diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1752.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1752.txt')
-rw-r--r-- | doc/rfc/rfc1752.txt | 2915 |
1 files changed, 2915 insertions, 0 deletions
diff --git a/doc/rfc/rfc1752.txt b/doc/rfc/rfc1752.txt new file mode 100644 index 0000000..c8c0030 --- /dev/null +++ b/doc/rfc/rfc1752.txt @@ -0,0 +1,2915 @@ + + + + + + +Network Working Group S. Bradner +Request for Comments: 1752 Harvard University +Category: Standards Track A. Mankin + ISI + January 1995 + + + The Recommendation for the IP Next Generation Protocol + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Abstract + + This document presents the recommendation of the IPng Area Directors + on what should be used to replace the current version of the Internet + Protocol. This recommendation was accepted by the Internet + Engineering Steering Group (IESG). + +Table of Contents + + 1. Summary. . . . . . . . . . . . . . . . . . . . . . . . . 2 + 2. Background . . . . . . . . . . . . . . . . . . . . . . . 4 + 3. A Direction for IPng . . . . . . . . . . . . . . . . . . 5 + 4. IPng Area. . . . . . . . . . . . . . . . . . . . . . . . 6 + 5. ALE Working Group. . . . . . . . . . . . . . . . . . . . 6 + 5.1 ALE Projections. . . . . . . . . . . . . . . . . . . . . 7 + 5.2 Routing Table Size . . . . . . . . . . . . . . . . . . . 7 + 5.3 Address Assignment Policy Recommendations. . . . . . . . 8 + 6. IPng Technical Requirements. . . . . . . . . . . . . . . 8 + 6.1 The IPng Technical Criteria document . . . . . . . . . . 9 + 7. IPng Proposals . . . . . . . . . . . . . . . . . . . . . 11 + 7.1 CATNIP. . . . . . . . . . . . . . . . . . . . . . . . . 11 + 7.2 SIPP. . . . . . . . . . . . . . . . . . . . . . . . . . 12 + 7.3 TUBA. . . . . . . . . . . . . . . . . . . . . . . . . . 13 + 8. IPng Proposal Reviews. . . . . . . . . . . . . . . . . . 13 + 8.1 CATNIP Reviews . . . . . . . . . . . . . . . . . . . . . 14 + 8.2 SIPP Reviews . . . . . . . . . . . . . . . . . . . . . . 15 + 8.3 TUBA Reviews . . . . . . . . . . . . . . . . . . . . . . 16 + 8.4 Summary of Proposal Reviews. . . . . . . . . . . . . . . 17 + 9. A Revised Proposal . . . . . . . . . . . . . . . . . . . 17 + 10 Assumptions . . . . . . . . . . . . . . . . . . . . . . 18 + 10.1 Criteria Document and Timing of Recommendation . . . . . 18 + + + +Bradner & Mankin [Page 1] + +RFC 1752 Recommendation for IPng January 1995 + + + 10.2 Address Length . . . . . . . . . . . . . . . . . . . . . 19 + 11. IPng Recommendation. . . . . . . . . . . . . . . . . . . 19 + 11.1 IPng Criteria Document and IPng. . . . . . . . . . . . . 20 + 11.2 IPv6. . . . . . . . . . . . . . . . . . . . . . . . . . 21 + 12. IPv6 Overview . . . . . . . . . . . . . . . . . . . . . 21 + 12.1 IPv6 Header Format . . . . . . . . . . . . . . . . . . . 24 + 12.2 Extension Headers. . . . . . . . . . . . . . . . . . . . 25 + 12.2.1 Hop-by-Hop Option Header . . . . . . . . . . . . . . . . 25 + 12.2.2 IPv6 Header Options. . . . . . . . . . . . . . . . . . . 26 + 12.2.3 Routing Header . . . . . . . . . . . . . . . . . . . . . 27 + 12.2.4 Fragment Header. . . . . . . . . . . . . . . . . . . . . 28 + 12.2.5 Authentication Header. . . . . . . . . . . . . . . . . . 29 + 12.2.6 Privacy Header . . . . . . . . . . . . . . . . . . . . . 30 + 12.2.7 End-to-End Option Header . . . . . . . . . . . . . . . . 32 + 13. IPng Working Group . . . . . . . . . . . . . . . . . . . 32 + 14. IPng Reviewer . . . . . . . . . . . . . . . . . . . . . 33 + 15. Address Autoconfiguration. . . . . . . . . . . . . . . . 33 + 16. Transition . . . . . . . . . . . . . . . . . . . . . . . 34 + 16.1 Transition - Short Term. . . . . . . . . . . . . . . . . 35 + 16.2 Transition - Long Term . . . . . . . . . . . . . . . . . 36 + 17. Other Address Families . . . . . . . . . . . . . . . . . 37 + 18. Impact on Other IETF Standards . . . . . . . . . . . . . 38 + 19. Impact on non-IETF standards and on products . . . . . . 39 + 20. APIs . . . . . . . . . . . . . . . . . . . . . . . . . . 39 + 21. Future of the IPng Area and Working Groups . . . . . . . 40 + 22. Security Considerations. . . . . . . . . . . . . . . . . 40 + 23. Authors' Addresses . . . . . . . . . . . . . . . . . . . 43 + + Appendix A Summary of Recommendations . . . . . . . . . . . . . 44 + Appendix B IPng Area Directorate. . . . . . . . . . . . . . . . 45 + Appendix C Documents Referred to the IPng Working Groups. . . . 46 + Appendix D IPng Proposal Overviews. . . . . . . . . . . . . . . 46 + Appendix E RFC 1550 White Papers. . . . . . . . . . . . . . . . 47 + Appendix F Additional References. . . . . . . . . . . . . . . . 48 + Appendix G Acknowledgments. . . . . . . . . . . . . . . . . . . 52 + +1. Summary + + The IETF started its effort to select a successor to IPv4 in late + 1990 when projections indicated that the Internet address space would + become an increasingly limiting resource. Several parallel efforts + then started exploring ways to resolve these address limitations + while at the same time providing additional functionality. The IETF + formed the IPng Area in late 1993 to investigate the various + proposals and recommend how to proceed. We developed an IPng + technical criteria document and evaluated the various proposals + against it. All were found wanting to some degree. After this + evaluation, a revised proposal was offered by one of the working + + + +Bradner & Mankin [Page 2] + +RFC 1752 Recommendation for IPng January 1995 + + + groups that resolved many of the problems in the previous proposals. + The IPng Area Directors recommend that the IETF designate this + revised proposal as the IPng and focus its energy on bringing a set + of documents defining the IPng to Proposed Standard status with all + deliberate speed. + + This protocol recommendation includes a simplified header with a + hierarchical address structure that permits rigorous route + aggregation and is also large enough to meet the needs of the + Internet for the foreseeable future. The protocol also includes + packet-level authentication and encryption along with plug and play + autoconfiguration. The design changes the way IP header options are + encoded to increase the flexibility of introducing new options in the + future while improving performance. It also includes the ability to + label traffic flows. + + Specific recommendations include: + + * current address assignment policies are adequate + * there is no current need to reclaim underutilized assigned network + numbers + * there is no current need to renumber major portions of the Internet + * CIDR-style assignments of parts of unassigned Class A address space + should be considered + * "Simple Internet Protocol Plus (SIPP) Spec. (128 bit ver)" + [Deering94b] be adopted as the basis for IPng + * the documents listed in Appendix C be the foundation of the IPng + effort + * an IPng Working Group be formed, chaired by Steve Deering and Ross + Callon + * Robert Hinden be the document editor for the IPng effort + * an IPng Reviewer be appointed and that Dave Clark be the reviewer + * an Address Autoconfiguration Working Group be formed, chaired by + Dave Katz and Sue Thomson + * an IPng Transition Working Group be formed, chaired by Bob Gilligan + and TBA + * the Transition and Coexistence Including Testing Working Group be + chartered + * recommendations about the use of non-IPv6 addresses in IPv6 + environments and IPv6 addresses in non-IPv6 environments be + developed + * the IESG commission a review of all IETF standards documents for + IPng implications + * the IESG task current IETF working groups to take IPng into account + * the IESG charter new working groups where needed to revise old + standards documents + * Informational RFCs be solicited or developed describing a few + specific IPng APIs + + + +Bradner & Mankin [Page 3] + +RFC 1752 Recommendation for IPng January 1995 + + + * the IPng Area and Area Directorate continue until main documents + are offered as Proposed Standards in late 1994 + * support for the Authentication Header be required + * support for a specific authentication algorithm be required + * support for the Privacy Header be required + * support for a specific privacy algorithm be required + * an "IPng framework for firewalls" be developed + +2. Background + + Even the most farseeing of the developers of TCP/IP in the early + 1980s did not imagine the dilemma of scale that the Internet faces + today. 1987 estimates projected a need to address as many as 100,000 + networks at some vague point in the future. [Callon87] We will reach + that mark by 1996. There are many realistic projections of many + millions of interconnected networks in the not too distant future. + [Vecchi94, Taylor94] + + Further, even though the current 32 bit IPv4 address structure can + enumerate over 4 billion hosts on as many as 16.7 million networks, + the actual address assignment efficiency is far less than that, even + on a theoretical basis. [Huitema94] This inefficiency is exacerbated + by the granularity of assignments using Class A, B and C addresses. + + In August 1990 during the Vancouver IETF meeting, Frank Solensky, + Phill Gross and Sue Hares projected that the current rate of + assignment would exhaust the Class B space by March of 1994. + + The then obvious remedy of assigning multiple Class C addresses in + place of Class B addresses introduced its own problem by further + expanding the size of the routing tables in the backbone routers + already growing at an alarming rate. + + We faced the dilemma of choosing between accepting either limiting + the rate of growth and ultimate size of the Internet, or disrupting + the network by changing to new techniques or technologies. + + The IETF formed the Routing and Addressing (ROAD) group in November + 1991 at the Santa Fe IETF meeting to explore this dilemma and guide + the IETF on the issues. The ROAD group reported their work in March + 1992 at the San Diego IETF meeting. [Gross92] The impact of the + recommendations ranged from "immediate" to "long term" and included + adopting the CIDR route aggregation proposal [Fuller93] for reducing + the rate of routing table growth and recommending a call for + proposals "to form working groups to explore separate approaches for + bigger Internet addresses." + + + + + +Bradner & Mankin [Page 4] + +RFC 1752 Recommendation for IPng January 1995 + + + In the late spring of 1992 the IAB issued "IP version 7" [IAB92], + concurring in the ROAD group's endorsement of CIDR and also + recommending "an immediate IETF effort to prepare a detailed and + organizational plan for using CLNP as the basis for IPv7." After + spirited discussion, the IETF decided to reject the IAB's + recommendation and issue the call for proposals recommended by the + ROAD group. This call was issued in July 1992 at the Boston IETF + meeting and a number of working groups were formed in response + + During the July 1993 Amsterdam IETF meeting an IPng (IP Next + Generation) Decision Process (ipdecide) BOF was held. This BOF "was + intended to help re-focus attention on the very important topic of + making a decision between the candidates for IPng. The BOF focused on + the issues of who should take the lead in making the recommendation + to the community and what criteria should be used to reach the + recommendation." [Carpen93] + +3. A Direction for IPng + + In September 1993 Phill Gross, chair of the IESG issued "A Direction + for IPng". [Gross94] In this memo he summarized the results of the + ipdecide BOF and open IESG plenary in Amsterdam. + + * The IETF needs to move toward closure on IPng. + * The IESG has the responsibility for developing an IPng + recommendation for the Internet community. + * The procedures of the recommendation-making process should be open + and published well in advance by the IESG. + * As part of this process, the IPng WGs may be given new milestones + and other guidance to aid the IESG. + * There should be ample opportunity for community comment prior to + final IESG recommendation. + + The memo also announced "a temporary, ad hoc, 'area' to deal + specifically with IPng issues." Phill asked two of the current IESG + members, Allison Mankin (Transport Services Area) and Scott Bradner + (Operational Requirements Area), to act as Directors for the new + area. The Area Directors were given a specific charge on how to + investigate the various IPng proposals and how to base their + recommendation to the IETF. It was also requested that a specific + recommendation be made. + + * Establish an IPng directorate. + * Ensure that a completely open process is followed. + * Develop an understanding of the level of urgency and the time + constraints imposed by the rate of address assignment and rate of + growth in the routing tables. + * Recommend the adoption of assignment policy changes if warranted. + + + +Bradner & Mankin [Page 5] + +RFC 1752 Recommendation for IPng January 1995 + + + * Define the scope of the IPng effort based on the understanding of + the time constraints. + * Develop a clear and concise set of technical requirements and + decision criteria for IPng. + * Develop a recommendation about which of the current IPng candidates + to accept, if any. + +4. IPng Area + + After the IPng Area was formed, we recruited a directorate. (Appendix + B) The members of the directorate were chosen both for their general + and specific technical expertise. The individuals were then asked to + have their management authorize this participation in the process and + confirm that they understood the IETF process. + + We took great care to ensure the inclusion of a wide spectrum of + knowledge. The directors are experts in security, routing, the needs + of large users, end system manufacturers, Unix and non-Unix + platforms, router manufacturers, theoretical researchers, protocol + architecture, and the operating regional, national, and international + networks. Additionally, several members of the directorate were + deeply involved in each of the IPng proposal working groups. + + The directorate functions as a direction-setting and preliminary + review body as requested by the charge to the area. The directorate + engages in biweekly conference calls, participates in an internal + mailing list and corresponds actively on the Big-Internet mailing + list. The directorate held open meetings during the March 1994 + Seattle and July 1994 Toronto IETF meetings as well as two additional + multi-day retreats. To ensure