONF,
	  IP Flow Information Export (IPFIX), etc.</dd>
          <dt pn="section-2.4-9.5">Packet exceptions:</dt>
          <dd pn="section-2.4-9.6">normal data packets that require a specific
            processing, such as generating a packet-too-big ICMP message or
            processing the hop-by-hop options header</dd>
        </dl>
        <section anchor="control" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.1">
          <name slugifiedName="name-control-protocols">Control Protocols</name>
          <t indent="0" pn="section-2.4.1-1">This class includes OSPFv3, BGP, NDP, and ICMP.</t>
          <t indent="0" pn="section-2.4.1-2">An ingress ACL to be applied on all the router interfaces for
          packets to be processed by the RP should be configured to: </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.4.1-3">
            <li pn="section-2.4.1-3.1">drop OSPFv3 (identified by Next-Header being 89) and RIPng
              (identified by UDP port 521) packets from a non-link-local
              address (except for OSPFv3 virtual links)</li>
            <li pn="section-2.4.1-3.2">allow BGP (identified by TCP port 179) packets from all BGP
              neighbors and drop the others</li>
            <li pn="section-2.4.1-3.3">allow all ICMP packets (transit and to the router
              interfaces)</li>
          </ul>
          <aside pn="section-2.4.1-4">
            <t indent="0" pn="section-2.4.1-4.1">Note: Dropping OSPFv3 packets that are authenticated by IPsec
          could be impossible on some routers that are unable to parse the
          IPsec ESP or AH extension headers during ACL classification.</t>
          </aside>
          <t indent="0" pn="section-2.4.1-5">Rate-limiting of the valid packets should be done; see <xref target="RFC8541" format="default" sectionFormat="of" derivedContent="RFC8541"/> for a side benefit for OSPv3. The exact
          configuration will depend on the available resources of the router
          (CPU, Ternary Content-Addressable Memory (TCAM), etc.).</t>
        </section>
        <section anchor="mgmt" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.2">
          <name slugifiedName="name-management-protocols">Management Protocols</name>
          <t indent="0" pn="section-2.4.2-1">This class includes SSH, SNMP, RESTCONF, NETCONF, gRPC Remote Procedure Calls
	  (gRPC), syslog, NTP, etc.</t>
          <t indent="0" pn="section-2.4.2-2">An ingress ACL to be applied on all the router interfaces (or at
          ingress interfaces of the security perimeter or by using specific
          features of the platform) should be configured for packets destined
          to the RP, such as: </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.4.2-3">
            <li pn="section-2.4.2-3.1">drop packets destined to the routers, except those belonging
              to protocols that are used (for example, permit TCP 22 and drop
              all others when only SSH is used) and</li>
            <li pn="section-2.4.2-3.2">drop packets where the source does not match the security
              policy (for example, if SSH connections should only be
              originated from the Network Operation Center (NOC), then the ACL
              should permit TCP port 22 packets only from the NOC prefix).</li>
          </ul>
          <t indent="0" pn="section-2.4.2-4">Rate-limiting of valid packets should be done. The exact
          configuration will depend on the available router resources.</t>
        </section>
        <section anchor="exception" numbered="true" toc="include" removeInRFC="false" pn="section-2.4.3">
          <name slugifiedName="name-packet-exceptions">Packet Exceptions</name>
          <t indent="0" pn="section-2.4.3-1">This class covers multiple cases where a data plane packet is
          punted to the route processor because it requires specific
          processing: </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.4.3-2">
            <li pn="section-2.4.3-2.1">generation of an ICMP packet-too-big message when a data
              plane packet cannot be forwarded because it is too large
              (required to discover the Path MTU);</li>
            <li pn="section-2.4.3-2.2">generation of an ICMP hop-limit-expired message when a data
              plane packet cannot be forwarded because its hop-limit field has
              reached 0 (also used by the traceroute utility);</li>
            <li pn="section-2.4.3-2.3">generation of an ICMP destination-unreachable message when a
              data plane packet cannot be forwarded for any reason;</li>
            <li pn="section-2.4.3-2.4">processing of the hop-by-hop options header; new
              implementations follow <xref target="RFC8200" sectionFormat="of" section="4.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8200#section-4.3" derivedContent="RFC8200"/> where this processing is optional; or</li>
            <li pn="section-2.4.3-2.5">more specific to some router implementations, an oversized
              extension header chain that cannot be processed by the hardware
              and cannot force the packet to be punted to the RP.</li>
          </ul>
          <t indent="0" pn="section-2.4.3-3">On some routers, not everything can be done by the specialized
          data plane hardware that requires some packets to be 'punted' to
          the generic RP. This could include, for example, the processing of a
          long extension header chain in order to apply an ACL based on
          Layer 4 information. <xref target="RFC6980" format="default" sectionFormat="of" derivedContent="RFC6980"/> and more generally
          <xref target="RFC7112" format="default" sectionFormat="of" derivedContent="RFC7112"/> highlight the security implications of
          oversized extension header chains on routers and update the
          original IPv6 specifications <xref target="RFC2460" format="default" sectionFormat="of" derivedContent="RFC2460"/> such that
          the first fragment of a packet is required to contain the entire
          IPv6 header chain. Those changes are incorporated in the IPv6
          standard <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>.</t>
          <t indent="0" pn="section-2.4.3-4">An ingress ACL cannot mitigate a control plane attack using these
          packet exceptions. The only protection for the RP is to rate-limit
          those packet exceptions that are forwarded to the RP. This means
          that some data plane packets will be dropped without an ICMP message
          sent to the source, which may delay Path MTU Discovery and cause
          drops.</t>
          <t indent="0" pn="section-2.4.3-5">In addition to limiting the rate of data plane packets queued to
          the RP, it is also important to rate-limit the generation of ICMP
          messages. This is important both to preserve RP resources and also
          to prevent an amplification attack using the router as a reflector.
          It is worth noting that some platforms implement this rate-limiting
          in hardware. Of course, a consequence of not generating an ICMP
          message will break some IPv6 mechanisms, such as Path MTU Discovery
          or a simple traceroute.</t>
        </section>
      </section>
      <section anchor="rsec" numbered="true" toc="include" removeInRFC="false" pn="section-2.5">
        <name slugifiedName="name-routing-security">Routing Security</name>
        <aside pn="section-2.5-1">
          <t indent="0" pn="section-2.5-1.1">Preamble: IPv6 routing security is congruent with IPv4 routing
        security, with the exception of OSPv3 neighbor authentication (see
        <xref target="auth" format="default" sectionFormat="of" derivedContent="Section 2.5.2"/>).</t>
        </aside>
        <t indent="0" pn="section-2.5-2">Routing security in general can be broadly divided into three
        sections: </t>
        <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-2.5-3">
	  <li pn="section-2.5-3.1" derivedCounter="1.">authenticating neighbors/peers</li>
          <li pn="section-2.5-3.2" derivedCounter="2.">securing routing updates between peers</li>
          <li pn="section-2.5-3.3" derivedCounter="3.">route filtering</li>
        </ol>
        <t indent="0" pn="section-2.5-4"><xref target="RFC5082" format="default" sectionFormat="of" derivedContent="RFC5082"/> is also applicable to IPv6 and can ensure
        that routing protocol packets are coming from the local network; it
        must also be noted that in IPv6 all interior gateway protocols use
        link-local addresses.</t>
        <t indent="0" pn="section-2.5-5">As for IPv4, it is recommended to enable a routing protocol only on
        interfaces where it is required.</t>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-2.5.1">
          <name slugifiedName="name-bgp-security">BGP Security</name>
          <t indent="0" pn="section-2.5.1-1">As BGP is identical for IPv4 and IPv6 and as <xref target="RFC7454" format="default" sectionFormat="of" derivedContent="RFC7454"/> covers all the security aspects for BGP in
          detail, <xref target="RFC7454" format="default" sectionFormat="of" derivedContent="RFC7454"/> is also applicable to IPv6.</t>
        </section>
        <section anchor="auth" numbered="true" toc="include" removeInRFC="false" pn="section-2.5.2">
          <name slugifiedName="name-authenticating-ospfv3-neigh">Authenticating OSPFv3 Neighbors</name>
          <t indent="0" pn="section-2.5.2-1">OSPFv3 can rely on IPsec to fulfill the authentication function.
          Operators should note that IPsec support is not standard on all
          routing platforms. In some cases, this requires specialized hardware
          that offloads crypto over to dedicated Application-Specific Integrated Circuits
	  (ASICs) or enhanced software
          images (both of which often come with added financial cost) to
          provide such functionality. An added detail is to determine whether
          OSPFv3 IPsec implementations use AH or ESP-NULL for integrity
          protection. In early implementations, all OSPFv3 IPsec
          configurations relied on AH since the details weren't specified in
          <xref target="RFC5340" format="default" sectionFormat="of" derivedContent="RFC5340"/>. 
	  However, the document that specifically
          describes how IPsec should be implemented for OSPFv3 <xref target="RFC4552" format="default" sectionFormat="of" derivedContent="RFC4552"/> states that "implementations <bcp14>MUST</bcp14> support ESP[-NULL] and
          <bcp14>MAY</bcp14> support AH" since it follows the overall IPsec standards
          wording. OSPFv3 can also use normal ESP to encrypt the OSPFv3
          payload to provide confidentiality for the routing information.</t>
          <t indent="0" pn="section-2.5.2-2"><xref target="RFC7166" format="default" sectionFormat="of" derivedContent="RFC7166"/> changes OSPFv3 reliance on IPsec by
          appending an authentication trailer to the end of the OSPFv3
          packets. It does not authenticate the specific
          originator of an OSPFv3 packet; rather, it allows a router to
          confirm that the packet has been issued by a router that had access
          to the shared authentication key.</t>
          <t indent="0" pn="section-2.5.2-3">With all authentication mechanisms, operators should confirm that
          implementations can support rekeying mechanisms that do not cause
          outages. There have been instances where any rekeying causes
          outages; therefore, the trade-off between utilizing this
          functionality needs to be weighed against the protection it
          provides. <xref target="RFC4107" format="default" sectionFormat="of" derivedContent="RFC4107"/> documents some guidelines for
          crypto keys management.</t>
        </section>
        <section anchor="updates" numbered="true" toc="include" removeInRFC="false" pn="section-2.5.3">
          <name slugifiedName="name-securing-routing-updates">Securing Routing Updates</name>
          <t indent="0" pn="section-2.5.3-1">IPv6 initially mandated the provisioning of IPsec capability in
          all nodes. However, in the updated IPv6 Nodes Requirement standard
          <xref target="RFC8504" format="default" sectionFormat="of" derivedContent="RFC8504"/>, IPsec is a '<bcp14>SHOULD</bcp14>' and not a
	  '<bcp14>MUST</bcp14>'
          implementation. Theoretically, it is possible that all communication
          between two IPv6 nodes, especially routers exchanging routing
          information, is encrypted using IPsec. However, in practice, 
          deploying IPsec is not always feasible given hardware and software
          limitations of the various platforms deployed.</t>
          <t indent="0" pn="section-2.5.3-2">Many routing protocols support the use of cryptography to protect
          the routing updates; the use of this protection is recommended.
          <xref target="RFC8177" format="default" sectionFormat="of" derivedContent="RFC8177"/> is a YANG data model for key chains
	  that includes rekeying functionality.</t>
        </section>
        <section anchor="rfilter" numbered="true" toc="include" removeInRFC="false" pn="section-2.5.4">
          <name slugifiedName="name-route-filtering">Route Filtering</name>
          <t indent="0" pn="section-2.5.4-1">Route filtering policies will be different depending on whether
          they pertain to edge route filtering or internal route filtering.
          At a minimum, the IPv6 routing policy, as it pertains to routing between
          different administrative domains, should aim to maintain parity with
          IPv4 from a policy perspective, for example: </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.5.4-2">
            <li pn="section-2.5.4-2.1">filter internal-use IPv6 addresses that are not globally routable at
              the perimeter;</li>
            <li pn="section-2.5.4-2.2">discard routes
	    for bogon <xref target="CYMRU" format="default" sectionFormat="of" derivedContent="CYMRU"/> and reserved
              space (see <xref target="RFC8190" format="default" sectionFormat="of" derivedContent="RFC8190"/>); and</li>
            <li pn="section-2.5.4-2.3">configure ingress route filters that validate route origin,
              prefix ownership, etc., through the use of various routing
              databases, e.g., <xref target="RADB" format="default" sectionFormat="of" derivedContent="RADB"/>. <xref target="RFC8210" format="default" sectionFormat="of" derivedContent="RFC8210"/>
              formally validates the origin Autonomous Systems (ASes) of BGP announcements. </li>
          </ul>
          <t indent="0" pn="section-2.5.4-3">Some good guidance can be found at <xref target="RFC7454" format="default" sectionFormat="of" derivedContent="RFC7454"/>.</t>
          <t indent="0" pn="section-2.5.4-4">A valid routing table can also be used to apply network ingress
          filtering (see <xref target="RFC2827" format="default" sectionFormat="of" derivedContent="RFC2827"/>).</t>
        </section>
      </section>
      <section anchor="log" numbered="true" toc="include" removeInRFC="false" pn="section-2.6">
        <name slugifiedName="name-logging-monitoring">Logging/Monitoring</name>
        <t indent="0" pn="section-2.6-1">In order to perform forensic research in the cases of a security
        incident or detecting abnormal behavior, network operators should log
        multiple pieces of information. In some cases, this requires a
        frequent poll of devices via a Network Management Station.</t>
        <t indent="0" pn="section-2.6-2">This logging should include but is not limited to: </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6-3">
          <li pn="section-2.6-3.1">logs of all applications using the network (including user
            space and kernel space) when available (for example, web servers
            that the network operator manages);</li>
          <li pn="section-2.6-3.2">data from <xref target="RFC7011" format="default" sectionFormat="of" derivedContent="RFC7011">IP Flow Information Export
            </xref>, also known as IPFIX;</li>
          <li pn="section-2.6-3.3">data from various SNMP <xref target="RFC4293" format="default" sectionFormat="of" derivedContent="RFC4293">MIBs</xref> or
            YANG data via <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040">RESTCONF</xref> or <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241">NETCONF</xref>;</li>
          <li pn="section-2.6-3.4">historical data of Neighbor Cache entries;</li>
          <li pn="section-2.6-3.5">
            <xref target="RFC8415" format="default" sectionFormat="of" derivedContent="RFC8415">stateful DHCPv6</xref> lease cache,
            especially when a <xref target="RFC6221" format="default" sectionFormat="of" derivedContent="RFC6221">relay agent</xref> is
            used;</li>
          <li pn="section-2.6-3.6">
            <xref target="RFC7039" format="default" sectionFormat="of" derivedContent="RFC7039">Source Address Validation Improvement
	  (SAVI)</xref> events, especially the binding of an IPv6
            address to a MAC address and a specific switch or router
            interface;</li>
          <li pn="section-2.6-3.7">firewall ACL logs;</li>
          <li pn="section-2.6-3.8">authentication server logs; and</li>
          <li pn="section-2.6-3.9">
            <xref target="RFC2866" format="default" sectionFormat="of" derivedContent="RFC2866">RADIUS</xref> accounting records.</li>
        </ul>
        <t indent="0" pn="section-2.6-4">Please note that there are privacy issues or regulations related to
        how these logs are collected, stored, used, and safely discarded.
        Operators are urged to check their country legislation (e.g., General
        Data Protection Regulation <xref target="GDPR" format="default" sectionFormat="of" derivedContent="GDPR"/> in the
        European Union).</t>
        <t indent="0" pn="section-2.6-5">All those pieces of information can be used for:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6-6">
          <li pn="section-2.6-6.1">
            <xref target="forensic" format="default" sectionFormat="of" derivedContent="Section 2.6.2.1">forensic</xref> investigations:
            who did what and when?</li>
          <li pn="section-2.6-6.2">
            <xref target="correlation" format="default" sectionFormat="of" derivedContent="Section 2.6.2.3">correlation</xref>: which IP
            addresses were used by a specific node (assuming the use of <xref target="RFC8981" format="default" sectionFormat="of" derivedContent="RFC8981">privacy extensions addresses </xref>)?</li>
          <li pn="section-2.6-6.3">
            <xref target="inventory" format="default" sectionFormat="of" derivedContent="Section 2.6.2.2">inventory</xref>: which IPv6 nodes
	    are on my network?</li>
          <li pn="section-2.6-6.4">
            <xref target="abnormal_behavior" format="default" sectionFormat="of" derivedContent="Section 2.6.2.4">abnormal behavior
            detection</xref>: unusual traffic patterns are often the symptoms
            of an abnormal behavior, which is in turn a potential attack
            (denial of service, network scan, a node being part of a botnet,
            etc.).</li>
        </ul>
        <section anchor="data_sources" numbered="true" toc="include" removeInRFC="false" pn="section-2.6.1">
          <name slugifiedName="name-data-sources">Data Sources</name>
          <t indent="0" pn="section-2.6.1-1">This section lists the most important sources of data that are
          useful for operational security.</t>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.1.1">
            <name slugifiedName="name-application-logs">Application Logs</name>
            <t indent="0" pn="section-2.6.1.1-1">Those logs are usually text files where the remote IPv6 address
            is stored in cleartext (not binary). This can complicate the
            processing since one IPv6 address, for example, 2001:db8::1, can be
            written in multiple ways, such as:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6.1.1-2">
              <li pn="section-2.6.1.1-2.1">2001:DB8::1 (in uppercase),</li>
              <li pn="section-2.6.1.1-2.2">2001:0db8::0001 (with leading 0), and</li>
              <li pn="section-2.6.1.1-2.3">many other ways, including the reverse DNS mapping into
                a Fully Qualified Domain Name (FQDN) (which should not be trusted).</li>
            </ul>
            <t indent="0" pn="section-2.6.1.1-3"><xref target="RFC5952" format="default" sectionFormat="of" derivedContent="RFC5952"/> explains this problem in detail and
            recommends the use of a single canonical format. This document
            recommends the use of <xref target="RFC5952" format="default" sectionFormat="of" derivedContent="RFC5952">canonical
            format</xref> for IPv6 addresses in all possible cases. If the
            existing application cannot log using the canonical format, then
            it is recommended to use an external post-processing program in
            order to canonicalize all IPv6 addresses.</t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.1.2">
            <name slugifiedName="name-ip-flow-information-export-">IP Flow Information Export by IPv6 Routers</name>
            <t indent="0" pn="section-2.6.1.2-1"><xref target="RFC7012" format="default" sectionFormat="of" derivedContent="RFC7012">IPFIX</xref> defines some data elements
            that are useful for security:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6.1.2-2">
              <li pn="section-2.6.1.2-2.1">nextHeaderIPv6, sourceIPv6Address, and
                destinationIPv6Address</li>
              <li pn="section-2.6.1.2-2.2">sourceMacAddress and destinationMacAddress</li>
            </ul>
            <t indent="0" pn="section-2.6.1.2-3">The IP version is the ipVersion element defined in <xref target="IANA-IPFIX" format="default" sectionFormat="of" derivedContent="IANA-IPFIX"/>.</t>
            <t indent="0" pn="section-2.6.1.2-4">Moreover, IPFIX is very efficient in terms of data handling and
            transport. It can also aggregate flows by a key, such as
            sourceMacAddress, in order to have aggregated data associated with
            a specific sourceMacAddress. This memo recommends the use of IPFIX
            and aggregation on nextHeaderIPv6, sourceIPv6Address, and
            sourceMacAddress.</t>
          </section>
          <section anchor="mib" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.1.3">
            <name slugifiedName="name-snmp-mib-and-netconf-restco">SNMP MIB and NETCONF/RESTCONF YANG Modules Data by IPv6 Routers</name>
            <t indent="0" pn="section-2.6.1.3-1"><xref target="RFC4293" format="default" sectionFormat="of" derivedContent="RFC4293"/> defines a Management
            Information Base (MIB) for the two address families of IP. This
            memo recommends the use of:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6.1.3-2">
              <li pn="section-2.6.1.3-2.1">ipIfStatsTable table, which collects traffic counters per
                interface, and</li>
              <li pn="section-2.6.1.3-2.2">ipNetToPhysicalTable table, which is the content of the
                Neighbor Cache, i.e., the mapping between IPv6 and data-link
                layer addresses.</li>
            </ul>
            <t indent="0" pn="section-2.6.1.3-3">There are also YANG modules relating to the two IP address
            families and that can be used with <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241"/> and <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040"/>. This memo recommends the use of:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6.1.3-4">
              <li pn="section-2.6.1.3-4.1">interfaces-state/interface/statistics from <xref target="RFC8343" format="default" sectionFormat="of" derivedContent="RFC8343">ietf-interfaces@2018-02-20.yang</xref>, which
                contains counters for interfaces, and</li>
              <li pn="section-2.6.1.3-4.2">ipv6/neighbor from <xref target="RFC8344" format="default" sectionFormat="of" derivedContent="RFC8344">ietf-ip@2018-02-22.yang</xref>, which is the
                content of the Neighbor Cache, i.e., the mapping between IPv6
                and data-link layer addresses.</li>
            </ul>
          </section>
          <section anchor="ndp_cache" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.1.4">
            <name slugifiedName="name-neighbor-cache-of-ipv6-rout">Neighbor Cache of IPv6 Routers</name>
            <t indent="0" pn="section-2.6.1.4-1">The Neighbor Cache of routers contains all mappings between
            IPv6 addresses and data-link layer addresses. There are multiple
            ways to collect the current entries in the Neighbor Cache, notably,
            but not limited to:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6.1.4-2">
              <li pn="section-2.6.1.4-2.1">using the <xref target="mib" format="default" sectionFormat="of" derivedContent="Section 2.6.1.3">SNMP MIB</xref>, as
	      explained above;</li>
              <li pn="section-2.6.1.4-2.2">using streaming telemetry or <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241">NETCONF</xref> and <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040">RESTCONF</xref> to collect the operational
                state of the Neighbor Cache; and</li>
              <li pn="section-2.6.1.4-2.3">connecting over a secure management channel (such
                as SSH) and explicitly requesting a Neighbor Cache dump via
                the Command-Line Interface (CLI) or another monitoring
                mechanism.</li>
            </ul>
            <t indent="0" pn="section-2.6.1.4-3">The Neighbor Cache is highly dynamic, as mappings are added when
            a new IPv6 address appears on the network. This could be quite
            frequently with <xref target="RFC8981" format="default" sectionFormat="of" derivedContent="RFC8981">privacy extension
            addresses</xref> or when they are removed when the state goes from
            UNREACH to removed (the default time for a removal per <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861">Neighbor Unreachability Detection</xref>
            algorithm is 38 seconds for a host using Windows 7). This means
            that the content of the Neighbor Cache must be
            fetched periodically at an interval that does not exhaust the router resources
            and still provides valuable information (the suggested value is 30
            seconds, but this should be verified in the actual deployment) and
            stored for later use.</t>
            <t indent="0" pn="section-2.6.1.4-4">This is an important source of information because it is
            trivial (on a switch not using the <xref target="RFC7039" format="default" sectionFormat="of" derivedContent="RFC7039">SAVI</xref> algorithm) to defeat the mapping
            between data-link layer address and an IPv6 address. Put another way, having access to the current and past
            content of the Neighbor Cache has a paramount value for the
            forensic and audit trails. It should also be noted that, in certain
            threat models, this information is also deemed valuable and could
            itself be a target.</t>
            <t indent="0" pn="section-2.6.1.4-5">When using one /64 per host (<xref target="sixty4perhost" format="default" sectionFormat="of" derivedContent="Section 2.1.8"/>)
	    or DHCP-PD, it is sufficient to keep the history of the allocated
            prefixes when combined with strict source address prefix
            enforcement on the routers and L2 switches to prevent IPv6
            spoofing.</t>
          </section>
          <section anchor="stateful_dhcp" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.1.5">
            <name slugifiedName="name-stateful-dhcpv6-lease">Stateful DHCPv6 Lease</name>
            <t indent="0" pn="section-2.6.1.5-1">In some networks, IPv6 addresses/prefixes are managed by a
            stateful <xref target="RFC8415" format="default" sectionFormat="of" derivedContent="RFC8415">DHCPv6 server</xref> that leases
            IPv6 addresses/prefixes to clients. It is indeed quite similar to
            DHCP for IPv4, so it can be tempting to use this DHCP lease file
            to discover the mapping between IPv6 addresses/prefixes and
            data-link layer addresses, as is commonly used in IPv4
            networking.</t>
            <t indent="0" pn="section-2.6.1.5-2">It is not so easy in the IPv6 networks, because not all nodes
            will use DHCPv6 (there are nodes that can only do stateless
            autoconfiguration) and also because DHCPv6 clients are identified
            not by their hardware-client address, as in IPv4, but by a DHCP
            Unique Identifier (DUID). The DUID can have several formats: the
            data-link layer address, the data-link layer address
            prepended with time information, or even an opaque number that
            requires correlation with another data source to be usable for
            operational security. Moreover, when the DUID is based on the
            data-link address, this address can be of any client interface
            (such as the wireless interface, while the client actually uses its
            wired interface to connect to the network).</t>
            <t indent="0" pn="section-2.6.1.5-3">If a <xref target="RFC6221" format="default" sectionFormat="of" derivedContent="RFC6221">lightweight DHCP relay
	    agent</xref>
            is used in a L2 switch, then the DHCP servers also receive
            the interface ID information, which could be saved in order to
            identify the interface on which the switch received a specific
            leased IPv6 address. Also, if a 'normal' (not lightweight) relay
            agent adds the data-link layer address in the option for Relay Agent
	    Remote-ID <xref target="RFC4649" format="default" sectionFormat="of" derivedContent="RFC4649"/> <xref target="RFC6939" format="default" sectionFormat="of" derivedContent="RFC6939"/>, then the DHCPv6 server can keep 
	    track of the data-link and leased IPv6 addresses.</t>
            <t indent="0" pn="section-2.6.1.5-4">In short, the DHCPv6 lease file is less interesting than lease files for
            IPv4 networks. If possible, it is recommended to use DHCPv6
            servers that keep the relayed data-link layer address in addition
            to the DUID in the lease file, as those servers have the equivalent
            information to IPv4 DHCP servers.</t>
            <t indent="0" pn="section-2.6.1.5-5">The mapping between the data-link layer address and the IPv6
            address can be secured by deploying switches implementing the
            <xref target="RFC7513" format="default" sectionFormat="of" derivedContent="RFC7513">SAVI</xref> mechanisms. Of course, this
            also requires that the data-link layer address be protected by
            using a L2 mechanism, such as <xref target="IEEE-802.1X" format="default" sectionFormat="of" derivedContent="IEEE-802.1X"/>.</t>
          </section>
          <section anchor="radius_accounting" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.1.6">
            <name slugifiedName="name-radius-accounting-log">RADIUS Accounting Log</name>
            <t indent="0" pn="section-2.6.1.6-1">For interfaces where the user is authenticated via a <xref target="RFC2866" format="default" sectionFormat="of" derivedContent="RFC2866">RADIUS</xref> server, and if RADIUS accounting is
            enabled, then the RADIUS server receives accounting
            Acct-Status-Type records at the start and at the end of the
            connection, which include all IPv6 (and IPv4) addresses used by the
            user. This technique can be used notably for Wi-Fi networks with
            Wi-Fi Protected Access (WPA) or other <xref target="IEEE-802.1X" format="default" sectionFormat="of" derivedContent="IEEE-802.1X">IEEE 802.1X</xref> wired interfaces on an
            Ethernet switch.</t>
          </section>
          <section numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.1.7">
            <name slugifiedName="name-other-data-sources">Other Data Sources</name>
            <t indent="0" pn="section-2.6.1.7-1">There are other data sources for log information that must be
            collected (as currently collected in IPv4 networks):</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6.1.7-2">
              <li pn="section-2.6.1.7-2.1">historical mappings of IPv6 addresses to users of remote
                access VPN and</li>
              <li pn="section-2.6.1.7-2.2">historical mappings of MAC addresses to switch ports in a
                wired network.</li>
            </ul>
          </section>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-2.6.2">
          <name slugifiedName="name-use-of-collected-data">Use of Collected Data</name>
          <t indent="0" pn="section-2.6.2-1">This section leverages the data collected, as described in <xref format="default" target="data_sources" sectionFormat="of" derivedContent="Section 2.6.1"/>, in order to
          achieve several security benefits. <xref target="RFC7934" sectionFormat="of" section="9.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7934#section-9.1" derivedContent="RFC7934"/> contains more details about host tracking.</t>
          <section anchor="forensic" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.2.1">
            <name slugifiedName="name-forensic-and-user-accountab">Forensic and User Accountability</name>
            <t indent="0" pn="section-2.6.2.1-1">The forensic use case is when the network operator must locate
            an IPv6 address (and the associated port, access point/switch, or
            VPN tunnel) that was present in the network at a certain time or
            is currently in the network.</t>
            <t indent="0" pn="section-2.6.2.1-2">To locate an IPv6 address in an enterprise network where the
            operator has control over all resources, the source of information
            can be the Neighbor Cache, or, if not found, the DHCP lease file.
