7 IPv6 Working Group John Loughney (ed)
11 Expires: July 14, 2004
15 IPv6 Node Requirements
16 draft-ietf-ipv6-node-requirements-08.txt
23 This document is an Internet-Draft and is in full conformance with
24 all provisions of Section 10 of RFC2026.
26 Internet-Drafts are working documents of the Internet Engineering
27 Task Force (IETF), its areas, and its working groups. Note that
28 other groups may also distribute working documents as Internet-
31 Internet-Drafts are draft documents valid for a maximum of six months
32 and may be updated, replaced, or obsoleted by other documents at any
33 time. It is inappropriate to use Internet-Drafts as reference
34 material or to cite them other than as "work in progress."
36 The list of current Internet-Drafts can be accessed at
37 http://www.ietf.org/ietf/1id-abstracts.txt.
39 The list of Internet-Draft Shadow Directories can be accessed at
40 http://www.ietf.org/shadow.html.
44 Copyright (C) The Internet Society (2003). All Rights Reserved.
48 This document defines requirements for IPv6 nodes. It is expected
49 that IPv6 will be deployed in a wide range of devices and situations.
50 Specifying the requirements for IPv6 nodes allows IPv6 to function
51 well and interoperate in a large number of situations and
58 Loughney (editor) February 16, 2004 [Page 1]
70 1.1 Requirement Language
71 1.2 Scope of this Document
72 1.3 Description of IPv6 Nodes
73 2. Abbreviations Used in This Document
75 3.1 Transmission of IPv6 Packets over Ethernet Networks - RFC2464
76 3.2 IP version 6 over PPP - RFC2472
77 3.3 IPv6 over ATM Networks - RFC2492
79 4.1 Internet Protocol Version 6 - RFC2460
80 4.2 Neighbor Discovery for IPv6 - RFC2461
81 4.3 Path MTU Discovery & Packet Size
82 4.4 ICMP for the Internet Protocol Version 6 (IPv6) - RFC2463
84 4.6 Multicast Listener Discovery (MLD) for IPv6 - RFC2710
88 5.3 Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
89 6. IPv4 Support and Transition
90 6.1 Transition Mechanisms
93 8.1 Basic Architecture
94 8.2 Security Protocols
95 8.3 Transforms and Algorithms
96 8.4 Key Management Methods
97 9. Router Functionality
99 10. Network Management
101 11. Security Considerations
105 13. Authors and Acknowledgements
118 Loughney (editor) February 16, 2004 [Page 2]
129 The goal of this document is to define the common functionality
130 required from both IPv6 hosts and routers. Many IPv6 nodes will
131 implement optional or additional features, but all IPv6 nodes can be
132 expected to implement the mandatory requirements listed in this
135 This document tries to avoid discussion of protocol details, and
136 references RFCs for this purpose. In case of any conflicting text,
137 this document takes less precedence than the normative RFCs, unless
138 additional clarifying text is included in this document.
140 Although the document points to different specifications, it should
141 be noted that in most cases, the granularity of requirements are
142 smaller than a single specification, as many specifications define
143 multiple, independent pieces, some of which may not be mandatory.
145 As it is not always possible for an implementer to know the exact
146 usage of IPv6 in a node, an overriding requirement for IPv6 nodes is
147 that they should adhere to Jon Postel's Robustness Principle:
149 Be conservative in what you do, be liberal in what you accept from
152 1.1 Requirement Language
154 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
155 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
156 document are to be interpreted as described in RFC 2119 [RFC-2119].
158 1.2 Scope of this Document
160 IPv6 covers many specifications. It is intended that IPv6 will be
161 deployed in many different situations and environments. Therefore,
162 it is important to develop the requirements for IPv6 nodes, in order
163 to ensure interoperability.
165 This document assumes that all IPv6 nodes meet the minimum
166 requirements specified here.
