| rfc9762.original | rfc9762.txt | |||
|---|---|---|---|---|
| IPv6 Maintenance L. Colitti | Internet Engineering Task Force (IETF) L. Colitti | |||
| Internet-Draft J. Linkova | Request for Comments: 9762 J. Linkova | |||
| Updates: 4861, 4862 (if approved) X. Ma, Ed. | Updates: 4861, 4862 X. Ma, Ed. | |||
| Intended status: Standards Track Google | Category: Standards Track Google | |||
| Expires: 11 April 2025 D. Lamparter | ISSN: 2070-1721 D. Lamparter | |||
| NetDEF, Inc. | NetDEF, Inc. | |||
| 8 October 2024 | June 2025 | |||
| Signaling DHCPv6 Prefix per Client Availability to Hosts | Using Router Advertisements to Signal the Availability of DHCPv6 Prefix | |||
| draft-ietf-6man-pio-pflag-12 | Delegation to Clients | |||
| Abstract | Abstract | |||
| This document defines a "P" flag in the Prefix Information Option | This document defines the P flag in the Prefix Information Option | |||
| (PIO) of IPv6 Router Advertisements (RAs). The flag is used to | (PIO) of IPv6 Router Advertisements (RAs). The flag is used to | |||
| indicate that the network prefers that clients use the RFC9663 | indicate that the network prefers that clients use the deployment | |||
| deployment model instead of using individual adresses in the on-link | model in RFC 9663 instead of using individual addresses in the on- | |||
| prefix assigned using Stateless Address Autoconfiguration (SLAAC) or | link prefix assigned using Stateless Address Autoconfiguration | |||
| DHCPv6 address assignment. | (SLAAC) or DHCPv6 address assignment. | |||
| This document updates RFC4862 to indicate that the Autonomous flag in | This document updates RFC 4862 to indicate that the Autonomous flag | |||
| a PIO needs to be ignored if the PIO has the P flag set. It also | in a PIO needs to be ignored if the PIO has the P flag set. It also | |||
| updates RFC4861 to specify that the P flag indicates DHCPv6 Prefix | updates RFC 4861 to specify that the P flag indicates DHCPv6 prefix | |||
| Delegation support for clients. | delegation support for clients. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
| provisions of BCP 78 and BCP 79. | ||||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
| Internet Standards is available in Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 11 April 2025. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9762. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2024 IETF Trust and the persons identified as the | Copyright (c) 2025 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
| extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
| described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
| provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
| in the Revised BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
| 2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3 | 2. Requirements Language | |||
| 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 3. Terminology | |||
| 4. Rationale . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 4. Rationale | |||
| 5. P Flag Overview . . . . . . . . . . . . . . . . . . . . . . . 5 | 5. P Flag Overview | |||
| 6. Router Behaviour . . . . . . . . . . . . . . . . . . . . . . 6 | 6. Router Behavior | |||
| 7. Client Behaviour . . . . . . . . . . . . . . . . . . . . . . 6 | 7. Client Behavior | |||
| 7.1. Processing the P Flag . . . . . . . . . . . . . . . . . . 6 | 7.1. Processing the P Flag | |||
| 7.2. Using Delegated Prefix(es) . . . . . . . . . . . . . . . 7 | 7.2. Using Delegated Prefix(es) | |||
| 7.3. Absence of PIOs with P bit set . . . . . . . . . . . . . 8 | 7.3. Absence of PIOs with the P Bit Set | |||
| 7.4. On-link Communication . . . . . . . . . . . . . . . . . . 8 | 7.4. On-Link Communication | |||
| 7.5. Source Address Selection . . . . . . . . . . . . . . . . 9 | 7.5. Source Address Selection | |||
| 8. Multihoming . . . . . . . . . . . . . . . . . . . . . . . . . 9 | 8. Multihoming | |||
| 9. Modifications to RFC-Mandated Behaviour . . . . . . . . . . . 9 | 9. Modifications to RFC-Mandated Behavior | |||
| 9.1. Changes to RFC4861 . . . . . . . . . . . . . . . . . . . 9 | 9.1. Changes to RFC 4861 | |||
| 9.2. Changes to RFC4862 . . . . . . . . . . . . . . . . . . . 10 | 9.2. Changes to RFC 4862 | |||
| 10. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | 10. Security Considerations | |||
| 11. Privacy Considerations . . . . . . . . . . . . . . . . . . . 12 | 11. Privacy Considerations | |||
| 12. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 | 12. IANA Considerations | |||
| 13. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 13. References | |||
| 13.1. Normative References . . . . . . . . . . . . . . . . . . 12 | 13.1. Normative References | |||
| 13.2. Informative References . . . . . . . . . . . . . . . . . 13 | 13.2. Informative References | |||
| Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 14 | Acknowledgements | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| [RFC9663] documents an IPv6 address assignment model where IPv6 | [RFC9663] documents an IPv6 address assignment model where IPv6 | |||
| devices obtain dedicated prefixes from the network via DHCPv6 Prefix | devices obtain dedicated prefixes from the network via DHCPv6 prefix | |||
| Delegation (DHCPv6-PD, [RFC8415]). This model provides devices with | delegation (DHCPv6-PD) [RFC8415]. This model provides devices with a | |||
| large IPv6 address space they can use to create addresses for | large IPv6 address space they can use to create addresses for | |||
| communication, individually number virtual machines (VM)s or | communication, individually number virtual machines (VMs) or | |||
| containers, or extend the network to downstream devices. It also | containers, or extend the network to downstream devices. It also | |||
| provides scalability benefits on large networks because network | provides scalability benefits on large networks because network | |||
| infrastructure devices do not need to maintain per-address state, | infrastructure devices do not need to maintain per-address state, | |||
| such as IPv6 neighbor cache, Source Address Validation Improvement | such as IPv6 neighbor cache, Source Address Validation Improvement | |||
| (SAVI, [RFC7039]) mappings, Virtual eXtensible Local Area Network | (SAVI) [RFC7039] mappings, Virtual eXtensible Local Area Network | |||