that the IPng process was as open as + possible, we took minutes during these meetings and then published + them. Additionally, we placed the archives of the internal IPng + mailing list on an anonymous ftp site. (Hsdndev.harvard.edu: + pub/ipng.) + +5. ALE Working Group + + We needed a reasonable estimate of the time remaining before we + exhausted the IPv4 address space in order to determine the scope of + the IPng effort. If the time remaining was about the same needed to + deploy a replacement, then we would have select the IPng which would + only fix the address limitations since we would not have enough time + to develop any other features. If more time seemed available, we + could consider additional improvements. + + The IETF formed an Address Lifetime Expectations (ALE) Working Group + in 1993 "to develop an estimate for the remaining lifetime of the + IPv4 address space based on currently known and available + + + +Bradner & Mankin [Page 6] + +RFC 1752 Recommendation for IPng January 1995 + + + technologies." [Solens93a] Tony Li of Cisco Systems and Frank + Solensky of FTP Software are the co-chairs. The IETF also charged + the working group to consider if developing more stringent address + allocation and utilization policies might provide more time for the + transition. + +5.1 ALE Projections + + The ALE Working Group met during the November 1993 Houston, + [Solens93b] March 1994 Seattle [Bos93] and July 1994 Toronto + [Solens94] IETF meetings. They projected at the Seattle meeting, + later confirmed at the Toronto meeting that, using the current + allocation statistics, the Internet would exhaust the IPv4 address + space between 2005 and 2011. + + Some members of the ipv4-ale and big-internet mailing lists called + into question the reliability of this projection. It has been + criticized as both too optimistic and as too pessimistic. + + Some people pointed out that this type of projection makes an + assumption of no paradigm shifts in IP usage. If someone were to + develop a new 'killer application', (for example cable-TV set top + boxes.) The resultant rise in the demand for IP addresses could make + this an over-estimate of the time available. + + There may also be a problem with the data used to make the + projection. The InterNIC allocates IP addresses in large chunks to + regional Network Information Centers (NICs) and network providers. + The NICs and the providers then re-allocate addresses to their + customers. The ALE projections used the InterNIC assignments without + regard to the actual rate of assignment of addresses to the end + users. They did the projection this way since the accuracy of the + data seems quite a bit higher. While using this once-removed data + may add a level of over-estimation since it assumes the rate of large + block allocation will continue, this may not be the case. + + These factors reduce the reliability of the ALE estimates but, in + general, they seem to indicate enough time remaining in the IPv4 + address space to consider adding features in an IPng besides just + expanding the address size even when considering time required for + development, testing, and deployment. + +5.2 Routing Table Size + + Another issue in Internet scaling is the increasing size of the + routing tables required in the backbone routers. Adopting the CIDR + block address assignment and aggregating routes reduced the size of + the tables for awhile but they are now expanding again. Providers now + + + +Bradner & Mankin [Page 7] + +RFC 1752 Recommendation for IPng January 1995 + + + need to more aggressively advertise their routes only in aggregates. + Providers must also advise their new customers to renumber their + networks in the best interest of the entire Internet community. + + The problem of exhausting the IPv4 address space may be moot if this + issue is ignored and if routers cannot be found that can keep up with + the table size growth. Before implementing CIDR the backbone routing + table was growing at a rate about 1.5 times as fast as memory + technology. + + We should also note that even though IPng addresses are designed with + aggregation in mind switching to IPng will not solve the routing + table size problem unless the addresses are assigned rigorously to + maximize the affect of such aggregation. This efficient advertising + of routes can be maintained since IPng includes address + autoconfiguration mechanisms to allow easy renumbering if a customer + decides to switch providers. Customers who receive service from more + than one provider may limit the ultimate efficiency of any route + aggregation. [Rekhter94] + +5.3 Address Assignment Policy Recommendations + + The IESG Chair charged the IPng Area to consider recommending more + stringent assignment policies, reclaiming some addresses already + assigned, or making a serious effort to renumber significant portions + of the Internet. [Gross94] + + The IPng Area Directors endorse the current address assignment + policies in view of the ALE projections. We do not feel that anyone + should take specific efforts to reclaim underutilized addresses + already assigned or to renumber forcefully major portions of the + Internet. We do however feel that we should all encourage network + service providers to assist new customers in renumbering their + networks to conform to the provider's CIDR assignments. + + The ALE Working Group recommends that we consider assigning CIDR-type + address blocks out of the unassigned Class A address space. The IPng + Area Directors concur with this recommendation. + +6. IPng Technical Requirements + + The IESG provided an outline in RFC 1380 [Gross92] of the type of + criteria we should use to determine the suitability of an IPng + proposal. The IETF further refined this understanding of the + appropriate criteria with the recommendations of a Selection Criteria + BOF held during the November 1992 IETF meeting in Washington D.C. + [Almqu92] We felt we needed to get additional input for determining + the requirements and issued a call for white papers. [Bradner93] This + + + +Bradner & Mankin [Page 8] + +RFC 1752 Recommendation for IPng January 1995 + + + call, issued as RFC 1550, intended to reach both inside and outside + the traditional IETF constituency to get the broadest possible + understanding of the requirements for a data networking protocol with + the broadest possible application. + + We received twenty one white papers in response to the RFC 1550 + solicitation. ( Appendix E) We received responses from the + industries that many feel will be the major providers of data + networking services in the future; the cable TV industry [Vecchi94], + the cellular industry [Taylor94], and the electric power industry + [Skelton94]. In addition, we received papers that dealt with + military applications [Adam94, Syming94, Green94], ATM [Brazd94], + mobility [Simpson94], accounting [Brown94], routing [Estrin94a, + Chiappa94], security [Adam94, Bell94b, Brit94, Green94, Vecchi94, + Flei94], large corporate networking [Britt94, Fleisch94], transition + [Carpen94a, Heager94], market acceptance [Curran94, Britt94], host + implementations [Bound94], as well as a number of other issues. + [Bello94a, Clark94, Ghisel94] + + These white papers, a Next Generation Requirements (ngreq) BOF + (chaired by Jon Crowcroft and Frank Kastenholz) held during the March + 1994 Seattle IETF meeting, discussions within the IPng Area + Directorate and considerable discussion on the big-internet mailing + list were all used by Frank Kastenholz and Craig Partridge in + revising their earlier criteria draft [Kasten92] to produce + "Technical Criteria for Choosing IP The Next Generation (IPng)." + [Kasten94] This document is the "clear and concise set of technical + requirements and decision criteria for IPng" called for in the charge + from the IESG Chair. We used this document as the basic guideline + while evaluating the IPng proposals. + +6.1 The IPng Technical Criteria document + + The criteria described in this document include: (from Kasten94) + + * complete specification - The proposal must completely describe the + proposed protocol. We must select an IPng by referencing specific + documents, not to future work. + * architectural simplicity - The IP-layer protocol should be as + simple as possible with functions located elsewhere that are more + appropriately performed at protocol layers other than the IP layer. + * scale - The IPng Protocol must allow identifying and addressing at + least 10**9 leaf-networks (and preferably much more) + * topological flexibility - The routing architecture and protocols + ofIPng must allow for many different network topologies. They must + not assume that the network's physical structure is a tree. + * performance - A state of the art, commercial grade router must be + able to process and forward IPng traffic at speeds capable of fully + + + +Bradner & Mankin [Page 9] + +RFC 1752 Recommendation for IPng January 1995 + + + utilizing common, commercially available, high-speed media at the + time. + * robust service - The network service and its associated routing and + control protocols must be robust. + * transition - The protocol must have a straightforward transition + plan from IPv4. + * media independence - The protocol must work across an internetwork + of many different LAN, MAN, and WAN media, with individual link + speeds ranging from a ones-of-bits per second to hundreds of + gigabits per second. + * datagram service - The protocol must support an unreliable datagram + delivery service. + * configuration ease - The protocol must permit easy and largely + distributed configuration and operation. Automatic configuration of + hosts and routers is required. + * security - IPng must provide a secure network layer. + * unique names - IPng must assign unique names to all IP-Layer + objects in the global, ubiquitous, Internet. These names may or + may not have any location, topology, or routing significance. + * access to standards - The protocols that define IPng and its + associated protocols should be as freely available and + redistributable as the IPv4 and related RFCs. There must be no + specification-related licensing fees for implementing or selling + IPng software. + * multicast support - The protocol must support both unicast and + multicast packet transmission. Dynamic and automatic routing of + multicasts is also required. + * extensibility - The protocol must be extensible; it must be able + to evolve to meet the future service needs of the Internet. This + evolution must be achievable without requiring network-wide + software upgrades. + * service classes - The protocol must allow network devices to + associate packets with particular service classes and provide them + with the services specified by those classes. + * mobility - The protocol must support mobile hosts, networks and + internetworks. + * control protocol - The protocol must include elementary support for + testing and debugging networks. (e.g., ping and traceroute) + * tunneling support - IPng must allow users to build private + internetworks on top of the basic Internet Infrastructure. Both + private IP-based internetworks and private non-IP-based (e.g., CLNP + or AppleTalk) internetworks must be supported. + + + + + + + + + +Bradner & Mankin [Page 10] + +RFC 1752 Recommendation for IPng January 1995 + + +7. IPng Proposals + + By the time that the IPng Area was formed, the IETF had already aimed + a considerable amount of IETF effort at solving the addressing and + routing problems of the Internet. Several proposals had been made + and some of these reached the level of having a working group + chartered. A number of these groups subsequently merged forming + groups with a larger consensus. These efforts represented different + views on the issues which confront us and sought to optimize + different aspects of the possible solutions. + + By February 1992 the Internet community developed four separate + proposals for IPng [Gross92], "CNAT" [Callon92a], "IP Encaps" + [Hinden92a], "Nimrod" [Chiappa91], and "Simple CLNP" [Callon92b]. By + December 1992 three more proposals followed; "The P Internet + Protocol" (PIP) [Tsuchiya92], "The Simple Internet Protocol" (SIP) + [Deering92] and "TP/IX" [Ullmann93]. After the March 1992 San Diego + IETF meeting "Simple CLNP" evolved into "TCP and UDP with Bigger + Addresses" (TUBA) [Callon92c] and "IP Encaps" evolved into "IP + Address Encapsulation" (IPAE) [Hinden92b]. + + By November 1993, IPAE merged with SIP while still maintaining the + name SIP. This group then merged with PIP and the resulting working + group called themselves "Simple Internet Protocol Plus" (SIPP). At + the same time the TP/IX Working Group changed its name to "Common + Architecture for the Internet" (CATNIP). + + None of these proposals were wrong nor were others right. All of the + proposals would work in some ways providing a path to overcome the + obstacles we face as the Internet expands. The task of the IPng Area + was to ensure that the IETF understand the offered proposals, learn + from the proposals and provide a recommendation on what path best + resolves the basic issues while providing the best foundation upon + which to build for the future. + + The IPng Area evaluated three IPng proposals as they were described + in their RFC 1550 white papers: CATNIP [McGovern94] , SIPP + [Hinden94a] and TUBA. [Ford94a]. The IESG viewed Nimrod as too much + of a research project for consideration as an IPng candidate. Since + Nimrod represents one possible future Internet routing strategy we + solicited a paper describing any requirements Nimrod would put on an + IPng to add to the requirements process. [Chiappa94] + +7.1 CATNIP + + "Common Architecture for the Internet (CATNIP) was conceived as a + convergence protocol. CATNIP integrates CLNP, IP, and IPX. The CATNIP + design provides for any of the transport layer protocols in use, for + + + +Bradner & Mankin [Page 11] + +RFC 1752 Recommendation for IPng January 1995 + + + example TP4, CLTP, TCP, UDP, IPX and SPX, to run over any of the + network layer protocol formats: CLNP, IP (version 4), IPX, and + CATNIP. With some attention paid to details, it is possible for a + transport layer protocol (such as TCP) to operate properly with one + end system using one network layer (e.g., IP version 4) and the other + using some other network protocol, such as CLNP." [McGovern94] + + "The objective is to