168 1.3 Description of IPv6 Nodes
170 From Internet Protocol, Version 6 (IPv6) Specification [RFC-2460] we
171 have the following definitions:
173 Description of an IPv6 Node
178 Loughney (editor) February 16, 2004 [Page 3]
187 - a device that implements IPv6
189 Description of an IPv6 router
191 - a node that forwards IPv6 packets not explicitly addressed to
194 Description of an IPv6 Host
196 - any node that is not a router.
198 2. Abbreviations Used in This Document
200 ATM Asynchronous Transfer Mode
202 AH Authentication Header
204 DAD Duplicate Address Detection
206 ESP Encapsulating Security Payload
208 ICMP Internet Control Message Protocol
210 IKE Internet Key Exchange
212 MIB Management Information Base
214 MLD Multicast Listener Discovery
216 MTU Maximum Transfer Unit
218 NA Neighbor Advertisement
220 NBMA Non-Broadcast Multiple Access
222 ND Neighbor Discovery
224 NS Neighbor Solicitation
226 NUD Neighbor Unreachability Detection
228 PPP Point-to-Point Protocol
230 PVC Permanent Virtual Circuit
232 SVC Switched Virtual Circuit
238 Loughney (editor) February 16, 2004 [Page 4]
247 An IPv6 node must include support for one or more IPv6 link-layer
248 specifications. Which link-layer specifications are included will
249 depend upon what link-layers are supported by the hardware available
250 on the system. It is possible for a conformant IPv6 node to support
251 IPv6 on some of its interfaces and not on others.
253 As IPv6 is run over new layer 2 technologies, it is expected that new
254 specifications will be issued. This section highlights some major
255 layer 2 technologies and is not intended to be complete.
257 3.1 Transmission of IPv6 Packets over Ethernet Networks - RFC2464
259 Nodes supporting IPv6 over Ethernet interfaces MUST implement
260 Transmission of IPv6 Packets over Ethernet Networks [RFC-2464].
262 3.2 IP version 6 over PPP - RFC2472
264 Nodes supporting IPv6 over PPP MUST implement IPv6 over PPP [RFC-
267 3.3 IPv6 over ATM Networks - RFC2492
269 Nodes supporting IPv6 over ATM Networks MUST implement IPv6 over ATM
270 Networks [RFC-2492]. Additionally, RFC 2492 states:
272 A minimally conforming IPv6/ATM driver SHALL support the PVC mode
273 of operation. An IPv6/ATM driver that supports the full SVC mode
274 SHALL also support PVC mode of operation.
278 4.1 Internet Protocol Version 6 - RFC2460
280 The Internet Protocol Version 6 is specified in [RFC-2460]. This
281 specification MUST be supported.
283 Unrecognized options in Hop-by-Hop Options or Destination Options
284 extensions MUST be processed as described in RFC 2460.
286 The node MUST follow the packet transmission rules in RFC 2460.
288 Nodes MUST always be able to send, receive and process fragment
289 headers. All conformant IPv6 implementations MUST be capable of
290 sending and receving IPv6 packets; forwarding functionality MAY be
293 RFC 2460 specifies extension headers and the processing for these
298 Loughney (editor) February 16, 2004 [Page 5]
307 A full implementation of IPv6 includes implementation of the
308 following extension headers: Hop-by-Hop Options, Routing (Type 0),
309 Fragment, Destination Options, Authentication and Encapsulating
310 Security Payload. [RFC-2460]
312 An IPv6 node MUST be able to process these headers. It should be
313 noted that there is some discussion about the use of Routing Headers
314 and possible security threats [IPv6-RH] caused by them.