            Then, the procedure is: </t>
            <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-2.6.2.1-3">
	      <li pn="section-2.6.2.1-3.1" derivedCounter="1.">based on the IPv6 prefix of the IPv6 address; find one or more
                routers that are used to reach this prefix (assuming
                that anti-spoofing mechanisms are used), perhaps based on an
                IPAM.</li>
              <li pn="section-2.6.2.1-3.2" derivedCounter="2.">based on this limited set of routers, on the incident time,
                and on the IPv6 address; retrieve the data-link address from
                the live Neighbor Cache, from the historical Neighbor Cache
                data, or from SAVI events, or retrieve the data-link address
                from the DHCP lease file (<xref target="stateful_dhcp" format="default" sectionFormat="of" derivedContent="Section 2.6.1.5"/>).</li>
              <li pn="section-2.6.2.1-3.3" derivedCounter="3.">based on the data-link layer address; look up the switch
                interface associated with the data-link layer address. In the
                case of wireless LAN with RADIUS accounting (see <xref target="radius_accounting" format="default" sectionFormat="of" derivedContent="Section 2.6.1.6"/>), the RADIUS log has the mapping
                between the user identification and the MAC address. If a
                Configuration Management Database (CMDB) is used, then it can
                be used to map the data-link layer address to a switch
                port.</li>
            </ol>
            <t indent="0" pn="section-2.6.2.1-4">At the end of the process, the interface of the host
            originating or the subscriber identity associated with the
            activity in question has been determined.</t>
            <t indent="0" pn="section-2.6.2.1-5">To identify the subscriber of an IPv6 address in a residential
            Internet Service Provider, the starting point is the DHCP-PD
            leased prefix covering the IPv6 address; this prefix can often be
            linked to a subscriber via the RADIUS log. Alternatively, the
            Forwarding Information Base (FIB) of the Cable Modem Termination
            System (CMTS) or Broadband Network Gateway (BNG) indicates the Customer Premises
	    Equipment (CPE)
            of the subscriber and the RADIUS log can be used to retrieve the
            actual subscriber.</t>
            <t indent="0" pn="section-2.6.2.1-6">More generally, a mix of the above techniques can be used in
            most, if not all, networks.</t>
          </section>
          <section anchor="inventory" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.2.2">
            <name slugifiedName="name-inventory">Inventory</name>
            <t indent="0" pn="section-2.6.2.2-1"><xref target="RFC7707" format="default" sectionFormat="of" derivedContent="RFC7707"/> describes the
            difficulties for an attacker to scan an IPv6 network due to the
            vast number of IPv6 addresses per link (and why in some cases it
            can still be done). While the huge addressing space can sometimes
            be perceived as a 'protection', it also makes the inventory task
            difficult in an IPv6 network while it was trivial to do in an IPv4
            network (a simple enumeration of all IPv4 addresses, followed by a
            ping and a TCP/UDP port scan). Getting an inventory of all
            connected devices is of prime importance for a secure network
            operation.</t>
            <t indent="0" pn="section-2.6.2.2-2">There are many ways to do an inventory of an IPv6 network.</t>
            <t indent="0" pn="section-2.6.2.2-3">The first technique is to use passive inspection, such as IPFIX.
            Using exported IPFIX information and extracting the list of all
            IPv6 source addresses allows finding all IPv6 nodes that sent
            packets through a router. This is very efficient but, alas, will
            not discover silent nodes that never transmitted packets
            traversing the IPFIX target router. Also, it must be noted that
            link-local addresses will never be discovered by this means. </t>
            <t indent="0" pn="section-2.6.2.2-4">The second way is again to use the collected Neighbor Cache
            content to find all IPv6 addresses in the cache. This process will
            also discover all link-local addresses. See <xref target="ndp_cache" format="default" sectionFormat="of" derivedContent="Section 2.6.1.4"/>.</t>
            <t indent="0" pn="section-2.6.2.2-5">Another way that works only for a local network consists of
            sending an ICMP ECHO_REQUEST to the link-local multicast address
            ff02::1, which addresses all IPv6 nodes on the network. All nodes
            should reply to this ECHO_REQUEST, per <xref target="RFC4443" format="default" sectionFormat="of" derivedContent="RFC4443"/>.</t>
            <t indent="0" pn="section-2.6.2.2-6">Other techniques involve obtaining data from DNS, parsing log
            files, and leveraging service discovery, such as mDNS <xref target="RFC6762" format="default" sectionFormat="of" derivedContent="RFC6762"/> <xref target="RFC6763" format="default" sectionFormat="of" derivedContent="RFC6763"/>.</t>
            <t indent="0" pn="section-2.6.2.2-7">Enumerating DNS zones, especially looking at reverse DNS
            records and CNAMEs, is another common method employed by various
            tools. As already mentioned in <xref target="RFC7707" format="default" sectionFormat="of" derivedContent="RFC7707"/>, this
            allows an attacker to prune the IPv6 reverse DNS tree and hence
            enumerate it in a feasible time. Furthermore, authoritative
            servers that allow zone transfers (i.e., Authoritative Transfers (AXFRs)) may be a further
            information source. An interesting research paper has analyzed the
            entropy in various IPv6 addresses: see <xref target="ENTROPYIP" format="default" sectionFormat="of" derivedContent="ENTROPYIP"/>.</t>
          </section>
          <section anchor="correlation" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.2.3">
            <name slugifiedName="name-correlation">Correlation</name>
            <t indent="0" pn="section-2.6.2.3-1">In an IPv4 network, it is easy to correlate multiple logs, for
            example, to find events related to a specific IPv4 address. A
            simple Unix grep command is enough to scan through multiple
            text-based files and extract all lines relevant to a specific IPv4
            address.</t>
            <t indent="0" pn="section-2.6.2.3-2">In an IPv6 network, this is slightly more difficult because
            different character strings can express the same IPv6 address.
            Therefore, the simple Unix grep command cannot be used. Moreover,
            an IPv6 node can have multiple IPv6 addresses.</t>
            <t indent="0" pn="section-2.6.2.3-3">In order to do correlation in IPv6-related logs, it is advised
            to have all logs in a format with only canonical IPv6 addresses
            <xref target="RFC5952" format="default" sectionFormat="of" derivedContent="RFC5952"/>. Then, the current (or
            historical) Neighbor Cache data set must be searched to find the data-link layer
            address of the IPv6 address. Next, the current and historical
            Neighbor Cache data sets must be searched for all IPv6 addresses
            associated with this data-link layer address to derive the search
            set. The last step is to search in all log files (containing only
            IPv6 addresses in canonical format) for any IPv6 addresses in the
            search set.</t>
            <t indent="0" pn="section-2.6.2.3-4">Moreover, <xref target="RFC7934" format="default" sectionFormat="of" derivedContent="RFC7934"/> recommends using multiple
            IPv6 addresses per prefix, so the correlation must also be done
            among those multiple IPv6 addresses, for example, by discovering all IPv6 addresses
            associated with the same MAC address and interface in
            the <xref target="ndp_cache" format="default" sectionFormat="of" derivedContent="Section 2.6.1.4">NDP cache</xref>.</t>
          </section>
          <section anchor="abnormal_behavior" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.6.2.4">
            <name slugifiedName="name-abnormal-behavior-detection">Abnormal Behavior Detection</name>
            <t indent="0" pn="section-2.6.2.4-1">Abnormal behavior (such as network scanning, spamming,
            DoS) can be detected in the same way as in an IPv4
            network:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.6.2.4-2">
              <li pn="section-2.6.2.4-2.1">a sudden increase of traffic detected by interface counter
                (SNMP) or by aggregated traffic from <xref target="RFC7012" format="default" sectionFormat="of" derivedContent="RFC7012">IPFIX records</xref>,</li>
              <li pn="section-2.6.2.4-2.2">rapid growth of ND cache size, or</li>
              <li pn="section-2.6.2.4-2.3">change in traffic pattern (number of connections per
                second, number of connections per host, etc.) observed with the
                use of <xref target="RFC7012" format="default" sectionFormat="of" derivedContent="RFC7012">IPFIX</xref>.</li>
            </ul>
          </section>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-2.6.3">
          <name slugifiedName="name-summary">Summary</name>
          <t indent="0" pn="section-2.6.3-1">While some data sources (IPFIX, MIB, switch Content Addressable Memory (CAM)
	  tables, logs, etc.) used in IPv4 are also used in the secure operation of an IPv6
          network, the DHCPv6 lease file is less reliable and the Neighbor
          Cache is of prime importance.</t>
          <t indent="0" pn="section-2.6.3-2">The fact that there are multiple ways to express the same IPv6
          address in a character string renders the use of filters mandatory
          when correlation must be done.</t>
        </section>
      </section>
      <section anchor="coexistence" numbered="true" toc="include" removeInRFC="false" pn="section-2.7">
        <name slugifiedName="name-transition-coexistence-tech">Transition/Coexistence Technologies</name>
        <t indent="0" pn="section-2.7-1">As it is expected that some networks will not run in a pure
        IPv6-only mode, the different transition mechanisms must be deployed
        and operated in a secure way. This section proposes operational
        guidelines for the most-known and deployed transition techniques.
        <xref target="RFC4942" format="default" sectionFormat="of" derivedContent="RFC4942"/> also contains security considerations for
        transition or coexistence scenarios.</t>
        <section anchor="dual" numbered="true" toc="include" removeInRFC="false" pn="section-2.7.1">
          <name slugifiedName="name-dual-stack">Dual Stack</name>
          <t indent="0" pn="section-2.7.1-1">Dual stack is often the first deployment choice for network
          operators. Dual stacking the network offers some advantages over
          other transition mechanisms. Firstly, the impact on existing IPv4
          operations is reduced. Secondly, in the absence of tunnels or
          address translation, the IPv4 and IPv6 traffic are native (easier to
          observe and secure) and should have the same network processing
          (network path, quality of service, etc.). Dual stack enables a
          gradual termination of the IPv4 operations when the IPv6 network is
          ready for prime time. On the other hand, the operators have to
          manage two network stacks with the added complexities.</t>
          <t indent="0" pn="section-2.7.1-2">From an operational security perspective, this now means that the
          network operator has twice the exposure. One needs to think about
          protecting both protocols now. At a minimum, the IPv6 portion of a
          dual-stacked network should be consistent with IPv4 from a security
          policy point of view. Typically, the following methods are employed
          to protect IPv4 networks at the edge or security perimeter: </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.7.1-3">
            <li pn="section-2.7.1-3.1">ACLs to permit or deny traffic,</li>
            <li pn="section-2.7.1-3.2">firewalls with stateful packet inspection, and</li>
            <li pn="section-2.7.1-3.3">application firewalls inspecting the application flows.</li>
          </ul>
          <t indent="0" pn="section-2.7.1-4">It is recommended that these ACLs and/or firewalls be
          additionally configured to protect IPv6 communications. The enforced
          IPv6 security must be congruent with the IPv4 security policy;
          otherwise, the attacker will use the protocol version that has the more
          relaxed security policy. Maintaining the congruence between security
          policies can be challenging (especially over time); it is
          recommended to use a firewall or an ACL manager that is dual stack,
          i.e., a system that can apply a single ACL entry to a mixed group of
          IPv4 and IPv6 addresses.</t>
          <t indent="0" pn="section-2.7.1-5">Application firewalls work at the application layer and are
          oblivious to the IP version, i.e., they work as well for IPv6 as for
          IPv4 and the same application security policy will work for both
          protocol versions.</t>
          <t indent="0" pn="section-2.7.1-6">Also, given the end-to-end connectivity that IPv6 provides, it is
          recommended that hosts be fortified against threats. General device
          hardening guidelines are provided in <xref target="device" format="default" sectionFormat="of" derivedContent="Section 2.8"/>.</t>
          <t indent="0" pn="section-2.7.1-7">For many years, all host operating systems have IPv6 enabled by
          default, so it is possible even in an 'IPv4-only' network to attack
          L2-adjacent victims via their IPv6 link-local address or via a
          global IPv6 address when the attacker provides rogue RAs or a rogue
          DHCPv6 service.</t>
          <t indent="0" pn="section-2.7.1-8"><xref target="RFC7123" format="default" sectionFormat="of" derivedContent="RFC7123"/> discusses the security implications of
          native IPv6 support and IPv6 transition/coexistence technologies on
          'IPv4-only' networks and describes possible mitigations for the
          aforementioned issues.</t>
        </section>
        <section anchor="transition" numbered="true" toc="include" removeInRFC="false" pn="section-2.7.2">
          <name slugifiedName="name-encapsulation-mechanisms">Encapsulation Mechanisms</name>
          <t indent="0" pn="section-2.7.2-1">There are many tunnels used for specific use cases. Except when
          protected by <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301">IPsec</xref> or alternative
          tunnel encryption methods, all those tunnels have a number of
          security issues, as described in <xref target="RFC6169" format="default" sectionFormat="of" derivedContent="RFC6169"/>:</t>
          <dl newline="true" spacing="normal" indent="3" pn="section-2.7.2-2">
            <dt pn="section-2.7.2-2.1">tunnel injection:</dt>
            <dd pn="section-2.7.2-2.2">A malevolent actor knowing a few pieces of
              information (for example, the tunnel endpoints and the
              encapsulation protocol) can forge a packet that looks like a
              legitimate and valid encapsulated packet that will gladly be
              accepted by the destination tunnel endpoint. This is a specific
              case of spoofing.</dd>
            <dt pn="section-2.7.2-2.3">traffic interception:</dt>
            <dd pn="section-2.7.2-2.4">No confidentiality is provided by the
              tunnel protocols (without the use of IPsec or alternative
              encryption methods); therefore, anybody on the tunnel path can
              intercept the traffic and have access to the cleartext IPv6
              packet. Combined with the absence of authentication, an on-path
              attack can also be mounted.</dd>
            <dt pn="section-2.7.2-2.5">service theft:</dt>
            <dd pn="section-2.7.2-2.6">As there is no authorization, even an
              unauthorized user can use a tunnel relay for free (this is a
              specific case of tunnel injection).</dd>
            <dt pn="section-2.7.2-2.7">reflection attack:</dt>
            <dd pn="section-2.7.2-2.8">Another specific use case of tunnel
              injection where the attacker injects packets with an IPv4
              destination address not matching the IPv6 address causing the
              first tunnel endpoint to re-encapsulate the packet to the
              destination. Hence, the final IPv4 destination will not see
              the original IPv4 address but only the IPv4 address of the relay
              router.</dd>
            <dt pn="section-2.7.2-2.9">bypassing security policy:</dt>
            <dd pn="section-2.7.2-2.10">If a firewall or an Intrusion
              Prevention System (IPS) is on the path of the tunnel, then it
              may neither inspect nor detect malevolent IPv6 traffic
              transmitted over the tunnel.</dd>
          </dl>
          <t indent="0" pn="section-2.7.2-3">To mitigate the bypassing of security policies, it is often
          recommended to block all automatic tunnels in default OS
          configuration (if they are not required) by denying IPv4 packets
          matching:</t>
          <dl newline="false" spacing="normal" indent="3" pn="section-2.7.2-4">
            <dt pn="section-2.7.2-4.1">IP protocol 41:</dt>
            <dd pn="section-2.7.2-4.2">This will block Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) (<xref target="isatap" format="default" sectionFormat="of" derivedContent="Section 2.7.2.2"/>), 6to4 (<xref target="sixtofour" format="default" sectionFormat="of" derivedContent="Section 2.7.2.7"/>), 6rd (<xref target="sixrd" format="default" sectionFormat="of" derivedContent="Section 2.7.2.3"/>), and 6in4 (<xref target="statictunnel" format="default" sectionFormat="of" derivedContent="Section 2.7.2.1"/>) tunnels.</dd>
            <dt pn="section-2.7.2-4.3">IP protocol 47:</dt>
            <dd pn="section-2.7.2-4.4">This will block GRE (<xref target="statictunnel" format="default" sectionFormat="of" derivedContent="Section 2.7.2.1"/>)
	    tunnels.</dd>
            <dt pn="section-2.7.2-4.5">UDP port 3544:</dt>
            <dd pn="section-2.7.2-4.6">This will block the default encapsulation of Teredo
              (<xref target="teredo" format="default" sectionFormat="of" derivedContent="Section 2.7.2.8"/>) tunnels.</dd>
          </dl>
          <t indent="0" pn="section-2.7.2-5"><xref target="RFC2827" format="default" sectionFormat="of" derivedContent="RFC2827">Ingress filtering</xref> should also
	  be applied on all tunnel endpoints, if applicable, to prevent IPv6
          address spoofing.</t>
          <t indent="0" pn="section-2.7.2-6">The reflection attack cited above should also be prevented by
          using an IPv6 ACL preventing the hair pinning of the traffic.</t>
          <t indent="0" pn="section-2.7.2-7">As several of the tunnel techniques share the same encapsulation
          (i.e., IPv4 protocol 41) and embed the IPv4 address in the IPv6
          address, there are a set of well-known looping attacks described in
          <xref target="RFC6324" format="default" sectionFormat="of" derivedContent="RFC6324"/>. This RFC also proposes
          mitigation techniques.</t>
          <section anchor="statictunnel" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.2.1">
            <name slugifiedName="name-site-to-site-static-tunnels">Site-to-Site Static Tunnels</name>
            <t indent="0" pn="section-2.7.2.1-1">Site-to-site static tunnels are described in <xref target="RFC2529" format="default" sectionFormat="of" derivedContent="RFC2529"/> and in <xref target="RFC2784" format="default" sectionFormat="of" derivedContent="RFC2784">GRE</xref>. As the IPv4 endpoints are statically
            configured and are not dynamic, they are slightly more secure
            (bidirectional service theft is mostly impossible), but traffic
            interception and tunnel injection are still possible. Therefore,
            the use of <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301">IPsec</xref> in transport mode
            to protect the encapsulated IPv4 packets is recommended for those
            tunnels. Alternatively, IPsec in tunnel mode can be used to
            transport IPv6 traffic over an untrusted IPv4 network.</t>
          </section>
          <section anchor="isatap" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.2.2">
            <name slugifiedName="name-isatap">ISATAP</name>
            <t indent="0" pn="section-2.7.2.2-1">ISATAP tunnels <xref target="RFC5214" format="default" sectionFormat="of" derivedContent="RFC5214"/> are mainly used within
            a single administrative domain and to connect a single IPv6 host
            to the IPv6 network. This often implies that those systems are
            usually managed by a single entity; therefore, audit trail and
            strict anti-spoofing are usually possible, and this raises the
            overall security. Even if ISATAP is no more often used, its
            security issues are relevant, per <xref target="KRISTOFF" format="default" sectionFormat="of" derivedContent="KRISTOFF"/>.</t>
            <t indent="0" pn="section-2.7.2.2-2">Special care must be taken to avoid a looping attack by