provide common ground between the Internet, OSI, + and the Novell protocols, as well as to advance the Internet + technology to the scale and performance of the next generation of + internetwork technology." + + "CATNIP supports OSI Network Service Access Point (NSAP) format + addresses. It also uses cache handles to provide both rapid + identification of the next hop in high performance routing as well as + abbreviation of the network header by permitting the addresses to be + omitted when a valid cache handle is available. The fixed part of the + network layer header carries the cache handles." [Sukonnik94] + +7.2 SIPP + + "Simple Internet Protocol Plus (SIPP) is a new version of IP which is + designed to be an evolutionary step from IPv4. It is a natural + increment to IPv4. It was not a design goal to take a radical step + away from IPv4. Functions which work in IPv4 were kept in SIPP. + Functions which didn't work were removed. It can be installed as a + normal software upgrade in internet devices and is interoperable with + the current IPv4. Its deployment strategy was designed to not have + any 'flag' days. SIPP is designed to run well on high performance + networks (e.g., ATM) and at the same time is still efficient for low + bandwidth networks (e.g., wireless). In addition, it provides a + platform for new internet functionality that will be required in the + near future." [Hinden94b] + + "SIPP increases the IP address size from 32 bits to 64 bits, to + support more levels of addressing hierarchy and a much greater number + of addressable nodes. SIPP addressing can be further extended, in + units of 64 bits, by a facility equivalent to IPv4's Loose Source and + Record Route option, in combination with a new address type called + 'cluster addresses' which identify topological regions rather than + individual nodes." + + "SIPP changes in the way IP header options are encoded allows for + more efficient forwarding, less stringent limits on the length of + options, and greater flexibility for introducing new options in the + future. A new capability is added to enable the labeling of packets + belonging to particular traffic 'flows' for which the sender requests + special handling, such as non-default quality of service or 'real- + + + +Bradner & Mankin [Page 12] + +RFC 1752 Recommendation for IPng January 1995 + + + time' service." [Hinden94a] + +7.3 TUBA + + "The TCP/UDP Over CLNP-Addressed Networks (TUBA) proposal seeks to + minimize the risk associated with migration to a new IP address + space. In addition, this proposal is motivated by the requirement to + allow the Internet to scale, which implies use of Internet + applications in a very large ubiquitous worldwide Internet. It is + therefore proposed that existing Internet transport and application + protocols continue to operate unchanged, except for the replacement + of 32-bit IP addresses with larger addresses. TUBA does not mean + having to move over to OSI completely. It would mean only replacing + IP with CLNP. TCP, UDP, and the traditional TCP/IP applications would + run on top of CLNP." [Callon92c] + + "The TUBA effort will expand the ability to route Internet packets by + using addresses which support more hierarchy than the current + Internet Protocol (IP) address space. TUBA specifies the continued + use of Internet transport protocols, in particular TCP and UDP, but + specifies their encapsulation in ISO 8473 (CLNP) packets. This will + allow the continued use of Internet application protocols such as + FTP, SMTP, TELNET, etc. TUBA seeks to upgrade the current system by + a transition from the use of IPv4 to ISO/IEC 8473 (CLNP) and the + corresponding large Network Service Access Point (NSAP) address + space." [Knopper94] + + "The TUBA proposal makes use of a simple long-term migration proposal + based on a gradual update of Internet Hosts (to run Internet + applications over CLNP) and DNS servers (to return larger addresses). + This proposal requires routers to be updated to support forwarding of + CLNP (in addition to IP). However, this proposal does not require + encapsulation nor translation of packets nor address mapping. IP + addresses and NSAP addresses may be assigned and used independently + during the migration period. Routing and forwarding of IP and CLNP + packets may be done independently." ([Callon92c] + +8. IPng Proposal Reviews + + The IPng Directorate discussed and reviewed the candidate proposals + during its biweekly teleconferences and through its mailing list. In + addition, members of the Big-Internet mailing list discussed many of + the aspects of the proposals, particularly when the Area Directors + posted several specific questions to stimulate discussion. [Big] + + The directorate members were requested to each evaluate the proposals + in preparation for a two day retreat held near Chicago on May 19th + and 20th 1994. The retreat opened with a roundtable airing of the + + + +Bradner & Mankin [Page 13] + +RFC 1752 Recommendation for IPng January 1995 + + + views of each of the participants, including the Area Directors, the + Directorate and a number of guests invited by the working group + chairs for each for the proposals. [Knopper94b] We will publish + these reviews as well as a more detailed compendium review of each of + the proposals as companion memos. + + The following table summarizes each of the three proposals reviewed + against the requirements in the IPng Criteria document. They do not + necessarily reflect the views of the Area Directors. "Yes" means the + reviewers mainly felt the proposal met the specific criterion. "No" + means the reviewers mainly felt the proposal did not meet the + criterion. "Mixed" means that the reviewers had mixed reviews with + none dominating. "Unknown" means that the reviewers mainly felt the + documentation did not address the criterion. + + CATNIP SIPP TUBA + ------ ---- ---- + complete spec no yes mostly + simplicity no no no + scale yes yes yes + topological flex yes yes yes + performance mixed mixed mixed + robust service mixed mixed yes + transition mixed no mixed + media indepdnt yes yes yes + datagram yes yes yes + config. ease unknown mixed mixed + security unknown mixed mixed + unique names mixed mixed mixed + access to stds yes yes mixed + multicast unknown yes mixed + extensibility unknown mixed mixed + service classes unknown yes mixed + mobility unknown mixed mixed + control proto unknown yes mixed + tunneling unknown yes mixed + +8.1 CATNIP Reviews + + All the reviewers felt that CATNIP is not completely specified. + However, many of the ideas in CATNIP are innovative and a number of + reviewers felt CATNIP shows the best vision of all of the proposals. + The use of Network Service Attachment Point Addresses (NSAPs) is well + thought out and the routing handles are innovative. + + While the goal of uniting three major protocol families, IP, ISO-CLNP + and Novell IPX is laudable our consensus was that the developers had + not developed detailed enough plans to support realizing that goal. + + + +Bradner & Mankin [Page 14] + +RFC 1752 Recommendation for IPng January 1995 + + + The plans they do describe suffer from the complexity of trying to be + the union of a number of existing network protocols. Some reviewers + felt that CATNIP is basically maps IPv4, IPX, and SIPP addresses into + NSAPs and, as such, does not deal with the routing problems of the + current and future Internet. + + Additionally the reviewers felt that CATNIP has poor support for + multicasting and mobility and does not specifically deal with such + important topics as security and autoconfiguration. + +8.2 SIPP Reviews + + Most of the reviewers, including those predisposed to other + proposals, felt as one reviewer put it, that SIPP is an + "aesthetically beautiful protocol well tailored to compactly satisfy + today's known network requirements." The SIPP Working Group has been + the most dynamic over the last year, producing a myriad of + documentation detailing almost all of the aspects necessary to + produce a complete protocol description. + + The biggest problem the reviewers had with SIPP was with IPAE, SIPP's + transition plan. The overwhelming feeling was that IPAE is fatally + flawed and could not be made to work reliably in an operational + Internet. + + There was significant disagreement about the adequacy of the SIPP 64 + bit address size. Although you can enumerate 10**15 end nodes in 64 + bits people have different views about how much inefficiency real- + world routing plans introduce. [Huitema94] The majority felt that 64 + bit addresses do not provide adequate space for the hierarchy + required to meet the needs of the future Internet. In addition since + no one has any experience with extended addressing and routing + concepts of the type proposed in SIPP, the reviewers generally felt + quite uncomfortable with this methodology. The reviewers also felt + that the design introduces some significant security issues. + + A number of reviewers felt that SIPP did not address the routing + issue in any useful way. In particular, there has been no serious + attempt made at developing ways to abstract topology information or + to aggregate information about areas of the network. + + Finally, most of the reviewers questioned the level of complexity in + the SIPP autoconfiguration plans as well as in SIPP in general, other + than the header itself. + + + + + + + +Bradner & Mankin [Page 15] + +RFC 1752 Recommendation for IPng January 1995 + + +8.3 TUBA Reviews + + The reviewers generally felt that the most important thing that TUBA + has offers is that it is based on CLNP and there is significant + deployment of CLNP-capable routers throughout the Internet. There + was considerably less agreement that there was significant deployment + of CLNP-capable hosts or actual networks running CLNP. Another + strong positive for TUBA is the potential for convergence of ISO and + IETF networking standards. A number of reviewers pointed out that, + if TUBA were to be based on a changed CLNP then the advantage of an + existing deployed infrastructure would be lost and that the + convergence potential would be reduced. + + A number of aspects of CLNP were felt to be a problem by the + reviewers including the inefficiencies introduced by the lack of any + particular word alignment of the header fields, CLNP source route, + the lack of a flow ID field, the lack of a protocol ID field, and the + use of CLNP error messages in TUBA. The CLNP packet format or + procedures would have to be modified to resolve at least some of + these issues. + + There seems to be a profound disagreement within the TUBA community + over the question of the ability of the IETF to modify the CLNP + standards. In our presentation in Houston we said that we felt that + "clone and run" was a legitimate process. This is also what the IAB + proposed in "IP version 7". [IAB92] The TUBA community has not + reached consensus that this view is reasonable. While many, + including a number of the CLNP document authors, are adamant that + this is not an issue and the IETF can make modifications to the base + standards, many others are just as adamant that the standards can + only be changed through the ISO standards process. Since the + overwhelming feeling within the IETF is that the IETF must 'own' the + standards on which it is basing its future, this disagreement within + the TUBA community was disquieting. + + For a number of reasons, unfortunately including prejudice in a few + cases, the reviews of the TUBA proposals were much more mixed than + for SIPP or CATNIP. Clearly TUBA meets the requirements for the + ability to scale to large numbers of hosts, supports flexible + topologies, is media independent and is a datagram protocol. To the + reviewers, it was less clear that TUBA met the other IPng + requirements and these views varied widely. + + There was also disagreement over the advisability of using NSAPs for + routing given the wide variety of NSAP allocation plans. The + Internet would have to restrict the use of NSAPs to those which are + allocated with the actual underlying network topology in mind if the + required degree of aggregation of routing information is to be + + + +Bradner & Mankin [Page 16] + +RFC 1752 Recommendation for IPng January 1995 + + + achieved. + +8.4 Summary of Proposal Reviews + + To summarize, significant problems were seen in all three of the + proposals. The feeling was that, to one degree or another, both SIPP + and TUBA would work in the Internet context but each exhibited its + own problems. Some of these problems would have to be rectified + before either one would be ready to replace IPv4, much less be the + vehicle to carry the Internet into the future. Other problems could + be addressed over time. CATNIP was felt to be too incomplete to be + considered. + +9. A Revised Proposal + + As mentioned above, there was considerable discussion of the + strengths and weaknesses of the various IPng proposals during the + IPng 'BigTen' retreat on May 19th and 20th 1994. [Knopper94b] After + this retreat Steve Deering and Paul Francis, two of the co-chairs of + the SIPP Working Group, sent a message to the sipp mailing list + detailing the discussions at the retreat and proposing some changes + in SIPP. [Deering94a] + + The message noted "The recurring (and unsurprising) concerns about + SIPP were: + + (1) complexity/manageability/feasibility of IPAE, and + + (2) adequacy/correctness/limitations of SIPP's addressing and routing + model, especially the use of loose source routing to accomplish + 'extended addressing'". + + They "proposed to address these concerns by changing SIPP as follows: + + * Change address size from 8 bytes to 16 bytes (fixed-length). + + * Specify optional use of serverless autoconfiguration of the 16-byte + address by using IEEE 802 address as the low-order ("node ID") + part. + + * For higher-layer protocols that use internet-layer addresses as + part of connection identifiers (e.g., TCP), require that they use + the entire 16-byte addresses. + + * Do *not* use Route Header for extended addressing." + + + + + + +Bradner & Mankin [Page 17] + +RFC 1752 Recommendation for IPng January 1995 + + + After considerable discussion on the sipp and big-internet mailing + lists about these proposed changes, the SIPP working group published + a revised version of SIPP [Deering94b], a new addressing architecture + [Francis94], and a simplified