316 4.2 Neighbor Discovery for IPv6 - RFC2461
318 Neighbor Discovery SHOULD be supported. RFC 2461 states:
320 "Unless specified otherwise (in a document that covers operating
321 IP over a particular link type) this document applies to all link
322 types. However, because ND uses link-layer multicast for some of
323 its services, it is possible that on some link types (e.g., NBMA
324 links) alternative protocols or mechanisms to implement those
325 services will be specified (in the appropriate document covering
326 the operation of IP over a particular link type). The services
327 described in this document that are not directly dependent on
328 multicast, such as Redirects, Next-hop determination, Neighbor
329 Unreachability Detection, etc., are expected to be provided as
330 specified in this document. The details of how one uses ND on
331 NBMA links is an area for further study."
333 Some detailed analysis of Neighbor Discovery follows:
335 Router Discovery is how hosts locate routers that reside on an
336 attached link. Router Discovery MUST be supported for
339 Prefix Discovery is how hosts discover the set of address prefixes
340 that define which destinations are on-link for an attached link.
341 Prefix discovery MUST be supported for implementations. Neighbor
342 Unreachability Detection (NUD) MUST be supported for all paths
343 between hosts and neighboring nodes. It is not required for paths
344 between routers. However, when a node receives a unicast Neighbor
345 Solicitation (NS) message (that may be a NUD's NS), the node MUST
346 respond to it (i.e. send a unicast Neighbor Advertisement).
348 Duplicate Address Detection MUST be supported on all links supporting
349 link-layer multicast (RFC2462 section 5.4 specifies DAD MUST take
350 place on all unicast addresses).
352 A host implementation MUST support sending Router Solicitations.
354 Receiving and processing Router Advertisements MUST be supported for
358 Loughney (editor) February 16, 2004 [Page 6]
367 host implementations. The ability to understand specific Router
368 Advertisement options is dependent on supporting the specification
369 where the RA is specified.
371 Sending and Receiving Neighbor Solicitation (NS) and Neighbor
372 Advertisement (NA) MUST be supported. NS and NA messages are required
373 for Duplicate Address Detection (DAD).
375 Redirect functionality SHOULD be supported. If the node is a router,
376 Redirect functionality MUST be supported.
378 4.3 Path MTU Discovery & Packet Size
380 4.3.1 Path MTU Discovery - RFC1981
382 Path MTU Discovery [RFC-1981] SHOULD be supported, though minimal
383 implementations MAY choose to not support it and avoid large packets.
384 The rules in RFC 2460 MUST be followed for packet fragmentation and
387 4.3.2 IPv6 Jumbograms - RFC2675
389 IPv6 Jumbograms [RFC-2675] MAY be supported.
391 4.4 ICMP for the Internet Protocol Version 6 (IPv6) - RFC2463
393 ICMPv6 [RFC-2463] MUST be supported.
397 4.5.1 IP Version 6 Addressing Architecture - RFC3513
399 The IPv6 Addressing Architecture [RFC-3513] MUST be supported.
401 4.5.2 IPv6 Stateless Address Autoconfiguration - RFC2462
403 IPv6 Stateless Address Autoconfiguration is defined in [RFC-2462].
404 This specification MUST be supported for nodes that are hosts.
406 Nodes that are routers MUST be able to generate link local addresses
407 as described in RFC 2462 [RFC-2462].
411 The autoconfiguration process specified in this document applies
412 only to hosts and not routers. Since host autoconfiguration uses
413 information advertised by routers, routers will need to be
414 configured by some other means. However, it is expected that
418 Loughney (editor) February 16, 2004 [Page 7]
427 routers will generate link-local addresses using the mechanism
428 described in this document. In addition, routers are expected to
429 successfully pass the Duplicate Address Detection procedure
430 described in this document on all addresses prior to assigning
431 them to an interface.
433 Duplicate Address Detection (DAD) MUST be supported.
435 4.5.3 Privacy Extensions for Address Configuration in IPv6 - RFC3041
437 Privacy Extensions for Stateless Address Autoconfiguration [RFC-3041]
438 SHOULD be supported. It is recommended that this behavior be
439 configurable on a connection basis within each application when
440 available. It is noted that a number of applications do not work
441 with addresses generated with this method, while other applications
442 work quite well with them.