            implementing the measures of <xref target="RFC6324" format="default" sectionFormat="of" derivedContent="RFC6324"/> and <xref target="RFC6964" format="default" sectionFormat="of" derivedContent="RFC6964"/> (especially in Section <xref target="RFC6964" sectionFormat="bare" section="3.6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6964#section-3.6" derivedContent="RFC6964"/>).</t>
            <t indent="0" pn="section-2.7.2.2-3"><xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301">IPsec</xref> in transport or tunnel mode
            can be used to secure the IPv4 ISATAP traffic to provide IPv6
            traffic confidentiality and prevent service theft.</t>
          </section>
          <section anchor="sixrd" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.2.3">
            <name slugifiedName="name-6rd">6rd</name>
            <t indent="0" pn="section-2.7.2.3-1">While 6rd tunnels share the same encapsulation as <xref target="sixtofour" format="default" sectionFormat="of" derivedContent="Section 2.7.2.7">6to4 tunnels</xref>, they are designed to be
            used within a single SP domain; in other words, they are deployed
            in a more constrained environment (e.g., anti-spoofing, protocol
            41 filtering at the edge) than 6to4 tunnels and have few security
            issues other than lack of confidentiality. The security
            considerations in <xref target="RFC5969" sectionFormat="of" section="12" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5969#section-12" derivedContent="RFC5969"/>
	    describes how to secure 6rd tunnels.</t>
            <t indent="0" pn="section-2.7.2.3-2"><xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301">IPsec</xref> for the transported
	    IPv6 traffic can be used if confidentiality is important.</t>
          </section>
          <section anchor="sixpe" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.2.4">
            <name slugifiedName="name-6pe-6vpe-and-ldpv6">6PE, 6VPE, and LDPv6</name>
            <t indent="0" pn="section-2.7.2.4-1">Organizations using MPLS in their core can also use IPv6 Provider Edge (6PE) <xref target="RFC4798" format="default" sectionFormat="of" derivedContent="RFC4798"/> and IPv6 Virtual Private Extension (6VPE) <xref target="RFC4659" format="default" sectionFormat="of" derivedContent="RFC4659"/> to enable
            IPv6 access over MPLS. As 6PE and 6VPE are really similar to
            BGP/MPLS IP VPNs described in <xref target="RFC4364" format="default" sectionFormat="of" derivedContent="RFC4364"/>, the
            security properties of these networks are also similar to those
            described in <xref target="RFC4381" format="default" sectionFormat="of" derivedContent="RFC4381"/> (please note that this RFC
            may resemble a published IETF work, but it is not based on an IETF
            review and the IETF disclaims any knowledge of the fitness of this
            RFC for any purpose). They rely on:</t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.7.2.4-2">
              <li pn="section-2.7.2.4-2.1">address space, routing, and traffic separation with the
                help of VRFs (only applicable to 6VPE);</li>
              <li pn="section-2.7.2.4-2.2">hiding the IPv4 core, hence, removing all attacks against
                P-routers; and</li>
              <li pn="section-2.7.2.4-2.3">securing the routing protocol between Customer Edge (CE) and Provider
	      Edge (PE); in the
                case of 6PE and 6VPE, link-local addresses (see <xref target="RFC7404" format="default" sectionFormat="of" derivedContent="RFC7404"/>) can be used, and, as these addresses cannot
                be reached from outside of the link, the security of 6PE and
                6VPE is even higher than an IPv4 BGP/MPLS IP VPN.</li>
            </ul>
            <t indent="0" pn="section-2.7.2.4-3">LDPv6 itself does not induce new risks; see <xref target="RFC7552" format="default" sectionFormat="of" derivedContent="RFC7552"/>.</t>
          </section>
          <section anchor="dslite_first" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.2.5">
            <name slugifiedName="name-ds-lite">DS-Lite</name>
            <t indent="0" pn="section-2.7.2.5-1">Dual-Stack Lite (DS-Lite) is also a translation mechanism and is therefore
            analyzed <xref target="dslite" format="default" sectionFormat="of" derivedContent="Section 2.7.3.3">further</xref> in this document,
	    as it includes IPv4 NAPT.</t>
          </section>
          <section anchor="map_first" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.2.6">
            <name slugifiedName="name-mapping-of-address-and-port">Mapping of Address and Port</name>
            <t indent="0" pn="section-2.7.2.6-1">With the encapsulation and translation versions of Mapping of
            Address and Port (MAP) -- abbreviated MAP-E <xref target="RFC7597" format="default" sectionFormat="of" derivedContent="RFC7597"/> and MAP-T <xref target="RFC7599" format="default" sectionFormat="of" derivedContent="RFC7599"/> -- the access
	    network is purely
            an IPv6 network, and MAP protocols are used to provide IPv4 hosts
            on the subscriber network access to IPv4 hosts on the Internet.
            The subscriber router does stateful operations in order to map all
            internal IPv4 addresses and Layer 4 ports to the IPv4 address and
            the set of Layer 4 ports received through the MAP configuration
            process. The SP equipment always does stateless operations (either
            decapsulation or stateless translation). Therefore, as opposed to
            <xref target="dslite" format="default" sectionFormat="of" derivedContent="Section 2.7.3.3"/>, there is no state exhaustion DoS attack
            against the SP equipment because there is no state and there is no
            operation caused by a new Layer 4 connection (no logging
            operation).</t>
            <t indent="0" pn="section-2.7.2.6-2">The SP MAP equipment should implement all the security
            considerations of <xref target="RFC7597" format="default" sectionFormat="of" derivedContent="RFC7597"/>, notably ensuring that
            the mapping of the IPv4 address and port are consistent with the
            configuration. As MAP has a predictable IPv4 address and port
            mapping, the audit logs are easier to use, as there is a clear
            mapping between the IPv6 address and the IPv4 address and
            ports.</t>
          </section>
          <section anchor="sixtofour" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.2.7">
            <name slugifiedName="name-6to4">6to4</name>
            <t indent="0" pn="section-2.7.2.7-1">In <xref target="RFC3056" format="default" sectionFormat="of" derivedContent="RFC3056"/>, 6to4 tunnels require 
	    a public-routable IPv4 address in order to work correctly. They can be used
            to provide either single IPv6 host connectivity to the IPv6
            Internet or multiple IPv6 networks connectivity to the IPv6
            Internet. The 6to4 relay was historically the anycast address
            defined in <xref target="RFC3068" format="default" sectionFormat="of" derivedContent="RFC3068"/>, which has been
	    deprecated by
            <xref target="RFC7526" format="default" sectionFormat="of" derivedContent="RFC7526"/> and is no longer used by recent
	    Operating
            Systems. Some security considerations are explained in <xref target="RFC3964" format="default" sectionFormat="of" derivedContent="RFC3964"/>.</t>
            <t indent="0" pn="section-2.7.2.7-2"><xref target="RFC6343" format="default" sectionFormat="of" derivedContent="RFC6343"/> points out that if an operator
            provides well-managed servers and relays for 6to4,
            nonencapsulated IPv6 packets will pass through well-defined
            points (the native IPv6 interfaces of those servers and relays) at
            which security mechanisms may be applied. Client usage of 6to4 by
            default is now discouraged, and significant precautions are needed
            to avoid operational problems.</t>
          </section>
          <section anchor="teredo" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.2.8">
            <name slugifiedName="name-teredo">Teredo</name>
            <t indent="0" pn="section-2.7.2.8-1">Teredo tunnels <xref target="RFC4380" format="default" sectionFormat="of" derivedContent="RFC4380"/> are mainly used in a
            residential environment because Teredo easily traverses an IPv4
            NAPT device thanks to its UDP encapsulation. Teredo tunnels
            connect a single host to the IPv6 Internet. 
	    Teredo shares the same
            issues as other tunnels: no authentication, no confidentiality,
            possible spoofing, and reflection attacks.</t>
            <t indent="0" pn="section-2.7.2.8-2"><xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301">IPsec</xref> for the transported IPv6
            traffic is recommended.</t>
            <t indent="0" pn="section-2.7.2.8-3">The biggest threat to Teredo is probably for an IPv4-only
            network, as Teredo has been designed to easily traverse IPv4 NAT-PT
            devices, which are quite often co-located with a stateful firewall.
            Therefore, if the stateful IPv4 firewall allows unrestricted UDP
            outbound and accepts the return UDP traffic, then Teredo actually
            punches a hole in this firewall for all IPv6 traffic to 
	    and from the Internet. Host policies can be deployed to
            block Teredo in an IPv4-only network in order to avoid this
            firewall bypass. On the IPv4 firewall, all outbound UDPs should be
            blocked except for the commonly used services (e.g., port 53 for
            DNS, port 123 for NTP, port 443 for QUIC, port 500 for Internet Key Exchange
	    Protocol (IKE), port 3478 for Session Traversal Utilities for NAT (STUN),
	    etc.).</t>
            <t indent="0" pn="section-2.7.2.8-4">Teredo is now hardly ever used and no longer enabled by default
            in most environments so it is less of a threat; however, special
            consideration must be made in cases when devices with older or
            operating systems that have not been updated may be present and by default were
            running Teredo.</t>
          </section>
        </section>
        <section anchor="xlate" numbered="true" toc="include" removeInRFC="false" pn="section-2.7.3">
          <name slugifiedName="name-translation-mechanisms">Translation Mechanisms</name>
          <t indent="0" pn="section-2.7.3-1">Translation mechanisms between IPv4 and IPv6 networks are
          alternate coexistence strategies while networks transition to IPv6.
          While a framework is described in <xref target="RFC6144" format="default" sectionFormat="of" derivedContent="RFC6144"/>, the
          specific security considerations are documented with each individual
          mechanism. For the most part, they specifically mention interference
          with IPsec or DNSSEC deployments, how to mitigate spoofed traffic,
          and what some effective filtering strategies may be.</t>
          <t indent="0" pn="section-2.7.3-2">While not really a transition mechanism to IPv6, this section
          also includes the discussion about the use of heavy IPv4-to-IPv4
          network addresses and port translation to prolong the life of
          IPv4-only networks.</t>
          <section anchor="cgn" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.3.1">
            <name slugifiedName="name-carrier-grade-nat-cgn">Carrier-Grade NAT (CGN)</name>
            <t indent="0" pn="section-2.7.3.1-1">Carrier-Grade NAT (CGN), also called NAT444 CGN or Large-Scale
            NAT (LSN) or SP NAT, is described in <xref target="RFC6264" format="default" sectionFormat="of" derivedContent="RFC6264"/> and
            is utilized as an interim measure to extend the use of IPv4 in a
            large service provider network until the provider can deploy an
            effective IPv6 solution. <xref target="RFC6598" format="default" sectionFormat="of" derivedContent="RFC6598"/> requested a
            specific IANA-allocated /10 IPv4 address block to be used as
            address space shared by all access networks using CGN. This has
            been allocated as 100.64.0.0/10.</t>
            <t indent="0" pn="section-2.7.3.1-2"><xref target="RFC6269" sectionFormat="of" section="13" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6269#section-13" derivedContent="RFC6269"/> lists some specific
            security-related issues caused by large-scale address sharing. The
            Security Considerations section of <xref target="RFC6598" format="default" sectionFormat="of" derivedContent="RFC6598"/> also
            lists some specific mitigation techniques for potential misuse of
            shared address space. Some law enforcement agencies have
            identified CGN as impeding their cybercrime investigations (for
            example, see the <xref target="europol-cgn" format="default" sectionFormat="of" derivedContent="europol-cgn">Europol press
	    release on
            CGN</xref>). Many translation techniques (NAT64, DS-Lite, etc.)
            have the same security issues as CGN when one part of the
            connection is IPv4 only.</t>
            <t indent="0" pn="section-2.7.3.1-3"><xref target="RFC6302" format="default" sectionFormat="of" derivedContent="RFC6302"/> has recommendations for
            Internet-facing servers to also log the source TCP or UDP ports of
            incoming connections in an attempt to help identify the users
            behind such a CGN.</t>
            <t indent="0" pn="section-2.7.3.1-4"><xref target="RFC7422" format="default" sectionFormat="of" derivedContent="RFC7422"/> suggests the use of deterministic
            address mapping in order to reduce logging requirements for CGN.
            The idea is to have a known algorithm for mapping the internal
            subscriber to/from public TCP and UDP ports.</t>
            <t indent="0" pn="section-2.7.3.1-5"><xref target="RFC6888" format="default" sectionFormat="of" derivedContent="RFC6888"/> lists common requirements for CGNs.
            <xref target="RFC6967" format="default" sectionFormat="of" derivedContent="RFC6967"/> analyzes some solutions to enforce
            policies on misbehaving nodes when address sharing is used. <xref target="RFC7857" format="default" sectionFormat="of" derivedContent="RFC7857"/> also updates the NAT behavioral
            requirements.</t>
          </section>
          <section anchor="nat64" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.3.2">
            <name slugifiedName="name-nat64-dns64-and-464xlat">NAT64/DNS64 and 464XLAT</name>
            <t indent="0" pn="section-2.7.3.2-1">Stateful NAT64 translation <xref target="RFC6146" format="default" sectionFormat="of" derivedContent="RFC6146"/> allows
            IPv6-only clients to contact IPv4 servers using unicast UDP, TCP,
            or ICMP. It can be used in conjunction with DNS64 <xref target="RFC6147" format="default" sectionFormat="of" derivedContent="RFC6147"/>, a mechanism that synthesizes AAAA records
            from existing A records. There is also a stateless NAT64 <xref target="RFC7915" format="default" sectionFormat="of" derivedContent="RFC7915"/>, which has similar security aspects but
	    with the added benefit of being stateless and is thereby less prone to a state exhaustion attack.</t>
            <t indent="0" pn="section-2.7.3.2-2">The Security Consideration sections of <xref target="RFC6146" format="default" sectionFormat="of" derivedContent="RFC6146"/>
            and <xref target="RFC6147" format="default" sectionFormat="of" derivedContent="RFC6147"/> list the comprehensive issues; in
            <xref target="RFC6147" sectionFormat="of" section="8" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6147#section-8" derivedContent="RFC6147"/>, there are some
            considerations on the interaction between NAT64 and DNSSEC. A
            specific issue with the use of NAT64 is that it will interfere
            with most IPsec deployments unless UDP encapsulation is used.</t>
            <t indent="0" pn="section-2.7.3.2-3">Another translation mechanism relying on a combination of
            stateful and stateless translation, 464XLAT <xref target="RFC6877" format="default" sectionFormat="of" derivedContent="RFC6877"/>, 
	    can be used to do a host-local translation from
            IPv4 to IPv6 and a network provider translation from IPv6 to IPv4,
            i.e., giving IPv4-only application access to an IPv4-only server
            over an IPv6-only network. 464XLAT shares the same security
            considerations as NAT64 and DNS64; however, it can be used without
            DNS64, avoiding the DNSSEC implications.</t>
          </section>
          <section anchor="dslite" numbered="true" toc="exclude" removeInRFC="false" pn="section-2.7.3.3">
            <name slugifiedName="name-ds-lite-2">DS-Lite</name>
            <t indent="0" pn="section-2.7.3.3-1">Dual-Stack Lite (DS-Lite) <xref target="RFC6333" format="default" sectionFormat="of" derivedContent="RFC6333"/> is a
            transition technique that enables a service provider to share IPv4
            addresses among customers by combining two well-known
            technologies: IP in IP (IPv4-in-IPv6) and IPv4 NAPT.</t>
            <t indent="0" pn="section-2.7.3.3-2">Security considerations, with respect to DS-Lite, mainly revolve
            around logging data, preventing DoS attacks from rogue devices (as
            the Address Family Translation Router (AFTR) <xref target="RFC6333" format="default" sectionFormat="of" derivedContent="RFC6333"/> function is stateful), and restricting service
            offered by the AFTR only to registered customers.</t>
            <t indent="0" pn="section-2.7.3.3-3"><xref target="RFC6333" sectionFormat="of" section="11" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6333#section-11" derivedContent="RFC6333"/> and <xref target="RFC7785" sectionFormat="of" section="2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7785#section-2" derivedContent="RFC7785"/> describe important security issues associated
            with this technology.</t>
          </section>
        </section>
      </section>
      <section anchor="device" numbered="true" toc="include" removeInRFC="false" pn="section-2.8">
        <name slugifiedName="name-general-device-hardening">General Device Hardening</name>
        <t indent="0" pn="section-2.8-1">With almost all devices being IPv6 enabled by default and with many
        endpoints having IPv6 connectivity to the Internet, it is critical to
        also harden those devices against attacks over IPv6.</t>
        <t indent="0" pn="section-2.8-2">The same techniques used to protect devices against attacks over IPv4
        should be used for IPv6 and should include but are not limited to:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2.8-3">
          <li pn="section-2.8-3.1">restricting device access to authorized individuals;</li>
          <li pn="section-2.8-3.2">monitoring and auditing access to the device;</li>
          <li pn="section-2.8-3.3">turning off any unused services on the end node</li>
          <li pn="section-2.8-3.4">understanding which IPv6 addresses are being used to source
            traffic and changing defaults if necessary;</li>
          <li pn="section-2.8-3.5">using cryptographically protected protocols for device management
            (Secure Copy Protocol (SCP), SNMPv3, SSH, TLS, etc.);</li>
          <li pn="section-2.8-3.6">using host firewall capabilities to control traffic that gets
            processed by upper-layer protocols;</li>
          <li pn="section-2.8-3.7">applying firmware, OS, and application patches/upgrades to the
            devices in a timely manner;</li>
          <li pn="section-2.8-3.8">using multifactor credentials to authenticate to devices; and</li>
          <li pn="section-2.8-3.9">using virus scanners to detect malicious programs.</li>
        </ul>
      </section>
    </section>
    <section anchor="enterprise" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-enterprises-specific-securi">Enterprises-Specific Security Considerations</name>
      <t indent="0" pn="section-3-1">Enterprises <xref target="RFC7381" format="default" sectionFormat="of" derivedContent="RFC7381"/> generally have robust network
      security policies in place to protect existing IPv4 networks. These
      policies have been distilled from years of experiential knowledge of
      securing IPv4 networks. At the very least, it is recommended that
      enterprise networks have parity between their security policies for both
      protocol versions. This section also applies to the enterprise part of
      all SP networks, i.e., the part of the network where the SP employees
      are connected.</t>
      <t indent="0" pn="section-3-2">Security considerations in the enterprise can be broadly categorized
      into two groups: external and internal.</t>
      <section anchor="external" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-external-security-considera">External Security Considerations</name>
        <t indent="0" pn="section-3.1-1">The external aspect deals with providing security at the edge or
        perimeter of the enterprise network where it meets the service
        provider's network. This is commonly achieved by enforcing a security
        policy, either by implementing dedicated firewalls with stateful packet
        inspection or a router with ACLs. A common default IPv4 policy on
        firewalls that could easily be ported to IPv6 is to allow all traffic
        outbound while only allowing specific traffic, such as established
        sessions, inbound (see <xref target="RFC6092" format="default" sectionFormat="of" derivedContent="RFC6092"/>).