transition mechanism [Gillig94a]. + These were submitted to the IPng Directorate for their consideration. + + This proposal represents a synthesis of multiple IETF efforts with + much of the basic protocol coming from the SIPP effort, the + autoconfiguration and transition portions influenced by TUBA, the + addressing structure is based on the CIDR work and the routing header + evolving out of the SDRP deliberations. + +10. Assumptions + +10.1 Criteria Document and Timing of Recommendation + + In making the following recommendations we are making two assumptions + of community consensus; that the IPng criteria document represents + the reasonable set of requirements for an IPng, and that a specific + recommendation should be made now and that from this point on the + IETF should proceed with a single IPng effort. + + As described above, the IPng Technical Criteria document [Kasten94] + was developed in a open manner and was the topic of extensive + discussions on a number of mailing lists. We believe that there is a + strong consensus that this document accurately reflects the + community's set of technical requirements which an IPng should be + able to meet. + + A prime topic of discussion on the big-internet mailing list this + spring as well as during the open IPng directorate meeting in + Seattle, was the need to make a specific IPng recommendation at this + time. Some people felt that additional research would help resolve + some of the issues that are currently unresolved. While others + argued that selecting a single protocol to work on would clarify the + picture for the community, focus the resources of the IETF on + finalizing its details, and, since the argument that there were open + research items could be made at any point in history, there might + never be a 'right' time. + + Our reading of the community is that there is a consensus that a + specific recommendation should be made now. This is consistent with + the views expressed during the ipdecide BOF in Amsterdam [Gross94] + and in some of the RFC 1550 white papers [Carpen94a]. + + There is no particular reason to think that the basic recommendation + would be significantly different if we waited for another six months + or a year. Clearly some details which are currently unresolved could + + + +Bradner & Mankin [Page 18] + +RFC 1752 Recommendation for IPng January 1995 + + + be filled in if the recommendation were to be delayed, but the + current fragmentation of the IETF's energies limits the efficiency of + this type of detail resolution. Concentrating the resources of the + IETF behind a single effort seems to us to be a more efficient way to + proceed. + +10.2 Address Length + + One of the most hotly discussed aspects of the IPng design + possibilities was address size and format. During the IPng process + four distinct views were expressed about these issues: + + 1. The view that 8 bytes of address are enough to meet the current + and future needs of the Internet (squaring the size of the IP + address space). More would waste bandwidth, promote inefficient + assignment, and cause problems in some networks (such as mobiles + and other low speed links). + + 2. The view that 16 bytes is about right. That length supports easy + auto-configuration as well as organizations with complex internal + routing topologies in conjunction with the global routing topology + now and well into the future. + + 3. The view that 20 byte OSI NSAPs should be used in the interests of + global harmonization. + + 4. The view that variable length addresses which might be smaller or + larger than 16 bytes should be used to embrace all the above + options and more, so that the size of the address could be + adjusted to the demands of the particular environment, and to + ensure the ability to meet any future networking requirements. + + Good technical and engineering arguments were made for and against + all of these views. Unanimity was not achieved, but we feel that a + clear majority view emerged that the use of 16 byte fixed length + addresses was the best compromise between efficiency, functionality, + flexibility, and global applicability. [Mankin94] + +11. IPng Recommendation + + After a great deal of discussion in many forums and with the + consensus of the IPng Directorate, we recommend that the protocol + described in "Simple Internet Protocol Plus (SIPP) Spec. (128 bit + ver)" [Deering94b] be adopted as the basis for IPng, the next + generation of the Internet Protocol. We also recommend that the + other documents listed in Appendix C be adopted as the basis of + specific features of this protocol. + + + + +Bradner & Mankin [Page 19] + +RFC 1752 Recommendation for IPng January 1995 + + + This proposal resolves most of the perceived problems, particularly + in the areas of addressing, routing, transition and address + autoconfiguration. It includes the broad base of the SIPP proposal + effort, flexible address autoconfiguration features, and a merged + transition strategy. We believe that it meets the requirements + outlined in the IPng Criteria document and provides the framework to + fully meet the needs of the greater Internet community for the + foreseeable future. + +11.1 IPng Criteria Document and IPng + + A detailed review of how IPng meets the requirements set down in the + IPng Criteria document [Kasten94] will soon be published. Following + is our feelings about the extent to which IPng is responsive to the + criteria. + + * complete specification - the base specifications for IPng are + complete but transition and address autoconfiguration do remain to + be finalized + * architectural simplicity - the protocol is simple, easy to explain + and uses well established paradigms + * scale - an address size of 128 bits easily meets the need to + address 10**9 networks even in the face of the inherent + inefficiency of address allocation for efficient routing + * topological flexibility - the IPng design places no constraints on + network topology except for the limit of 255 hops + * performance - the simplicity of processing, the alignment of the + fields in the headers, and the elimination of the header checksum + will allow for high performance handling of IPng data streams + * robust service - IPng includes no inhibitors to robust service and + the addition of packet-level authentication allows the securing of + control and routing protocols without having to have separate + procedures + * transition - the IPng transition plan is simple and realistically + covers the transition methods that will be present in the + marketplace + * media independence - IPng retains IPv4's media independence, it may + be possible to make use of IPng's Flow Label in some connection- + oriented media such as ATM + * datagram service - IPng preserves datagram service as its basic + operational mode, it is possible that the use of path MTU discovery + will complicate the use of datagrams in some cases + * configuration ease - IPng will have easy and flexible address + autoconfiguration which will support a wide variety of environments + from nodes on an isolated network to nodes deep in a complex + internet + * security - IPng includes specific mechanisms for authentication and + encryption at the internetwork layer; the security features do rely + + + +Bradner & Mankin [Page 20] + +RFC 1752 Recommendation for IPng January 1995 + + + on the presence of a yet to be defined key management system + * unique names - IPng addresses may be used as globally unique names + although they do have topological significance + * access to standards - all of the IPng standards will be published + as RFCs with unlimited distribution + * multicast support - IPng specifically includes multicast support + * extensibility - the use of extension headers and an expandable + header option feature will allow the introduction of new features + into IPng when needed in a way that minimizes the disruption of the + existing network + * service classes - the IPng header includes a Flow Label which may + be used to differentiate requested service classes + * mobility - the proposed IPv4 mobility functions will work with IPng + * control protocol - IPng includes the familiar IPv4 control protocol + features + * tunneling support - encapsulation of IPng or other protocols within + IPng is a basic capability described in the IPng specifications + +11.2 IPv6 + + The IANA has assigned version number 6 to IPng. The protocol itself + will be called IPv6. + + The remainder of this memo is used to describe IPv6 and its features. + This description is an overview snapshot. The standards documents + themselves should be referenced for definitive specifications. We + also make a number of specific recommendations concerning the details + of the proposed protocol, the procedures required to complete the + definition of the protocol, and the IETF working groups we feel are + necessary to accomplish the task. + +12. IPv6 Overview + + IPv6 is a new version of the Internet Protocol, it has been designed + as an evolutionary, rather than revolutionary, step from IPv4. + Functions which are generally seen as working in IPv4 were kept in + IPv6. Functions which don't work or are infrequently used were + removed or made optional. A few new features were added where the + functionality was felt to be necessary. + + The important features of IPv6 include: [Hinden94c] + + * expanded addressing and routing capabilities - The IP address size + is increased from 32 bits to 128 bits providing support for a much + greater number of addressable nodes, more levels of addressing + hierarchy, and simpler auto-configuration of addresses. + + + + + +Bradner & Mankin [Page 21] + +RFC 1752 Recommendation for IPng January 1995 + + + The scaleability of multicast routing is improved by adding a + "scope" field to multicast addresses. + + A new type of address, called a "cluster address" is defined to + identify topological regions rather than individual nodes. The use + of cluster addresses in conjunction with the IPv6 source route + capability allows nodes additional control over the path their + traffic takes. + + * simplified header format - Some IPv4 header fields have been + dropped or made optional to reduce the common-case processing cost + of packet handling and to keep the bandwidth overhead of the IPv6 + header as low as possible in spite of the increased size of the + addresses. Even though the IPv6 addresses are four time longer + than the IPv4 addresses, the IPv6 header is only twice the size of + the IPv4 header. + + * support for extension headers and options - IPv6 options are placed + in separate headers that are located in the packet between the IPv6 + header and the transport-layer header. Since most IPv6 option + headers are not examined or processed by any router along a + packet's delivery path until it arrives at its final destination, + this organization facilitates a major improvement in router + performance for packets containing options. Another improvement is + that unlike IPv4, IPv6 options can be of arbitrary length and not + limited to 40 bytes. This feature plus the manner in which they are + processed, permits IPv6 options to be used for functions which were + not practical in IPv4. + + A key extensibility feature of IPv6 is the ability to encode, + within an option, the action which a router or host should perform + if the option is unknown. This permits the incremental deployment + of additional functionality into an operational network with a + minimal danger of disruption. + + * support for authentication and privacy - IPv6 includes the + definition of an extension which provides support for + authentication and data integrity. This extension is included as a + basic element of IPv6 and support for it will be required in all + implementations. + + IPv6 also includes the definition of an extension to support + confidentiality by means of encryption. Support for this extension + will be strongly encouraged in all implementations. + + + + + + + +Bradner & Mankin [Page 22] + +RFC 1752 Recommendation for IPng January 1995 + + + * support for autoconfiguration - IPv6 supports multiple forms of + autoconfiguration, from "plug and play" configuration of node + addresses on an isolated network to the full-featured facilities + offered by DHCP. + + * support for source routes - IPv6 includes an extended function + source routing header designed to support the Source Demand Routing + Protocol (SDRP). The purpose of SDRP is to support source-initiated + selection of routes to complement the route selection provided by + existing routing protocols for both inter-domain and intra-domain + routes. [Estrin94b] + + * simple and flexible transition from IPv4 - The IPv6 transition plan + is aimed at meeting four basic requirements: [Gillig94a] + + - Incremental upgrade. Existing installed IPv4 hosts and routers + may be upgraded to IPv6 at any time without being dependent on + any other hosts or routers being upgraded. + - Incremental deployment. New IPv6 hosts and routers can be + installed at any time without any prerequisites. + - Easy Addressing. When existing installed IPv4 hosts or routers + are upgraded to IPv6, they may continue to use their existing + address. They do not need to be assigned new addresses. + - Low start-up costs. Little or no preparation work is needed in + order to upgrade existing IPv4 systems to IPv6, or to deploy new + IPv6 systems. + + * quality of service capabilities - A new capability is added to + enable the labeling of packets belonging to particular traffic + "flows" for which the sender has requested special handling, such + as non-default quality of service or "real-time" service. + + + + + + + + + + + + + + + + + + + + +Bradner & Mankin [Page 23] + +RFC 1752 Recommendation for IPng January 1995 + + +12.1 IPv6 Header Format + + The IPv6 header, although longer than the IPv4 header, is + considerably simplified. A number of functions that were in the IPv4 + header have been relocated in extension headers or dropped. + [Deering94b] + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |Version| Flow Label | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Payload Length | Next Header | Hop Limit | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + + + + | | + + Source Address + + | | + + + + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + + + + | | + + Destination Address + + | | + + + + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + * Version - Internet Protocol version number. IPng has been assigned + version number 6. (4-bit field) + + * Flow Label - This field may be used by a host to label those + packets for which it is requesting special handling by routers + within a network, such as non-default quality of service or "real- + time" service. (28-bit field) + + * Payload Length - Length of the remainder of the packet following + the IPv6 header, in octets. To permit payloads of greater than 64K + bytes, if the value in this field is 0 the actual packet length + will be found in an Hop-by-Hop option. (16-bit unsigned integer) + + * Next Header - Identifies the type of header immediately following + the IPv6 header. The Next Header field uses the same values as the + IPv4 Protocol field (8-bit selector field) + + + + + + +Bradner & Mankin [Page 24] + +RFC 1752 Recommendation for IPng January 1995 + + + * Hop Limit - Used to limit the impact of routing loops. The Hop + Limit field is decremented by 1 by each node that forwards the + packet. The packet is discarded if Hop Limit is decremented to + zero. (8-bit unsigned integer) + + * Source Address - An address of the initial sender of the packet. + (128 bit field) + + * Destination Address - An address of the intended recipient of the + packet (possibly not the ultimate recipient, if an optional Routing + Header is present). (128 bit field) + +12.2 Extension Headers + + In IPv6, optional internet-layer information is encoded in separate + headers that may be placed between the IPv6 header and the + transport-layer header in a packet. There are a small number of such + extension headers, each identified by a distinct Next Header value. + [From a number of the documents listed in Appendix C.] + + 12.2.1 Hop-by-Hop Option Header + + The Hop-by-Hop Options header is used to carry optional + information that must be examined by every node along a packet's + delivery path. The Hop-by-Hop Options header is identified by a + Next Header value of 0 in the IPv6 header, and has the following + format: + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Next Header | Hdr Ext Len | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + | | + . . + . Options . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + * Next Header - Identifies the type of header immediately + following the Hop-by-Hop Options header. Uses the same values + as the IPv4 Protocol field. (8-bit selector) + + * Hdr Ext Len - Length of the Hop-by-Hop Options header in 8-octet + units, not including the first 8 octets. (8-bit unsigned + integer) + + + + + + +Bradner & Mankin [Page 25] + +RFC 1752 Recommendation for IPng January 1995 + + + * Options - Contains one or more TLV-encoded options. (Variable- + length field, of length such that the complete Hop-by-Hop + Options header is an integer multiple of 8 octets long.) + + 12.2.2 IPv6 Header Options + + Two of the currently-defined extension headers -- the Hop-by-Hop + Options header and the End-to-End Options header -- may carry a + variable number of Type-Length-Value (TLV) encoded "options", of + the following format: + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - + | Option Type | Opt Data Len | Option Data + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - + + * Option Type - identifier of the type of option (8-bit field) + + * Opt Data Len - Length of the Option Data field of this option, + in octets. (8-bit unsigned integer) + + * Option Data - Option-Type-specific data. (Variable-length field) + + The Option Type identifiers are internally encoded such that their + highest-order two bits specify the action that must be taken if + the processing IPv6 node does not recognize the Option Type: + + 00 - skip over this option and continue processing the header + 01 - discard the packet + 10 - discard the packet and send an ICMP Unrecognized Type message + to the packet's Source Address, pointing to the unrecognized + Option Type + 11 - undefined. + + In the case of Hop-by-Hop options only, the third-highest-order + bit of the Option Type specifies whether or not the Option Data of + this option shall be included in the integrity assurance + computation performed when an Authentication header is present. + Option data that changes en route must be excluded from that + computation. + + + + + + + + + + + + +Bradner & Mankin [Page 26] + +RFC 1752 Recommendation for IPng January 1995 + + + 12.2.3 Routing Header + + The Routing header is used by an IPv6 source to list one or more + intermediate nodes (or topological clusters) to be "visited" on + the way to a packet's destination. This particular form of the + Routing Header is designed to support SDRP. [Estrin94b] + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Next Header |Routing Type=1 |M|F| Reserved | SrcRouteLen | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | NextHopPtr | Strict/Loose Bit Mask | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . . + . Source Route . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + * Next Header - Identifies the type of header immediately + following the Routing Header. Uses the same values as the IPv4 + Protocol field. (8-bit selector) + + * Routing Type - Indicates the type of routing supported by this + header. Value must be 1. + + * MRE flag - Must Report Errors. If this bit is set to 1, and a + router can not further forward a packet (with an incompletely + traversed source route), as specified in the Source Route, the + router must generate an ICMP error message. If this bit is set + to 0, and a router can not further forward a packet (with an + incompletely traversed source route), as specified in the Source + Route, the router should not generate an ICMP error message. + + * F flag - Failure of Source Route Behavior. If this bit it set + to 1, it indicates that if a router can not further forward a + packet (with an incompletely traversed source route), as + specified in the Source Route, the router must set the value of + the Next Hop Pointer field to the value of the Source Route + Length field, so that the subsequent forwarding will be based + solely on the destination address. If this bit is set to 0, it + indicates that if a router can not further forward a packet + (with an incompletely traversed source route), as specified in + the Source Route, the router must discard the packet. + + + + + +Bradner & Mankin [Page 27] + +RFC 1752 Recommendation for IPng January 1995 + + + * Reserved - Initialized to zero for transmission; ignored on + reception. + + * SrcRouteLen - Source Route Length - Number of source route + elements/hops in the SDRP Routing header. Length of SDRP + routing header can be calculated from this value (length = + SrcRouteLen * 16 + 8) This field may not exceed a value of 24. + (8 bit unsigned integer) + + * NextHopPtr - Next Hop Pointer- Index of next element/hop to be + processed; initialized to 0 to point to first element/hop in the + source route. When Next Hop Pointer is equal to Source Route + Length then the Source Route is completed. (8 bit unsigned + integer) + + * Strict/Loose Bit Mask - The Strict/Loose Bit Mask is used when + making a forwarding decision. If the value of the Next Hop + Pointer field is N, and the N-th bit in the Strict/Loose Bit + Mask field is set to 1, it indicates that the next hop is a + Strict Source Route Hop. If this bit is set to 0, it indicates + that the next hop is a Loose Source Route Hop. (24 bit + bitpattern) + + * Source Route - A list of IPv6 addresses indicating the path that + this packet should follow. A Source Route can contain an + arbitrary intermix of unicast and cluster addresses. (integral + multiple of 128 bits) + + 12.2.4 Fragment Header + + The Fragment header is used by an IPv6 source to send payloads + larger than would fit in the path MTU to their destinations. + (Note: unlike IPv4, fragmentation in IPv6 is performed only by + source nodes, not by routers along a packet's delivery path) The + Fragment header is identified by a Next Header value of 44 in the + immediately preceding header, and has the following format: + + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Next Header | Reserved | Fragment Offset |Res|M| + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Identification | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + * Next Header - Identifies the type of header immediately + following the Fragment header. Uses the same values as the IPv4 + Protocol field. (8 bit selector) + + + + +Bradner & Mankin [Page 28] + +RFC 1752 Recommendation for IPng January 1995 + + + * Reserved, Res - Initialized to zero for transmission; ignored on + reception. + + * Fragment Offset - The offset, in 8-octet units, of the following + payload, relative to the start of the original, unfragmented + payload. (13-bit unsigned integer) + + * M flag - 1 = more fragments; 0 = last fragment. + + * Identification - A value assigned to the original payload that + is different than that of any other fragmented payload sent + recently with the same IPv6 Source Address, IPv6 Destination + Address, and Fragment Next Header value. (If a Routing header + is present, the IPv6 Destination Address is that of the final + destination.) The Identification value is carried in the + Fragment header of all of the original payload's fragments, and + is used by the destination to identify all fragments belonging + to the same original payload. (32 bit field) + + 12.2.5 Authentication Header + + The Authentication header is used to provide authentication and + integrity assurance for IPv6 packets. Non-repudiation may be + provided by an authentication algorithm used with the + Authentication header, but it is not provided with all + authentication algorithms that might be used with this header. + The Authentication header is identified by a Next Header value of + 51 in the immediately preceding header, and has the following + format: + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Next Header | Auth Data Len | Reserved | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Security Association ID | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . . + . Authentication Data . + . . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + * Next Header - Identifies the type of header immediately + following the Authentication header. Uses the same values as + the IPv4 Protocol field. (8-bit selector) + + * Auth Data Len - Length of the Authentication Data field in 8- + octet units. (8-bit unsigned integer) + + + +Bradner & Mankin [Page 29] + +RFC 1752 Recommendation for IPng January 1995 + + + * Reserved - Initialized to zero for transmission; ignored on + reception. + + * Security Assoc. ID - When combined with the IPv6 Source Address, + identifies to the receiver(s) the pre-established security + association to which this packet belongs. (32 bit field) + + * Authentication Data - Algorithm-specific information required + to authenticate the source of the packet and assure its + integrity, as specified for the pre-established security + association. (Variable-length field, an integer multiple of 8 + octets long.) + + 12.2.6 Privacy Header + + The Privacy Header seeks to provide confidentiality and integrity + by encrypting data to be protected and placing the encrypted data + in the data portion of the Privacy Header. Either a transport- + layer (e.g., UDP or TCP) frame may be encrypted or an entire IPv6 + datagram may be encrypted, depending on the user's security + requirements. This encapsulating approach is necessary to provide + confidentiality for the entire original datagram. If present, the + Privacy Header is always the last non-encrypted field in a packet. + + The Privacy Header works between hosts, between a host and a + security gateway, or between security gateways. This support for + security gateways permits trustworthy networks to exist without + the performance and monetary costs of security, while providing + security for traffic transiting untrustworthy network segments. + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Security Association Identifier (SAID) | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + . Initialization Vector . + | | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Next Header* | Length* | Reserved* | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | + | Protected Data* +-+-+-+-+-+-+-+-+-+-+ + | | trailer* | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + *encrypted + + + + + + +Bradner & Mankin [Page 30] + +RFC 1752 Recommendation for IPng January 1995 + + + * Security Association Identifier (SAID) - Identifies the security + association for this datagram. If no security association has + been established, the value of this field shall be 0x0000. A + security association is normally one-way. An authenticated + communications session between two hosts will normally have two + SAIDs in use (one in each direction). The receiving host uses + the combination of SAID value and originating address to + distinguish the correct association. (32 bit value) + + * Initialization Vector - This field is optional and its value + depends on the SAID in use. For example, the field may contain + cryptographic synchronization data for a block oriented + encryption algorithm. It may also be used to contain a + cryptographic initialization vector. A Privacy Header + implementation will normally use the SAID value to determine + whether this field is present and, if it is, the field's size + and use. (presence and length dependent on SAID) + + * Next Header - encrypted - Identifies the type of header + immediately following the Privacy header. Uses the same values + as the IPv4 Protocol field. (8 bit selector) + + * Reserved - encrypted - Ignored on reception. + + * Length - encrypted - Length of the Privacy Header in 8-octet + units, not including the first 8 octets. (8-bit unsigned + integer) + + * Protected Data - encrypted - This field may contain an entire + encapsulated IPv6 datagram, including the IPv6 header, a + sequence of zero or more IPv6 options, and a transport-layer + payload, or it may just be a sequence of zero or more IPv6 + options followed by a transport-layer payload. (variable + length) + + * trailer (Algorithm-dependent Trailer) - encrypted - A field + present to support some algorithms which need to have padding + (e.g., to a full cryptographic block size for block-oriented + encryption algorithms) or for storage of authentication data for + use with a encryption algorithm