444 4.5.4 Default Address Selection for IPv6 - RFC3484
446 The rules specified in the Default Address Selection for IPv6 [RFC-
447 3484] document MUST be implemented. It is expected that IPv6 nodes
448 will need to deal with multiple addresses.
450 4.5.5 Stateful Address Autoconfiguration
452 Stateful Address Autoconfiguration MAY be supported. DHCPv6 [RFC-
453 3315] is the standard stateful address configuration protocol; see
454 section 5.3 for DHCPv6 support.
456 Nodes which do not support Stateful Address Autoconfiguration may be
457 unable to obtain any IPv6 addresses aside from link-local addresses
458 when it receives a router advertisement with the 'M' flag (Managed
459 address configuration) set and which contains no prefixes advertised
460 for Stateless Address Autoconfiguration (see section 4.5.2).
461 Additionally, such nodes will be unable to obtain other configuration
462 information such as the addresses of DNS servers when it is connected
463 to a link over which the node receives a router advertisement in
464 which the 'O' flag ("Other stateful configuration") is set.
466 4.6 Multicast Listener Discovery (MLD) for IPv6 - RFC2710
468 Nodes that need to join multicast groups SHOULD implement MLDv2
469 [MLDv2]. However, if the node has applications, which only need
470 support for Any- Source Multicast [RFC3569], the node MAY implement
471 MLDv1 [MLDv1] instead. If the node has applications, which need
472 support for Source- Specific Multicast [RFC3569, SSMARCH], the node
473 MUST support MLDv2 [MLDv2].
478 Loughney (editor) February 16, 2004 [Page 8]
487 When MLD is used, the rules in "Source Address Selection for the
488 Multicast Listener Discovery (MLD) Protocol" [RFC-3590] MUST be
491 5. Transport Layer and DNS
495 5.1.1 TCP and UDP over IPv6 Jumbograms - RFC2147
497 This specification MUST be supported if jumbograms are implemented
502 DNS, as described in [RFC-1034], [RFC-1035], [RFC-3152], [RFC-3363]
503 and [RFC-3596] MAY be supported. Not all nodes will need to resolve
504 names. All nodes that need to resolve names SHOULD implement stub-
505 resolver [RFC-1034] functionality, in RFC 1034 section 5.3.1 with
508 - AAAA type Resource Records [RFC-3596];
509 - reverse addressing in ip6.arpa using PTR records [RFC-3152];
510 - EDNS0 [RFC-2671] to allow for DNS packet sizes larger than 512
513 Those nodes are RECOMMENDED to support DNS security extentions
514 [DNSSEC- INTRO], [DNSSEC-REC] and [DNSSEC-PROT].
516 Those nodes are NOT RECOMMENDED to support the experimental A6 and
517 DNAME Resource Records [RFC-3363].
519 5.2.2 Format for Literal IPv6 Addresses in URL's - RFC2732
521 RFC 2732 MUST be supported if applications on the node use URL's.
523 5.3 Dynamic Host Configuration Protocol for IPv6 (DHCPv6) - RFC3315
525 5.3.1 Managed Address Configuration
527 Those IPv6 Nodes that use DHCP for address assignment initiate DHCP
528 to obtain IPv6 addresses and other configuration information upon
529 receipt of a Router Advertisement with the 'M' flag set, as described
530 in section 5.5.3 of RFC 2462. In addition, in the absence of a
531 router, those IPv6 Nodes that use DHCP for address assignment MUST
532 initiate DHCP to obtain IPv6 addresses and other configuration
533 information, as described in section 5.5.2 of RFC 2462. Those IPv6
534 nodes that do not use DHCP for address assignment can ignore the 'M'
538 Loughney (editor) February 16, 2004 [Page 9]
547 flag in Router Advertisements.
549 5.3.2 Other Configuration Information
551 Those IPv6 Nodes that use DHCP to obtain other configuration
552 information initiate DHCP for other configuration information upon
553 receipt of a Router Advertisement with the 'O' flag set, as described
554 in section 5.5.3 of RFC 2462. Those IPv6 nodes that do not use DHCP
555 for other configuration information can ignore the 'O' flag in Router
558 An IPv6 Node can use the subset of DHCP described in [DHCPv6-SL] to
559 obtain other configuration information.
