summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2101.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc2101.txt')
-rw-r--r--doc/rfc/rfc2101.txt731
1 files changed, 731 insertions, 0 deletions
diff --git a/doc/rfc/rfc2101.txt b/doc/rfc/rfc2101.txt
new file mode 100644
index 0000000..56c88e4
--- /dev/null
+++ b/doc/rfc/rfc2101.txt
@@ -0,0 +1,731 @@
+
+
+
+
+
+
+Network Working Group B. Carpenter
+Request for Comments: 2101 J. Crowcroft
+Category: Informational Y. Rekhter
+ IAB
+ February 1997
+
+
+ IPv4 Address Behaviour Today
+
+Status of this Memo
+
+ This memo provides information for the Internet community. This memo
+ does not specify an Internet standard of any kind. Distribution of
+ this memo is unlimited.
+
+Abstract
+
+ The main purpose of this note is to clarify the current
+ interpretation of the 32-bit IP version 4 address space, whose
+ significance has changed substantially since it was originally
+ defined. A short section on IPv6 addresses mentions the main points
+ of similarity with, and difference from, IPv4.
+
+Table of Contents
+
+ 1. Introduction.................................................1
+ 2. Terminology..................................................2
+ 3. Ideal properties.............................................3
+ 4. Overview of the current situation of IPv4 addresses..........4
+ 4.1. Addresses are no longer globally unique locators.........4
+ 4.2. Addresses are no longer all temporally unique............6
+ 4.3. Multicast and Anycast....................................7
+ 4.4. Summary..................................................8
+ 5. IPv6 Considerations..........................................8
+ ANNEX: Current Practices for IPv4 Address Allocation & Routing..9
+ Security Considerations........................................10
+ Acknowledgements...............................................11
+ References.....................................................11
+ Authors' Addresses.............................................13
+
+1. Introduction
+
+ The main purpose of this note is to clarify the current
+ interpretation of the 32-bit IP version 4 address space, whose
+ significance has changed substantially since it was originally
+ defined in 1981 [RFC 791].
+
+
+
+
+
+Carpenter, et. al. Informational [Page 1]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ This clarification is intended to assist protocol designers, product
+ implementors, Internet service providers, and user sites. It aims to
+ avoid misunderstandings about IP addresses that can result from the
+ substantial changes that have taken place in the last few years, as a
+ result of the Internet's exponential growth.
+
+ A short section on IPv6 addresses mentions the main points of
+ similarity with, and difference from, IPv4.
+
+2. Terminology
+
+ It is well understood that in computer networks, the concepts of
+ directories, names, network addresses, and routes are separate and
+ must be analysed separately [RFC 1498]. However, it is also
+ necessary to sub-divide the concept of "network address" (abbreviated
+ to "address" from here on) into at least two notions, namely
+ "identifier" and "locator". This was perhaps less well understood
+ when RFC 791 was written.
+
+ In this document, the term "host" refers to any system originating
+ and/or terminating IPv4 packets, and "router" refers to any system
+ forwarding IPv4 packets from one host or router to another.
+
+ For the purposes of this document, an "identifier" is a bit string
+ which is used throughout the lifetime of a communication session
+ between two hosts, to identify one of the hosts as far as the other
+ is concerned. Such an identifier is used to verify the source of
+ incoming packets as being truly the other end of the communication
+ concerned, e.g. in the TCP pseudo-header [RFC 793] or in an IP
+ Security association [RFC 1825]. Traditionally, the source IPv4
+ address in every packet is used for this.
+
+ Note that other definitions of "identifier" are sometimes used; this
+ document does not claim to discuss the general issue of the semantics
+ of end-point identifiers.
+
+ For the purposes of this document, a "locator" is a bit string which
+ is used to identify where a particular packet must be delivered, i.e.