        <xref target="RFC7381" sectionFormat="of" section="3.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7381#section-3.2" derivedContent="RFC7381"/> also provides similar
	recommendations.</t>
        <t indent="0" pn="section-3.1-2">Here are a few more things that could enhance the default policy:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3.1-3">
          <li pn="section-3.1-3.1">Filter internal-use IPv6 addresses at the perimeter; this will
            also mitigate the vulnerabilities listed in <xref target="RFC7359" format="default" sectionFormat="of" derivedContent="RFC7359"/>.</li>
          <li pn="section-3.1-3.2">Discard packets from and to bogon and reserved space; see
            <xref target="CYMRU" format="default" sectionFormat="of" derivedContent="CYMRU"/> and <xref target="RFC8190" format="default" sectionFormat="of" derivedContent="RFC8190"/>.</li>
          <li pn="section-3.1-3.3">Accept certain ICMPv6 messages to allow proper operation of ND
            and Path MTU Discovery (PMTUD); see <xref target="RFC4890" format="default" sectionFormat="of" derivedContent="RFC4890"/> or <xref target="REY_PF" format="default" sectionFormat="of" derivedContent="REY_PF"/> for hosts.</li>
          <li pn="section-3.1-3.4">Based on the use of the network, filter specific extension
            headers by accepting only the required ones (permit list approach),
            such as ESP, AH, and not forgetting the required transport layers:
            ICMP, TCP, UDP, etc. This filtering should be done where applicable
            at the edge and possibly inside the perimeter; see <xref target="I-D.ietf-opsec-ipv6-eh-filtering" format="default" sectionFormat="of" derivedContent="IPV6-EH-FILTERING"/>.</li>
          <li pn="section-3.1-3.5">Filter packets having an illegal IPv6 header chain at the
            perimeter (and, if possible, inside the network as well); see <xref target="ext_headers" format="default" sectionFormat="of" derivedContent="Section 2.2"/>.</li>
          <li pn="section-3.1-3.6">Filter unneeded services at the perimeter.</li>
          <li pn="section-3.1-3.7">Implement ingress and egress anti-spoofing in the forwarding
            and control planes; see <xref target="RFC2827" format="default" sectionFormat="of" derivedContent="RFC2827"/> and <xref target="RFC3704" format="default" sectionFormat="of" derivedContent="RFC3704"/>.</li>
          <li pn="section-3.1-3.8">Implement appropriate rate-limiters and control plane policers
            based on traffic baselines.</li>
        </ul>
        <t indent="0" pn="section-3.1-4">Having global IPv6 addresses on all the enterprise sites is
        different than in IPv4, where <xref target="RFC1918" format="default" sectionFormat="of" derivedContent="RFC1918"/> addresses are
        often used internally and not routed over the Internet. <xref target="RFC7359" format="default" sectionFormat="of" derivedContent="RFC7359"/> and <xref target="WEBER_VPN" format="default" sectionFormat="of" derivedContent="WEBER_VPN"/> explain that without
        careful design, there could be IPv6 leakages from Layer 3 VPNs.</t>
      </section>
      <section anchor="internal" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-internal-security-considera">Internal Security Considerations</name>
        <t indent="0" pn="section-3.2-1">The internal aspect deals with providing security inside the
        perimeter of the network, including end hosts. Internal networks of
        enterprises are often different, e.g., University campus, wireless guest
        access, etc., so there is no "one size fits all" recommendation.</t>
        <t indent="0" pn="section-3.2-2">The most significant concerns here are related to Neighbor
        Discovery. At the network level, it is recommended that all security
        considerations discussed in <xref target="linklayer" format="default" sectionFormat="of" derivedContent="Section 2.3"/> be reviewed
        carefully and the recommendations be considered in-depth as well.
        <xref target="RFC7381" sectionFormat="of" section="4.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7381#section-4.1" derivedContent="RFC7381"/> also provides some
        recommendations.</t>
        <t indent="0" pn="section-3.2-3">As mentioned in <xref target="transition" format="default" sectionFormat="of" derivedContent="Section 2.7.2"/>, care must be taken
        when running automated IPv6-in-IPv4 tunnels.</t>
        <t indent="0" pn="section-3.2-4">When site-to-site VPNs are used, it should be kept in mind that,
        given the global scope of IPv6 global addresses as opposed to the
        common use of IPv4 private address space <xref target="RFC1918" format="default" sectionFormat="of" derivedContent="RFC1918"/>,
        sites might be able to communicate with each other over the Internet
        even when the VPN mechanism is not available. Hence, no traffic
        encryption is performed and traffic could be injected from the
        Internet into the site; see <xref target="WEBER_VPN" format="default" sectionFormat="of" derivedContent="WEBER_VPN"/>. It is
        recommended to filter at Internet connection(s) packets having a
        source or destination address belonging to the site internal
        prefix or prefixes; this should be done for ingress and egress traffic.</t>
        <t indent="0" pn="section-3.2-5">Hosts need to be hardened directly through security policy to
        protect against security threats. The host firewall default
        capabilities have to be clearly understood. In some cases, third-party
        firewalls have no IPv6 support, whereas the native firewall installed
        by default has IPv6 support. General device hardening guidelines are
        provided in <xref target="device" format="default" sectionFormat="of" derivedContent="Section 2.8"/>.</t>
        <t indent="0" pn="section-3.2-6">It should also be noted that many hosts still use IPv4 for
        transporting logs for RADIUS, DIAMETER, TACACS+, syslog, etc.
        Operators cannot rely on an IPv6-only security policy to secure such
        protocols that are still using IPv4.</t>
      </section>
    </section>
    <section anchor="sp" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-service-provider-security-c">Service Provider Security Considerations</name>
      <section anchor="bgp" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-bgp">BGP</name>
        <t indent="0" pn="section-4.1-1">The threats and mitigation techniques are identical between IPv4
        and IPv6. Broadly speaking, they are: </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.1-2">
          <li pn="section-4.1-2.1">authenticating the TCP session;</li>
          <li pn="section-4.1-2.2">TTL security (which becomes hop-limit security in IPv6), as in
            <xref target="RFC5082" format="default" sectionFormat="of" derivedContent="RFC5082"/>;</li>
          <li pn="section-4.1-2.3">bogon AS filtering; see <xref target="CYMRU" format="default" sectionFormat="of" derivedContent="CYMRU"/>; and</li>
          <li pn="section-4.1-2.4">prefix filtering.</li>
        </ul>
        <t indent="0" pn="section-4.1-3"> These are explained in more detail in <xref target="rsec" format="default" sectionFormat="of" derivedContent="Section 2.5"/>.
        Also, the recommendations of <xref target="RFC7454" format="default" sectionFormat="of" derivedContent="RFC7454"/> should be
        considered.</t>
        <section anchor="rtbh" numbered="true" toc="include" removeInRFC="false" pn="section-4.1.1">
          <name slugifiedName="name-remote-triggered-black-hole">Remote Triggered Black Hole Filtering</name>
          <t indent="0" pn="section-4.1.1-1">A Remote Triggered Black Hole (RTBH) <xref target="RFC5635" format="default" sectionFormat="of" derivedContent="RFC5635"/> works identically in IPv4 and IPv6.
          IANA has allocated the 100::/64 prefix to be used as the discard
          prefix <xref target="RFC6666" format="default" sectionFormat="of" derivedContent="RFC6666"/>.</t>
        </section>
      </section>
      <section anchor="sptrans" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-transition-coexistence-mech">Transition/Coexistence Mechanism</name>
        <t indent="0" pn="section-4.2-1">SPs will typically use transition mechanisms, such as 6rd, 6PE, MAP,
        and NAT64, which have been analyzed in the transition and coexistence
        (<xref target="coexistence" format="default" sectionFormat="of" derivedContent="Section 2.7"/>).</t>
      </section>
      <section anchor="li" numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-lawful-intercept">Lawful Intercept</name>
        <t indent="0" pn="section-4.3-1">The lawful intercept requirements are similar for IPv6 and IPv4
        architectures and will be subject to the laws enforced in different
        geographic regions. The local issues with each jurisdiction can make
        this challenging and both corporate legal and privacy personnel should
        be involved in discussions pertaining to what information gets logged
        and with regard to the respective log retention policies for this
        information.</t>
        <t indent="0" pn="section-4.3-2">The target of interception will usually be a residential subscriber
        (e.g., his/her PPP session, physical line, or CPE MAC address). In the
        absence of IPv6 NAT on the CPE, IPv6 has the possibility to allow for
        intercepting the traffic from a single host (i.e., a /128 target)
        rather than the whole set of hosts of a subscriber (which could be a
        /48, /60, or /64).</t>
        <t indent="0" pn="section-4.3-3">In contrast, in mobile environments, since the 3GPP specifications
        allocate a /64 per device, it may be sufficient to intercept traffic
        from the /64 rather than specific /128s (since each time the device
        establishes a data connection, it gets a new IID).</t>
      </section>
    </section>
    <section anchor="residential" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-residential-users-security-">Residential Users Security Considerations</name>
      <t indent="0" pn="section-5-1">The IETF Home Networking (homenet) Working Group is working on standards and
      guidelines
      for IPv6 residential networks; this obviously includes operational
      security considerations, but this is still a work in progress. <xref target="RFC8520" format="default" sectionFormat="of" derivedContent="RFC8520"/> is an interesting approach on how firewalls could
      retrieve and apply specific security policies to some residential
      devices.</t>
      <t indent="0" pn="section-5-2">Some residential users have less experience and knowledge about
      security or networking than experimented operators. As most of the
      recent hosts (e.g., smartphones and tablets) have IPv6 enabled by default,
      IPv6 security is important for those users. Even with an IPv4-only ISP,
      those users can get IPv6 Internet access with the help of <xref target="teredo" format="default" sectionFormat="of" derivedContent="Section 2.7.2.8">Teredo</xref> tunnels. Several peer-to-peer programs
      support IPv6, and those programs can initiate a Teredo tunnel through an
      IPv4 residential gateway, with the consequence of making the internal
      host reachable from any IPv6 host on the Internet. Therefore, it is
      recommended that all host security products (including personal
      firewalls) are configured with a dual-stack security policy.</t>
      <t indent="0" pn="section-5-3">If the residential CPE has IPv6 connectivity, <xref target="RFC7084" format="default" sectionFormat="of" derivedContent="RFC7084"/> defines the requirements of an IPv6 CPE and does not
      take a position on the debate of default IPv6 security policy, as defined
      in <xref target="RFC6092" format="default" sectionFormat="of" derivedContent="RFC6092"/>:</t>
      <dl newline="true" spacing="normal" indent="3" pn="section-5-4">
        <dt pn="section-5-4.1">outbound only:</dt>
        <dd pn="section-5-4.2">Allowing all internally initiated connections and
          blocking all externally initiated ones, which is a common default
          security policy enforced by IPv4 residential gateway doing NAPT, but
          it also breaks the end-to-end reachability promise of IPv6. <xref target="RFC6092" format="default" sectionFormat="of" derivedContent="RFC6092"/> lists several recommendations to design such a
          CPE.</dd>
        <dt pn="section-5-4.3">open/transparent:</dt>
        <dd pn="section-5-4.4">Allowing all internally and externally
          initiated connections, therefore, restoring the end-to-end nature of
          the Internet for IPv6 traffic but having a different security policy
          for IPv6 than for IPv4.</dd>
      </dl>
      <t indent="0" pn="section-5-5">REC-49 states that a choice must be given to
      the user to select one of those two policies <xref target="RFC6092" format="default" sectionFormat="of" derivedContent="RFC6092"/>.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-further-reading">Further Reading</name>
      <t indent="0" pn="section-6-1">There are several documents that describe in more detail the security
      of an IPv6 network; these documents are not written by the IETF and some
      of them are dated but are listed here for the reader's convenience:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-2">
        <li pn="section-6-2.1">Guidelines for the Secure Deployment of IPv6 <xref target="NIST" format="default" sectionFormat="of" derivedContent="NIST"/></li>
        <li pn="section-6-2.2">North American IPv6 Task Force Technology Report - IPv6 Security Technology Paper
	<xref target="NAv6TF_Security" format="default" sectionFormat="of" derivedContent="NAv6TF_Security"/></li>
        <li pn="section-6-2.3">IPv6 Security <xref target="IPv6_Security_Book" format="default" sectionFormat="of" derivedContent="IPv6_Security_Book"/></li>
      </ul>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1">This memo attempts to give an overview of security considerations of
      operating an IPv6 network both for an IPv6-only network and for networks
      utilizing the most widely deployed IPv4/IPv6 coexistence strategies.</t>
    </section>
    <section anchor="IANA_Considerations" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-8-1">This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.kampanakis-6man-ipv6-eh-parsing" to="IPV6-EH-PARSING"/>
    <displayreference target="I-D.ietf-opsec-ipv6-eh-filtering" to="IPV6-EH-FILTERING"/>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" quoteTitle="true" derivedAnchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author initials="S." surname="Deering" fullname="S. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Hinden" fullname="R. Hinden">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="July"/>
            <abstract>
              <t indent="0">This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="CYMRU" target="https://team-cymru.com/community-services/bogon-reference/" quoteTitle="true" derivedAnchor="CYMRU">
          <front>
            <title>The Bogon Reference</title>
            <author>
              <organization showOnFrontPage="true">Team Cymru</organization>
            </author>
          </front>
        </reference>
        <reference anchor="ENTROPYIP" target="http://www.entropy-ip.com/" quoteTitle="true" derivedAnchor="ENTROPYIP">
          <front>
            <title>Entropy/IP: Uncovering Structure in IPv6 Addresses</title>
            <author fullname="Pawel Foremski" surname="Foremski"/>
            <author fullname="Dave Plonka" surname="Plonla"/>
            <author fullname="Arthur Berger" surname="Berger"/>
            <date month="November" year="2016"/>
          </front>
        </reference>
        <reference anchor="europol-cgn" target="https://www.europol.europa.eu/newsroom/news/are-you-sharing-same-ip-address-criminal-law-enforcement-call-for-end-of-carrier-grade-nat-cgn-to-increase-accountability-online" quoteTitle="true" derivedAnchor="europol-cgn">
          <front>
            <title>Are you sharing the same IP address as a criminal? Law enforcement call for the end of Carrier Grade Nat (CGN) to increase accountability online</title>
            <author>
              <organization showOnFrontPage="true">Europol</organization>
            </author>
            <date month="October" year="2017"/>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://eur-lex.europa.eu/eli/reg/2016/679/oj" quoteTitle="true" derivedAnchor="GDPR">
          <front>
            <title>Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)</title>
            <author>
              <organization showOnFrontPage="true">European Union</organization>
            </author>
            <date month="April" year="2016"/>
          </front>
          <refcontent>Official Journal of the European Union</refcontent>
        </reference>
        <reference anchor="IANA-IPFIX" target="http://www.iana.org/assignments/ipfix" quoteTitle="true" derivedAnchor="IANA-IPFIX">
          <front>
            <title>IP Flow Information Export (IPFIX) Entities</title>
            <author>
              <organization showOnFrontPage="true">IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IEEE-802.1X" quoteTitle="true" derivedAnchor="IEEE-802.1X">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks--Port-Based Network Access Control</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="February" year="2020"/>
          </front>
          <seriesInfo name="IEEE Std" value="802.1X-2020"/>
        </reference>
        <reference anchor="I-D.ietf-opsec-ipv6-eh-filtering" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-opsec-ipv6-eh-filtering-08" derivedAnchor="IPV6-EH-FILTERING">
          <front>
            <title>Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers</title>
            <author initials="F" surname="Gont" fullname="Fernando Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W" surname="Liu" fullname="Will (Shucheng) Liu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2021" month="June" day="3"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-ipv6-eh-filtering-08"/>
          <format type="TXT" target="https://www.ietf.org/internet-drafts/draft-ietf-opsec-ipv6-eh-filtering-08.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.kampanakis-6man-ipv6-eh-parsing" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-kampanakis-6man-ipv6-eh-parsing-01" derivedAnchor="IPV6-EH-PARSING">
          <front>
            <title>Implementation Guidelines for parsing IPv6 Extension Headers</title>
            <author fullname="Panos Kampanakis">
	 </author>
            <date month="August" day="5" year="2014"/>
            <abstract>
              <t indent="0">   IPv6 is widely used on the internet today and is expected to be
   deployed more as more devices (i.e. home automation) get inter-
   connected.  The IPv6 header format allows for the use of Extension
   Headers (EH).  EHs could be chained together with very few existing
   guidelines by the IPv6 protocol on how devices should parse them,
   which open room for security concerns and inconsistencies.  This
   document presents guidelines for parsing IPv6 EHs with a goal of
   providing a common and consistent parsing methodology for IPv6
   implementers among the industry.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kampanakis-6man-ipv6-eh-parsing-01"/>
          <format type="TXT" target="https://www.ietf.org/archive/id/draft-kampanakis-6man-ipv6-eh-parsing-01.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="IPv6_Security_Book" quoteTitle="true" derivedAnchor="IPv6_Security_Book">
          <front>
            <title>IPv6 Security</title>
            <author fullname="Scott Hogg" surname="Hogg"/>
            <author fullname="Éric Vyncke" surname="Vyncke"/>
            <date month="December" year="2008"/>
          </front>
          <seriesInfo name="ISBN" value="1587055945"/>
          <refcontent>CiscoPress</refcontent>
        </reference>
        <reference anchor="KRISTOFF" target="https://dataplane.org/jtk/publications/kgkp-pam-21.pdf" quoteTitle="true" derivedAnchor="KRISTOFF">
          <front>
            <title>Plight at the End of the Tunnel: Legacy IPv6 Transition Mechanisms in the Wild</title>
            <author fullname="John Kristoff" surname="Kristoff"/>
            <author fullname="Mohammad Ghasemisharif" surname="Ghasemisharif"/>
            <author fullname="Chris Kanich" surname="Kanich"/>
            <author fullname="Jason Polakis" surname="Polakis"/>
            <date month="March" year="2021"/>
          </front>
        </reference>
        <reference anchor="NAv6TF_Security" target="http://www.ipv6forum.com/dl/white/NAv6TF_Security_Report.pdf" quoteTitle="true" derivedAnchor="NAv6TF_Security">
          <front>
            <title>North American IPv6 Task Force (NAv6TF) Technology Report "IPv6 Security Technology Paper</title>
            <author fullname="Merike Kaeo" surname="Kaeo"/>
            <author fullname="David Green" surname="Green"/>
            <author fullname="Jim Bound" surname="Bound"/>
            <author fullname="Yanick Pouffary" surname="Pouffary"/>
            <date month="July" year="2006"/>
          </front>
        </reference>
        <reference anchor="NIST" target="http://csrc.nist.gov/publications/nistpubs/800-119/sp800-119.pdf" quoteTitle="true" derivedAnchor="NIST">
          <front>
            <title>Guidelines for the Secure Deployment of IPv6</title>
            <author fullname="Sheila Frankel" surname="Frankel"/>
            <author fullname="Richard Graveman" surname="Graveman"/>
            <author fullname="John Pearce" surname="Pearce"/>
            <author fullname="Mark Rooks" surname="Rooks"/>
            <date month="December" year="2010"/>
          </front>
        </reference>
        <reference anchor="RADB" target="https://www.radb.net/" quoteTitle="true" derivedAnchor="RADB">
          <front>
            <title>RADb: The Internet Routing Registry</title>
            <author>
              <organization showOnFrontPage="true">Merit Network, Inc.</organization>
            </author>
          </front>
        </reference>
        <reference anchor="REY_PF" target="https://labs.ripe.net/Members/enno_rey/local-packet-filtering-with-ipv6" quoteTitle="true" derivedAnchor="REY_PF">
          <front>
            <title>Local Packet Filtering with IPv6</title>
            <author fullname="Enno Rey" surname="Rey"/>
            <date month="July" year="2017"/>
          </front>
        </reference>
        <reference anchor="RFC0826" target="https://www.rfc-editor.org/info/rfc826" quoteTitle="true" derivedAnchor="RFC0826">
          <front>
            <title>An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware</title>
            <author initials="D." surname="Plummer" fullname="D. Plummer">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1982" month="November"/>
            <abstract>
              <t indent="0">The purpose of this RFC is to present a method of Converting Protocol Addresses (e.g., IP addresses) to Local Network Addresses (e.g., Ethernet addresses).  This is an issue of general concern in the ARPA Internet Community at this time.  The method proposed here is presented for your consideration and comment.  This is not the specification of an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="37"/>
          <seriesInfo name="RFC" value="826"/>
          <seriesInfo name="DOI" value="10.17487/RFC0826"/>
        </reference>
        <reference anchor="RFC1918" target="https://www.rfc-editor.org/info/rfc1918" quoteTitle="true" derivedAnchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author initials="Y." surname="Rekhter" fullname="Y. Rekhter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Moskowitz" fullname="B. Moskowitz">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Karrenberg" fullname="D. Karrenberg">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G. J." surname="de Groot" fullname="G. J. de Groot">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Lear" fullname="E. Lear">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1996" month="February"/>
            <abstract>
              <t indent="0">This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC2131" target="https://www.rfc-editor.org/info/rfc2131" quoteTitle="true" derivedAnchor="RFC2131">
          <front>
            <title>Dynamic Host Configuration Protocol</title>
            <author initials="R." surname="Droms" fullname="R. Droms">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCPIP network.  DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional configuration options.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2131"/>
          <seriesInfo name="DOI" value="10.17487/RFC2131"/>
        </reference>
        <reference anchor="RFC2460" target="https://www.rfc-editor.org/info/rfc2460" quoteTitle="true" derivedAnchor="RFC2460">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author initials="S." surname="Deering" fullname="S. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Hinden" fullname="R. Hinden">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1998" month="December"/>
            <abstract>
              <t indent="0">This document specifies version 6 of the Internet Protocol (IPv6), also sometimes referred to as IP Next Generation or IPng.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2460"/>
          <seriesInfo name="DOI" value="10.17487/RFC2460"/>
        </reference>
        <reference anchor="RFC2529" target="https://www.rfc-editor.org/info/rfc2529" quoteTitle="true" derivedAnchor="RFC2529">
          <front>
            <title>Transmission of IPv6 over IPv4 Domains without Explicit Tunnels</title>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Jung" fullname="C. Jung">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1999" month="March"/>
            <abstract>
              <t indent="0">This memo specifies the frame format for transmission of IPv6 (IPV6) packets and the method of forming IPv6 link-local addresses over IPv4 domains.  It also specifies the content of the Source/Target Link-layer Address option used in the Router Solicitation, Router Advertisement, Neighbor Solicitation, and Neighbor Advertisement and Redirect messages, when those messages are transmitted on an IPv4 multicast network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2529"/>
          <seriesInfo name="DOI" value="10.17487/RFC2529"/>
        </reference>
        <reference anchor="RFC2663" target="https://www.rfc-editor.org/info/rfc2663" quoteTitle="true" derivedAnchor="RFC2663">
          <front>
            <title>IP Network Address Translator (NAT) Terminology and Considerations</title>
            <author initials="P." surname="Srisuresh" fullname="P. Srisuresh">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Holdrege" fullname="M. Holdrege">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1999" month="August"/>
            <abstract>
              <t indent="0">This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2663"/>
          <seriesInfo name="DOI" value="10.17487/RFC2663"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" quoteTitle="true" derivedAnchor="RFC2784">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author initials="D." surname="Farinacci" fullname="D. Farinacci">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Li" fullname="T. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Hanks" fullname="S. Hanks">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Meyer" fullname="D. Meyer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Traina" fullname="P. Traina">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2000" month="March"/>
            <abstract>
              <t indent="0">This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" quoteTitle="true" derivedAnchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author initials="P." surname="Ferguson" fullname="P. Ferguson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Senie" fullname="D. Senie">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2000" month="May"/>
            <abstract>
              <t indent="0">This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC2866" target="https://www.rfc-editor.org/info/rfc2866" quoteTitle="true" derivedAnchor="RFC2866">
          <front>
            <title>RADIUS Accounting</title>
            <author initials="C." surname="Rigney" fullname="C. Rigney">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2000" month="June"/>
            <abstract>
              <t indent="0">This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC3056" target="https://www.rfc-editor.org/info/rfc3056" quoteTitle="true" derivedAnchor="RFC3056">
          <front>
            <title>Connection of IPv6 Domains via IPv4 Clouds</title>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Moore" fullname="K. Moore">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2001" month="February"/>
            <abstract>
              <t indent="0">This memo specifies an optional interim mechanism for IPv6 sites to communicate with each other over the IPv4 network without explicit tunnel setup, and for them to communicate with native IPv6 domains via relay routers.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3056"/>
          <seriesInfo name="DOI" value="10.17487/RFC3056"/>
        </reference>