| (VXLAN, [RFC7348]) routes, etc. | (VXLAN) [RFC7348] routes, etc. | |||
| On networks with fewer devices, however, this model may not be | On networks with fewer devices, however, this model may not be | |||
| appropriate, because scaling to support multiple individual IPv6 | appropriate, because scaling to support multiple individual IPv6 | |||
| addresses per device is less of a concern. Also, many home networks | addresses per device is less of a concern. Also, many home networks | |||
| currently offer prefix delegation but assume that a limited number of | currently offer prefix delegation but assume that a limited number of | |||
| specialized devices and/or applications will require delegated | specialized devices and/or applications will require delegated | |||
| prefixes, and thus do not allocate enough address space to offer | prefixes and thus do not allocate enough address space to offer | |||
| prefixes to every device that connects to the network. For example, | prefixes to every device that connects to the network. For example, | |||
| if clients enable [RFC9663] on a home network that only receives a | if clients assume the [RFC9663] deployment model on a home network | |||
| /60 from the ISP, and each client obtains a /64 prefix, then the | that only receives a /60 from the ISP and each client obtains a /64 | |||
| network will run out of prefixes after 15 devices have been | prefix, then the network will run out of prefixes after 15 devices | |||
| connected. | have been connected. | |||
| Therefore, to safely roll out [RFC9663] implementations on the client | Therefore, to safely roll out the support of the deployment model | |||
| side, it is necessary to have a mechanism for the network to signal | defined in [RFC9663] on the client side, it is necessary to have a | |||
| to the client which address assignment method is preferred. | mechanism for the network to signal to the client which address | |||
| assignment method is preferred. | ||||
| 2. Requirements Language | 2. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| 3. Terminology | 3. Terminology | |||
| Node: a device that implements IPv6, [RFC8200]. | Node: a device that implements IPv6 [RFC8200] | |||
| Host: any node that is not a router, [RFC8200]. | Host: any node that is not a router [RFC8200] | |||
| Client: a node which connects to a network and acquires addresses. | Client: a node that connects to a network and acquires addresses. | |||
| The node may wish to obtain addresses for its own use, or may be a | The node may wish to obtain addresses for its own use, or it may | |||
| router that wishes to extend the network to its physical or virtual | be a router that wishes to extend the network to its physical or | |||
| subsystems, or both. It may be either a host or a router as defined | virtual subsystems, or both. It may be either a host or a router | |||
| by [RFC8200]. | as defined by [RFC8200]. | |||
| DHCPv6-PD: DHCPv6 ([RFC8415]) mechanism to delegate IPv6 prefixes to | DHCPv6-PD: DHCPv6 Prefix Delegation [RFC8415]; a mechanism to | |||
| clients. | delegate IPv6 prefixes to clients. | |||
| DHCPv6 IA_NA: Identity Association for Non-temporary Addresses | DHCPv6 IA_NA: Identity Association for Non-temporary Addresses | |||
| (Section 21.4 of [RFC8415]). | (Section 21.4 of [RFC8415]) | |||
| DHCPv6 IA_PD: Identity Association for Prefix Delegation | DHCPv6 IA_PD: Identity Association for Prefix Delegation | |||
| (Section 21.21 of [RFC8415]). | (Section 21.21 of [RFC8415]) | |||
| ND: Neighbor Discovery, [RFC4861]. | ND: Neighbor Discovery [RFC4861] | |||
| On-link address: an address that is assigned to an interface on a | On-link address: an address that is assigned to an interface on a | |||
| specified link ([RFC4861]). | specified link [RFC4861] | |||
| On-link prefix: a prefix that is assigned to a specified link. | On-link prefix: a prefix that is assigned to a specified link | |||
| Off-link: the opposite of "on-link" (see [RFC4861]). | Off-link: the opposite of "on-link" (see [RFC4861]) | |||
| PIO: Prefix Information Option, [RFC4862]. | PIO: Prefix Information Option [RFC4862] | |||
| SLAAC: IPv6 Stateless Address Autoconfiguration, [RFC4862]. | RA: Router Advertisement [RFC4861] | |||
| SLAAC: Stateless Address Autoconfiguration [RFC4862] | ||||
| 4. Rationale | 4. Rationale | |||
| The network administrator might want to indicate to clients that | The network administrator might want to indicate to clients that | |||
| requesting a prefix via DHCPv6-PD and using that prefix for address | requesting a prefix via DHCPv6-PD and using that prefix for address | |||
| assignment (see [RFC9663]) should be preferred over using individual | assignment (see [RFC9663]) should be preferred over using individual | |||
| addresses from the on-link prefix. The information is passed to the | addresses from the on-link prefix. The information is passed to the | |||
| client via a P flag in the Prefix Information Option (PIO). The | client via a P flag in the PIO. The reasons for it being a PIO flag | |||
| reason for it being a PIO flag is as follows: | are as follows: | |||
| * The information must be contained in the Router Advertisement | * The information must be contained in the RA because it must be | |||
| because it must be available to the client before it decides to | available to the client before it decides to form IPv6 addresses | |||
| form IPv6 addresses from the PIO prefix using SLAAC. Otherwise, | from the PIO prefix using SLAAC. Otherwise, the client might use | |||
| the client might use SLAAC to form IPv6 addresses from the PIO | SLAAC to form IPv6 addresses from the PIO provided and start using | |||
| provided and start using them, even if a unique per-client prefix | them, even if a unique per-client prefix is available via | |||
| is available via DHCPv6-PD. Forming addresses via SLAAC is | DHCPv6-PD. Forming addresses via SLAAC is suboptimal because if | |||
| suboptimal because if the client later acquires a prefix using | the client later acquires a prefix using DHCPv6-PD, it can either | |||
| DHCPv6-PD, it can either use both the prefix and SLAAC addresses, | 1) use both the prefix and SLAAC addresses, reducing the | |||
| reducing the scalability benefits of using DHCPv6-PD, or can | scalability benefits of using DHCPv6-PD, or 2) remove the SLAAC | |||