561 6. IPv4 Support and Transition
563 IPv6 nodes MAY support IPv4.
565 6.1 Transition Mechanisms
567 6.1.1 Transition Mechanisms for IPv6 Hosts and Routers - RFC2893
569 If an IPv6 node implements dual stack and tunneling, then RFC2893
572 RFC 2893 is currently being updated.
576 The Mobile IPv6 [MIPv6] specification defines requirements for the
577 following types of nodes:
580 - correspondent nodes with support for route optimization
584 Hosts MAY support mobile node functionality described in Section 8.5
585 of [MIPv6], including support of generic packet tunneling [RFC-2473]
586 and secure home agent communications [MIPv6-HASEC].
588 Hosts SHOULD support route optimization requirements for
589 correspondent nodes described in Section 8.2 of [MIPv6].
591 Routers SHOULD support the generic mobility-related requirements for
592 all IPv6 routers described in Section 8.3 of [MIPv6]. Routers MAY
593 support the home agent functionality described in Section 8.4 of
594 [MIPv6], including support of [RFC-2473] and [MIPv6-HASEC].
598 Loughney (editor) February 16, 2004 [Page 10]
609 This section describes the specification of IPsec for the IPv6 node.
611 8.1 Basic Architecture
613 Security Architecture for the Internet Protocol [RFC-2401] MUST be
614 supported. RFC-2401 is being updated by the IPsec Working Group.
616 8.2 Security Protocols
618 ESP [RFC-2406] MUST be supported. AH [RFC-2402] MUST be supported.
619 RFC- 2406 and RFC 2402 are being updated by the IPsec Working Group.
622 8.3 Transforms and Algorithms
624 Current IPsec RFCs specify the support of certain transforms and
625 algorithms, NULL encryption, DES-CBC, HMAC-SHA-1-96, and HMAC-MD5-96.
626 The requirements for these are discussed first, and then additional
627 algorithms 3DES-CBC, AES-128-CBC and HMAC-SHA-256-96 are discussed.
629 NULL encryption algorithm [RFC-2410] MUST be supported for providing
630 integrity service and also for debugging use.
632 The "ESP DES-CBC Cipher Algorithm With Explicit IV" [RFC-2405] SHOULD
633 NOT be supported. Security issues related to the use of DES are
634 discussed in [DESDIFF], [DESINT], [DESCRACK]. It is still listed as
635 required by the existing IPsec RFCs, but as it is currently viewed as
636 an inherently weak algorithm, and no longer fulfills its intended
639 The NULL authentication algorithm [RFC-2406] MUST be supported within
640 ESP. The use of HMAC-SHA-1-96 within AH and ESP, described in [RFC-
641 2404] MUST be supported. The use of HMAC-MD5-96 within AH and ESP,
642 described in [RFC-2403] MUST be supported. An implementer MUST refer
643 to Keyed- Hashing for Message Authentication [RFC-2104].
645 3DES-CBC does not suffer from the issues related to DES-CBC. 3DES-CBC
646 and ESP CBC-Mode Cipher Algorithms [RFC-2451] MAY be supported. AES-
647 CBC Cipher Algorithm [RFC-3602] MUST be supported, as it is expected
648 to be a widely available, secure algorithm that is required for
649 interoperability. It is not required by the current IPsec RFCs, but
650 is expected to become required in the future.
652 In addition to the above requirements, "Cryptographic Algorithm
653 Implementation Requirements For ESP And AH" [CRYPTREQ] contains the
654 current set of mandatory to implement algorithms for ESP and AH as
658 Loughney (editor) February 16, 2004 [Page 11]
667 well as specifying algorithms that should be implemented because they
668 may be promoted to mandatory at some future time. It is RECOMMENDED
669 that IPv6 nodes conform to the requirements in this document.