        <reference anchor="RFC3068" target="https://www.rfc-editor.org/info/rfc3068" quoteTitle="true" derivedAnchor="RFC3068">
          <front>
            <title>An Anycast Prefix for 6to4 Relay Routers</title>
            <author initials="C." surname="Huitema" fullname="C. Huitema">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2001" month="June"/>
            <abstract>
              <t indent="0">This memo introduces a "6to4 anycast address" in order to simplify the configuration of 6to4 routers.  It also defines how this address will be used by 6to4 relay routers, how the corresponding "6to4 anycast prefix" will be advertised in the IGP and in the EGP.  The memo documents the reservation by IANA (Internet Assigned Numbers Authority) of the "6to4 relay anycast prefix."  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3068"/>
          <seriesInfo name="DOI" value="10.17487/RFC3068"/>
        </reference>
        <reference anchor="RFC3627" target="https://www.rfc-editor.org/info/rfc3627" quoteTitle="true" derivedAnchor="RFC3627">
          <front>
            <title>Use of /127 Prefix Length Between Routers Considered Harmful</title>
            <author initials="P." surname="Savola" fullname="P. Savola">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2003" month="September"/>
            <abstract>
              <t indent="0">In some cases, the operational decision may be to use IPv6 /127 prefix lengths, especially on point-to-point links between routers.  Under certain situations, this may lead to one router claiming both addresses due to subnet-router anycast being implemented.  This document discusses the issue and offers a couple of solutions to the problem; nevertheless, /127 should be avoided between two routers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3627"/>
          <seriesInfo name="DOI" value="10.17487/RFC3627"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" quoteTitle="true" derivedAnchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Savola" fullname="P. Savola">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="March"/>
            <abstract>
              <t indent="0">BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC3756" target="https://www.rfc-editor.org/info/rfc3756" quoteTitle="true" derivedAnchor="RFC3756">
          <front>
            <title>IPv6 Neighbor Discovery (ND) Trust Models and Threats</title>
            <author initials="P." surname="Nikander" fullname="P. Nikander" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Kempf" fullname="J. Kempf">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="May"/>
            <abstract>
              <t indent="0">The existing IETF standards specify that IPv6 Neighbor Discovery (ND) and Address Autoconfiguration mechanisms may be protected with IPsec Authentication Header (AH).  However, the current specifications limit the security solutions to manual keying due to practical problems faced with automatic key management.  This document specifies three different trust models and discusses the threats pertinent to IPv6 Neighbor Discovery.  The purpose of this discussion is to define the requirements for Securing IPv6 Neighbor Discovery.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3756"/>
          <seriesInfo name="DOI" value="10.17487/RFC3756"/>
        </reference>
        <reference anchor="RFC3964" target="https://www.rfc-editor.org/info/rfc3964" quoteTitle="true" derivedAnchor="RFC3964">
          <front>
            <title>Security Considerations for 6to4</title>
            <author initials="P." surname="Savola" fullname="P. Savola">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Patel" fullname="C. Patel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="December"/>
            <abstract>
              <t indent="0">The IPv6 interim mechanism 6to4 (RFC3056) uses automatic IPv6-over-IPv4 tunneling to interconnect IPv6 networks.  The architecture includes 6to4 routers and 6to4 relay routers, which accept and decapsulate IPv4 protocol-41 ("IPv6-in-IPv4") traffic from any node in the IPv4 internet.  This characteristic enables a number of security threats, mainly Denial of Service.  It also makes it easier for nodes to spoof IPv6 addresses.  This document discusses these issues in more detail and suggests enhancements to alleviate the problems.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3964"/>
          <seriesInfo name="DOI" value="10.17487/RFC3964"/>
        </reference>
        <reference anchor="RFC3971" target="https://www.rfc-editor.org/info/rfc3971" quoteTitle="true" derivedAnchor="RFC3971">
          <front>
            <title>SEcure Neighbor Discovery (SEND)</title>
            <author initials="J." surname="Arkko" fullname="J. Arkko" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Kempf" fullname="J. Kempf">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Zill" fullname="B. Zill">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Nikander" fullname="P. Nikander">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="March"/>
            <abstract>
              <t indent="0">IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors.  If not secured, NDP is vulnerable to various attacks.  This document specifies security mechanisms for NDP.  Unlike those in the original NDP specifications, these mechanisms do not use IPsec.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3971"/>
          <seriesInfo name="DOI" value="10.17487/RFC3971"/>
        </reference>
        <reference anchor="RFC3972" target="https://www.rfc-editor.org/info/rfc3972" quoteTitle="true" derivedAnchor="RFC3972">
          <front>
            <title>Cryptographically Generated Addresses (CGA)</title>
            <author initials="T." surname="Aura" fullname="T. Aura">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="March"/>
            <abstract>
              <t indent="0">This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3972"/>
          <seriesInfo name="DOI" value="10.17487/RFC3972"/>
        </reference>
        <reference anchor="RFC4033" target="https://www.rfc-editor.org/info/rfc4033" quoteTitle="true" derivedAnchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author initials="R." surname="Arends" fullname="R. Arends">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Austein" fullname="R. Austein">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Larson" fullname="M. Larson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Massey" fullname="D. Massey">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Rose" fullname="S. Rose">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="March"/>
            <abstract>
              <t indent="0">The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC4107" target="https://www.rfc-editor.org/info/rfc4107" quoteTitle="true" derivedAnchor="RFC4107">
          <front>
            <title>Guidelines for Cryptographic Key Management</title>
            <author initials="S." surname="Bellovin" fullname="S. Bellovin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="June"/>
            <abstract>
              <t indent="0">The question often arises of whether a given security system requires some form of automated key management, or whether manual keying is sufficient.  This memo provides guidelines for making such decisions. When symmetric cryptographic mechanisms are used in a protocol, the presumption is that automated key management is generally but not always needed.  If manual keying is proposed, the burden of proving that automated key management is not required falls to the proposer.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="107"/>
          <seriesInfo name="RFC" value="4107"/>
          <seriesInfo name="DOI" value="10.17487/RFC4107"/>
        </reference>
        <reference anchor="RFC4193" target="https://www.rfc-editor.org/info/rfc4193" quoteTitle="true" derivedAnchor="RFC4193">
          <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author initials="R." surname="Hinden" fullname="R. Hinden">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Haberman" fullname="B. Haberman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="October"/>
            <abstract>
              <t indent="0">This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4193"/>
          <seriesInfo name="DOI" value="10.17487/RFC4193"/>
        </reference>
        <reference anchor="RFC4293" target="https://www.rfc-editor.org/info/rfc4293" quoteTitle="true" derivedAnchor="RFC4293">
          <front>
            <title>Management Information Base for the Internet Protocol (IP)</title>
            <author initials="S." surname="Routhier" fullname="S. Routhier" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="April"/>
            <abstract>
              <t indent="0">This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.  In particular, it describes managed objects used for implementations of the Internet Protocol (IP) in an IP version independent manner.  This memo obsoletes RFCs 2011, 2465, and 2466.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4293"/>
          <seriesInfo name="DOI" value="10.17487/RFC4293"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" quoteTitle="true" derivedAnchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Seo" fullname="K. Seo">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="December"/>
            <abstract>
              <t indent="0">This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" quoteTitle="true" derivedAnchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="December"/>
            <abstract>
              <t indent="0">This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6.  This document obsoletes RFC 2402 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" quoteTitle="true" derivedAnchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author initials="S." surname="Kent" fullname="S. Kent">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2005" month="December"/>
            <abstract>
              <t indent="0">This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.  ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.  This document obsoletes RFC 2406 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4364" target="https://www.rfc-editor.org/info/rfc4364" quoteTitle="true" derivedAnchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author initials="E." surname="Rosen" fullname="E. Rosen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Rekhter" fullname="Y. Rekhter">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="February"/>
            <abstract>
              <t indent="0">This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers.  This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other.  Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC4380" target="https://www.rfc-editor.org/info/rfc4380" quoteTitle="true" derivedAnchor="RFC4380">
          <front>
            <title>Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)</title>
            <author initials="C." surname="Huitema" fullname="C. Huitema">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="February"/>
            <abstract>
              <t indent="0">We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP; we call this the Teredo service.  Running the service requires the help of "Teredo servers" and "Teredo relays".  The Teredo servers are stateless, and only have to manage a small fraction of the traffic between Teredo clients; the Teredo relays act as IPv6 routers between the Teredo service and the "native" IPv6 Internet.  The relays can also provide interoperability with hosts using other transition mechanisms such as "6to4".  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4380"/>
          <seriesInfo name="DOI" value="10.17487/RFC4380"/>
        </reference>
        <reference anchor="RFC4381" target="https://www.rfc-editor.org/info/rfc4381" quoteTitle="true" derivedAnchor="RFC4381">
          <front>
            <title>Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author initials="M." surname="Behringer" fullname="M. Behringer">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="February"/>
            <abstract>
              <t indent="0">This document analyses the security of the BGP/MPLS IP virtual private network (VPN) architecture that is described in RFC 4364, for the benefit of service providers and VPN users.</t>
              <t indent="0">The analysis shows that BGP/MPLS IP VPN networks can be as secure as traditional layer-2 VPN services using Asynchronous Transfer Mode (ATM) or Frame Relay.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4381"/>
          <seriesInfo name="DOI" value="10.17487/RFC4381"/>
        </reference>
        <reference anchor="RFC4443" target="https://www.rfc-editor.org/info/rfc4443" quoteTitle="true" derivedAnchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author initials="A." surname="Conta" fullname="A. Conta">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Deering" fullname="S. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Gupta" fullname="M. Gupta" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="March"/>
            <abstract>
              <t indent="0">This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC4552" target="https://www.rfc-editor.org/info/rfc4552" quoteTitle="true" derivedAnchor="RFC4552">
          <front>
            <title>Authentication/Confidentiality for OSPFv3</title>
            <author initials="M." surname="Gupta" fullname="M. Gupta">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Melam" fullname="N. Melam">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="June"/>
            <abstract>
              <t indent="0">This document describes means and mechanisms to provide authentication/confidentiality to OSPFv3 using an IPv6 Authentication Header/Encapsulating Security Payload (AH/ESP) extension header.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4552"/>
          <seriesInfo name="DOI" value="10.17487/RFC4552"/>
        </reference>
        <reference anchor="RFC4649" target="https://www.rfc-editor.org/info/rfc4649" quoteTitle="true" derivedAnchor="RFC4649">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Remote-ID Option</title>
            <author initials="B." surname="Volz" fullname="B. Volz">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="August"/>
            <abstract>
              <t indent="0">This memo defines a new Relay Agent Remote-ID option for the Dynamic Host Configuration Protocol for IPv6 (DHCPv6).  This option is the DHCPv6 equivalent for the Dynamic Host Configuration Protocol for IPv4 (DHCPv4) Relay Agent Option's Remote-ID suboption as specified in RFC 3046.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4649"/>
          <seriesInfo name="DOI" value="10.17487/RFC4649"/>
        </reference>
        <reference anchor="RFC4659" target="https://www.rfc-editor.org/info/rfc4659" quoteTitle="true" derivedAnchor="RFC4659">
          <front>
            <title>BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN</title>
            <author initials="J." surname="De Clercq" fullname="J. De Clercq">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Ooms" fullname="D. Ooms">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Carugi" fullname="M. Carugi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Le Faucheur" fullname="F. Le Faucheur">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="September"/>
            <abstract>
              <t indent="0">This document describes a method by which a Service Provider may use its packet-switched backbone to provide Virtual Private Network (VPN) services for its IPv6 customers.  This method reuses, and extends where necessary, the "BGP/MPLS IP VPN" method for support of IPv6.  In BGP/MPLS IP VPN, "Multiprotocol BGP" is used for distributing IPv4 VPN routes over the service provider backbone, and MPLS is used to forward IPv4 VPN packets over the backbone.  This document defines an IPv6 VPN address family and describes the corresponding IPv6 VPN route distribution in "Multiprotocol BGP".</t>
              <t indent="0">This document defines support of the IPv6 VPN service over both an IPv4 and an IPv6 backbone, and for using various tunneling techniques over the core, including MPLS, IP-in-IP, Generic Routing Encapsulation (GRE) and IPsec protected tunnels.  The inter-working between an IPv4 site and an IPv6 site is outside the scope of this document.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4659"/>
          <seriesInfo name="DOI" value="10.17487/RFC4659"/>
        </reference>
        <reference anchor="RFC4795" target="https://www.rfc-editor.org/info/rfc4795" quoteTitle="true" derivedAnchor="RFC4795">
          <front>
            <title>Link-local Multicast Name Resolution (LLMNR)</title>
            <author initials="B." surname="Aboba" fullname="B. Aboba">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Esibov" fullname="L. Esibov">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="January"/>
            <abstract>
              <t indent="0">The goal of Link-Local Multicast Name Resolution (LLMNR) is to enable name resolution in scenarios in which conventional DNS name resolution is not possible.  LLMNR supports all current and future DNS formats, types, and classes, while operating on a separate port from DNS, and with a distinct resolver cache.  Since LLMNR only operates on the local link, it cannot be considered a substitute for DNS.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4795"/>
          <seriesInfo name="DOI" value="10.17487/RFC4795"/>
        </reference>
        <reference anchor="RFC4798" target="https://www.rfc-editor.org/info/rfc4798" quoteTitle="true" derivedAnchor="RFC4798">
          <front>
            <title>Connecting IPv6 Islands over IPv4 MPLS Using IPv6 Provider Edge Routers (6PE)</title>
            <author initials="J." surname="De Clercq" fullname="J. De Clercq">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Ooms" fullname="D. Ooms">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Prevost" fullname="S. Prevost">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Le Faucheur" fullname="F. Le Faucheur">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="February"/>
            <abstract>
              <t indent="0">This document explains how to interconnect IPv6 islands over a Multiprotocol Label Switching (MPLS)-enabled IPv4 cloud.  This approach relies on IPv6 Provider Edge routers (6PE), which are Dual Stack in order to connect to IPv6 islands and to the MPLS core, which is only required to run IPv4 MPLS.  The 6PE routers exchange the IPv6 reachability information transparently over the core using the Multiprotocol Border Gateway Protocol (MP-BGP) over IPv4.  In doing so, the BGP Next Hop field is used to convey the IPv4 address of the 6PE router so that dynamically established IPv4-signaled MPLS Label Switched Paths (LSPs) can be used without explicit tunnel configuration.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4798"/>
          <seriesInfo name="DOI" value="10.17487/RFC4798"/>
        </reference>
        <reference anchor="RFC4861" target="https://www.rfc-editor.org/info/rfc4861" quoteTitle="true" derivedAnchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Simpson" fullname="W. Simpson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Soliman" fullname="H. Soliman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="September"/>
            <abstract>
              <t indent="0">This document specifies the Neighbor Discovery protocol for IP Version 6.  IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4864" target="https://www.rfc-editor.org/info/rfc4864" quoteTitle="true" derivedAnchor="RFC4864">
          <front>
            <title>Local Network Protection for IPv6</title>
            <author initials="G." surname="Van de Velde" fullname="G. Van de Velde">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Hain" fullname="T. Hain">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Droms" fullname="R. Droms">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Klein" fullname="E. Klein">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="May"/>
            <abstract>
              <t indent="0">Although there are many perceived benefits to Network Address Translation (NAT), its primary benefit of "amplifying" available address space is not needed in IPv6.  In addition to NAT's many serious disadvantages, there is a perception that other benefits exist, such as a variety of management and security attributes that could be useful for an Internet Protocol site.  IPv6 was designed with the intention of making NAT unnecessary, and this document shows how Local Network Protection (LNP) using IPv6 can provide the same or more benefits without the need for address translation.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4864"/>
          <seriesInfo name="DOI" value="10.17487/RFC4864"/>
        </reference>
        <reference anchor="RFC4890" target="https://www.rfc-editor.org/info/rfc4890" quoteTitle="true" derivedAnchor="RFC4890">
          <front>
            <title>Recommendations for Filtering ICMPv6 Messages in Firewalls</title>
            <author initials="E." surname="Davies" fullname="E. Davies">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Mohacsi" fullname="J. Mohacsi">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="May"/>
            <abstract>
              <t indent="0">In networks supporting IPv6, the Internet Control Message Protocol version 6 (ICMPv6) plays a fundamental role with a large number of functions, and a correspondingly large number of message types and options.  ICMPv6 is essential to the functioning of IPv6, but there are a number of security risks associated with uncontrolled forwarding of ICMPv6 messages.  Filtering strategies designed for the corresponding protocol, ICMP, in IPv4 networks are not directly applicable, because these strategies are intended to accommodate a useful auxiliary protocol that may not be required for correct functioning.</t>
              <t indent="0">This document provides some recommendations for ICMPv6 firewall filter configuration that will allow propagation of ICMPv6 messages that are needed to maintain the functioning of the network but drop messages that are potential security risks.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4890"/>
          <seriesInfo name="DOI" value="10.17487/RFC4890"/>
        </reference>
        <reference anchor="RFC4942" target="https://www.rfc-editor.org/info/rfc4942" quoteTitle="true" derivedAnchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <author initials="E." surname="Davies" fullname="E. Davies">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Savola" fullname="P. Savola">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="September"/>
            <abstract>
              <t indent="0">The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms.  This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t indent="0">o  issues due to the IPv6 protocol itself, o  issues due to transition mechanisms, and o  issues due to IPv6 deployment.  </t>
              <t indent="0">This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4942"/>
          <seriesInfo name="DOI" value="10.17487/RFC4942"/>
        </reference>
        <reference anchor="RFC5082" target="https://www.rfc-editor.org/info/rfc5082" quoteTitle="true" derivedAnchor="RFC5082">
          <front>
            <title>The Generalized TTL Security Mechanism (GTSM)</title>
            <author initials="V." surname="Gill" fullname="V. Gill">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Heasley" fullname="J. Heasley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Meyer" fullname="D. Meyer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Savola" fullname="P. Savola" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Pignataro" fullname="C. Pignataro">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="October"/>
            <abstract>
              <t indent="0">The use of a packet's Time to Live (TTL) (IPv4) or Hop Limit (IPv6) to verify whether the packet was originated by an adjacent node on a connected link has been used in many recent protocols.  This document generalizes this technique.  This document obsoletes Experimental RFC 3682.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5082"/>
          <seriesInfo name="DOI" value="10.17487/RFC5082"/>
        </reference>
        <reference anchor="RFC5214" target="https://www.rfc-editor.org/info/rfc5214" quoteTitle="true" derivedAnchor="RFC5214">
          <front>
            <title>Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)</title>
            <author initials="F." surname="Templin" fullname="F. Templin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Gleeson" fullname="T. Gleeson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="March"/>
            <abstract>
              <t indent="0">The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) connects dual-stack (IPv6/IPv4) nodes over IPv4 networks.  ISATAP views the IPv4 network as a link layer for IPv6 and supports an automatic tunneling abstraction similar to the Non-Broadcast Multiple Access (NBMA) model.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5214"/>
          <seriesInfo name="DOI" value="10.17487/RFC5214"/>
        </reference>
        <reference anchor="RFC5340" target="https://www.rfc-editor.org/info/rfc5340" quoteTitle="true" derivedAnchor="RFC5340">
          <front>
            <title>OSPF for IPv6</title>
            <author initials="R." surname="Coltun" fullname="R. Coltun">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Ferguson" fullname="D. Ferguson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Moy" fullname="J. Moy">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Lindem" fullname="A. Lindem">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="July"/>
            <abstract>
              <t indent="0">This document describes the modifications to OSPF to support version 6 of the Internet Protocol (IPv6).  The fundamental mechanisms of OSPF (flooding, Designated Router (DR) election, area support, Short Path First (SPF) calculations, etc.) remain unchanged.  However, some changes have been necessary, either due to changes in protocol semantics between IPv4 and IPv6, or simply to handle the increased address size of IPv6.  These modifications will necessitate incrementing the protocol version from version 2 to version 3.  OSPF for IPv6 is also referred to as OSPF version 3 (OSPFv3).</t>
              <t indent="0">Changes between OSPF for IPv4, OSPF Version 2, and OSPF for IPv6 as described herein include the following.  Addressing semantics have been removed from OSPF packets and the basic Link State Advertisements (LSAs).  New LSAs have been created to carry IPv6 addresses and prefixes.  OSPF now runs on a per-link basis rather than on a per-IP-subnet basis.  Flooding scope for LSAs has been generalized.  Authentication has been removed from the OSPF protocol and instead relies on IPv6's Authentication Header and Encapsulating Security Payload (ESP).</t>
              <t indent="0">Even with larger IPv6 addresses, most packets in OSPF for IPv6 are almost as compact as those in OSPF for IPv4.  Most fields and packet- size limitations present in OSPF for IPv4 have been relaxed.  In addition, option handling has been made more flexible.</t>
              <t indent="0">All of OSPF for IPv4's optional capabilities, including demand circuit support and Not-So-Stubby Areas (NSSAs), are also supported in OSPF for IPv6.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5340"/>
          <seriesInfo name="DOI" value="10.17487/RFC5340"/>
        </reference>
        <reference anchor="RFC5635" target="https://www.rfc-editor.org/info/rfc5635" quoteTitle="true" derivedAnchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author initials="W." surname="Kumari" fullname="W. Kumari">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="McPherson" fullname="D. McPherson">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="August"/>
            <abstract>
              <t indent="0">Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This  memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC5952" target="https://www.rfc-editor.org/info/rfc5952" quoteTitle="true" derivedAnchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author initials="S." surname="Kawamura" fullname="S. Kawamura">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Kawashima" fullname="M. Kawashima">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="August"/>
            <abstract>
              <t indent="0">As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text.  While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users.  This document defines a canonical textual representation format.  It does not define a format for internal storage, such as within an application or database.  It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC5969" target="https://www.rfc-editor.org/info/rfc5969" quoteTitle="true" derivedAnchor="RFC5969">
          <front>
            <title>IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) -- Protocol Specification</title>
            <author initials="W." surname="Townsley" fullname="W. Townsley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="O." surname="Troan" fullname="O. Troan">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="August"/>
            <abstract>