| remove the SLAAC addresses, which would be disruptive for | addresses, which would be disruptive for applications that are | |||
| applications that are using them. | using them. | |||
| * This information is specific to the particular prefix being | * This information is specific to the particular prefix being | |||
| announced. For example, a network administrator might want | announced. For example, a network administrator might want | |||
| clients to assign global addresses from delegated prefixes, but | clients to assign global addresses from delegated prefixes but | |||
| use the PIO prefix to form Unique Local Unicast (ULA, [RFC4193]) | form Unique Local IPv6 Unicast Addresses [RFC4193] from another | |||
| addresses. Also, in a multihoming situation, one upstream network | PIO in the RA using SLAAC. Also, in a multihoming situation, one | |||
| might choose to assign prefixes via prefix delegation, and another | upstream network might choose to assign prefixes via prefix | |||
| via PIOs. | delegation and another via PIOs. | |||
| Note that setting the 'P' flag in a PIO expresses the network | Note that setting the P flag in a PIO expresses the network | |||
| operator's preference as to whether clients should attempt using | operator's preference that clients should attempt using DHCPv6-PD | |||
| DHCPv6-PD instead of performing individual address configuration on | instead of performing individual address configuration on the prefix. | |||
| the prefix. For clients that honor this preference by requesting | For clients that honor this preference by requesting prefix | |||
| prefix delegation, the actual delegated prefix will necessarily be a | delegation, the actual delegated prefix will necessarily be a prefix | |||
| prefix different from the one from the PIO. | different from the one from the PIO. | |||
| 5. P Flag Overview | 5. P Flag Overview | |||
| The P flag (also called DHCPv6-PD preferred flag) is a 1-bit PIO | The P flag (also called the DHCPv6-PD Preferred Flag) is a 1-bit PIO | |||
| flag, located after the R flag ([RFC6275]). The presence of a PIO | flag, located after the R flag [RFC6275]. The presence of a PIO with | |||
| with the P flag set indicates that the network prefers that clients | the P flag set indicates that the network prefers that clients use | |||
| use Prefix Delegation instead of acquiring individual addresses via | prefix delegation instead of acquiring individual addresses via SLAAC | |||
| SLAAC or DHCPv6 address assignment. This implies that the network | or DHCPv6 address assignment. This implies that the network has a | |||
| has a DHCPv6 server capable of making DHCPv6 Prefix Delegations to | DHCPv6 server capable of making DHCPv6 prefix delegations to every | |||
| every device on the network, as described in [RFC9663]. | device on the network, as described in [RFC9663]. | |||
| The resulting format of the Prefix Information Option is as follows | Figure 1 shows the resulting format of the PIO. | |||
| (see Figure 1): | ||||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Type | Length | Prefix Length |L|A|R|P| Rsvd1 | | | Type | Length | Prefix Length |L|A|R|P| Rsvd1 | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Valid Lifetime | | | Valid Lifetime | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Preferred Lifetime | | | Preferred Lifetime | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Reserved2 | | | Reserved2 | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | |||
| + + | + + | |||
| | | | | | | |||
| + Prefix + | + Prefix + | |||
| | | | | | | |||
| + + | + + | |||
| | | | | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 1 | Figure 1 | |||
| The P flag is independent of the value of the M and O flags in the | The P flag is independent of the value of the M and O flags in the | |||
| Router Advertisement. If the network desires to delegate prefixes to | RA. If the network desires to delegate prefixes to devices that | |||
| devices that support DHCPv6 Prefix Delegation but do not support the | support DHCPv6 prefix delegation but do not support the P flag, it | |||
| P flag, it SHOULD also set the M or O bits in the RA to 1, because | SHOULD also set the M or O bits in the RA to 1, because some devices, | |||
| some devices, such as [RFC7084] Customer Edge (CE) routers, might not | such as Customer Edge (CE) routers [RFC7084], might not initiate | |||
| initiate DHCPv6 Prefix Delegation if both the M and O bits are set to | DHCPv6 prefix delegation if both the M and O bits are set to zero. | |||
| zero. | ||||
| 6. Router Behaviour | 6. Router Behavior | |||
| Routers SHOULD set the P flag to zero by default, unless explicitly | Routers SHOULD set the P flag to zero by default, unless explicitly | |||
| configured by the administrator, and SHOULD allow the operator to set | configured by the administrator, and SHOULD allow the operator to set | |||
| the P flag value for any given prefix advertised in a PIO. Routers | the P flag value for any given prefix advertised in a PIO. Routers | |||
| MUST allow the P flag to be configured separately from the A flag. | MUST allow the P flag to be configured separately from the A flag. | |||
| In particular, enabling or disabling the P flag MUST not trigger | In particular, enabling or disabling the P flag MUST NOT trigger | |||
| automatic changes in the A flag value set by the router. | automatic changes in the A flag value set by the router. | |||
| 7. Client Behaviour | 7. Client Behavior | |||
| 7.1. Processing the P Flag | 7.1. Processing the P Flag | |||
| This specification only applies to clients which support DHCPv6 | This specification only applies to clients that support DHCPv6 prefix | |||
| Prefix Delegation. Clients which do not support DHCPv6 prefix | delegation. Clients that do not support DHCPv6 prefix delegation | |||
| delegation MUST ignore the P flag. The P flag is meaningless for | MUST ignore the P flag. The P flag is meaningless for link-local | |||
| link-local prefixes and any Prefix Information Option containing the | prefixes, and any PIO containing the link-local prefix MUST be | |||
| link-local prefix MUST be ignored as specified in Section 5.5.3 of | ignored as specified in Section 5.5.3 of [RFC4862]. In the following | |||
| [RFC4862]. In the following text, all prefixes are assumed not to be | text, all prefixes are assumed not to be link-local. | |||
| link-local. | ||||