that provides confidentiality + without authentication. It is present only when the algorithm + in use requires such a field. (presence and length dependent on + SAID) + + + + + + + + +Bradner & Mankin [Page 31] + +RFC 1752 Recommendation for IPng January 1995 + + + 12.2.7 End-to-End Option Header + + The End-to-End Options header is used to carry optional + information that needs to be examined only by a packet's + destination node(s). The End-to-End Options header is identified + by a Next Header value of TBD in the immediately preceding header, + and has the same format as the Hop-by-Hop Option Header except for + the ability to exclude an option from the authentication integrity + assurance computation. + +13. IPng Working Group + + We recommend that a new IPng Working Group be formed to produce + specifications for the core functionality of the IPv6 protocol suite. + The working group will carry out the recommendations of the IPng Area + Directors as outlined at the July 1994 IETF and in this memo. We + recommend that this working group be chaired by Steve Deering of + Xerox PARC and Ross Callon of Wellfleet. + + The primary task of the working group is to produce a set of + documents that define the basic functions, interactions, assumptions, + and packet formats for IPv6. We recommend that Robert Hinden of Sun + Microsystems be the editor for these documents. The documents listed + in Appendix C will be used by the working group to form the basis of + the final document set. + + The work of the IPng Working Group includes: + + * complete the IPv6 overview document + * complete the IPv6 detailed operational specification + * complete the IPv6 Addressing Architecture specification + * produce specifications for IPv6 encapsulations over various media + * complete specifications for the support of packets larger than 64KB + * complete specifications of the DNS enhancements required to support + IPv6 + * complete specification of ICMP, IGMP and router discovery for + support of IPv6. + * complete specification of path MTU discovery for IPv6 + * complete specifications of IPv6 in IPv6 tunneling + * complete the suggested address format and assignment plan + * coordinate with the Address Autoconfiguration Working Group + * coordinate with the NGTRANS and TACIT Working Groups + * complete specifications of authentication and privacy support + headers + + + + + + + +Bradner & Mankin [Page 32] + +RFC 1752 Recommendation for IPng January 1995 + + + The working group should also consider a few selected enhancements + including: + + * consider ways to compress the IPv6 header in the contexts of native + IPv6, multiple IPv6 packets in a flow, and encapsulated IPv6 + * consider specifying support for a larger minimum MTU + +14. IPng Reviewer + + Currently it is the task of the IPng Area Directors, the IPng + Directorate and the chairs of the proposed ipng working group to + coordinate the activities of the many parallel efforts currently + directed towards different aspects of IPng. While this is possible + and currently seems to be working well it can not be maintained over + the long run because, among other reasons, the IPng Area will be + dissolved eventually and its Directorate disbanded. It will also + become much more difficult as IPng related activities start up in + other IETF areas. + + We recommend that an IPng Reviewer be appointed to be specifically + responsible for ensuring that a consistent view of IPv6 is maintained + across the related working groups. We feel that this function is + required due to the complex nature of the interactions between the + parts of the IPng effort and due to the distribution of the IPng + related work amongst a number of IETF areas. We recommend that Dave + Clark of MIT be offered this appointment. + + This would be a long-term task involving the review of on-going + activities. The aim is not for the IPng Reviewer to make + architectural decisions since that is the work of the various working + groups, the IAB, and the IETF as a whole.. The aim is to spot gaps or + misunderstandings before they reach the point where functionality or + interworkability is threatened. + +15. Address Autoconfiguration + + As data networks become more complex the need to be able to bypass at + least some of the complexity and move towards "plug and play" becomes + ever more acute. The user can not be expected to be able to + understand the details of the network architecture or know how to + configure the network software in their host. In the ideal case, a + user should be able to unpack a new computer, plug it into the local + network and "just" have it work without requiring the entering of any + special information. Security concerns may restrict the ability to + offer this level of transparent address autoconfiguration in some + environments but the mechanisms must be in place to support whatever + level of automation which the local environment feels comfortable + with. + + + +Bradner & Mankin [Page 33] + +RFC 1752 Recommendation for IPng January 1995 + + + The basic requirement of "plug and play" operation is that a host + must be able to acquire an address dynamically, either when attaching + to a network for the first time or when the host needs to be + readdressed because the host moved or because the identity of the + network has changed. There are many other functions required to + support a full "plug and play" environment. [Berk94] Most of these + must be addressed outside of the IPv6 Area but a focused effort to + define a host address autoconfiguration protocol is part of the IPv6 + process. + + We recommend that a new Address Autoconfiguration Working Group + (addrconf) be formed with Dave Katz of Cisco Systems and Sue Thomson + of Bellcore as co-chairs. The purpose of this working group is to + design and specify a protocol for allocating addresses dynamically to + IPv6 hosts. The address configuration protocol must be suitable for + a wide range of network topologies, from a simple isolated network to + a sophisticated globally connected network. It should also allow for + varying levels of administrative control, from completely automated + operation to very tight oversight. + + The scope of this working group is to propose a host address + autoconfiguration protocol which supports the full range of + topological and administrative environments in which IPv6 will be + used. It is the intention that, together with IPv6 system discovery, + the address autoconfiguration protocol will provide the minimal + bootstrapping information necessary to enable hosts to acquire + further configuration information (such as that provided by DHCP in + IPv4). The scope does not include router configuration or any other + host configuration functions. However, it is within the scope of the + working group to investigate and document the interactions between + this work and related functions including system discovery, DNS + autoregistration, service discovery, and broader host configuration + issues, to facilitate the smooth integration of these functions. + [Katz94a] + + The working group is expected to complete its work around the end of + 1994 and disband at that time. The group will use "IPv6 Address + Autoconfiguration Architecture" [Katz94b] draft document as the basis + of their work. + +16. Transition + + The transition of the Internet from IPv4 to IPv6 has to meet two + separate needs. There is a short term need to define specific + technologies and methods to transition IPv4 networks, including the + Internet, into IPv6 networks and an IPv6 Internet. There is also a + long term need to do broad-based operational planning for transition, + including developing methods to allow decentralized migration + + + +Bradner & Mankin [Page 34] + +RFC 1752 Recommendation for IPng January 1995 + + + strategies, understanding the ramifications of a long period of + coexistence when both protocols are part of the basic infrastructure, + developing an understanding of the type and scope of architectural + and interoperability testing that will be required to ensure a + reliable and manageable Internet in the future. + +16.1 Transition - Short Term + + Any IPng transition plan must take into account the realities of what + types of devices vendors will build and network managers will deploy. + The IPng transition plan must define the procedures required to + successfully implement the functions which vendors will be likely to + include in their devices. This is the case even if there are good + arguments to recommend against a particular function, header + translation for example. If products will exist it is better to have + them interoperate than not. + + We recommend that a new IPng Transition (NGTRANS) Working Group be + formed with Bob Gilligan of Sun Microsystems and xxx of yyy as co- + chairs to design the mechanisms and procedures to support the + transition of the Internet from IPv4 to IPv6 and to give advice on + what procedures and techniques are preferred. + + The work of the group will fall into three areas: + + * Define the processes by which the Internet will make the transition + from IPv4 to IPv6. As part of this effort, the group will produce + a document explaining to the general Internet community what + mechanisms will be employed in the transition, how the transition + will work, the assumptions about infrastructure deployment inherent + in the operation of these mechanisms, and the types of + functionality that applications developers will be able to assume + as the protocol mix changes over time. + * Define and specify the mandatory and optional mechanisms that + vendors should implement in hosts, routers, and other components of + the Internet in order for the transition to be carried out. Dual- + stack, encapsulation and header translation mechanisms must all be + defined, as well as the interaction between hosts using different + combinations of these mechanisms. The specifications produced will + be used by people implementing these IPv6 systems. + * Articulate a concrete operational plan for the Internet to make the + transition from IPv4 to IPv6. The result of this work will be a + transition plan for the Internet that network operators and + Internet subscribers can execute. + [Gillig94c] + + + + + + +Bradner & Mankin [Page 35] + +RFC 1752 Recommendation for IPng January 1995 + + + The working group is expected to complete its work around the end of + 1994 and disband at that time. The group will use the "Simple SIPP + Transition (SST)" [Gilig94a] overview document as the starting point + for its work. + +16.2 Transition - Long Term + + There are a number of transition related topics in addition to + defining the specific IPv4 to IPv6 mechanisms and their deployment, + operation and interaction. The ramifications and procedures of + migrating to a new technology or to a new version of an existing + technology must be fully understood. + + We recommend that the Transition and Coexistence Including Testing + (TACIT) Working Group, which was started a few months ago, explore + some of the basic issues associated with the deployment of new + technology into an established Internet. The TACIT Working Group + will focus on the generic issues of transition and will not limit + itself to the upcoming transition to IPv6 because, over time, + enhancements to IPv6 (IPv6ng) will be developed and accepted. At + that point they will need to be deployed into the then existing + Internet. The TACIT Working Group will be more operationally + oriented than the NGTRANS Working Group and will continue well into + the actual IPv6 transition. + + The main areas of exploration are: + + * Make the transition from a currently deployed protocol to a new + protocol while accommodating heterogeneity and decentralized + management. + * Since it is often difficult or impossible to replace all legacy + systems or software, it is important to understand the + characteristics and operation of a long period of coexistence + between a new protocol and the existing protocol. + * The Internet must now be considered a utility. We are far removed + from a time when a new technology could be deployed to see if it + would work in large scale situations. Rigorous architectural and + interoperability testing must be part of the predeployment phase of + any proposed software for the Internet. Testing the scaling up + behaviors and robustness of a new protocol will offer particular + challenges. The WG should determine if there are lessons to be + learned from: OSPF, BGP4 and CIDR Deployment, the AppleTalk 1 to 2 + transition, DECnet Phase 4 to Phase 5 planning and transition, + among others. + + + + + + + +Bradner & Mankin [Page 36] + +RFC 1752 Recommendation for IPng January 1995 + + + The TACIT Working Group will explore each of these facets of the + deployment of new technology and develop a number of documents to + help guide users and managers of affected data networks and provide + to the IETF: + + * Detailed descriptions of problem areas in transition and + coexistence, both predicted, based on lessons learned, and observed + as the IPv6 process progresses. + * Recommendations for specific testing procedures. + * Recommendations for coexistence operations procedures + * Recommendations for the smoothing of decentralized transition + planning. + [Huston94] + +17. Other Address Families + + There are many environments in which there are one or more network + protocols already deployed or where a significant planning effort has + been undertaken to create a comprehensive network addressing plan. In + such cases there may be a temptation to integrate IPv6 into the + environment by making use of an existing addressing plan to define + all or part of the IPv6 addresses. The advantage of doing this is + that it permits unified management of address space among multiple + protocol families. The use of common addresses can help facilitate + transition from other protocols to IPv6. + + If the existing addresses are globally unique and assigned with + regard to network topology this may be a reasonable idea. The IETF + should work with other organizations to develop algorithms that could + be used to map addresses between IPv6 and other environments. The + goal for any such mapping must be to provide an unambiguous 1 to 1 + map between individual addresses. + + Suggestions have been made to develop mapping algorithms for Novell + IPX addresses, some types of OSI NSAPs, E164 