671 8.4 Key Management Methods
673 Manual keying MUST be supported.
675 IKE [RFC-2407] [RFC-2408] [RFC-2409] MAY be supported for unicast
676 traffic. Where key refresh, anti-replay features of AH and ESP, or
677 on- demand creation of Security Associations (SAs) is required,
678 automated keying MUST be supported. Note that the IPsec WG is working
679 on the successor to IKE [IKE2]. Key management methods for multicast
680 traffic are also being worked on by the MSEC WG.
682 "Cryptographic Algorithms for use in the Internet Key Exchange
683 Version 2" [IKEv2ALGO] defines the current set of mandatory to
684 implement algorithms for use of IKEv2 as well as specifying
685 algorithms that should be implemented because they made be promoted
686 to mandatory at some future time. It is RECOMMENDED that IPv6 nodes
687 implementing IKEv2 conform to the requirements in this
690 9. Router-Specific Functionality
692 This section defines general host considerations for IPv6 nodes that
693 act as routers. Currently, this section does not discuss routing-
694 specific requirements.
698 9.1.1 IPv6 Router Alert Option - RFC2711
701 The IPv6 Router Alert Option [RFC-2711] is an optional IPv6 Hop-by-
702 Hop Header that is used in conjunction with some protocols (e.g.,
703 RSVP [RFC- 2205], or MLD [RFC-2710]). The Router Alert option will
704 need to be implemented whenever protocols that mandate its usage are
705 implemented. See Section 4.6.
707 9.1.2 Neighbor Discovery for IPv6 - RFC2461
709 Sending Router Advertisements and processing Router Solicitation MUST
712 10. Network Management
714 Network Management MAY be supported by IPv6 nodes. However, for IPv6
718 Loughney (editor) February 16, 2004 [Page 12]
727 nodes that are embedded devices, network management may be the only
728 possibility to control these nodes.
730 10.1 Management Information Base Modules (MIBs)
732 The following two MIBs SHOULD be supported by nodes that support an
735 10.1.1 IP Forwarding Table MIB
737 IP Forwarding Table MIB [RFC-2096BIS] SHOULD be supported by nodes
738 that support an SNMP agent.
740 10.1.2 Management Information Base for the Internet Protocol (IP)
742 IP MIB [RFC-2011BIS] SHOULD be supported by nodes that support an
745 11. Security Considerations
747 This draft does not affect the security of the Internet, but
748 implementations of IPv6 are expected to support a minimum set of
749 security features to ensure security on the Internet. "IP Security
750 Document Roadmap" [RFC-2411] is important for everyone to read.
752 The security considerations in RFC2460 describe the following:
754 The security features of IPv6 are described in the Security
755 Architecture for the Internet Protocol [RFC-2401].
761 [CRYPTREQ] D. Eastlake 3rd, "Cryptographic Algorithm Implementa-
762 tion Requirements For ESP And AH", draft-ietf-ipsec-
763 esp-ah-algorithms-01.txt, January 2004.
765 [IKEv2ALGO] J. Schiller, "Cryptographic Algorithms for use in the
766 Internet Key Exchange Version 2", draft-ietf-ipsec-
767 ikev2-algorithms-04.txt, Work in Progress.
769 [DHCPv6-SL] R. Droms, "A Guide to Implementing Stateless DHCPv6
770 Service", draft- ietf-dhc-dhcpv6-stateless-00.txt,
773 [MIPv6] J. Arkko, D. Johnson and C. Perkins, "Mobility Support
774 in IPv6", draft- ietf-mobileip-ipv6-24.txt, Work in
778 Loughney (editor) February 16, 2004 [Page 13]
789 [MIPv6-HASEC] J. Arkko, V. Devarapalli and F. Dupont, "Using IPsec
790 to Protect Mobile IPv6 Signaling between Mobile Nodes
791 and Home Agents", draft-ietf- mobileip-mipv6-ha-
792 ipsec-06.txt, Work in Progress.