              <t indent="0">This document specifies an automatic tunneling mechanism tailored to advance deployment of IPv6 to end users via a service provider's IPv4 network infrastructure.  Key aspects include automatic IPv6 prefix delegation to sites, stateless operation, simple provisioning, and service, which is equivalent to native IPv6 at the sites that are served by the mechanism.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5969"/>
          <seriesInfo name="DOI" value="10.17487/RFC5969"/>
        </reference>
        <reference anchor="RFC6092" target="https://www.rfc-editor.org/info/rfc6092" quoteTitle="true" derivedAnchor="RFC6092">
          <front>
            <title>Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service</title>
            <author initials="J." surname="Woodyatt" fullname="J. Woodyatt" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="January"/>
            <abstract>
              <t indent="0">This document identifies a set of recommendations for the makers of devices and describes how to provide for "simple security" capabilities at the perimeter of local-area IPv6 networks in Internet-enabled homes and small offices.  This document is not  an Internet Standards Track specification; it is published for  informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6092"/>
          <seriesInfo name="DOI" value="10.17487/RFC6092"/>
        </reference>
        <reference anchor="RFC6104" target="https://www.rfc-editor.org/info/rfc6104" quoteTitle="true" derivedAnchor="RFC6104">
          <front>
            <title>Rogue IPv6 Router Advertisement Problem Statement</title>
            <author initials="T." surname="Chown" fullname="T. Chown">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Venaas" fullname="S. Venaas">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="February"/>
            <abstract>
              <t indent="0">When deploying IPv6, whether IPv6-only or dual-stack, routers are configured to send IPv6 Router Advertisements (RAs) to convey information to nodes that enable them to autoconfigure on the network.  This information includes the implied default router address taken from the observed source address of the RA message, as well as on-link prefix information.  However, unintended misconfigurations by users or administrators, or possibly malicious attacks on the network, may lead to bogus RAs being present, which in turn can cause operational problems for hosts on the network.  In this document, we summarise the scenarios in which rogue RAs may be observed and present a list of possible solutions to the problem.  We focus on the unintended causes of rogue RAs in the text.  The goal of this text is to be Informational, and as such to present a framework around which solutions can be proposed and discussed.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6104"/>
          <seriesInfo name="DOI" value="10.17487/RFC6104"/>
        </reference>
        <reference anchor="RFC6105" target="https://www.rfc-editor.org/info/rfc6105" quoteTitle="true" derivedAnchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author initials="E." surname="Levy-Abegnoli" fullname="E. Levy-Abegnoli">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Van de Velde" fullname="G. Van de Velde">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Popoviciu" fullname="C. Popoviciu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Mohacsi" fullname="J. Mohacsi">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="February"/>
            <abstract>
              <t indent="0">Routed protocols are often susceptible to spoof attacks.  The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy.  This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC6144" target="https://www.rfc-editor.org/info/rfc6144" quoteTitle="true" derivedAnchor="RFC6144">
          <front>
            <title>Framework for IPv4/IPv6 Translation</title>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="X." surname="Li" fullname="X. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Bao" fullname="C. Bao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Yin" fullname="K. Yin">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="April"/>
            <abstract>
              <t indent="0">This note describes a framework for IPv4/IPv6 translation.  This is in the context of replacing Network Address Translation - Protocol Translation (NAT-PT), which was deprecated by RFC 4966, and to enable networks to have IPv4 and IPv6 coexist in a somewhat rational manner while transitioning to an IPv6 network.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6144"/>
          <seriesInfo name="DOI" value="10.17487/RFC6144"/>
        </reference>
        <reference anchor="RFC6146" target="https://www.rfc-editor.org/info/rfc6146" quoteTitle="true" derivedAnchor="RFC6146">
          <front>
            <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Matthews" fullname="P. Matthews">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="van Beijnum" fullname="I. van Beijnum">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="April"/>
          </front>
          <seriesInfo name="RFC" value="6146"/>
          <seriesInfo name="DOI" value="10.17487/RFC6146"/>
        </reference>
        <reference anchor="RFC6147" target="https://www.rfc-editor.org/info/rfc6147" quoteTitle="true" derivedAnchor="RFC6147">
          <front>
            <title>DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</title>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Sullivan" fullname="A. Sullivan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Matthews" fullname="P. Matthews">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="van Beijnum" fullname="I. van Beijnum">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="April"/>
            <abstract>
              <t indent="0">DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs.  This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6147"/>
          <seriesInfo name="DOI" value="10.17487/RFC6147"/>
        </reference>
        <reference anchor="RFC6164" target="https://www.rfc-editor.org/info/rfc6164" quoteTitle="true" derivedAnchor="RFC6164">
          <front>
            <title>Using 127-Bit IPv6 Prefixes on Inter-Router Links</title>
            <author initials="M." surname="Kohno" fullname="M. Kohno">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Nitzan" fullname="B. Nitzan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Bush" fullname="R. Bush">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Matsuzaki" fullname="Y. Matsuzaki">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Colitti" fullname="L. Colitti">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="April"/>
            <abstract>
              <t indent="0">On inter-router point-to-point links, it is useful, for security and other reasons, to use 127-bit IPv6 prefixes.  Such a practice parallels the use of 31-bit prefixes in IPv4.  This document specifies the motivation for, and usages of, 127-bit IPv6 prefix lengths on inter-router point-to-point links.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6164"/>
          <seriesInfo name="DOI" value="10.17487/RFC6164"/>
        </reference>
        <reference anchor="RFC6169" target="https://www.rfc-editor.org/info/rfc6169" quoteTitle="true" derivedAnchor="RFC6169">
          <front>
            <title>Security Concerns with IP Tunneling</title>
            <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Hoagland" fullname="J. Hoagland">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="April"/>
            <abstract>
              <t indent="0">A number of security concerns with IP tunnels are documented in this memo.  The intended audience of this document includes network administrators and future protocol developers.  The primary intent of this document is to raise the awareness level regarding the security issues with IP tunnels as deployed and propose strategies for the mitigation of those issues. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6169"/>
          <seriesInfo name="DOI" value="10.17487/RFC6169"/>
        </reference>
        <reference anchor="RFC6177" target="https://www.rfc-editor.org/info/rfc6177" quoteTitle="true" derivedAnchor="RFC6177">
          <front>
            <title>IPv6 Address Assignment to End Sites</title>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Huston" fullname="G. Huston">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Roberts" fullname="L. Roberts">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="March"/>
            <abstract>
              <t indent="0">RFC 3177 argued that in IPv6, end sites should be assigned /48 blocks in most cases.  The Regional Internet Registries (RIRs) adopted that recommendation in 2002, but began reconsidering the policy in 2005. This document obsoletes the RFC 3177 recommendations on the assignment of IPv6 address space to end sites.  The exact choice of how much address space to assign end sites is an issue for the operational community.  The IETF's role in this case is limited to providing guidance on IPv6 architectural and operational considerations.  This document reviews the architectural and operational considerations of end site assignments as well as the motivations behind the original recommendations in RFC 3177.  Moreover, this document clarifies that a one-size-fits-all recommendation of /48 is not nuanced enough for the broad range of end sites and is no longer recommended as a single default.</t>
              <t indent="0">This document obsoletes RFC 3177.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="157"/>
          <seriesInfo name="RFC" value="6177"/>
          <seriesInfo name="DOI" value="10.17487/RFC6177"/>
        </reference>
        <reference anchor="RFC6192" target="https://www.rfc-editor.org/info/rfc6192" quoteTitle="true" derivedAnchor="RFC6192">
          <front>
            <title>Protecting the Router Control Plane</title>
            <author initials="D." surname="Dugal" fullname="D. Dugal">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Pignataro" fullname="C. Pignataro">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Dunn" fullname="R. Dunn">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="March"/>
            <abstract>
              <t indent="0">This memo provides a method for protecting a router's control plane from undesired or malicious traffic.  In this approach, all legitimate router control plane traffic is identified.  Once legitimate traffic has been identified, a filter is deployed in the router's forwarding plane.  That filter prevents traffic not specifically identified as legitimate from reaching the router's control plane, or rate-limits such traffic to an acceptable level.</t>
              <t indent="0">Note that the filters described in this memo are applied only to traffic that is destined for the router, and not to all traffic that is passing through the router.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6192"/>
          <seriesInfo name="DOI" value="10.17487/RFC6192"/>
        </reference>
        <reference anchor="RFC6221" target="https://www.rfc-editor.org/info/rfc6221" quoteTitle="true" derivedAnchor="RFC6221">
          <front>
            <title>Lightweight DHCPv6 Relay Agent</title>
            <author initials="D." surname="Miles" fullname="D. Miles" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Ooghe" fullname="S. Ooghe">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Dec" fullname="W. Dec">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Kavanagh" fullname="A. Kavanagh">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="May"/>
            <abstract>
              <t indent="0">This document proposes a Lightweight DHCPv6 Relay Agent (LDRA) that is used to insert relay agent options in DHCPv6 message exchanges identifying client-facing interfaces.  The LDRA can be implemented in existing access nodes (such as Digital Subscriber Link Access Multiplexers (DSLAMs) and Ethernet switches) that do not support IPv6 control or routing functions.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6221"/>
          <seriesInfo name="DOI" value="10.17487/RFC6221"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" quoteTitle="true" derivedAnchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author initials="R." surname="Enns" fullname="R. Enns" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schoenwaelder" fullname="J. Schoenwaelder" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Bierman" fullname="A. Bierman" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="June"/>
            <abstract>
              <t indent="0">The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6264" target="https://www.rfc-editor.org/info/rfc6264" quoteTitle="true" derivedAnchor="RFC6264">
          <front>
            <title>An Incremental Carrier-Grade NAT (CGN) for IPv6 Transition</title>
            <author initials="S." surname="Jiang" fullname="S. Jiang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Guo" fullname="D. Guo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="June"/>
            <abstract>
              <t indent="0">Global IPv6 deployment was slower than originally expected.  As IPv4 address exhaustion approaches, IPv4 to IPv6 transition issues become more critical and less tractable.  Host-based transition mechanisms used in dual-stack environments cannot meet all transition requirements.  Most end users are not sufficiently expert to configure or maintain host-based transition mechanisms.  Carrier-Grade NAT (CGN) devices with integrated transition mechanisms can reduce the operational changes required during the IPv4 to IPv6 migration or coexistence period.</t>
              <t indent="0">This document proposes an incremental CGN approach for IPv6 transition.  It can provide IPv6 access services for IPv6 hosts and IPv4 access services for IPv4 hosts while leaving much of a legacy ISP network unchanged during the initial stage of IPv4 to IPv6 migration.  Unlike CGN alone, incremental CGN also supports and encourages smooth transition towards dual-stack or IPv6-only ISP networks.  An integrated configurable CGN device and an adaptive home gateway (HG) device are described.  Both are reusable during different transition phases, avoiding multiple upgrades.  This enables IPv6 migration to be incrementally achieved according to real user requirements.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6264"/>
          <seriesInfo name="DOI" value="10.17487/RFC6264"/>
        </reference>
        <reference anchor="RFC6269" target="https://www.rfc-editor.org/info/rfc6269" quoteTitle="true" derivedAnchor="RFC6269">
          <front>
            <title>Issues with IP Address Sharing</title>
            <author initials="M." surname="Ford" fullname="M. Ford" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Durand" fullname="A. Durand">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Levis" fullname="P. Levis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Roberts" fullname="P. Roberts">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="June"/>
            <abstract>
              <t indent="0">The completion of IPv4 address allocations from IANA and the Regional Internet Registries (RIRs) is causing service providers around the world to question how they will continue providing IPv4 connectivity service to their subscribers when there are no longer sufficient IPv4 addresses to allocate them one per subscriber.  Several possible solutions to this problem are now emerging based around the idea of shared IPv4 addressing.  These solutions give rise to a number of issues, and this memo identifies those common to all such address sharing approaches.  Such issues include application failures, additional service monitoring complexity, new security vulnerabilities, and so on.  Solution-specific discussions are out of scope.</t>
              <t indent="0">Deploying IPv6 is the only perennial way to ease pressure on the public IPv4 address pool without the need for address sharing mechanisms that give rise to the issues identified herein.  This  document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6269"/>
          <seriesInfo name="DOI" value="10.17487/RFC6269"/>
        </reference>
        <reference anchor="RFC6296" target="https://www.rfc-editor.org/info/rfc6296" quoteTitle="true" derivedAnchor="RFC6296">
          <front>
            <title>IPv6-to-IPv6 Network Prefix Translation</title>
            <author initials="M." surname="Wasserman" fullname="M. Wasserman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="June"/>
            <abstract>
              <t indent="0">This document describes a stateless, transport-agnostic IPv6-to-IPv6 Network Prefix Translation (NPTv6) function that provides the address-independence benefit associated with IPv4-to-IPv4 NAT (NAPT44) and provides a 1:1 relationship between addresses in the "inside" and "outside" prefixes, preserving end-to-end reachability at the network layer.  This document defines an Experimental Protocol  for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6296"/>
          <seriesInfo name="DOI" value="10.17487/RFC6296"/>
        </reference>
        <reference anchor="RFC6302" target="https://www.rfc-editor.org/info/rfc6302" quoteTitle="true" derivedAnchor="RFC6302">
          <front>
            <title>Logging Recommendations for Internet-Facing Servers</title>
            <author initials="A." surname="Durand" fullname="A. Durand">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Gashinsky" fullname="I. Gashinsky">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Lee" fullname="D. Lee">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Sheppard" fullname="S. Sheppard">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="June"/>
            <abstract>
              <t indent="0">In the wake of IPv4 exhaustion and deployment of IP address sharing techniques, this document recommends that Internet-facing servers log port number and accurate timestamps in addition to the incoming IP address.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="162"/>
          <seriesInfo name="RFC" value="6302"/>
          <seriesInfo name="DOI" value="10.17487/RFC6302"/>
        </reference>
        <reference anchor="RFC6324" target="https://www.rfc-editor.org/info/rfc6324" quoteTitle="true" derivedAnchor="RFC6324">
          <front>
            <title>Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations</title>
            <author initials="G." surname="Nakibly" fullname="G. Nakibly">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Templin" fullname="F. Templin">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="August"/>
            <abstract>
              <t indent="0">This document is concerned with security vulnerabilities in IPv6-in- IPv4 automatic tunnels.  These vulnerabilities allow an attacker to take advantage of inconsistencies between the IPv4 routing state and the IPv6 routing state.  The attack forms a routing loop that can be abused as a vehicle for traffic amplification to facilitate denial- of-service (DoS) attacks.  The first aim of this document is to inform on this attack and its root causes.  The second aim is to present some possible mitigation measures.  It should be noted that at the time of this writing there are no known reports of malicious attacks exploiting these vulnerabilities.  Nonetheless, these vulnerabilities can be activated by accidental misconfiguration. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6324"/>
          <seriesInfo name="DOI" value="10.17487/RFC6324"/>
        </reference>
        <reference anchor="RFC6333" target="https://www.rfc-editor.org/info/rfc6333" quoteTitle="true" derivedAnchor="RFC6333">
          <front>
            <title>Dual-Stack Lite Broadband Deployments Following IPv4 Exhaustion</title>
            <author initials="A." surname="Durand" fullname="A. Durand">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Droms" fullname="R. Droms">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Woodyatt" fullname="J. Woodyatt">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Lee" fullname="Y. Lee">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="August"/>
            <abstract>
              <t indent="0">This document revisits the dual-stack model and introduces the Dual- Stack Lite technology aimed at better aligning the costs and benefits of deploying IPv6 in service provider networks.  Dual-Stack Lite enables a broadband service provider to share IPv4 addresses among customers by combining two well-known technologies: IP in IP (IPv4- in-IPv6) and Network Address Translation (NAT).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6333"/>
          <seriesInfo name="DOI" value="10.17487/RFC6333"/>
        </reference>
        <reference anchor="RFC6343" target="https://www.rfc-editor.org/info/rfc6343" quoteTitle="true" derivedAnchor="RFC6343">
          <front>
            <title>Advisory Guidelines for 6to4 Deployment</title>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="August"/>
            <abstract>
              <t indent="0">This document provides advice to network operators about deployment of the 6to4 technique for automatic tunneling of IPv6 over IPv4.  It is principally addressed to Internet Service Providers (ISPs), including those that do not yet support IPv6, and to Content Providers.  Some advice to implementers is also included.  The intention of the advice is to minimize both user dissatisfaction and help-desk calls.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6343"/>
          <seriesInfo name="DOI" value="10.17487/RFC6343"/>
        </reference>
        <reference anchor="RFC6434" target="https://www.rfc-editor.org/info/rfc6434" quoteTitle="true" derivedAnchor="RFC6434">
          <front>
            <title>IPv6 Node Requirements</title>
            <author initials="E." surname="Jankiewicz" fullname="E. Jankiewicz">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Loughney" fullname="J. Loughney">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="December"/>
            <abstract>
              <t indent="0">This document defines requirements for IPv6 nodes.  It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6434"/>
          <seriesInfo name="DOI" value="10.17487/RFC6434"/>
        </reference>
        <reference anchor="RFC6459" target="https://www.rfc-editor.org/info/rfc6459" quoteTitle="true" derivedAnchor="RFC6459">
          <front>
            <title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
            <author initials="J." surname="Korhonen" fullname="J. Korhonen" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Soininen" fullname="J. Soininen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Patil" fullname="B. Patil">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Savolainen" fullname="T. Savolainen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Bajko" fullname="G. Bajko">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Iisakkila" fullname="K. Iisakkila">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="January"/>
            <abstract>
              <t indent="0">The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed.  Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6.  This document describes the support for IPv6 in 3GPP network architectures.  This document is  not an Internet Standards Track specification; it is published for  informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6459"/>
          <seriesInfo name="DOI" value="10.17487/RFC6459"/>
        </reference>
        <reference anchor="RFC6547" target="https://www.rfc-editor.org/info/rfc6547" quoteTitle="true" derivedAnchor="RFC6547">
          <front>
            <title>RFC 3627 to Historic Status</title>
            <author initials="W." surname="George" fullname="W. George">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="February"/>
            <abstract>
              <t indent="0">This document moves "Use of /127 Prefix Length Between Routers Considered Harmful" (RFC 3627) to Historic status to reflect the updated guidance contained in "Using 127-Bit IPv6 Prefixes on Inter- Router Links" (RFC 6164).  A Standards Track document supersedes an informational document; therefore, guidance provided in RFC 6164 is to be followed when the two documents are in conflict.  This document links the two RFCs so that the IETF's updated guidance on this topic is clearer.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6547"/>
          <seriesInfo name="DOI" value="10.17487/RFC6547"/>
        </reference>
        <reference anchor="RFC6564" target="https://www.rfc-editor.org/info/rfc6564" quoteTitle="true" derivedAnchor="RFC6564">
          <front>
            <title>A Uniform Format for IPv6 Extension Headers</title>
            <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Woodyatt" fullname="J. Woodyatt">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Kline" fullname="E. Kline">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Hoagland" fullname="J. Hoagland">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bhatia" fullname="M. Bhatia">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="April"/>
            <abstract>
              <t indent="0">In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the transport-layer header.  There are a small number of such extension headers currently defined.  This document describes the issues that can arise when defining new extension headers and discusses the alternate extension mechanisms in IPv6.  It also provides a common format for defining any new IPv6 extension headers, if they are needed.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6564"/>
          <seriesInfo name="DOI" value="10.17487/RFC6564"/>
        </reference>
        <reference anchor="RFC6583" target="https://www.rfc-editor.org/info/rfc6583" quoteTitle="true" derivedAnchor="RFC6583">
          <front>
            <title>Operational Neighbor Discovery Problems</title>
            <author initials="I." surname="Gashinsky" fullname="I. Gashinsky">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Jaeggli" fullname="J. Jaeggli">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Kumari" fullname="W. Kumari">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="March"/>
            <abstract>
              <t indent="0">In IPv4, subnets are generally small, made just large enough to cover the actual number of machines on the subnet.  In contrast, the default IPv6 subnet size is a /64, a number so large it covers trillions of addresses, the overwhelming number of which will be unassigned.  Consequently, simplistic implementations of Neighbor Discovery (ND) can be vulnerable to deliberate or accidental denial of service (DoS), whereby they attempt to perform address resolution for large numbers of unassigned addresses.  Such denial-of-service attacks can be launched intentionally (by an attacker) or result from legitimate operational tools or accident conditions.  As a result of these vulnerabilities, new devices may not be able to "join" a network, it may be impossible to establish new IPv6 flows, and existing IPv6 transported flows may be interrupted.</t>
              <t indent="0">This document describes the potential for DoS in detail and suggests possible implementation improvements as well as operational mitigation techniques that can, in some cases, be used to protect against or at least alleviate the impact of such attacks.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6583"/>
          <seriesInfo name="DOI" value="10.17487/RFC6583"/>
        </reference>
        <reference anchor="RFC6598" target="https://www.rfc-editor.org/info/rfc6598" quoteTitle="true" derivedAnchor="RFC6598">
          <front>
            <title>IANA-Reserved IPv4 Prefix for Shared Address Space</title>
            <author initials="J." surname="Weil" fullname="J. Weil">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Kuarsingh" fullname="V. Kuarsingh">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Donley" fullname="C. Donley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Liljenstolpe" fullname="C. Liljenstolpe">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Azinger" fullname="M. Azinger">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="April"/>
            <abstract>
              <t indent="0">This document requests the allocation of an IPv4 /10 address block to be used as Shared Address Space to accommodate the needs of Carrier- Grade NAT (CGN) devices.  It is anticipated that Service Providers will use this Shared Address Space to number the interfaces that connect CGN devices to Customer Premises Equipment (CPE).</t>
              <t indent="0">Shared Address Space is distinct from RFC 1918 private address space because it is intended for use on Service Provider networks. However, it may be used in a manner similar to RFC 1918 private address space on routing equipment that is able to do address translation across router interfaces when the addresses are identical on two different interfaces.  Details are provided in the text of this document.</t>
              <t indent="0">This document details the allocation of an additional special-use IPv4 address block and updates RFC 5735.  This memo documents an  Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6598"/>
          <seriesInfo name="DOI" value="10.17487/RFC6598"/>
        </reference>
        <reference anchor="RFC6620" target="https://www.rfc-editor.org/info/rfc6620" quoteTitle="true" derivedAnchor="RFC6620">
          <front>