| For each interface, the client MUST keep a list of every prefix that | For each interface, the client MUST keep a list of every prefix that | |||
| was received from a PIO with the P flag set and currently has a non- | was received from a PIO with the P flag set and currently has a non- | |||
| zero Preferred Lifetime. The list affects the behaviour of the | zero preferred lifetime. The list affects the behavior of the DHCPv6 | |||
| DHCPv6 client as follows: | client as follows: | |||
| * When a prefix's Preferred Lifetime becomes zero, either because | * When a prefix's preferred lifetime becomes zero, either because | |||
| the Preferred Lifetime expires or because the client receives a | the preferred lifetime expires or because the client receives a | |||
| PIO for the prefix with a zero Preferred Lifetime, the prefix MUST | PIO for the prefix with a zero preferred lifetime, the prefix MUST | |||
| be removed from the list. | be removed from the list. | |||
| * When the length of the list increases to one, the client SHOULD | * When the length of the list increases to one, the client SHOULD | |||
| start requesting prefixes via DHCPv6 prefix delegation unless it | start requesting prefixes via DHCPv6 prefix delegation unless it | |||
| is already doing so. | is already doing so. | |||
| * When the length of the list decreases to zero, the client SHOULD | * When the length of the list decreases to zero, the client SHOULD | |||
| stop requesting or renewing prefixes via DHCPv6 prefix delegation | stop requesting or renewing prefixes via DHCPv6 prefix delegation | |||
| if it has no other reason to do so. The lifetimes of any prefixes | if it has no other reason to do so. The lifetimes of any prefixes | |||
| already obtained via DHCPv6 are unaffected. | already obtained via DHCPv6 are unaffected. | |||
| * If the client has already received delegated prefix(es) from one | * If the client has already received delegated prefix(es) from one | |||
| or more servers, then any time a prefix is added to or removed | or more servers, then any time one or more prefix(es) are added to | |||
| from the list, the client MUST consider this to be a change in | or removed from the list, the client MUST consider this to be a | |||
| configuration information as described in Section 18.2.12 of | change in configuration information as described in | |||
| [RFC8415]. In that case the client MUST perform a REBIND, unless | Section 18.2.12 of [RFC8415]. In that case, the client MUST | |||
| the list is now empty. This is in addition to performing a REBIND | perform a REBIND, unless the list is now empty. This is in | |||
| in the other cases required by that section. Issuing a REBIND | addition to performing a REBIND in the other cases required by | |||
| allows the client to obtain new prefixes if necessary, for example | that section. Issuing a REBIND allows the client to obtain new | |||
| when the network is being renumbered. It also refreshes state | prefixes if necessary, for example, when the network is being | |||
| related to the delegated prefix(es). | renumbered. It also refreshes the state related to the delegated | |||
| prefix(es). | ||||
| When a client requests a prefix via DHCPv6-PD, it MUST use the prefix | When a client requests a prefix via DHCPv6-PD, it MUST use the prefix | |||
| length hint (Section 18.2.4 of [RFC8415]) to request a prefix that is | length hint (Section 18.2.4 of [RFC8415]) to request a prefix that is | |||
| short enough to form addresses via SLAAC. | short enough to form addresses via SLAAC. | |||
| In order to achieve the scalability benefits of using DHCPv6-PD, the | In order to achieve the scalability benefits of using DHCPv6-PD, the | |||
| client SHOULD prefer to form addresses from the delegated prefix | client SHOULD prefer to form addresses from the delegated prefix | |||
| instead of using individual addresses in the on-link prefix(es). | instead of using individual addresses in the on-link prefix(es). | |||
| Therefore, when the client requests a prefix using DHCPv6-PD, the | Therefore, when the client requests a prefix using DHCPv6-PD, the | |||
| client SHOULD NOT use SLAAC to obtain IPv6 addresses from PIOs with | client SHOULD NOT use SLAAC to obtain IPv6 addresses from PIOs with | |||
| the P and A bits set. Similarly, if all PIOs processed by the client | the P and A bits set. Similarly, if all PIOs processed by the client | |||
| have the P bit set, the client SHOULD NOT request individual IPv6 | have the P bit set, the client SHOULD NOT request individual IPv6 | |||
| addresses from DHCPv6, i.e., it SHOULD NOT include any IA_NA options | addresses from DHCPv6, i.e., it SHOULD NOT include any IA_NA options | |||
| in SOLICIT ([RFC8415]) messages. The client MAY continue to use | in Solicit messages [RFC8415]. The client MAY continue to use | |||
| addresses that are already configured. | addresses that are already configured. | |||
| If the client does not obtain any suitable prefixes via DHCPv6-PD | If the client does not obtain any suitable prefixes via DHCPv6-PD | |||
| that are suitable for SLAAC, it MAY choose to disable further | that are suitable for SLAAC, it MAY choose to disable further | |||
| processing of the P flag on that interface, allowing the client to | processing of the P flag on that interface, allowing the client to | |||
| fall back to other address assignment mechanisms, such as forming | fall back to other address assignment mechanisms, such as forming | |||
| addresses via SLAAC (if the PIO has the A flag set to 1) and/or | addresses via SLAAC (if the PIO has the A flag set to 1) and/or | |||
| requesting individual addresses via DHCPv6. | requesting individual addresses via DHCPv6. | |||
| 7.2. Using Delegated Prefix(es) | 7.2. Using Delegated Prefix(es) | |||
| If the delegated prefix is too long to be used for SLAAC, the client | If the delegated prefix is too long to be used for SLAAC, the client | |||
| MUST ignore it, as Section 7 of [RFC9663] requires the network to | MUST ignore it, as Section 7 of [RFC9663] requires the network to | |||
| provide a SLAAC-suitable prefix to clients. If the prefix is shorter | provide a SLAAC-suitable prefix to clients. If the prefix is shorter | |||
| than required for SLAAC, the client SHOULD accept it, allocate one or | than required for SLAAC, the client SHOULD accept it, allocate one or | |||