addresses and SNA + addresses. Each of these possibilities should be carefully examined + to ensure that use of such an algorithm solves more problems than it + creates. In some cases it may be better to recommend either that a + native IPng addressing plan be developed instead, or that an IPv6 + address be used within the non-IP environment. [Carpen94b] + + We recommend that, in conjunction with other organizations, + recommendations about the use of non-IPv6 addresses in IPv6 + environments and IPv6 addresses in non-IPv6 environments be + developed. + + + + + + +Bradner & Mankin [Page 37] + +RFC 1752 Recommendation for IPng January 1995 + + +18. Impact on Other IETF Standards + + Many current IETF standards are affected by IPv6. At least 27 of the + current 51 full Internet Standards must be revised for IPv6, along + with at least 6 of the 20 Draft Standards and at least 25 of the 130 + Proposed Standards. [Postel94] + + In some cases the revisions consist of simple changes to the text, + for example, in a number of RFCs an IP address is referred to in + passing as a "32 bit IP address" even though IP addresses are not + directly used in the protocol being defined. All of the standards + track documents will have to be checked to see if they contain such + references. + + In most of the rest of the cases revisions to the protocols, + including packet formats, will be required. In many of these cases + the address is just being carried as a data element and a revised + format with a larger field for the address will have no effect on the + functional paradigm. + + In the remaining cases some facet of the operation of the protocol + will be changed as a result of IPv6. For example, the security and + source route mechanisms are fundamentally changed from IPv4 with + IPv6. Protocols and applications that relied on the IPv4 + functionality will have to be redesigned or rethought to use the + equivalent function in IPv6. + + In a few cases this opportunity should be used to determine if some + of the RFCs should be moved to historic, for example EGP [Mills84] + and IP over ARCNET. [Provan91] + + The base IPng Working Group will address some of these, existing IETF + working groups can work on others, while new working groups must be + formed to deal with a few of them. The IPng Working Group will be + responsible for defining new versions of ICMP, ARP/RARP, and UDP. It + will also review RFC 1639, "FTP Operation Over Big Address Records + (FOOBAR)" [Piscit94] and RFC 1191 "Path MTU Discovery" [Mogul90] + + Existing working groups will examine revisions for some of the + routing protocols: RIPv2, IS-IS, IDRP and SDRP. A new working group + may be required for OSPF. + + The existing DHCP Working Group may be able to revise DHCP and + examine BOOTP. + + + + + + + +Bradner & Mankin [Page 38] + +RFC 1752 Recommendation for IPng January 1995 + + + A TCPng Working Group will be formed soon, and new working groups + will have to be formed to deal with standards such as SNMP, DNS, NTP, + NETbios, OSI over TCP, Host Requirements, and Kerberos as well as + reviewing most of the RFCs that define IP usage over various media. + + In addition to the standards track RFCs mentioned above there are + many Informational and Experimental RFCs which would be affected as + well as numerous Internet Drafts (and those standards track RFCs that + we missed). + + We recommend that the IESG commission a review of all standards track + RFCs to ensure that a full list of affected documents is compiled. We + recommend that the IESG charge current IETF working groups with the + task of understanding the impact of IPv6 on their proposals and, + where appropriate, revise the documents to include support for IPv6. + + We recommend that the IESG charter new working groups where required + to revise other standards RFCs. + +19. Impact on non-IETF standards and on products + + Many products and user applications which rely on the size or + structure of IPv4 addresses will need to be modified to work with + IPv6. While the IETF can facilitate an investigation of the impacts + of IPv6 on non-IETF standards and products, the primary + responsibility for doing so resides in the other standards bodies and + the vendors. + + Examples of non-IETF standards that are effected by IPv6 include the + POSIX standards, Open Software Foundation's DCE and DME, X-Open, Sun + ONC, the Andrew File System and MIT's Kerberos. Most products that + provide specialized network security including firewall-type devices + are among those that must be extended to support IPv6. + +20. APIs + + It is traditional to state that the IETF does not "do" APIs. While + there are many reasons for this, the one most commonly referenced is + that there are too many environments where TCP/IP is used, too many + different operating systems, programming languages, and platforms. + The feeling is that the IETF should not get involved in attempting to + define a language and operating system independent interface in the + face of such complexity. + + We feel that this historical tendency for the IETF to avoid dealing + with APIs should be reexamined in the case of IPv6. We feel that in + a few specific cases the prevalence of a particular type of API is + such that a single common solution for the modifications made + + + +Bradner & Mankin [Page 39] + +RFC 1752 Recommendation for IPng January 1995 + + + necessary by IPv6 should be documented. + + We recommend that Informational RFCs be solicited or developed for + these few cases. In particular, the Berkeley-style sockets + interface, the UNIX TLI and XTI interfaces, and the WINSOCK + interfaces should be targeted. A draft document exists which could + be developed into the sockets API description. [Gillig94b] + +21. Future of the IPng Area and Working Groups + + In our presentation at the Houston IETF meeting we stated that the + existing IPng proposal working groups would not be forced to close + down after the recommendation was made. Each of them has been + working on technologies that may have applications in addition to + their IPng proposal and these technologies should not be lost. + + Since the Toronto IETF meeting the existing IPng working groups have + been returned to the Internet Area. The group members may decide to + close down the working groups or to continue some of their efforts. + The charters of the working groups must be revised if they choose to + continue since they would no longer be proposing an IPng candidate. + + In Toronto the chairs of the SIPP Working Group requested that the + SIPP Working Group be concluded. The chairs of the TUBA Working + Group requested that the TUBA working group be understood to be in + hiatus until a number of the documents in process were completed, at + which time they would request that the working group be concluded. + + We recommend that the IPng Area and its Directorate continue until + the basic documents have entered the standards track in late 1994 or + early 1995 and that after such time the area be dissolved and those + IPng Area working groups still active be moved to their normal IETF + areas. + +22. Security Considerations + + The security of the Internet has long been questioned. It has been + the topic of much press coverage, many conferences and workshops. + Almost all of this attention has been negative, pointing out the many + places where the level of possible security is far less than that + deemed necessary for the current and future uses of the Internet. A + number of the RFC 1550 White Papers specifically pointed out the + requirement to improve the level of security available [Adam94, + Bell94b, Brit94, Green94, Vecchi94, Flei94] as does "Realizing the + Information Future". [Nat94] + + + + + + +Bradner & Mankin [Page 40] + +RFC 1752 Recommendation for IPng January 1995 + + + In February of 1994, the IAB convened a workshop on security in the + Internet architecture. The report of this workshop [IAB94] includes + an exploration of many of the security problem areas and makes a + number of recommendations to improve the level of security that the + Internet offers its users. + + We feel that an improvement in the basic level of security in the + Internet is vital to its continued success. Users must be able to + assume that their exchanges are safe from tampering, diversion and + exposure. Organizations that wish to use the Internet to conduct + business must be able to have a high level of confidence in the + identity of their correspondents and in the security of their + communications. The goal is to provide strong protection as a matter + of course throughout the Internet. + + As the IAB report points out, many of the necessary tools are not a + function of the internetworking layer of the protocol. These higher + level tools could make use of strong security features in the + internetworking layer if they were present. While we expect that + there will be a number of special high-level security packages + available for specific Internet constituencies, support for basic + packet-level authentication will provide for the adoption of a much + needed, widespread, security infrastructure throughout the Internet. + + It is best to separate the support for authentication from the + support for encryption. One should be able to use the two functions + independently. There are some applications in which authentication + of a corespondent is sufficient and others where the data exchanged + must be kept private. + + It is our recommendation that IPv6 support packet authentication as a + basic and required function. Applications should be able to rely on + support for this feature in every IPv6 implementation. Support for a + specific authentication algorithm should also be mandated while + support for additional algorithms should be optional. + + Thus we recommend that support for the Authentication Header be + required in all compliant IPv6 implementations. + + We recommend that support for a specific authentication algorithm be + required. The specific algorithm should be determined by the time + the IPv6 documents are offered as Proposed Standards. + + We recommend that support for the Privacy Header be required in IPv6 + implementations. + + + + + + +Bradner & Mankin [Page 41] + +RFC 1752 Recommendation for IPng January 1995 + + + We recommend that support for a privacy authentication algorithm be + required. The specific algorithm should be determined by the time the + IPv6 documents are offered as Proposed Standards. + + Clearly, a key management infrastructure will be required in order to + enable the use of the authentication and encryption headers. + However, defining such an infrastructure is outside the scope of the + IPv6 effort. We do note that there are on-going IETF activities in + this area. The IPv6 transition working groups must coordinate with + these activities. + + Just as clearly, the use of authentication and encryption may add to + the cost and impact the performance of systems but the more secure + infrastructure is worth the penalty. Whatever penalty there is + should also decrease in time with improved software and hardware + assistance. + + The use of firewalls is increasing on the Internet. We hope that the + presence of the authentication and privacy features in IPv6 will + reduce the need for firewalls, but we do understand that they will + continue to be used for the foreseeable future. In this light, we + feel that clear guidance should be given to the developers of + firewalls on the best ways to design and configure them when working + in an IPv6 environment. + + We recommend that an "IPv6 framework for firewalls" be developed. + This framework should explore the ways in which the Authentication + Header can be used to strengthen firewall technology and detail how + the IPv6 packet should be analyzed by a firewall. + + Some aspects of security require additional study. For example, it + has been pointed out [Vecchi94] that, even in non-military + situations, there are places where procedures to thwart traffic + analysis will be required. This could be done by the use of + encrypted encapsulation, but this and other similar requirements must + be addressed on an on-going basis by the Security Area of the IETF. + The design of IPv6 must be flexible enough to support the later + addition of such security features. + + We believe that IPv6 with its inherent security features will provide + the foundation upon which the Internet can continue to expand its + functionality and user base. + + + + + + + + + +Bradner & Mankin [Page 42] + +RFC 1752 Recommendation for IPng January 1995 + + +23. Authors' Addresses + + Scott Bradner + Harvard University + 10 Ware St. + Cambridge, MA 02138 + + Phone: +1 617 495 3864 + EMail: sob@harvard.edu + + + Allison Mankin + USC/Information Sciences Institute + 4350 North Fairfax Drive, Suite 400 + Arlington, VA 22303 + + Phone: +1 703-807-0132 + EMail: mankin@isi.edu + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Bradner & Mankin [Page 43] + +RFC 1752 Recommendation for IPng January 1995 + + +Appendix A - Summary of Recommendations + + 5.3 Address Assignment Policy Recommendations + changes in address assignment policies are not recommended + reclamation of underutilized assigned addresses is not currently + recommended + efforts to renumber significant portions of the Internet are not + currently recommended + recommend consideration of assigning CIDR-type address blocks out + of unassigned Class A addressees + 11. IPng Recommendation + recommend that "Simple Internet Protocol Plus (SIPP) Spec. (128 + bit ver)" [Deering94b] be adopted as the basis for IPng + recommend that the documents listed in Appendix C be the basis of + IPng + 13. IPng Working Group + recommend that an IPng Working Group be formed, chaired by Steve + Deering and Ross Callon + recommend that Robert Hinden be the document editor for the IPng + effort + 14. IPng Reviewer + recommend that an IPng Reviewer be appointed and that Dave Clark + be that reviewer + 15. Address Autoconfiguration + recommend that an Address Autoconfiguration Working Group be + formed, chaired by Dave Katz and Sue Thomson + 16.1 Transition - Short Term + recommend that an IPng Transition Working Group be formed, chaired + by Bob Gilligan and TBA + 16.2 Transition - Long Term + recommend that the Transition and Coexistence Including Testing + Working Group be chartered + 17. Other Address Families + recommend that