+ it serves to locate the place in the Internet topology where the
+ destination host is attached. Traditionally, the destination IPv4
+ address in every packet is used for this. IP routing protocols
+ interpret IPv4 addresses as locators and construct routing tables
+ based on which routers (which have their own locators) claim to know
+ a route towards the locators of particular hosts.
+
+ Both identifiers and locators have requirements of uniqueness, but
+ these requirements are different. Identifiers must be unique with
+ respect to each set of inter-communicating hosts. Locators must be
+
+
+
+Carpenter, et. al. Informational [Page 2]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ unique with respect to each set of inter-communicating routers (which
+ we will call a routing "realm"). While locators must be unique within
+ a given routing realm, this uniqueness (but not routability) could
+ extend to more than one realm. Thus we can further distinguish
+ between a set of realms with unique locators versus a set of realms
+ with non-unique (overlapping) locators.
+
+ Both identifiers and locators have requirements of lifetime, but
+ these requirements are different. Identifiers must be valid for at
+ least the maximum lifetime of a communication between two hosts.
+ Locators must be valid only as long as the routing mechanisms so
+ require (which could be shorter or longer than the lifetime of a
+ communication).
+
+ It will be noted that it is a contingent fact of history that the
+ same address space and the same fields in the IP header (source and
+ destination addresses) are used by RFC 791 and RFC 793 for both
+ identifiers and locators, and that in the traditional Internet a
+ host's identifier is identical to its locator, as well as being
+ spatially unique (unambiguous) and temporally unique (constant).
+
+ These uniqueness conditions had a number of consequences for design
+ assumptions of routing (the infrastructure that IPv4 locators enable)
+ and transport protocols (that which depends on the IP connectivity).
+ Spatial uniqueness of an address meant that it served as both an
+ interface identifier and a host identifier, as well as the key to the
+ routing table. Temporal uniqueness of an address meant that there
+ was no need for TCP implementations to maintain state regarding
+ identity of the far end, other than the IP address. Thus IP addresses
+ could be used both for end-to-end IP security and for binding upper
+ layer sessions.
+
+ Generally speaking, the use of IPv4 addresses as locators has been
+ considered more important than their use as identifiers, and whenever
+ there has been a conflict between the two uses, the use as a locator
+ has prevailed. That is, it has been considered more useful to deliver
+ the packet, then worry about how to identify the end points, than to
+ provide identity in a packet that cannot be delivered. In other
+ words, there has been intensive work on routing protocols and little
+ concrete work on other aspects of address usage.
+
+3. Ideal properties.
+
+ Whatever the constraints mentioned above, it is easy to see the ideal
+ properties of identifiers and locators. Identifiers should be
+ assigned at birth, never change, and never be re-used. Locators
+ should describe the host's position in the network's topology, and
+ should change whenever the topology changes.
+
+
+
+Carpenter, et. al. Informational [Page 3]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ Unfortunately neither of the these ideals are met by IPv4 addresses.
+ The remainder of this document is intended as a snapshot of the
+ current real situation.
+
+4. Overview of the current situation of IPv4 addresses.
+
+ It is a fact that IPv4 addresses are no longer all globally unique
+ and no longer all have indefinite lifetimes.
+
+ 4.1 Addresses are no longer globally unique locators
+
+ [RFC 1918] shows how corporate networks, a.k.a. Intranets, may if
+ necessary legitimately re-use a subset of the IPv4 address space,
+ forming multiple routing realms. At the boundary between two (or
+ more) routing realms, we may find a spectrum of devices that
+ enables communication between the realms.
+
+ At one end of the spectrum is a pure Application Layer Gateway
+ (ALG). Such a device acts as a termination point for the
+ application layer data stream, and is visible to an end-user. For
+ example, when an end-user Ua in routing realm A wants to
+ communicate with an end-user Ub in routing realm B, Ua has first
+ to explicitly establish communication with the ALG that
+ interconnects A and B, and only via that can Ua establish
+ communication with Ub. We term such a gateway a "non-transparent"
+ ALG.