| more longer prefix suitable for SLAAC and use the prefixes as | more longer prefixes suitable for SLAAC, and use the prefixes as | |||
| described below. | described below. | |||
| For every accepted prefix: | For every accepted prefix: | |||
| * The client MAY form as many IPv6 addresses from the prefix as it | * The client MAY form as many IPv6 addresses from the prefix as it | |||
| chooses. | chooses. | |||
| * The client MAY use the prefix to provide IPv6 addresses to | * The client MAY use the prefix to provide IPv6 addresses to | |||
| internal components such as virtual machines or containers. | internal components such as VMs or containers. | |||
| * The client MAY use the prefix to allow devices directly connected | * The client MAY use the prefix to allow devices directly connected | |||
| to it to obtain IPv6 addresses. For example, the client MAY route | to it to obtain IPv6 addresses. For example, the client MAY route | |||
| traffic for that prefix to the interface and send a Router | traffic for that prefix to an interface and send an RA containing | |||
| Advertisement containing a PIO for the prefix on the interface. | a PIO for the prefix on that interface. That interface MUST NOT | |||
| That interface MUST NOT be the interface the prefix is obtained | be the interface the prefix is obtained from. If the client | |||
| from. If the client advertises the prefix on an interface, and it | advertises the prefix on an interface and it has formed addresses | |||
| has formed addresses from the prefix, then it MUST act as though | from the prefix, then it MUST act as though the addresses were | |||
| the addresses were assigned to that interface for the purposes of | assigned to that interface for the purposes of Neighbor Discovery | |||
| Neighbour Discovery and Duplicate Address Detection. | and Duplicate Address Detection. | |||
| The client MUST NOT send or forward packets with destination | The client MUST NOT send or forward packets with destination | |||
| addresses within a delegated prefix to the interface that it obtained | addresses within a delegated prefix to the interface that it obtained | |||
| the prefix on, as this can cause a routing loop. This problem will | the prefix on, as this can cause a routing loop. This problem will | |||
| not occur if the client has assigned the prefix to another interface. | not occur if the client has assigned the prefix to another interface. | |||
| Another way the client can prevent this problem is to add to its | Another way the client can prevent this problem is to add to its | |||
| routing table a high-metric discard route for the delegated prefix. | routing table a high-metric discard route for the delegated prefix. | |||
| 7.3. Absence of PIOs with P bit set | 7.3. Absence of PIOs with the P Bit Set | |||
| The P bit is purely a positive indicator, telling nodes that DHCPv6 | The P bit is purely a positive indicator, telling nodes that DHCPv6 | |||
| Prefix Delegation is available and the network prefers that nodes use | prefix delegation is available and the network prefers that nodes use | |||
| it, even if they do not have any other reason to run a Prefix | it, even if they do not have any other reason to run a prefix | |||
| Delegation client. The absence of any PIOs with the P bit does not | delegation client. The absence of any PIOs with the P bit does not | |||
| carry any kind of signal to the opposite, and MUST NOT be processed | carry any kind of signal to the opposite and MUST NOT be processed to | |||
| to mean that DHCPv6-PD is absent. In particular, nodes that run | mean that DHCPv6-PD is absent. In particular, nodes that run | |||
| DHCPv6-PD due to explicit configuration or by default (e.g., to | DHCPv6-PD due to explicit configuration or by default (e.g., to | |||
| extend the network) MUST NOT disable DHCPv6-PD on the absence of PIOs | extend the network) MUST NOT disable DHCPv6-PD on the absence of PIOs | |||
| with the P bit set. A very common example of this are CE routers as | with the P bit set. A very common example of this are CE routers as | |||
| described by [RFC7084]. | described by [RFC7084]. | |||
| 7.4. On-link Communication | 7.4. On-Link Communication | |||
| When the network delegates unique prefixes to clients, each client | When the network delegates unique prefixes to clients, each client | |||
| will consider other client's destination addresses to be off-link, | will consider other clients' destination addresses to be off-link, | |||
| because those addresses are from the delegated prefixes and are not | because those addresses are from the delegated prefixes and are not | |||
| within any on-link prefix. When a client sends traffic to another | within any on-link prefix. When a client sends traffic to another | |||
| client, packets will initially be sent to the default router. The | client, packets will initially be sent to the default router. The | |||
| router may respond with an ICMPv6 redirect message (Section 4.5 of | router may respond with an ICMPv6 redirect message (Section 4.5 of | |||
| [RFC4861]). If the client receives and accepts the redirect, then | [RFC4861]). If the client receives and accepts the redirect, then | |||
| traffic can flow directly from device to device. Therefore, hosts | traffic can flow directly from device to device. Therefore, hosts | |||
| supporting the P flag SHOULD process redirects unless configured | supporting the P flag SHOULD process redirects unless configured | |||
| otherwise. Hosts which do not process ICMPv6 redirects, and routers, | otherwise. Hosts that do not process ICMPv6 redirects, and routers | |||
| which do not act on ICMPv6 redirects, may experience higher latency | that do not act on ICMPv6 redirects, may experience higher latency | |||
| while communicating to prefixes delegated to other clients on the | while communicating to prefixes delegated to other clients on the | |||
| same link. | same link. | |||
| 7.5. Source Address Selection | 7.5. Source Address Selection | |||
| For the purpose of source address selection [RFC6724], if the host | For the purpose of source address selection [RFC6724], if the host | |||
| creates any addresses from a delegated prefix, it SHOULD treat those | creates any addresses from a delegated prefix, it SHOULD treat those | |||
| addresses as if they were assigned to the interface on which the | addresses as if they were assigned to the interface on which the | |||