recommendations about the use of non-IPv6 addresses + in IPv6 environments and IPv6 addresses in non-IPv6 + environments be developed + 18. Impact on Other IETF Standards + recommend the IESG commission a review of all standards track RFCs + recommend the IESG charge current IETF working groups with the + task of understanding the impact of IPng on their proposals + and, where appropriate, revise the documents to include support + for IPng + recommend the IESG charter new working groups where required to + revise other standards RFCs + 20. APIs + recommend that Informational RFCs be developed or solicited for a + few of the common APIs + + + + +Bradner & Mankin [Page 44] + +RFC 1752 Recommendation for IPng January 1995 + + + 21. Future of the IPng Area and Working Groups + recommend that the IPng Area and Area Directorate continue until + main documents are offered as Proposed Standards in late 1994 + 22. Security Considerations + recommend that support for the Authentication Header be required + recommend that support for a specific authentication algorithm be + required + recommend that support for the Privacy Header be required + recommend that support for a specific privacy algorithm be + required + recommend that an "IPng framework for firewalls" be developed + +Appendix B - IPng Area Directorate + + J. Allard - Microsoft <jallard@microsoft.com> + Steve Bellovin - AT&T <smb@research.att.com> + Jim Bound - Digital <bound@zk3.dec.com> + Ross Callon - Wellfleet <rcallon@wellfleet.com> + Brian Carpenter - CERN <brian.carpenter@cern.ch> + Dave Clark - MIT <ddc@lcs.mit.edu > + John Curran - NEARNET <curran@nic.near.net> + Steve Deering - Xerox <deering@parc.xerox.com> + Dino Farinacci - Cisco <dino@cisco.com> + Paul Francis - NTT <francis@slab.ntt.jp> + Eric Fleischmann - Boeing <ericf@atc.boeing.com> + Mark Knopper - Ameritech <mak@aads.com> + Greg Minshall - Novell <minshall@wc.novell.com> + Rob Ullmann - Lotus <ariel@world.std.com> + Lixia Zhang - Xerox <lixia@parc.xerox.com> + + Daniel Karrenberg of RIPE joined the Directorate when it was formed + but had to withdraw due to the demands of his day job. + + Since the Toronto IETF meeting Paul Francis has resigned from the + Directorate to pursue other interests. Robert Hinden of Sun + Microsystems and Yakov Rekhter of IBM joined. + + + + + + + + + + + + + + + +Bradner & Mankin [Page 45] + +RFC 1752 Recommendation for IPng January 1995 + + +Appendix C - Documents Referred to the IPng Working Groups + + [Deering94b] Deering, S., "Simple Internet Protocol Plus (SIPP) Spec. + (128 bit ver)", Work in Progress. + + [Francis94] Francis, P., "SIPP Addressing Architecture", Work in + Progress. + + [Rekhter94] Rekhter, Y., and T. Li, "An Architecture for IPv6 Unicast + Address Allocation", Work in Progress. + + [Gillig94a] Gilligan, R., "Simple SIPP Transition (SST) Overview", + Work in Progress. + + [Gillig94b] Gilligan, R., Govindan, R., Thomson, S., and J. Bound, + "SIPP Program Interfaces for BSD Systems", Work in Progress. + + [Atkins94a] Atkinson, R., "SIPP Security Architecture", Work in + Progress. + + [Atkins94b] Atkinson, R., "SIPP Authentication Header", Work in + Progress. + + [Ford94b] Ford, P., Li, T., and Y. Rekhter, "SDRP Routing Header for + SIPP-16", Work in Progress. + + [Hinden94c] Hinden, R., "IP Next Generation Overview", Work in + Progress. + +Appendix D - IPng Proposal Overviews + + [Ford94a] Ford, P., and M. Knopper, "TUBA as IPng: A White Paper", + Work in Progress. + + [Hinden94a] Hinden, R., "Simple Internet Protocol Plus White Paper", + RFC 1710, Sun Microsystems, October 1994. + + [McGovern94] McGovern, M., and R. Ullmann, "CATNIP: Common + Architecture for the Internet", RFC 1707, Sunspot Graphics, Lotus + Development Corp., October 1994. + + + + + + + + + + + +Bradner & Mankin [Page 46] + +RFC 1752 Recommendation for IPng January 1995 + + +Appendix E - RFC 1550 White Papers + + [Adam94] Adamson, B., "Tactical Radio Frequency Communication + Requirements for IPng", RFC 1677, NRL, August 1994. + + [Bello94a] Bellovin, S., "On Many Addresses per Host", RFC 1681, AT&T + Bell Laboratories, August 1994. + + [Bello94b] Bellovin, S., "Security Concerns for IPng", RFC 1675, AT&T + Bell Laboratories, August 1994. + + [Bound94] Bound, J., "IPng BSD Host Implementation Analysis", RFC + 1682, Digital Equipment Corporation, August 1994. + + [Brazd94] Brazdziunas, C., "IPng Support for ATM Services", RFC 1680, + Bellcore, August 1994. + + [Britt94] Britton, E., and J. Tavs, "IPng Requirements of Large + Corporate Networks", RFC 1678, IBM, August 1994. + + [Brownl94] Brownlee, J., "Accounting Requirements for IPng", RFC + 1672, University of Auckland, August 1994. + + [Carpen94a] Carpenter, B., "IPng White Paper on Transition and Other + Considerations", RFC 1671, CERN, August 1994. + + [Chiappa94] Chiappa, N., "IPng Technical Requirements Of the Nimrod + Routing and Addressing Architecture", RFC 1753, December 1994. + + [Clark94] Clark, R., Ammar, M., and K. Calvert, "Multiprotocol + Interoperability In IPng", RFC 1683, Georgia Institute of + Technology, August 1994. + + [Curran94] Curran, J., "Market Viability as a IPng Criteria", RFC + 1669, BBN, August 1994. + + [Estrin94a] Estrin, D., Li, T., and Y. Rekhter, "Unified Routing + Requirements for IPng", RFC 1668, USC, cisco Systems, IBM, August + 1994. + + [Fleisch94] Fleischman, E., "A Large Corporate User's View of IPng", + RFC 1687, Boeing Computer Services, August 1994. + + [Green94] Green, D., Irey, P., Marlow, D., and K. O'Donoghue, "HPN + Working Group Input to the IPng Requirements Solicitation", RFC + 1679, NSWC-DD, August 1994. + + + + + +Bradner & Mankin [Page 47] + +RFC 1752 Recommendation for IPng January 1995 + + + [Ghisel94] Ghiselli, A., Salomoni, D., and C. Vistoli, "INFN + Requirements for an IPng", RFC 1676, INFN/CNAF, August 1994. + + [Heager94] Heagerty, D., "Input to IPng Engineering Considerations", + RFC 1670, CERN, August 1994. + + [Simpson94] Simpson, W. "IPng Mobility Considerations", RFC 1688, + Daydreamer, August 1994. + + [Skelton94] Skelton, R., "Electric Power Research Institute Comments + on IPng", RFC 1673, EPRI, August 1994. + + [Syming94] Symington, S., Wood, D., and J. Pullen, "Modeling and + Simulation Requirements for IPng", RFC 1667, MITRE, George Mason + University, August 1994. + + [Taylor94] Taylor, M., "A Cellular Industry View of IPng", RFC 1674, + CDPD Consortium, August 1994. + + [Vecchi94] Vecchi, M., "IPng Requirements: A Cable Television + Industry Viewpoint", RFC 1686, Time Warner Cable, August 1994. + +Appendix F - Additional References + + [Almqu92] Almquist, P., "Minutes of the Selection Criteria BOF", + Washington DC IETF, November 1992, (ietf/nov92/select-minutes- + 92nov.txt). + + [Berkow94] Berkowitz, H., "IPng and Related Plug-and-Play Issues and + Requirements", Work in Progress, September 1994. + + [Bos94] Bos, E. J., "Minutes of the Address Lifetime Expectations BOF + (ALE)", Seattle IETF, March 1994, (ietf/ale/ale-minutes- + 94mar.txt). + + [Big] Archives of the big-internet mailing list, on munnari.oz.au in + big-internet/list-archives. + + [Bradner93] Bradner, S., and A. Mankin, "IP: Next Generation (IPng) + White Paper Solicitation", RFC 1550, Harvard University, NRL, + December 1993. + + [Callon87] Callon, R., "A Proposal for a Next Generation Internet + Protocol", Proposal to X3S3, December 1987. + + [Callon92a] Callon, R., "CNAT", Work in Progress. + + [Callon92b] Callon, R., "Simple CLNP", Work in Progress. + + + +Bradner & Mankin [Page 48] + +RFC 1752 Recommendation for IPng January 1995 + + + [Callon92c] Callon, R., "TCP and UDP with Bigger Addresses (TUBA), A + Simple Proposal for Internet Addressing and Routing", RFC 1347, + DEC, June 1992. + + [Carpen93] Carpenter, B. and T. Dixon, "Minutes of the IPng Decision + Process BOF (IPDECIDE)", /ietf/93jul/ipdecide-minutes-93jul.txt, + August 1993. + + [Carpen94b] Carpenter, B, and J. Bound, "Recommendations for OSI NSAP + usage in IPv6", Work in Progress. + + [Chiappa91] Chiappa, J., "A New IP Routing and Addressing + Architecture", Work in Progress. + + [Clark91] Clark, D., Chapin, L., Cerf, V., Braden, R., and R. Hobby, + "Towards the Future Internet Architecture", RFC 1287, MIT, BBN, + CNRI, ISI, UC Davis, December 1991. + + [Deering92] Deering, S., "The Simple Internet Protocol", Big-Internet + mailing list, 22 Sept. 1992. + + [Deering94a] Deering, S., and P. Francis, Message to sipp mailing + list, 31 May 1994. + + [Estrin94b] Estrin, D., Zappala, D., Li, T., Rekhter, Y., and K. + Varadhan, "Source Demand Routing: Packet Format and Forwarding + Specification (Version 1)" Work in Progress. + + [Fuller93] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Classless + Inter-Domain Routing (CIDR): an Address Assignment and Aggregation + Strategy", RFC 1519, BARRNet, cisco Systems, MERIT, OARnet, + September 1993. + + [Gillig94c] Gilligan, B., "IPng Transition (ngtrans)", Work in + Progress. + + [Gross92} Gross, P., and P. Almquist, "IESG Deliberations on Routing + and Addressing", RFC 1380, ANS, Stanford University, November + 1992. + + [Gross94] Gross, P. "A Direction for IPng", RFC 1719, MCI, December + 1994. + + [Hinden92a] Hinden, R., "New Scheme for Internet Routing and + Addressing (ENCAPS)", Work in Progress. + + [Hinden94b] Hinden, R., Deering, S., and P. Francis, "Simple Internet + Protocol Plus", Working Group Charter, April 1994. + + + +Bradner & Mankin [Page 49] + +RFC 1752 Recommendation for IPng January 1995 + + + [Hinden92b] Hinden, R., and D. Crocker, "A Proposal for IP Address + Encapsulation (IPAE): A Compatible version of IP with Large + Addresses", Work in Progress. + + [Huston94] Huston, G., and A. Bansal, draft charter for the + "Transition and Coexistence Including Testing (TACIT) Working + Group, June 1994. + + [Huitema93] Huitema, C., "IAB Recommendations for an Intermediate + Strategy to Address the Issue of Scaling", RFC 1481, INRIA, July + 1993. + + [Huitema94] Huitema, C., "The H ratio for address assignment + efficiency", RFC 1715, INRIA, October 1994. + + [IAB92] Internet Architecture Board, "IP Version 7", Work in + Progress. + + [IAB94] Braden, R., Clark, D., Crocker, S., and C. Huitema, "Report + of IAB Workshop on Security in the Internet Architecture - + February 8-10, 1994", RFC 1636, USC/Informaiton Sciences + Institute, MIT Laboratory for Computer Science, Trusted + Information Systems, Inc., INRIA, IAB Chair, June 1994. + + [Kasten92] Kastenholz, F, and C. Partridge, "IPv7 Technical + Criteria", Work in Progress. + + [Kasten94] Partridge, C., and F. Kastenholz, "Technical Criteria for + Choosing IP: The Next Generation (IPng)", RFC 1726, BBN Systems + and Technologies, FTP Software, December 1994. + + [Knopper94a] Knopper, M., and P. Ford, "TCP/UDP Over CLNP-Addressed + Networks (TUBA)", Working Group Charter, January 1994. + + [Knopper94b] Knopper, M., and D. Piscitello, "Minutes of the BigTen + IPng Retreat, May 19 & 20 1994". + + [Leiner93] Leiner, B., and Y. Rekhter, "The MultiProtocol Internet", + RFC 1560, USRA, IBM, December 1993. + + [Mankin94] Mankin, A., and S. Bradner, message to big-internet, tuba, + sipp, catnip and ietf mailing lists, 7 July 1994. + + [Mills84] Mills, D. "Exterior Gateway Protocol Formal Specification", + RFC 904, UDEL, April 1984. + + [Mogul90] Mogul, J., and S. Deering, "Path MTU Discovery", RFC 1191, + DECWRL, Stanford University, November 1990. + + + +Bradner & Mankin [Page 50] + +RFC 1752 Recommendation for IPng January 1995 + + + [Nat94] National Research Council, "Realizing the Information Future: + The Internet and Beyond", National Academy Press, 1994. + + [Piscit94] Piscitello, D., "FTP Operation Over Big Address Records + (FOOBAR)", RFC 1639, Core Competence, June 1994. + + [Provan91] Provan, D., "Transmitting IP Traffic over ARCNET + Networks", RFC 1051, Novell, February 1991. + + [Postel94] Postel, J., Editor, "Internet Official Protocol + Standards", RFC 1720, USC/Information Sciences Institute, November + 1994. + + [Solens93a] Solensky, F., and T. Li, "Charter for the Address + Lifetime Expectations Working Group", FTP Software, Cisco Systems, + November 1993. + + [Solens93b] Solensky, F., "Minutes of the Address Lifetime + Expectations BOF (ALE)", Houston IETF, November 1993, + (ietf/ale/ale-minutes-93nov.txt). + + [Solens94] Solensky, F., "Minutes of the Address Lifetime + Expectations BOF (ALE)", Toronto IETF, July 1994, (ietf/ale/ale- + minutes-94jul.txt). + + [Sukonnik94] Sukonnik, V., "Common Architecture for Next-Generation + IP (catnip), Working Group Charter, April 1994. + + [Tsuchiya92] Tsuchiya, P., "The 'P' Internet Protocol", Work in + Progress. + + [Ullmann93] Ullmann, R., "TP/IX: The Next Internet", RFC 1475, + Process Software Corporation, June 1993. + + + + + + + + + + + + + + + + + + +Bradner & Mankin [Page 51] + +RFC 1752 Recommendation for IPng January 1995 + + +Appendix G - Acknowledgments + + Reaching this stage of the recommendation would not have been even + vaguely possible without the efforts of many people. In particular, + the work of IPng Directorate (listed in Appendix B), Frank Kastenholz + and Craig Partridge (the authors of the Criteria document) along with + Jon Crowcroft (who co-chaired the ngreq BOF) was critical. The work + and cooperation of the chairs, members and document authors of the + three IPng proposal working groups, the ALE working group and the + TACIT working group laid the groundwork upon which this + recommendation sits. + + We would also like to thank the many people who took the time to + respond to RFC1550 and who provided the broad understanding of the + many requirements of data networking that any proposal for an IPng + must address. + + The members of the IESG, the IAB, and the always active participants + in the various mailing lists provided us with many insights into the + issues we faced. + + Many other individuals gave us sometimes spirited but always useful + counsel during this process. They include (in no particular order) + Radia Perlman, Noel Chiappa, Peter Ford, Dave Crocker, Tony Li, Dave + Piscitello, Vint Cerf and Dan Lynch. + + Thanks to David Williams and Cheryl Chapman who took on the + occasionally impossible task of ensuring that what is written here + resembles English to some degree. + + To all of the many people mentioned above and those we have skipped + in our forgetfulness, thank you for making this task doable. + + + + + + + + + + + + + + + + + + + +Bradner & Mankin [Page 52] + |