+
+ Another form of ALG makes communication through the ALG
+ transparent to an end user. Using the previous example, with a
+ "transparent" ALG, Ua would not be required to establish explicit
+ connectivity to the ALG first, before starting to communicate with
+ Ub. Such connectivity will be established transparently to Ua, so
+ that Ua would only see connectivity to Ub.
+
+ For completeness, note that it is not necessarily the case that
+ communicating via an ALG involves changes to the network header.
+ An ALG could be used only at the beginning of a session for the
+ purpose of authentication, after which the ALG goes away and
+ communication continues natively.
+
+ Both non-transparent and transparent ALGs are required (by
+ definition) to understand the syntax and semantics of the
+ application data stream. ALGs are very simple from the viewpoint
+ of network layer architecture, since they appear as Internet hosts
+ in each realm, i.e. they act as origination and termination points
+ for communication.
+
+
+
+
+
+Carpenter, et. al. Informational [Page 4]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ At the other end of the spectrum is a Network Address Translator
+ (NAT) [RFC 1631]. In the context of this document we define a NAT
+ as a device that just modifies the network and the transport layer
+ headers, but does not understand the syntax/semantics of the
+ application layer data stream (using our terminology what is
+ described in RFC1631 is a device that has both the NAT and ALG
+ functionality).
+
+ In the standard case of a NAT placed between a corporate network
+ using private addresses [RFC 1918] and the public Internet, that
+ NAT changes the source IPv4 address in packets going towards the
+ Internet, and changes the destination IPv4 address in packets
+ coming from the Internet. When a NAT is used to interconnect
+ routing realms with overlapping addresses, such as a direct
+ connection between two intranets, the NAT may modify both
+ addresses in the IP header. Since the NAT modifies address(es) in
+ the IP header, the NAT also has to modify the transport (e.g.,
+ TCP, UDP) pseudo-header checksum. Upon some introspection one
+ could observe that when interconnecting routing realms with
+ overlapping addresses, the set of operations on the network and
+ transport header performed by a NAT forms a (proper) subset of the
+ set of operations on the network and transport layer performed by
+ a transparent ALG.
+
+ By definition a NAT does not understand syntax and semantics of an
+ application data stream. Therefore, a NAT cannot support
+ applications that carry IP addresses at the application layer
+ (e.g., FTP with PORT or PASV command [RFC 959]). On the other
+ hand, a NAT can support any application, as long as such an
+ application does not carry IP addresses at the application layer.
+ This is in contrast with an ALG that can support only the
+ applications coded into the ALG.
+
+ One can conclude that both NATs and ALGs have their own
+ limitations, which could constrain their usefulness. Combining NAT
+ and ALG functionality in a single device could be used to overcome
+ some, but not all, of these limitations. Such a device would use
+ the NAT functionality for the applications that do not carry IP
+ addresses, and would resort to the ALG functionality when dealing
+ with the applications that carry IP addresses. For example, such a
+ device would use the NAT functionality to deal with the FTP data
+ connection, but would use the ALG functionality to deal with the
+ FTP control connection. However, such a device will fail
+ completely handling an application that carries IP addresses, when
+ the device does not support the application via the ALG
+ functionality, but rather handles it via the NAT functionality.
+
+
+
+
+
+Carpenter, et. al. Informational [Page 5]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ Communicating through either ALGs or NATs involves changes to the
+ network header (and specifically source and destination
+ addresses), and to the transport header. Since IP Security
+ authentication headers assume that the addresses in the network
+ header are preserved end-to-end, it is not clear how one could
+ support IP Security-based authentication between a pair of hosts
+ communicating through either an ALG or a NAT. Since IP Security,
+ when used for confidentiality, encrypts the entire transport layer
+ end-to-end, it is not clear how an ALG or NAT could modify
+ encrypted packets as they require to. In other words, both ALGs
+ and NATs are likely to force a boundary between two distinct IP
+ Security domains, both for authentication and for confidentiality,
+ unless specific enhancements to IP Security are designed for this
+ purpose.