| prefix was received. This includes placing them in the candidate | prefix was received. This includes placing them in the candidate set | |||
| set, and associating them with the outgoing interface when | and associating them with the outgoing interface when implementing | |||
| implementing Rule 5 of the source address selection algorithm. | Rule 5 of the source address selection algorithm [RFC6724]. | |||
| 8. Multihoming | 8. Multihoming | |||
| In multi-prefix multihoming, the host generally needs to associate | In multi-prefix multihoming, the host generally needs to associate | |||
| the prefix with the router that advertised it (see for example, | the prefix with the router that advertised it (for example, see Rule | |||
| [RFC6724] Rule 5.5). If the host supports Rule 5.5, then it SHOULD | 5.5 in [RFC6724]). If the host supports Rule 5.5, then it SHOULD | |||
| associate each prefix with the link-local address of the DHCPv6 | associate each prefix with the link-local address of the DHCPv6 | |||
| server or relay from which it received the REPLY packet. When | server or relay from which it received the REPLY packet. When | |||
| receiving multiple REPLYs carrying the same prefix from distinct | receiving multiple REPLYs carrying the same prefix from distinct | |||
| link-local addresses, the host SHOULD associate that prefix with all | link-local addresses, the host SHOULD associate that prefix with all | |||
| of these addresses. This can commonly happen in networks with | of these addresses. This can commonly happen in networks with | |||
| redundant routers and DHCPv6 servers or relays. | redundant routers and DHCPv6 servers or relays. | |||
| 9. Modifications to RFC-Mandated Behaviour | 9. Modifications to RFC-Mandated Behavior | |||
| 9.1. Changes to RFC4861 | 9.1. Changes to RFC 4861 | |||
| This document makes the following changes to Section 4.2 of | This document makes the following changes to Section 4.2 of | |||
| [RFC4861]: | [RFC4861]: | |||
| OLD TEXT: | OLD TEXT: | |||
| ==== | | Note: If neither M nor O flags are set, this indicates that no | |||
| | information is available via DHCPv6. | ||||
| Note: If neither M nor O flags are set, this indicates that no | ||||
| information is available via DHCPv6. | ||||
| ==== | ||||
| NEW TEXT: | NEW TEXT: | |||
| ==== | | Note: If the M, O, or P (RFC 9762) flags are not set, this | |||
| | indicates that no information is available via DHCPv6. | ||||
| Note: If none of M, O, or P (draft-ietf-6man-pio-pflag) flags are | ||||
| set, this indicates that no information is available via DHCPv6. | ||||
| ==== | ||||
| 9.2. Changes to RFC4862 | 9.2. Changes to RFC 4862 | |||
| This document makes the following changes to Section 5.5.3 of | This document makes the following changes to Section 5.5.3 of | |||
| [RFC4862]: | [RFC4862]: | |||
| OLD TEXT: | OLD TEXT: | |||
| === | | For each Prefix-Information option in the Router Advertisement: | |||
| | | ||||
| For each Prefix-Information option in the Router Advertisement: | | a) If the Autonomous flag is not set, silently ignore the Prefix | |||
| | Information option. | ||||
| a) If the Autonomous flag is not set, silently ignore the Prefix | | | |||
| Information option. | | b) If the prefix is the link-local prefix, silently ignore the | |||
| | Prefix Information option. | ||||
| b) If the prefix is the link-local prefix, silently ignore the Prefix | | | |||
| Information option. | | c) If the preferred lifetime is greater than the valid lifetime, | |||
| | silently ignore the Prefix Information option. A node MAY | ||||
| c) If the preferred lifetime is greater than the valid lifetime, | | wish to log a system management error in this case. | |||
| silently ignore the Prefix Information option. A node MAY wish to | | | |||
| log a system management error in this case. | | d) If the prefix advertised is not equal to the prefix of an | |||
| | address configured by stateless autoconfiguration already in | ||||
| d) If the prefix advertised is not equal to the prefix of an address | | the list of addresses associated with the interface (where | |||
| configured by stateless autoconfiguration already in the list of | | "equal" means the two prefix lengths are the same and the | |||
| addresses associated with the interface (where "equal" means the two | | first prefix-length bits of the prefixes are identical), and | |||
| prefix lengths are the same and the first prefix- length bits of the | | if the Valid Lifetime is not 0, form an address (and add it to | |||
| prefixes are identical), and if the Valid Lifetime is not 0, form an | | the list) by combining the advertised prefix with an interface | |||
| address (and add it to the list) by combining the advertised prefix | | identifier of the link as follows: | |||
| with an interface identifier of the link as follows: | ||||
| === | ||||
| NEW TEXT: | NEW TEXT: | |||
| === | | For each Prefix Information Option in the Router Advertisement: | |||
| | | ||||
| For each Prefix-Information option in the Router Advertisement: | | a) If the prefix is the link-local prefix, silently ignore the | |||
| | Prefix Information Option. | ||||
| a) If the P flag is set, and the node implements draft-ietf-6man-pio- | | | |||
| pflag, it SHOULD treat the Autonomous flag as if it was unset, and | | b) If the P flag is set and the node implements RFC 9762, it | |||
| use prefix delegation to obtain addresses as described in draft-ietf- | | SHOULD treat the Autonomous flag as if it was unset and use | |||
| 6man-pio-pflag. | | prefix delegation to obtain addresses as described in RFC | |||
| | 9762. | ||||
| b) If the Autonomous flag is not set, silently ignore the Prefix | | | |||
| Information option. | | c) If the Autonomous flag is not set, silently ignore the Prefix | |||
| | Information Option. | ||||
| c) If the prefix is the link-local prefix, silently ignore the Prefix | | | |||
| Information option. | | d) If the preferred lifetime is greater than the valid lifetime, | |||
| | silently ignore the Prefix Information Option. A node MAY | ||||
| d) If the preferred lifetime is greater than the valid lifetime, | | wish to log a system management error in this case. | |||
| silently ignore the Prefix Information option. A node MAY wish to | | | |||
| log a system management error in this case. | | e) If the prefix advertised is not equal to the prefix of an | |||