794 [MLDv2] Vida, R. et al., "Multicast Listener Discovery Version
795 2 (MLDv2) for IPv6", draft-vida-mld-v2-07.txt, Work in
798 [RFC-1035] Mockapetris, P., "Domain names - implementation and
799 specification", STD 13, RFC 1035, November 1987.
801 [RFC-1981] McCann, J., Mogul, J. and Deering, S., "Path MTU
802 Discovery for IP version 6", RFC 1981, August 1996.
804 [RFC-2096BIS] Haberman, B. and Wasserman, M., "IP Forwarding Table
805 MIB", draft-ietf- ipv6-rfc2096-update-07.txt, Work in
808 [RFC-2011BIS] Routhier, S (ed), "Management Information Base for the
809 Internet Protocol (IP)", draft-ietf-ipv6-rfc2011-
810 update-07.txt, Work in progress.
812 [RFC-2104] Krawczyk, K., Bellare, M., and Canetti, R., "HMAC:
813 Keyed-Hashing for Message Authentication", RFC 2104,
816 [RFC-2119] Bradner, S., "Key words for use in RFCs to Indicate
817 Requirement Levels", BCP 14, RFC 2119, March 1997.
819 [RFC-2401] Kent, S. and Atkinson, R., "Security Architecture for
820 the Internet Protocol", RFC 2401, November 1998.
822 [RFC-2402] Kent, S. and Atkinson, R., "IP Authentication
823 Header", RFC 2402, November 1998.
825 [RFC-2403] Madson, C., and Glenn, R., "The Use of HMAC-MD5 within
826 ESP and AH", RFC 2403, November 1998.
828 [RFC-2404] Madson, C., and Glenn, R., "The Use of HMAC-SHA-1
829 within ESP and AH", RFC 2404, November 1998.
831 [RFC-2405] Madson, C. and Doraswamy, N., "The ESP DES-CBC Cipher
832 Algorithm With Explicit IV", RFC 2405, November 1998.
834 [RFC-2406] Kent, S. and Atkinson, R., "IP Encapsulating Security
838 Loughney (editor) February 16, 2004 [Page 14]
847 Protocol (ESP)", RFC 2406, November 1998.
849 [RFC-2407] Piper, D., "The Internet IP Security Domain of
850 Interpretation for ISAKMP", RFC 2407, November 1998.
852 [RFC-2408] Maughan, D., Schertler, M., Schneider, M., and Turner,
853 J., "Internet Security Association and Key Management
854 Protocol (ISAKMP)", RFC 2408, November 1998.
856 [RFC-2409] Harkins, D., and Carrel, D., "The Internet Key
857 Exchange (IKE)", RFC 2409, November 1998.
859 [RFC-2410] Glenn, R. and Kent, S., "The NULL Encryption Algorithm
860 and Its Use With IPsec", RFC 2410, November 1998.
862 [RFC-2451] Pereira, R. and Adams, R., "The ESP CBC-Mode Cipher
863 Algorithms", RFC 2451, November 1998.
865 [RFC-2460] Deering, S. and Hinden, R., "Internet Protocol, Ver-
866 sion 6 (IPv6) Specification", RFC 2460, December 1998.
868 [RFC-2461] Narten, T., Nordmark, E. and Simpson, W., "Neighbor
869 Discovery for IP Version 6 (IPv6)", RFC 2461, December
872 [RFC-2462] Thomson, S. and Narten, T., "IPv6 Stateless Address
873 Autoconfiguration", RFC 2462.
875 [RFC-2463] Conta, A. and Deering, S., "ICMP for the Internet Pro-
876 tocol Version 6 (IPv6)", RFC 2463, December 1998.