+
+ Interconnecting routing realms via either ALGs or NATs relies on
+ the DNS [RFC 1035]. Specifically, for a given set of
+ (interconnected) routing realms, even if network layer addresses
+ are no longer unique across the set, fully qualified domain names
+ would need to be unique across the set. However, a site that is
+ running a NAT or ALG probably needs to run two DNS servers, one
+ inside and one outside the NAT or ALG, giving different answers to
+ identical queries. This is discussed further in [kre]. DNS
+ security [RFC 2065] and some dynamic DNS updates [dns2] will
+ presumably not be valid across a NAT/ALG boundary, so we must
+ assume that the external DNS server acquires at least part of its
+ tables by some other mechanism.
+
+ To summarize, since RFC 1918, we have not really changed the
+ spatial uniqueness of an address, so much as recognized that there
+ are multiple spaces. i.e. each space is still a routing realm
+ such as an intranet, possibly connected to other intranets, or the
+ Internet, by NATs or ALGs (see above discussion). The temporal
+ uniqueness of an address is unchanged by RFC 1918.
+
+ 4.2. Addresses are no longer all temporally unique
+
+ Note that as soon as address significance changes anywhere in the
+ address space, it has in some sense changed everywhere. This has
+ in fact already happened.
+
+ IPv4 address blocks were for many years assigned chronologically,
+ i.e. effectively at random with respect to network topology.
+ This led to constantly growing routing tables; this does not
+ scale. Today, hierarchical routing (CIDR [RFC 1518], [RFC 1519])
+ is used as a mechanism to improve scaling of routing within a
+ routing realm, and especially within the Internet (The Annex goes
+ into more details on CIDR).
+
+
+
+Carpenter, et. al. Informational [Page 6]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ Scaling capabilities of CIDR are based on the assumption that
+ address allocation reflects network topology as much as possible,
+ and boundaries for aggregation of addressing information are not
+ required to be fully contained within a single organization - they
+ may span multiple organizations (e.g., provider with its
+ subscribers). Thus if a subscriber changes its provider, then to
+ avoid injecting additional overhead in the Internet routing
+ system, the subscriber may need to renumber.
+
+ Changing providers is just one possible reason for renumbering.
+ The informational document [RFC 1900] shows why renumbering is an
+ increasingly frequent event. Both DHCP [RFC 1541] and PPP [RFC
+ 1661] promote the use of dynamic address allocation.
+
+ To summarize, since the development and deployment of DHCP and
+ PPP, and since it is expected that renumbering is likely to become
+ a common event, IP address significance has indeed been changed.
+ Spatial uniqueness should be the same, so addresses are still
+ effective locators. Temporal uniqueness is no longer assured. It
+ may be quite short, possibly shorter than a TCP connection time.
+ In such cases an IP address is no longer a good identifier. This
+ has some impact on end-to-end security, and breaks TCP in its
+ current form.
+
+ 4.3. Multicast and Anycast
+
+ Since we deployed multicast [RFC 1112], we must separate the
+ debate over meaning of IP addresses into meaning of source and
+ destination addresses. A destination multicast address (i.e. a
+ locator for a topologically spread group of hosts) can traverse a
+ NAT, and is not necessarily restricted to an intranet (or to the
+ public Internet). Its lifetime can be short too.
+
+ The concept of an anycast address is of an address that
+ semantically locates any of a group of systems performing
+ equivalent functions. There is no way such an address can be
+ anything but a locator; it can never serve as an identifier as
+ defined in this document, since it does not uniquely identify
+ host. In this case, the effective temporal uniqueness, or useful
+ lifetime, of an IP address can be less than the time taken to
+ establish a TCP connection.