            <title>FCFS SAVI: First-Come, First-Served Source Address Validation Improvement for Locally Assigned IPv6 Addresses</title>
            <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Levy-Abegnoli" fullname="E. Levy-Abegnoli">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="May"/>
            <abstract>
              <t indent="0">This memo describes First-Come, First-Served Source Address Validation Improvement (FCFS SAVI), a mechanism that provides source address validation for IPv6 networks using the FCFS principle.  The proposed mechanism is intended to complement ingress filtering techniques to help detect and prevent source address spoofing.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6620"/>
          <seriesInfo name="DOI" value="10.17487/RFC6620"/>
        </reference>
        <reference anchor="RFC6666" target="https://www.rfc-editor.org/info/rfc6666" quoteTitle="true" derivedAnchor="RFC6666">
          <front>
            <title>A Discard Prefix for IPv6</title>
            <author initials="N." surname="Hilliard" fullname="N. Hilliard">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Freedman" fullname="D. Freedman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="August"/>
            <abstract>
              <t indent="0">Remote triggered black hole filtering describes a method of mitigating the effects of denial-of-service attacks by selectively discarding traffic based on source or destination address.  Remote triggered black hole routing describes a method of selectively re- routing traffic into a sinkhole router (for further analysis) based on destination address.  This document updates the "IPv6 Special Purpose Address Registry" by explaining why a unique IPv6 prefix should be formally assigned by IANA for the purpose of facilitating IPv6 remote triggered black hole filtering and routing.  This document  is not an Internet Standards Track specification; it is published for  informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6666"/>
          <seriesInfo name="DOI" value="10.17487/RFC6666"/>
        </reference>
        <reference anchor="RFC6762" target="https://www.rfc-editor.org/info/rfc6762" quoteTitle="true" derivedAnchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author initials="S." surname="Cheshire" fullname="S. Cheshire">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Krochmal" fullname="M. Krochmal">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="February"/>
            <abstract>
              <t indent="0">As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important.  In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t indent="0">Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server.  In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t indent="0">The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC6763" target="https://www.rfc-editor.org/info/rfc6763" quoteTitle="true" derivedAnchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author initials="S." surname="Cheshire" fullname="S. Cheshire">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Krochmal" fullname="M. Krochmal">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="February"/>
            <abstract>
              <t indent="0">This document specifies how DNS resource records are named and structured to facilitate service discovery.  Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC6775" target="https://www.rfc-editor.org/info/rfc6775" quoteTitle="true" derivedAnchor="RFC6775">
          <front>
            <title>Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
            <author initials="Z." surname="Shelby" fullname="Z. Shelby" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Chakrabarti" fullname="S. Chakrabarti">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2012" month="November"/>
            <abstract>
              <t indent="0">The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4.  This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation.  In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links.  IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network.  This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks.  The document thus updates RFC 4944 to specify the use of the optimizations defined here.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6775"/>
          <seriesInfo name="DOI" value="10.17487/RFC6775"/>
        </reference>
        <reference anchor="RFC6877" target="https://www.rfc-editor.org/info/rfc6877" quoteTitle="true" derivedAnchor="RFC6877">
          <front>
            <title>464XLAT: Combination of Stateful and Stateless Translation</title>
            <author initials="M." surname="Mawatari" fullname="M. Mawatari">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Kawashima" fullname="M. Kawashima">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Byrne" fullname="C. Byrne">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="April"/>
            <abstract>
              <t indent="0">This document describes an architecture (464XLAT) for providing limited IPv4 connectivity across an IPv6-only network by combining existing and well-known stateful protocol translation (as described in RFC 6146) in the core and stateless protocol translation (as described in RFC 6145) at the edge. 464XLAT is a simple and scalable technique to quickly deploy limited IPv4 access service to IPv6-only edge networks without encapsulation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6877"/>
          <seriesInfo name="DOI" value="10.17487/RFC6877"/>
        </reference>
        <reference anchor="RFC6888" target="https://www.rfc-editor.org/info/rfc6888" quoteTitle="true" derivedAnchor="RFC6888">
          <front>
            <title>Common Requirements for Carrier-Grade NATs (CGNs)</title>
            <author initials="S." surname="Perreault" fullname="S. Perreault" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Yamagata" fullname="I. Yamagata">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Miyakawa" fullname="S. Miyakawa">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Nakagawa" fullname="A. Nakagawa">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Ashida" fullname="H. Ashida">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="April"/>
            <abstract>
              <t indent="0">This document defines common requirements for Carrier-Grade NATs (CGNs).  It updates RFC 4787.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="6888"/>
          <seriesInfo name="DOI" value="10.17487/RFC6888"/>
        </reference>
        <reference anchor="RFC6939" target="https://www.rfc-editor.org/info/rfc6939" quoteTitle="true" derivedAnchor="RFC6939">
          <front>
            <title>Client Link-Layer Address Option in DHCPv6</title>
            <author initials="G." surname="Halwasia" fullname="G. Halwasia">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Bhandari" fullname="S. Bhandari">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Dec" fullname="W. Dec">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="May"/>
            <abstract>
              <t indent="0">This document specifies the format and mechanism that is to be used for encoding the client link-layer address in DHCPv6 Relay-Forward messages by defining a new DHCPv6 Client Link-Layer Address option.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6939"/>
          <seriesInfo name="DOI" value="10.17487/RFC6939"/>
        </reference>
        <reference anchor="RFC6964" target="https://www.rfc-editor.org/info/rfc6964" quoteTitle="true" derivedAnchor="RFC6964">
          <front>
            <title>Operational Guidance for IPv6 Deployment in IPv4 Sites Using the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)</title>
            <author initials="F." surname="Templin" fullname="F. Templin">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="May"/>
            <abstract>
              <t indent="0">Many end-user sites in the Internet today still have predominantly IPv4 internal infrastructures.  These sites range in size from small home/office networks to large corporate enterprise networks, but share the commonality that IPv4 provides satisfactory internal routing and addressing services for most applications.  As more and more IPv6-only services are deployed, however, end-user devices within such sites will increasingly require at least basic IPv6 functionality.  This document therefore provides operational guidance for deployment of IPv6 within predominantly IPv4 sites using the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6964"/>
          <seriesInfo name="DOI" value="10.17487/RFC6964"/>
        </reference>
        <reference anchor="RFC6967" target="https://www.rfc-editor.org/info/rfc6967" quoteTitle="true" derivedAnchor="RFC6967">
          <front>
            <title>Analysis of Potential Solutions for Revealing a Host Identifier (HOST_ID) in Shared Address Deployments</title>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Touch" fullname="J. Touch">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Levis" fullname="P. Levis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Penno" fullname="R. Penno">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="June"/>
            <abstract>
              <t indent="0">This document is a collection of potential solutions for revealing a host identifier (denoted as HOST_ID) when a Carrier Grade NAT (CGN) or application proxies are involved in the path.  This host identifier could be used by a remote server to sort packets according to the sending host.  The host identifier must be unique to each host under the same shared IP address.</t>
              <t indent="0">This document analyzes a set of potential solutions for revealing a host identifier and does not recommend a particular solution, although it does highlight the hazards of some approaches.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6967"/>
          <seriesInfo name="DOI" value="10.17487/RFC6967"/>
        </reference>
        <reference anchor="RFC6980" target="https://www.rfc-editor.org/info/rfc6980" quoteTitle="true" derivedAnchor="RFC6980">
          <front>
            <title>Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="August"/>
            <abstract>
              <t indent="0">This document analyzes the security implications of employing IPv6 fragmentation with Neighbor Discovery (ND) messages.  It updates RFC 4861 such that use of the IPv6 Fragmentation Header is forbidden in all Neighbor Discovery messages, thus allowing for simple and effective countermeasures for Neighbor Discovery attacks.  Finally, it discusses the security implications of using IPv6 fragmentation with SEcure Neighbor Discovery (SEND) and formally updates RFC 3971 to provide advice regarding how the aforementioned security implications can be mitigated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6980"/>
          <seriesInfo name="DOI" value="10.17487/RFC6980"/>
        </reference>
        <reference anchor="RFC7010" target="https://www.rfc-editor.org/info/rfc7010" quoteTitle="true" derivedAnchor="RFC7010">
          <front>
            <title>IPv6 Site Renumbering Gap Analysis</title>
            <author initials="B." surname="Liu" fullname="B. Liu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Jiang" fullname="S. Jiang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Venaas" fullname="S. Venaas">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="George" fullname="W. George">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="September"/>
            <abstract>
              <t indent="0">This document briefly introduces the existing mechanisms that could be utilized for IPv6 site renumbering and tries to cover most of the explicit issues and requirements associated with IPv6 renumbering.  The content is mainly a gap analysis that provides a basis for future works to identify and develop solutions or to stimulate such development as appropriate.  The gap analysis is organized by the main steps of a renumbering process.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7010"/>
          <seriesInfo name="DOI" value="10.17487/RFC7010"/>
        </reference>
        <reference anchor="RFC7011" target="https://www.rfc-editor.org/info/rfc7011" quoteTitle="true" derivedAnchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author initials="B." surname="Claise" fullname="B. Claise" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Trammell" fullname="B. Trammell" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Aitken" fullname="P. Aitken">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="September"/>
            <abstract>
              <t indent="0">This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network.  In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required.  This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process.  This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7012" target="https://www.rfc-editor.org/info/rfc7012" quoteTitle="true" derivedAnchor="RFC7012">
          <front>
            <title>Information Model for IP Flow Information Export (IPFIX)</title>
            <author initials="B." surname="Claise" fullname="B. Claise" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Trammell" fullname="B. Trammell" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="September"/>
            <abstract>
              <t indent="0">This document defines the data types and management policy for the information model for the IP Flow Information Export (IPFIX) protocol.  This information model is maintained as the IANA "IPFIX                         Information Elements" registry, the initial contents of which were defined by RFC 5102.  This information model is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and the Exporting Process.  Although this model was developed for the IPFIX protocol, it is defined in an open way that allows it to be easily used in other protocols, interfaces, and applications. This document obsoletes RFC 5102.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7012"/>
          <seriesInfo name="DOI" value="10.17487/RFC7012"/>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" quoteTitle="true" derivedAnchor="RFC7039">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author initials="J." surname="Wu" fullname="J. Wu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Bi" fullname="J. Bi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Vogt" fullname="C. Vogt" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t indent="0">Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation.  This document is a framework document that describes and motivates the design of the SAVI methods.  Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7045" target="https://www.rfc-editor.org/info/rfc7045" quoteTitle="true" derivedAnchor="RFC7045">
          <front>
            <title>Transmission and Processing of IPv6 Extension Headers</title>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Jiang" fullname="S. Jiang">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="December"/>
            <abstract>
              <t indent="0">Various IPv6 extension headers have been standardised since the IPv6 standard was first published.  This document updates RFC 2460 to clarify how intermediate nodes should deal with such extension headers and with any that are defined in the future.  It also specifies how extension headers should be registered by IANA, with a corresponding minor update to RFC 2780.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7045"/>
          <seriesInfo name="DOI" value="10.17487/RFC7045"/>
        </reference>
        <reference anchor="RFC7084" target="https://www.rfc-editor.org/info/rfc7084" quoteTitle="true" derivedAnchor="RFC7084">
          <front>
            <title>Basic Requirements for IPv6 Customer Edge Routers</title>
            <author initials="H." surname="Singh" fullname="H. Singh">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Beebee" fullname="W. Beebee">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Donley" fullname="C. Donley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Stark" fullname="B. Stark">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="November"/>
            <abstract>
              <t indent="0">This document specifies requirements for an IPv6 Customer Edge (CE) router.  Specifically, the current version of this document focuses on the basic provisioning of an IPv6 CE router and the provisioning of IPv6 hosts attached to it.  The document also covers IP transition technologies.  Two transition technologies in RFC 5969's IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) and RFC 6333's Dual-Stack Lite (DS-Lite) are covered in the document.  The document obsoletes RFC 6204.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7084"/>
          <seriesInfo name="DOI" value="10.17487/RFC7084"/>
        </reference>
        <reference anchor="RFC7112" target="https://www.rfc-editor.org/info/rfc7112" quoteTitle="true" derivedAnchor="RFC7112">
          <front>
            <title>Implications of Oversized IPv6 Header Chains</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Manral" fullname="V. Manral">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Bonica" fullname="R. Bonica">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="January"/>
            <abstract>
              <t indent="0">The IPv6 specification allows IPv6 Header Chains of an arbitrary size.  The specification also allows options that can, in turn, extend each of the headers.  In those scenarios in which the IPv6 Header Chain or options are unusually long and packets are fragmented, or scenarios in which the fragment size is very small, the First Fragment of a packet may fail to include the entire IPv6 Header Chain.  This document discusses the interoperability and security problems of such traffic, and updates RFC 2460 such that the First Fragment of a packet is required to contain the entire IPv6 Header Chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7112"/>
          <seriesInfo name="DOI" value="10.17487/RFC7112"/>
        </reference>
        <reference anchor="RFC7113" target="https://www.rfc-editor.org/info/rfc7113" quoteTitle="true" derivedAnchor="RFC7113">
          <front>
            <title>Implementation Advice for IPv6 Router Advertisement Guard (RA-Guard)</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="February"/>
            <abstract>
              <t indent="0">The IPv6 Router Advertisement Guard (RA-Guard) mechanism is commonly employed to mitigate attack vectors based on forged ICMPv6 Router Advertisement messages.  Many existing IPv6 deployments rely on RA-Guard as the first line of defense against the aforementioned attack vectors.  However, some implementations of RA-Guard have been found to be prone to circumvention by employing IPv6 Extension Headers. This document describes the evasion techniques that affect the aforementioned implementations and formally updates RFC 6105, such that the aforementioned RA-Guard evasion vectors are eliminated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7113"/>
          <seriesInfo name="DOI" value="10.17487/RFC7113"/>
        </reference>
        <reference anchor="RFC7123" target="https://www.rfc-editor.org/info/rfc7123" quoteTitle="true" derivedAnchor="RFC7123">
          <front>
            <title>Security Implications of IPv6 on IPv4 Networks</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Liu" fullname="W. Liu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="February"/>
            <abstract>
              <t indent="0">This document discusses the security implications of native IPv6 support and IPv6 transition/coexistence technologies on "IPv4-only" networks and describes possible mitigations for the aforementioned issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7123"/>
          <seriesInfo name="DOI" value="10.17487/RFC7123"/>
        </reference>
        <reference anchor="RFC7166" target="https://www.rfc-editor.org/info/rfc7166" quoteTitle="true" derivedAnchor="RFC7166">
          <front>
            <title>Supporting Authentication Trailer for OSPFv3</title>
            <author initials="M." surname="Bhatia" fullname="M. Bhatia">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Manral" fullname="V. Manral">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Lindem" fullname="A. Lindem">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="March"/>
            <abstract>
              <t indent="0">Currently, OSPF for IPv6 (OSPFv3) uses IPsec as the only mechanism for authenticating protocol packets.  This behavior is different from authentication mechanisms present in other routing protocols (OSPFv2, Intermediate System to Intermediate System (IS-IS), RIP, and Routing Information Protocol Next Generation (RIPng)).  In some environments, it has been found that IPsec is difficult to configure and maintain and thus cannot be used.  This document defines an alternative mechanism to authenticate OSPFv3 protocol packets so that OSPFv3 does not depend only upon IPsec for authentication.</t>
              <t indent="0">The OSPFv3 Authentication Trailer was originally defined in RFC 6506. This document obsoletes RFC 6506 by providing a revised definition, including clarifications and refinements of the procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7166"/>
          <seriesInfo name="DOI" value="10.17487/RFC7166"/>
        </reference>
        <reference anchor="RFC7217" target="https://www.rfc-editor.org/info/rfc7217" quoteTitle="true" derivedAnchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="April"/>
            <abstract>
              <t indent="0">This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another.  This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users.  The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
        </reference>
        <reference anchor="RFC7359" target="https://www.rfc-editor.org/info/rfc7359" quoteTitle="true" derivedAnchor="RFC7359">
          <front>
            <title>Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts/Networks</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="August"/>
            <abstract>
              <t indent="0">The subtle way in which the IPv6 and IPv4 protocols coexist in typical networks, together with the lack of proper IPv6 support in popular Virtual Private Network (VPN) tunnel products, may inadvertently result in VPN tunnel traffic leakages.  That is, traffic meant to be transferred over an encrypted and integrity- protected VPN tunnel may leak out of such a tunnel and be sent in the clear on the local network towards the final destination.  This document discusses some scenarios in which such VPN tunnel traffic leakages may occur as a result of employing IPv6-unaware VPN software.  Additionally, this document offers possible mitigations for this issue.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7359"/>
          <seriesInfo name="DOI" value="10.17487/RFC7359"/>
        </reference>
        <reference anchor="RFC7381" target="https://www.rfc-editor.org/info/rfc7381" quoteTitle="true" derivedAnchor="RFC7381">
          <front>
            <title>Enterprise IPv6 Deployment Guidelines</title>
            <author initials="K." surname="Chittimaneni" fullname="K. Chittimaneni">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Chown" fullname="T. Chown">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Howard" fullname="L. Howard">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Kuarsingh" fullname="V. Kuarsingh">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Pouffary" fullname="Y. Pouffary">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Vyncke" fullname="E. Vyncke">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="October"/>
            <abstract>
              <t indent="0">Enterprise network administrators worldwide are in various stages of preparing for or deploying IPv6 into their networks.  The administrators face different challenges than operators of Internet access providers and have reasons for different priorities.  The overall problem for many administrators will be to offer Internet- facing services over IPv6 while continuing to support IPv4, and while introducing IPv6 access within the enterprise IT network.  The overall transition will take most networks from an IPv4-only environment to a dual-stack network environment and eventually an IPv6-only operating mode.  This document helps provide a framework for enterprise network architects or administrators who may be faced with many of these challenges as they consider their IPv6 support strategies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7381"/>
          <seriesInfo name="DOI" value="10.17487/RFC7381"/>
        </reference>
        <reference anchor="RFC7404" target="https://www.rfc-editor.org/info/rfc7404" quoteTitle="true" derivedAnchor="RFC7404">
          <front>
            <title>Using Only Link-Local Addressing inside an IPv6 Network</title>
            <author initials="M." surname="Behringer" fullname="M. Behringer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Vyncke" fullname="E. Vyncke">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="November"/>
            <abstract>
              <t indent="0">In an IPv6 network, it is possible to use only link-local addresses on infrastructure links between routers.  This document discusses the advantages and disadvantages of this approach to facilitate the decision process for a given network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7404"/>
          <seriesInfo name="DOI" value="10.17487/RFC7404"/>
        </reference>
        <reference anchor="RFC7422" target="https://www.rfc-editor.org/info/rfc7422" quoteTitle="true" derivedAnchor="RFC7422">
          <front>
            <title>Deterministic Address Mapping to Reduce Logging in Carrier-Grade NAT Deployments</title>
            <author initials="C." surname="Donley" fullname="C. Donley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Grundemann" fullname="C. Grundemann">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Sarawat" fullname="V. Sarawat">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Sundaresan" fullname="K. Sundaresan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="O." surname="Vautrin" fullname="O. Vautrin">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="December"/>
            <abstract>
              <t indent="0">In some instances, Service Providers (SPs) have a legal logging requirement to be able to map a subscriber's inside address with the address used on the public Internet (e.g., for abuse response). Unfortunately, many logging solutions for Carrier-Grade NATs (CGNs) require active logging of dynamic translations.  CGN port assignments are often per connection, but they could optionally use port ranges. Research indicates that per-connection logging is not scalable in many residential broadband services.  This document suggests a way to manage CGN translations in such a way as to significantly reduce the amount of logging required while providing traceability for abuse response.  IPv6 is, of course, the preferred solution.  While deployment is in progress, SPs are forced by business imperatives to maintain support for IPv4.  This note addresses the IPv4 part of the network when a CGN solution is in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7422"/>
          <seriesInfo name="DOI" value="10.17487/RFC7422"/>
        </reference>
        <reference anchor="RFC7454" target="https://www.rfc-editor.org/info/rfc7454" quoteTitle="true" derivedAnchor="RFC7454">
          <front>
            <title>BGP Operations and Security</title>
            <author initials="J." surname="Durand" fullname="J. Durand">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Pepelnjak" fullname="I. Pepelnjak">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Doering" fullname="G. Doering">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="February"/>
            <abstract>
              <t indent="0">The Border Gateway Protocol (BGP) is the protocol almost exclusively used in the Internet to exchange routing information between network domains.  Due to this central nature, it is important to understand the security measures that can and should be deployed to prevent accidental or intentional routing disturbances.</t>
              <t indent="0">This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering.  It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP community scrubbing.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="194"/>
          <seriesInfo name="RFC" value="7454"/>
          <seriesInfo name="DOI" value="10.17487/RFC7454"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" quoteTitle="true" derivedAnchor="RFC7513">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author initials="J." surname="Bi" fullname="J. Bi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Wu" fullname="J. Wu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Yao" fullname="G. Yao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t indent="0">This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device.  The bindings set up by this procedure are used to filter packets with forged source IP addresses.  This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC7526" target="https://www.rfc-editor.org/info/rfc7526" quoteTitle="true" derivedAnchor="RFC7526">
          <front>
            <title>Deprecating the Anycast Prefix for 6to4 Relay Routers</title>