| | address configured by stateless autoconfiguration already in | ||||
| e) If the prefix advertised is not equal to the prefix of an address | | the list of addresses associated with the interface (where | |||
| configured by stateless autoconfiguration already in the list of | | "equal" means the two prefix lengths are the same and the | |||
| addresses associated with the interface (where "equal" means the two | | first prefix-length bits of the prefixes are identical) and if | |||
| prefix lengths are the same and the first prefix- length bits of the | | the Valid Lifetime is not 0, form an address (and add it to | |||
| prefixes are identical), and if the Valid Lifetime is not 0, form an | | the list) by combining the advertised prefix with an interface | |||
| address (and add it to the list) by combining the advertised prefix | | identifier of the link as follows: | |||
| with an interface identifier of the link as follows: | ||||
| === | ||||
| 10. Security Considerations | 10. Security Considerations | |||
| The mechanism described in this document relies on the information | The mechanism described in this document relies on the information | |||
| provided in the Router Advertisement and therefore shares the same | provided in the RA and therefore shares the same security model as | |||
| security model as SLAAC. If the network does not implement RA Guard | SLAAC. If the network does not implement RA-Guard [RFC6105], an | |||
| [RFC6105], an attacker might send RAs containing the PIO used by the | attacker might send RAs containing the PIO used by the network, set | |||
| network, set the P flag to 1 and force hosts to ignore the A flag. | the P flag to 1, and force hosts to ignore the A flag. In the | |||
| In the absence of DHCPv6-PD infrastructure, hosts would either obtain | absence of DHCPv6-PD infrastructure, hosts would either obtain no | |||
| no IPv6 addresses or, if they fall back to other IPv6 address | IPv6 addresses or, if they fall back to other IPv6 address assignment | |||
| assignment mechanisms such as SLAAC and IA_NA, would experience | mechanisms such as SLAAC and IA_NA, would experience delays in | |||
| delays in obtaining IPv6 addresses. If the network does not support | obtaining IPv6 addresses. If the network does not support | |||
| DHCPv6-Shield [RFC7610], the attacker could also run a rogue DHCPv6 | DHCPv6-Shield [RFC7610], the attacker could also run a rogue DHCPv6 | |||
| server, providing the host with invalid prefixes or other invalid | server, providing the host with invalid prefixes or other invalid | |||
| configuration information. | configuration information. | |||
| The attacker might force hosts to oscillate between DHCPv6-PD and | The attacker might force hosts to oscillate between DHCPv6-PD and | |||
| PIO-based SLAAC by sending the same set of PIOs with and then w/o P | PIO-based SLAAC by sending the same set of PIOs with and then without | |||
| flag set. That would cause the clients to issue REBIND requests, | the P flag set. That would cause the clients to issue REBIND | |||
| increasing the load on the DHCP infrastructure. However, | requests, increasing the load on the DHCP infrastructure. However, | |||
| Section 14.1 of [RFC8415] requires that DHCPv6-PD clients rate limit | Section 14.1 of [RFC8415] requires that DHCPv6-PD clients rate-limit | |||
| transmitted DHCPv6 messages. | transmitted DHCPv6 messages. | |||
| It should be noted that if the network allows rogue RAs to be sent, | It should be noted that if the network allows rogue RAs to be sent, | |||
| the attacker would be able to disrupt hosts connectivity anyway, so | the attacker would be able to disrupt hosts' connectivity anyway, so | |||
| this document doesn't introduce any fundamentally new security | this document doesn't introduce any fundamentally new security | |||
| considerations. | considerations. | |||
| Security considerations inherent to the PD-per-device model are | Security considerations inherent to the PD-per-device model are | |||
| documented in Section 15 of [RFC9663]. | documented in Section 15 of [RFC9663]. | |||
| 11. Privacy Considerations | 11. Privacy Considerations | |||
| The privacy implications of implementing the P flag and using | The privacy implications of implementing the P flag and using | |||
| DHCPv6-PD to assign prefixes to hosts are similar to privacy | DHCPv6-PD to assign prefixes to hosts are similar to the privacy | |||
| implications of using DHCPv6 for assigning individual addresses. If | implications of using DHCPv6 to assign individual addresses. If the | |||
| the DHCPv6 infrastructure assigns the same prefix to the same client, | DHCPv6 infrastructure assigns the same prefix to the same client, | |||
| then an observer might be able to identify clients based on the | then an observer might be able to identify clients based on the | |||
| highest 64 bits of the client's address. Those implications and | highest 64 bits of the client's address. Those implications and | |||
| recommended countermeasures are discussed in Section 13 of [RFC9663]. | recommended countermeasures are discussed in Section 13 of [RFC9663]. | |||
| Implementing the P flag support on a host / receiving side enables | Implementing the P flag support on a host and receiving will enable | |||
| DHCPv6 on that host. Sending DHCPv6 packets may reveal some minor | DHCPv6 on that host if the host receives an RA containing a PIO with | |||
| the P bit set. Sending DHCPv6 packets may reveal some minor | ||||
| additional information about the host, most prominently the hostname. | additional information about the host, most prominently the hostname. | |||
| This is not a new concern and would apply for any network which uses | This is not a new concern and would apply for any network that uses | |||
| DHCPv6 and sets 'M' flag in Router Advertisements. | DHCPv6 and sets the M flag in RAs. | |||
| No privacy considerations result from supporting the P flag on the | No privacy considerations result from supporting the P flag on the | |||
| sender side. | sender side. | |||
| 12. IANA Considerations | 12. IANA Considerations | |||
| This memo requests that IANA allocate bit 3 from the "IPv6 Neighbor | IANA has made the following allocation in the "IPv6 Neighbor | |||