+
+ Here we have used TCP simply to illustrate the idea of an
+ association - many UDP based applications (or other systems
+ layered on IP) allocate state after receiving or sending a first
+ packet, based on the source and/or destination. All are affected
+ by absence of temporal uniqueness whereas only the routing
+ infrastructure is affected by spatial uniqueness changes.
+
+
+
+Carpenter, et. al. Informational [Page 7]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ 4.4. Summary
+
+ Due to dynamic address allocation and increasingly frequent
+ network renumbering, temporal uniqueness of IPv4 addresses is no
+ longer globally guaranteed, which puts their use as identifiers
+ into severe question. Due to the proliferation of Intranets,
+ spatial uniqueness is also no longer guaranteed across routing
+ realms; interconnecting routing realms could be accomplished via
+ either ALGs or NATs. In principle such interconnection will have
+ less functionality than if those Intranets were directly
+ connected. In practice the difference in functionality may or may
+ not matter, depending on individual circumstances.
+
+5. IPv6 Considerations
+
+ As far as temporal uniqueness (identifier-like behaviour) is
+ concerned, the IPv6 model [RFC 1884] is very similar to the current
+ state of the IPv4 model, only more so. IPv6 will provide mechanisms
+ to autoconfigure IPv6 addresses on IPv6 hosts. Prefix changes,
+ requiring the global IPv6 addresses of all hosts under a given prefix
+ to change, are to be expected. Thus, IPv6 will amplify the existing
+ problem of finding stable identifiers to be used for end-to-end
+ security and for session bindings such as TCP state.
+
+ The IAB feels that this is unfortunate, and that the transition to
+ IPv6 would be an ideal occasion to provide upper layer end-to-end
+ protocols with temporally unique identifiers. The exact nature of
+ these identifiers requires further study.
+
+ As far as spatial uniqueness (locator-like behaviour) is concerned,
+ the IPv6 address space is so big that a shortage of addresses,
+ requiring an RFC 1918-like approach and address translation, is
+ hardly conceivable. Although there is no shortage of IPv6 addresses,
+ there is also a well-defined mechanism for obtaining link-local and
+ site-local addresses in IPv6 [RFC 1884, section 2.4.8]. These
+ properties of IPv6 do not prevent separate routing realms for IPv6,
+ if so desired (resulting in multiple security domains as well).
+ While at the present moment we cannot identify a case in which
+ multiple IPv6 routing realms would be required, it is also hard to
+ give a definitive answer to whether there will be only one, or more
+ than one IPv6 routing realms. If one hypothesises that there will be
+ more than one IPv6 routing realm, then such realms could be
+ interconnected together via ALGs and NATs. Considerations for such
+ ALGs and NATs appear to be identical to those for IPv4.
+
+
+
+
+
+
+
+Carpenter, et. al. Informational [Page 8]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ANNEX: Current Practices for IPv4 Address Allocation & Routing
+
+ Initially IP address structure and IP routing were designed around
+ the notion of network number classes (Class A/B/C networks) [RFC
+ 790]. In the earlier 90s growth of the Internet demanded significant
+ improvements in both the scalability of the Internet routing system,
+ as well as in the IP address space utilization. Classful structure
+ of IP address space and associated with it classful routing turned
+ out to be inadequate to meet the demands, so during 1992 - 1993
+ period the Internet adopted Classless Inter-Domain Routing (CIDR)
+ [RFC 1380], [RFC 1518], [RFC 1519]. CIDR encompasses a new address
+ allocation architecture, new routing protocols, and a new structure
+ of IP addresses.
+
+ CIDR improves scalability of the Internet routing system by extending
+ the notion of hierarchical routing beyond the level of individual
+ subnets and networks, to allow routing information aggregation not
+ only at the level of individual subnets and networks, but at the
+ level of individual sites, as well as at the level of Internet
+ Service Providers. Thus an organization (site) could act as an
+ aggregator for all the destinations within the organization.
+ Likewise, a provider could act as an aggregator for all the
+ destinations within its subscribers (organizations directly connected
+ to the provider).