            <author initials="O." surname="Troan" fullname="O. Troan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Carpenter" fullname="B. Carpenter" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t indent="0">Experience with the 6to4 transition mechanism defined in RFC 3056 ("Connection of IPv6 Domains via IPv4 Clouds") has shown that the mechanism is unsuitable for widespread deployment and use in the Internet when used in its anycast mode.  Therefore, this document requests that RFC 3068 ("An Anycast Prefix for 6to4 Relay Routers") and RFC 6732 ("6to4 Provider Managed Tunnels") be made obsolete and moved to Historic status.  It recommends that future products should not support 6to4 anycast and that existing deployments should be reviewed.  This complements the guidelines in RFC 6343.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="196"/>
          <seriesInfo name="RFC" value="7526"/>
          <seriesInfo name="DOI" value="10.17487/RFC7526"/>
        </reference>
        <reference anchor="RFC7552" target="https://www.rfc-editor.org/info/rfc7552" quoteTitle="true" derivedAnchor="RFC7552">
          <front>
            <title>Updates to LDP for IPv6</title>
            <author initials="R." surname="Asati" fullname="R. Asati">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Pignataro" fullname="C. Pignataro">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Raza" fullname="K. Raza">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Manral" fullname="V. Manral">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Papneja" fullname="R. Papneja">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="June"/>
            <abstract>
              <t indent="0">The Label Distribution Protocol (LDP) specification defines procedures to exchange label bindings over either IPv4 or IPv6 networks, or both.  This document corrects and clarifies the LDP behavior when an IPv6 network is used (with or without IPv4).  This document updates RFCs 5036 and 6720.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7552"/>
          <seriesInfo name="DOI" value="10.17487/RFC7552"/>
        </reference>
        <reference anchor="RFC7597" target="https://www.rfc-editor.org/info/rfc7597" quoteTitle="true" derivedAnchor="RFC7597">
          <front>
            <title>Mapping of Address and Port with Encapsulation (MAP-E)</title>
            <author initials="O." surname="Troan" fullname="O. Troan" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Dec" fullname="W. Dec">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="X." surname="Li" fullname="X. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Bao" fullname="C. Bao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Matsushima" fullname="S. Matsushima">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Murakami" fullname="T. Murakami">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Taylor" fullname="T. Taylor" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="July"/>
            <abstract>
              <t indent="0">This document describes a mechanism for transporting IPv4 packets across an IPv6 network using IP encapsulation.  It also describes a generic mechanism for mapping between IPv6 addresses and IPv4 addresses as well as transport-layer ports.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7597"/>
          <seriesInfo name="DOI" value="10.17487/RFC7597"/>
        </reference>
        <reference anchor="RFC7599" target="https://www.rfc-editor.org/info/rfc7599" quoteTitle="true" derivedAnchor="RFC7599">
          <front>
            <title>Mapping of Address and Port using Translation (MAP-T)</title>
            <author initials="X." surname="Li" fullname="X. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Bao" fullname="C. Bao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Dec" fullname="W. Dec" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="O." surname="Troan" fullname="O. Troan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Matsushima" fullname="S. Matsushima">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Murakami" fullname="T. Murakami">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="July"/>
            <abstract>
              <t indent="0">This document specifies the solution architecture based on "Mapping                             of Address and Port" stateless IPv6-IPv4 Network Address Translation (NAT64) for providing shared or non-shared IPv4 address connectivity to and across an IPv6 network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7599"/>
          <seriesInfo name="DOI" value="10.17487/RFC7599"/>
        </reference>
        <reference anchor="RFC7610" target="https://www.rfc-editor.org/info/rfc7610" quoteTitle="true" derivedAnchor="RFC7610">
          <front>
            <title>DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Liu" fullname="W. Liu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Van de Velde" fullname="G. Van de Velde">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="August"/>
            <abstract>
              <t indent="0">This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers.  It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received.  A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks.  This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="199"/>
          <seriesInfo name="RFC" value="7610"/>
          <seriesInfo name="DOI" value="10.17487/RFC7610"/>
        </reference>
        <reference anchor="RFC7707" target="https://www.rfc-editor.org/info/rfc7707" quoteTitle="true" derivedAnchor="RFC7707">
          <front>
            <title>Network Reconnaissance in IPv6 Networks</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Chown" fullname="T. Chown">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="March"/>
            <abstract>
              <t indent="0">IPv6 offers a much larger address space than that of its IPv4 counterpart.  An IPv6 subnet of size /64 can (in theory) accommodate approximately 1.844 * 10^19 hosts, thus resulting in a much lower host density (#hosts/#addresses) than is typical in IPv4 networks, where a site typically has 65,000 or fewer unique addresses.  As a result, it is widely assumed that it would take a tremendous effort to perform address-scanning attacks against IPv6 networks; therefore, IPv6 address-scanning attacks have been considered unfeasible.  This document formally obsoletes RFC 5157, which first discussed this assumption, by providing further analysis on how traditional address-scanning techniques apply to IPv6 networks and exploring some additional techniques that can be employed for IPv6 network reconnaissance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7707"/>
          <seriesInfo name="DOI" value="10.17487/RFC7707"/>
        </reference>
        <reference anchor="RFC7721" target="https://www.rfc-editor.org/info/rfc7721" quoteTitle="true" derivedAnchor="RFC7721">
          <front>
            <title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="March"/>
            <abstract>
              <t indent="0">This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized.  It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7721"/>
          <seriesInfo name="DOI" value="10.17487/RFC7721"/>
        </reference>
        <reference anchor="RFC7772" target="https://www.rfc-editor.org/info/rfc7772" quoteTitle="true" derivedAnchor="RFC7772">
          <front>
            <title>Reducing Energy Consumption of Router Advertisements</title>
            <author initials="A." surname="Yourtchenko" fullname="A. Yourtchenko">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Colitti" fullname="L. Colitti">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="February"/>
            <abstract>
              <t indent="0">Frequent Router Advertisement messages can severely impact host power consumption.  This document recommends operational practices to avoid such impact.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="202"/>
          <seriesInfo name="RFC" value="7772"/>
          <seriesInfo name="DOI" value="10.17487/RFC7772"/>
        </reference>
        <reference anchor="RFC7785" target="https://www.rfc-editor.org/info/rfc7785" quoteTitle="true" derivedAnchor="RFC7785">
          <front>
            <title>Recommendations for Prefix Binding in the Context of Softwire Dual-Stack Lite</title>
            <author initials="S." surname="Vinapamula" fullname="S. Vinapamula">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="February"/>
            <abstract>
              <t indent="0">This document discusses issues induced by the change of the Dual- Stack Lite (DS-Lite) Basic Bridging BroadBand (B4) IPv6 address and sketches a set of recommendations to solve those issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7785"/>
          <seriesInfo name="DOI" value="10.17487/RFC7785"/>
        </reference>
        <reference anchor="RFC7824" target="https://www.rfc-editor.org/info/rfc7824" quoteTitle="true" derivedAnchor="RFC7824">
          <front>
            <title>Privacy Considerations for DHCPv6</title>
            <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Mrugalski" fullname="T. Mrugalski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Jiang" fullname="S. Jiang">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="May"/>
            <abstract>
              <t indent="0">DHCPv6 is a protocol that is used to provide addressing and configuration information to IPv6 hosts.  This document describes the privacy issues associated with the use of DHCPv6 by Internet users. It is intended to be an analysis of the present situation and does not propose any solutions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7824"/>
          <seriesInfo name="DOI" value="10.17487/RFC7824"/>
        </reference>
        <reference anchor="RFC7844" target="https://www.rfc-editor.org/info/rfc7844" quoteTitle="true" derivedAnchor="RFC7844">
          <front>
            <title>Anonymity Profiles for DHCP Clients</title>
            <author initials="C." surname="Huitema" fullname="C. Huitema">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Mrugalski" fullname="T. Mrugalski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="May"/>
            <abstract>
              <t indent="0">Some DHCP options carry unique identifiers.  These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses.  The anonymity profiles are designed for clients that wish to remain anonymous to the visited network.  The profiles provide guidelines on the composition of DHCP or DHCPv6 messages, designed to minimize disclosure of identifying information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7844"/>
          <seriesInfo name="DOI" value="10.17487/RFC7844"/>
        </reference>
        <reference anchor="RFC7857" target="https://www.rfc-editor.org/info/rfc7857" quoteTitle="true" derivedAnchor="RFC7857">
          <front>
            <title>Updates to Network Address Translation (NAT) Behavioral Requirements</title>
            <author initials="R." surname="Penno" fullname="R. Penno">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Perreault" fullname="S. Perreault">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Sivakumar" fullname="S. Sivakumar">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Naito" fullname="K. Naito">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="April"/>
            <abstract>
              <t indent="0">This document clarifies and updates several requirements of RFCs 4787, 5382, and 5508 based on operational and development experience. The focus of this document is Network Address Translation from IPv4 to IPv4 (NAT44).</t>
              <t indent="0">This document updates RFCs 4787, 5382, and 5508.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="7857"/>
          <seriesInfo name="DOI" value="10.17487/RFC7857"/>
        </reference>
        <reference anchor="RFC7872" target="https://www.rfc-editor.org/info/rfc7872" quoteTitle="true" derivedAnchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Linkova" fullname="J. Linkova">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Chown" fullname="T. Chown">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Liu" fullname="W. Liu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="June"/>
            <abstract>
              <t indent="0">This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7872"/>
          <seriesInfo name="DOI" value="10.17487/RFC7872"/>
        </reference>
        <reference anchor="RFC7915" target="https://www.rfc-editor.org/info/rfc7915" quoteTitle="true" derivedAnchor="RFC7915">
          <front>
            <title>IP/ICMP Translation Algorithm</title>
            <author initials="C." surname="Bao" fullname="C. Bao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="X." surname="Li" fullname="X. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Anderson" fullname="T. Anderson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="June"/>
            <abstract>
              <t indent="0">This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers).  This document obsoletes RFC 6145.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7915"/>
          <seriesInfo name="DOI" value="10.17487/RFC7915"/>
        </reference>
        <reference anchor="RFC7934" target="https://www.rfc-editor.org/info/rfc7934" quoteTitle="true" derivedAnchor="RFC7934">
          <front>
            <title>Host Address Availability Recommendations</title>
            <author initials="L." surname="Colitti" fullname="L. Colitti">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Cerf" fullname="V. Cerf">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Cheshire" fullname="S. Cheshire">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Schinazi" fullname="D. Schinazi">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="July"/>
            <abstract>
              <t indent="0">This document recommends that networks provide general-purpose end hosts with multiple global IPv6 addresses when they attach, and it describes the benefits of and the options for doing so.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="204"/>
          <seriesInfo name="RFC" value="7934"/>
          <seriesInfo name="DOI" value="10.17487/RFC7934"/>
        </reference>
        <reference anchor="RFC8040" target="https://www.rfc-editor.org/info/rfc8040" quoteTitle="true" derivedAnchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author initials="A." surname="Bierman" fullname="A. Bierman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Watsen" fullname="K. Watsen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="January"/>
            <abstract>
              <t indent="0">This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8064" target="https://www.rfc-editor.org/info/rfc8064" quoteTitle="true" derivedAnchor="RFC8064">
          <front>
            <title>Recommendation on Stable IPv6 Interface Identifiers</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Thaler" fullname="D. Thaler">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Liu" fullname="W. Liu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="February"/>
            <abstract>
              <t indent="0">This document changes the recommended default Interface Identifier (IID) generation scheme for cases where Stateless Address Autoconfiguration (SLAAC) is used to generate a stable IPv6 address. It recommends using the mechanism specified in RFC 7217 in such cases, and recommends against embedding stable link-layer addresses in IPv6 IIDs.  It formally updates RFC 2464, RFC 2467, RFC 2470, RFC 2491, RFC 2492, RFC 2497, RFC 2590, RFC 3146, RFC 3572, RFC 4291, RFC 4338, RFC 4391, RFC 5072, and RFC 5121.  This document does not change any existing recommendations concerning the use of temporary addresses as specified in RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8064"/>
          <seriesInfo name="DOI" value="10.17487/RFC8064"/>
        </reference>
        <reference anchor="RFC8177" target="https://www.rfc-editor.org/info/rfc8177" quoteTitle="true" derivedAnchor="RFC8177">
          <front>
            <title>YANG Data Model for Key Chains</title>
            <author initials="A." surname="Lindem" fullname="A. Lindem" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y." surname="Qu" fullname="Y. Qu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Yeung" fullname="D. Yeung">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Chen" fullname="I. Chen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Zhang" fullname="J. Zhang">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="June"/>
            <abstract>
              <t indent="0">This document describes the key chain YANG data model.  Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys.  A key chain is a list containing one or more elements containing a Key ID, key string, send/accept lifetimes, and the associated authentication or encryption algorithm.  By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated.  By representing them in a YANG data model, key distribution can be automated.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8177"/>
          <seriesInfo name="DOI" value="10.17487/RFC8177"/>
        </reference>
        <reference anchor="RFC8190" target="https://www.rfc-editor.org/info/rfc8190" quoteTitle="true" derivedAnchor="RFC8190">
          <front>
            <title>Updates to the Special-Purpose IP Address Registries</title>
            <author initials="R." surname="Bonica" fullname="R. Bonica">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Cotton" fullname="M. Cotton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Haberman" fullname="B. Haberman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Vegoda" fullname="L. Vegoda">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="June"/>
            <abstract>
              <t indent="0">This memo updates the IANA IPv4 and IPv6 Special-Purpose Address Registries to address issues raised by the definition of a "global" prefix.  It also corrects several errors in registry entries to ensure the integrity of the IANA Special-Purpose Address Registries.</t>
              <t indent="0">This memo updates RFC 6890.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="8190"/>
          <seriesInfo name="DOI" value="10.17487/RFC8190"/>
        </reference>
        <reference anchor="RFC8210" target="https://www.rfc-editor.org/info/rfc8210" quoteTitle="true" derivedAnchor="RFC8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author initials="R." surname="Bush" fullname="R. Bush">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Austein" fullname="R. Austein">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="September"/>
            <abstract>
              <t indent="0">In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t indent="0">This document describes version 1 of the RPKI-Router protocol.  RFC 6810 describes version 0.  This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="RFC8273" target="https://www.rfc-editor.org/info/rfc8273" quoteTitle="true" derivedAnchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author initials="J." surname="Brzozowski" fullname="J. Brzozowski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Van de Velde" fullname="G. Van de Velde">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="December"/>
            <abstract>
              <t indent="0">This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix).  Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="RFC8343" target="https://www.rfc-editor.org/info/rfc8343" quoteTitle="true" derivedAnchor="RFC8343">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="March"/>
            <abstract>
              <t indent="0">This document defines a YANG data model for the management of network interfaces.  It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t indent="0">The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t indent="0">This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC8344" target="https://www.rfc-editor.org/info/rfc8344" quoteTitle="true" derivedAnchor="RFC8344">
          <front>
            <title>A YANG Data Model for IP Management</title>
            <author initials="M." surname="Bjorklund" fullname="M. Bjorklund">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="March"/>
            <abstract>
              <t indent="0">This document defines a YANG data model for management of IP implementations.  The data model includes configuration and system state.</t>
              <t indent="0">The YANG data model in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
              <t indent="0">This document obsoletes RFC 7277.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8344"/>
          <seriesInfo name="DOI" value="10.17487/RFC8344"/>
        </reference>
        <reference anchor="RFC8415" target="https://www.rfc-editor.org/info/rfc8415" quoteTitle="true" derivedAnchor="RFC8415">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author initials="T." surname="Mrugalski" fullname="T. Mrugalski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Siodelski" fullname="M. Siodelski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Volz" fullname="B. Volz">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Yourtchenko" fullname="A. Yourtchenko">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Richardson" fullname="M. Richardson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Jiang" fullname="S. Jiang">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Lemon" fullname="T. Lemon">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Winters" fullname="T. Winters">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="November"/>
            <abstract>
              <t indent="0">This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes.  DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t indent="0">This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283).  In addition, this document clarifies the interactions between models of operation (RFC 7550).  As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
        </reference>
        <reference anchor="RFC8504" target="https://www.rfc-editor.org/info/rfc8504" quoteTitle="true" derivedAnchor="RFC8504">
          <front>
            <title>IPv6 Node Requirements</title>
            <author initials="T." surname="Chown" fullname="T. Chown">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Loughney" fullname="J. Loughney">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Winters" fullname="T. Winters">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="January"/>
            <abstract>
              <t indent="0">This document defines requirements for IPv6 nodes.  It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.</t>
              <t indent="0">This document obsoletes RFC 6434, and in turn RFC 4294.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="220"/>
          <seriesInfo name="RFC" value="8504"/>
          <seriesInfo name="DOI" value="10.17487/RFC8504"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520" quoteTitle="true" derivedAnchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author initials="E." surname="Lear" fullname="E. Lear">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Droms" fullname="R. Droms">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Romascanu" fullname="D. Romascanu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="March"/>
            <abstract>
              <t indent="0">This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t>
              <t indent="0">This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC8541" target="https://www.rfc-editor.org/info/rfc8541" quoteTitle="true" derivedAnchor="RFC8541">
          <front>
            <title>Impact of Shortest Path First (SPF) Trigger and Delay Strategies on IGP Micro-loops</title>
            <author initials="S." surname="Litkowski" fullname="S. Litkowski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Decraene" fullname="B. Decraene">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Horneffer" fullname="M. Horneffer">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="March"/>
            <abstract>
              <t indent="0">A micro-loop is a packet-forwarding loop that may occur transiently among two or more routers in a hop-by-hop packet-forwarding paradigm.</t>
              <t indent="0">This document analyzes the impact of using different link state IGP implementations in a single network with respect to micro-loops.  The analysis is focused on the Shortest Path First (SPF) delay algorithm but also mentions the impact of SPF trigger strategies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8541"/>
          <seriesInfo name="DOI" value="10.17487/RFC8541"/>
        </reference>
        <reference anchor="RFC8981" target="https://www.rfc-editor.org/info/rfc8981" quoteTitle="true" derivedAnchor="RFC8981">
          <front>
            <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Draves" fullname="R. Draves">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2021" month="February"/>
            <abstract>
              <t indent="0">This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8981"/>
          <seriesInfo name="DOI" value="10.17487/RFC8981"/>
        </reference>
        <reference anchor="SCANNING" target="http://www.caida.org/workshops/isma/1202/slides/aims1202_rbarnes.pdf" quoteTitle="true" derivedAnchor="SCANNING">
          <front>
            <title>Mapping the Great Void - Smarter scanning for IPv6</title>
            <author fullname="Richard Barnes"/>
            <author fullname="Rick Altmann"/>
            <author fullname="Daniel Kerr"/>
            <date month="February" year="2012"/>
          </front>
        </reference>
        <reference anchor="WEBER_VPN" target="https://blog.webernetz.net/wp-content/uploads/2018/03/TR18-Johannes-Weber-Dynamic-IPv6-Prefix-Problems-and-VPNs.pdf" quoteTitle="true" derivedAnchor="WEBER_VPN">
          <front>
            <title>Dynamic IPv6 Prefix - Problems and VPNs</title>
            <author fullname="Johannes Weber" surname="Weber"/>
            <date month="March" year="2018"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="Acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">The authors would like to thank the following people for their useful
      comments (in alphabetical order): <contact fullname="Mikael Abrahamsson"/>, <contact fullname="Fred Baker"/>,
      <contact fullname="Mustafa Suha Botsali"/>, <contact fullname="Mohamed       Boucadair"/>, <contact fullname="Brian Carpenter"/>, <contact fullname="Tim Chown"/>,
      <contact fullname="Lorenzo Colitti"/>, <contact fullname="Roman Danyliw"/>
      (IESG Review), <contact fullname="Markus de Bruen"/>, <contact fullname="Lars Eggert"/>
      (IESG review), <contact fullname="Tobias Fiebig"/>, <contact fullname="Fernando Gont"/>,
      <contact fullname="Jeffry Handal"/>, <contact fullname="Lee Howard"/>, 
      <contact fullname="Benjamin Kaduk"/> (IESG
      review), <contact fullname="Panos Kampanakis"/>, <contact fullname="Erik Kline"/>, 
      <contact fullname="Jouni Korhonen"/>, <contact fullname="Warren Kumari"/>
      (IESG review), <contact fullname="Ted Lemon"/>, <contact fullname="Mark Lentczner"/>, 
      <contact fullname="Acee Lindem"/> (and his detailed
      nits), <contact fullname="Jen Linkova"/> (and her detailed review), 
      <contact fullname="Gyan S. Mishra"/> (the
      Document Shepherd), <contact fullname="Jordi Palet"/>, <contact fullname="Alvaro Retana"/>
      (IESG review), <contact fullname="Zaheduzzaman Sarker"/> (IESG review), 
      <contact fullname="Bob Sleigh"/>, <contact fullname="Donald Smith"/>, 
      <contact fullname="Tarko Tikan"/>, <contact fullname="Ole Troan"/>, and
      <contact fullname="Bernie Volz"/>.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Éric Vyncke" initials="É" surname="Vyncke">
        <organization showOnFrontPage="true">Cisco</organization>
        <address>
          <postal>
            <street>De Kleetlaan 6a</street>
            <city>Diegem</city>
            <country>Belgium</country>
            <code>1831</code>
          </postal>
          <phone>+32 2 778 4677</phone>
          <email>evyncke@cisco.com</email>
        </address>
      </author>
      <author fullname="Kiran Kumar Chittimaneni" initials="K" surname="Chittimaneni">
        <organization showOnFrontPage="true"/>
        <address>
          <postal/>
          <email>kk.chittimaneni@gmail.com</email>
        </address>
      </author>
      <author fullname="Merike Kaeo" initials="M" surname="Kaeo">
        <organization showOnFrontPage="true">Double Shot Security</organization>
        <address>
          <postal>
            <street>3518 Fremont Ave N 363</street>
            <city>Seattle</city>
            <country>United States of America</country>
            <code>98103</code>
          </postal>
          <phone>+12066696394</phone>
          <email>merike@doubleshotsecurity.com</email>
        </address>
      </author>
      <author fullname="Enno Rey" initials="E" surname="Rey">
        <organization showOnFrontPage="true">ERNW</organization>
        <address>
          <postal>
            <street>Carl-Bosch-Str. 4</street>
            <city>Heidelberg Baden-Wuertemberg</city>
            <code>69115</code>
            <country>Germany</country>
          </postal>
          <phone>+49 6221 480390</phone>
          <email>erey@ernw.de</email>
          <uri/>
        </address>
      </author>
    </section>
  </back>
</rfc>