| Discovery Prefix Information Option Flags" registry created by | Discovery Prefix Information Option Flags" registry [RFC8425]: | |||
| [RFC8425] for use as the P flag as described in this document. The | ||||
| following entry should be appended: | ||||
| +================+==============================+=================+ | +================+==============================+===========+ | |||
| | PIO Option Bit | Description | Reference | | | PIO Option Bit | Description | Reference | | |||
| +================+==============================+=================+ | +================+==============================+===========+ | |||
| | 3 | P - DHCPv6-PD preferred flag | [THIS DOCUMENT] | | | 3 | P - DHCPv6-PD Preferred Flag | RFC 9762 | | |||
| +----------------+------------------------------+-----------------+ | +----------------+------------------------------+-----------+ | |||
| Table 1 | Table 1 | |||
| 13. References | 13. References | |||
| 13.1. Normative References | 13.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| skipping to change at page 13, line 45 ¶ | skipping to change at line 582 ¶ | |||
| [RFC6105] Levy-Abegnoli, E., Van de Velde, G., Popoviciu, C., and J. | [RFC6105] Levy-Abegnoli, E., Van de Velde, G., Popoviciu, C., and J. | |||
| Mohacsi, "IPv6 Router Advertisement Guard", RFC 6105, | Mohacsi, "IPv6 Router Advertisement Guard", RFC 6105, | |||
| DOI 10.17487/RFC6105, February 2011, | DOI 10.17487/RFC6105, February 2011, | |||
| <https://www.rfc-editor.org/info/rfc6105>. | <https://www.rfc-editor.org/info/rfc6105>. | |||
| [RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility | [RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility | |||
| Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July | Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July | |||
| 2011, <https://www.rfc-editor.org/info/rfc6275>. | 2011, <https://www.rfc-editor.org/info/rfc6275>. | |||
| [RFC7084] Singh, H., Beebee, W., Donley, C., and B. Stark, "Basic | ||||
| Requirements for IPv6 Customer Edge Routers", RFC 7084, | ||||
| DOI 10.17487/RFC7084, November 2013, | ||||
| <https://www.rfc-editor.org/info/rfc7084>. | ||||
| [RFC7039] Wu, J., Bi, J., Bagnulo, M., Baker, F., and C. Vogt, Ed., | [RFC7039] Wu, J., Bi, J., Bagnulo, M., Baker, F., and C. Vogt, Ed., | |||
| "Source Address Validation Improvement (SAVI) Framework", | "Source Address Validation Improvement (SAVI) Framework", | |||
| RFC 7039, DOI 10.17487/RFC7039, October 2013, | RFC 7039, DOI 10.17487/RFC7039, October 2013, | |||
| <https://www.rfc-editor.org/info/rfc7039>. | <https://www.rfc-editor.org/info/rfc7039>. | |||
| [RFC7084] Singh, H., Beebee, W., Donley, C., and B. Stark, "Basic | ||||
| Requirements for IPv6 Customer Edge Routers", RFC 7084, | ||||
| DOI 10.17487/RFC7084, November 2013, | ||||
| <https://www.rfc-editor.org/info/rfc7084>. | ||||
| [RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, | [RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, | |||
| L., Sridhar, T., Bursell, M., and C. Wright, "Virtual | L., Sridhar, T., Bursell, M., and C. Wright, "Virtual | |||
| eXtensible Local Area Network (VXLAN): A Framework for | eXtensible Local Area Network (VXLAN): A Framework for | |||
| Overlaying Virtualized Layer 2 Networks over Layer 3 | Overlaying Virtualized Layer 2 Networks over Layer 3 | |||
| Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014, | Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014, | |||
| <https://www.rfc-editor.org/info/rfc7348>. | <https://www.rfc-editor.org/info/rfc7348>. | |||
| [RFC7610] Gont, F., Liu, W., and G. Van de Velde, "DHCPv6-Shield: | [RFC7610] Gont, F., Liu, W., and G. Van de Velde, "DHCPv6-Shield: | |||
| Protecting against Rogue DHCPv6 Servers", BCP 199, | Protecting against Rogue DHCPv6 Servers", BCP 199, | |||
| RFC 7610, DOI 10.17487/RFC7610, August 2015, | RFC 7610, DOI 10.17487/RFC7610, August 2015, | |||
| skipping to change at page 14, line 36 ¶ | skipping to change at line 618 ¶ | |||
| [RFC9663] Colitti, L., Linkova, J., Ed., and X. Ma, Ed., "Using | [RFC9663] Colitti, L., Linkova, J., Ed., and X. Ma, Ed., "Using | |||
| DHCPv6 Prefix Delegation (DHCPv6-PD) to Allocate Unique | DHCPv6 Prefix Delegation (DHCPv6-PD) to Allocate Unique | |||
| IPv6 Prefixes per Client in Large Broadcast Networks", | IPv6 Prefixes per Client in Large Broadcast Networks", | |||
| RFC 9663, DOI 10.17487/RFC9663, October 2024, | RFC 9663, DOI 10.17487/RFC9663, October 2024, | |||
| <https://www.rfc-editor.org/info/rfc9663>. | <https://www.rfc-editor.org/info/rfc9663>. | |||
| Acknowledgements | Acknowledgements | |||
| Thanks to Nick Buraglio, Brian Carpenter, Tim Chown, David Farmer, | Thanks to Nick Buraglio, Brian Carpenter, Tim Chown, David Farmer, | |||
| Fernando Gont, Susan Hares, Dirk Von Hugo, Mahesh Jethanandani, | Fernando Gont, Susan Hares, Mahesh Jethanandani, Suresh Krishnan, Ted | |||
| Suresh Krishnan, Ted Lemon, Andrew McGregor, Erik Nordmark, Tomek | Lemon, Andrew McGregor, Tomek Mrugalski, Erik Nordmark, Michael | |||
| Mrugalski, Michael Richardson, John Scudder, Ole Trøan, Eric Vyncke | Richardson, Patrick Rohr, John Scudder, Ole Trøan, Dirk Von Hugo, | |||
| and Timothy Winters for the discussions, reviews, the input and all | Éric Vyncke and Timothy Winters for the discussions, reviews, input, | |||
| contributions. | and contributions. | |||
| Authors' Addresses | Authors' Addresses | |||
| Lorenzo Colitti | Lorenzo Colitti | |||
| Shibuya 3-21-3, | Shibuya 3-21-3, | |||
| Japan | Japan | |||
| Email: lorenzo@google.com | Email: lorenzo@google.com | |||
| Jen Linkova | Jen Linkova | |||
| 1 Darling Island Rd | 1 Darling Island Rd | |||
| Pyrmont NSW 2009 | Pyrmont NSW 2009 | |||
| Australia | Australia | |||
| Email: furry13@gmail.com, furry@google.com | Email: furry13@gmail.com, furry@google.com | |||
| Xiao Ma (editor) | Xiao Ma (editor) | |||
| Shibuya 3-21-3, | Shibuya 3-21-3, | |||
| Japan | Japan | |||
| Email: xiaom@google.com | Email: xiaom@google.com | |||
| David 'equinox' Lamparter | David 'equinox' Lamparter | |||
| NetDEF, Inc. | NetDEF, Inc. | |||
| San Jose, | 04229 Leipzig | |||
| United States of America | Germany | |||
| Email: equinox@diac24.net, equinox@opensourcerouting.org | Email: equinox@diac24.net, equinox@opensourcerouting.org | |||
| End of changes. 77 change blocks. | ||||
| 309 lines changed or deleted | 294 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||