+
+ Extending the notion of hierarchical routing to the level of
+ individual sites and providers, and allowing sites and providers to
+ act as aggregators of routing information, required changes both to
+ the address allocation procedures, and to the routing protocols.
+ While in pre-CIDR days address allocation to sites was done without
+ taking into consideration the need to aggregate the addressing
+ information above the level of an individual network numbers, CIDR-
+ based allocation recommends that address allocation be done in such
+ a way as to enable sites and providers to act as aggregators of
+ addressing information - such allocation is called "aggregator
+ based". To benefit from the "aggregator based" address allocation,
+ CIDR introduces an inter-domain routing protocol (BGP-4) [RFC 1771,
+ RFC 1772] that provides capabilities for routing information
+ aggregation at the level of individual sites and providers.
+
+ CIDR improves address space utilization by eliminating the notion of
+ network classes, and replacing it with the notion of contiguous
+ variable size (power of 2) address blocks. This allows a better match
+ between the amount of address space requested and the amount of
+ address space allocated [RFC 1466]. It also facilitates "aggregator
+ based" address allocation. Eliminating the notion of network classes
+ requires new capabilities in the routing protocols (both intra and
+ inter-domain), and IP forwarding. Specifically, the CIDR-capable
+
+
+
+Carpenter, et. al. Informational [Page 9]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ protocols are required to handle reachability (addressing)
+ information expressed in terms of variable length address prefixes,
+ and forwarding is required to implement the "longest match"
+ algorithm. CIDR implications on routing protocols are described in
+ [RFC 1817].
+
+ The scaling capabilities of CIDR are based on the assumption that
+ address allocation reflects network topology as much as possible,
+ especially at the level of sites, and their interconnection with
+ providers, to enable sites and providers to act as aggregators. If a
+ site changes its provider, then to avoid injecting additional
+ overhead in the Internet routing system, the site may need to
+ renumber. While CIDR does not require every site that changes its
+ providers to renumber, it is important to stress that if none of the
+ sites that change their providers will renumber, the Internet routing
+ system might collapse due to the excessive amount of routing
+ information it would need to handle.
+
+ Maintaining "aggregator based" address allocation (to promote
+ scalable routing), and the need to support the ability of sites to
+ change their providers (to promote competition) demands practical
+ solutions for renumbering sites. The need to contain the overhead
+ in a rapidly growing Internet routing system is likely to make
+ renumbering more and more common [RFC 1900].
+
+ The need to scale the Internet routing system, and the use of CIDR as
+ the primary mechanism for scaling, results in the evolution of
+ address allocation and management policies for the Internet. This
+ evolution results in adding the "address lending" policy as an
+ alternative to the "address ownership" policy [RFC 2008].
+
+ IP addressing and routing have been in constant evolution since IP
+ was first specified [RFC 791]. Some of the addressing and routing
+ principles have been deprecated, some of the principles have been
+ preserved, while new principles have been introduced. Current
+ Internet routing and addresses (based on CIDR) is an evolutionary
+ step that extends the use of hierarchy to maintain a routable global
+ Internet.
+
+Security Considerations
+
+ The impact of the IP addressing model on security is discussed in
+ sections 4.1 and 5 of this document.
+
+
+
+
+
+
+
+
+Carpenter, et. al. Informational [Page 10]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+Acknowledgements
+
+ This document was developed in the IAB. Constructive comments were
+ received from Ran Atkinson, Jim Bound, Matt Crawford, Tony Li,
+ Michael A. Patton, Jeff Schiller. Earlier private communications from
+ Noel Chiappa helped to clarify the concepts of locators and
+ identifiers.
+
+References
+
+ [RFC 791] Postel, J., "Internet Protocol", STD 5, RFC 791, September
+ 1981.
+
+ [RFC 790] Postel, J., "Assigned Numbers", September 1981.
+
+ [RFC 959] Postel, J., and J. Reynolds, "File Transfer Protocol", STD
+ 9, RFC 959, October 1985.
+
+ [RFC 1035] Mockapetris, P., "Domain Names - Implementation and
+ Specification", STD 13, RFC 1035, November 1987.
+
+ [RFC 1112] Deering, S., "Host Extensions for IP Multicasting", STD 5,
+ RFC 1112, September 1989.
+
+ [RFC 1380] Gross, P., and P. Almquist, "IESG Deliberations on Routing
+ and Addressing", RFC 1380, November 1992.
+
+ [RFC 1466] Gerich, E., "Guidelines for Management of IP Address
+ Space", RFC 1466, May 1993.
+
+ [RFC 1498] Saltzer, J., "On the Naming and Binding of Network
+ Destinations", RFC 1498, August 1993 (originally published 1982).
+
+ [RFC 1518] Rekhter, Y., and T. Li, "An Architecture for IP Address
+ Allocation with CIDR", RFC 1518, September 1993.
+
+ [RFC 1519] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Classless
+ Inter-Domain Routing (CIDR): an Address Assignment and Aggregation
+ Strategy", RFC 1519, September 1993.
+
+ [RFC 1541] Droms, R., "Dynamic Host Configuration Protocol", RFC
+ 1541, October 1993.
+
+ [RFC 1661] Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51,
+ RFC 1661, July 1994.
+
+ [RFC 1771] Rekhter, Y., and T. Li, "A Border Gateway Protocol 4
+ (BGP-4)", RFC 1771, March 1995.
+
+
+
+Carpenter, et. al. Informational [Page 11]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+ [RFC 1772] Rekhter, Y., and P. Gross, "Application of the Border
+ Gateway Protocol in the Internet", RFC 1772, March 1995.
+
+ [RFC 1817] Rekhter, Y., "CIDR and Classful Routing", RFC 1817,
+ September 1995.
+
+ [RFC 1825] Atkinson, R., "Security Architecture for the Internet
+ Protocol", RFC 1825, September 1995.
+
+ [RFC 1900] Carpenter, B., and Y. Rekhter, "Renumbering Needs Work",
+ RFC 1900, February 1996.
+
+ [RFC 1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.
+ J., and E. Lear, "Address Allocation for Private Internets", RFC
+ 1918, February 1996.
+
+ [RFC 1933] Gilligan, R., and E. Nordmark, "Transition Mechanisms for
+ IPv6 Hosts and Routers", RFC 1933, April 1996.
+
+ [RFC 2008] Rekhter, Y., and T. Li, "Implications of Various Address
+ Allocation Policies for Internet Routing", RFC 2008, October 1996.
+
+ [kre] Elz, R., et. al., "Selection and Operation of Secondary DNS
+ Servers", Work in Progress.
+
+ [RFC 2065] Eastlake, E., and C. Kaufman, "Domain Name System Security
+ Extensions", RFC 2065, January 1997.
+
+ [dns2] Vixie, P., et. al., "Dynamic Updates in the Domain Name System
+ (DNS UPDATE)", Work in Progress.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Carpenter, et. al. Informational [Page 12]
+
+RFC 2101 IPv4 Address Behavior Today February 1997
+
+
+Authors' Addresses
+
+ Brian E. Carpenter
+ Computing and Networks Division
+ CERN
+ European Laboratory for Particle Physics
+ 1211 Geneva 23, Switzerland
+
+ EMail: brian@dxcoms.cern.ch
+
+ Jon Crowcroft
+ Dept. of Computer Science
+ University College London
+ London WC1E 6BT, UK
+
+ EMail: j.crowcroft@cs.ucl.ac.uk
+
+ Yakov Rekhter
+ Cisco systems
+ 170 West Tasman Drive
+ San Jose, CA, USA
+
+ Phone: +1 914 528 0090
+ Fax: +1 408 526-4952
+ EMail: yakov@cisco.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Carpenter, et. al. Informational [Page 13]
+