878 [RFC-2472] Haskin, D. and Allen, E., "IP version 6 over PPP", RFC
881 [RFC-2473] Conta, A. and Deering, S., "Generic Packet Tunneling
882 in IPv6 Specification", RFC 2473, December 1998. Xxx
885 [RFC-2671] Vixie, P., "Extension Mechanisms for DNS (EDNS0)", RFC
888 [RFC-2710] Deering, S., Fenner, W. and Haberman, B., "Multicast
889 Listener Discovery (MLD) for IPv6", RFC 2710, October
892 [RFC-2711] Partridge, C. and Jackson, A., "IPv6 Router Alert
893 Option", RFC 2711, October 1999.
898 Loughney (editor) February 16, 2004 [Page 15]
907 [RFC-3041] Narten, T. and Draves, R., "Privacy Extensions for
908 Stateless Address Autoconfiguration in IPv6", RFC
911 [RFC-3152] Bush, R., "Delegation of IP6.ARPA", RFC 3152, August
914 [RFC-3315] Bound, J. et al., "Dynamic Host Configuration Protocol
915 for IPv6 (DHCPv6)", RFC 3315, July 2003.
917 [RFC-3363] Bush, R., et al., "Representing Internet Protocol ver-
918 sion 6 (IPv6) Addresses in the Domain Name System
919 (DNS)", RFC 3363, August 2002.
921 [RFC-3484] Draves, R., "Default Address Selection for IPv6", RFC
924 [RFC-3513] Hinden, R. and Deering, S. "IP Version 6 Addressing
925 Architecture", RFC 3513, April 2003.
927 [RFC-3590] Haberman, B., "Source Address Selection for the Multi-
928 cast Listener Discovery (MLD) Protocol", RFC 3590,
931 [RFC-3596] Thomson, S., et al., "DNS Extensions to support IP
932 version 6", RFC 3596, October 2003.
934 [RFC-3602] S. Frankel, "The AES-CBC Cipher Algorithm and Its Use
935 with IPsec", RFC 3602, September 2003.
939 [ANYCAST] Hagino, J and Ettikan K., "An Analysis of IPv6 Anycast",
940 draft-ietf- ipngwg-ipv6-anycast-analysis-02.txt, Work in
943 [DESDIFF] Biham, E., Shamir, A., "Differential Cryptanalysis of
944 DES-like cryptosystems", Journal of Cryptology Vol 4, Jan
947 [DESCRACK] Cracking DES, O'Reilly & Associates, Sebastapol, CA 2000.
949 [DESINT] Bellovin, S., "An Issue With DES-CBC When Used Without
950 Strong Integrity", Proceedings of the 32nd IETF, Danvers,
953 [DHCPv6-SL] Droms, R., "A Guide to Implementing Stateless DHCPv6 Ser-
954 vice", draft- ietf-dhc-dhcpv6-stateless-02.txt, Work in
958 Loughney (editor) February 16, 2004 [Page 16]
969 [DNSSEC-INTRO] Arends, R., Austein, R., Larson, M., Massey, D. and Rose,
970 S., "DNS Security Introduction and Requirements" draft-
971 ietf-dnsext-dnssec-intro- 06.txt, Work in Progress.
973 [DNSSEC-REC] Arends, R., Austein, R., Larson, M., Massey, D. and Rose,
974 S., "Resource Records for the DNS Security Extensions",
975 draft-ietf-dnsext-dnssec- records-04.txt, Work in Pro-
978 [DNSSEC-PROT] Arends, R., Austein, R., Larson, M., Massey, D. and Rose,
979 S., "Protocol Modifications for the DNS Security Exten-
980 sions", draft-ietf-dnsext- dnssec-protocol-02.txt, Work
983 [IKE2] Kaufman, C. (ed), "Internet Key Exchange (IKEv2) Proto-
984 col", draft-ietf- ipsec-ikev2-10.txt, Work in Progress.
986 [IPv6-RH] P. Savola, "Security of IPv6 Routing Header and Home
987 Address Options", draft-savola-ipv6-rh-ha-security-
988 03.txt, Work in Progress, March 2002.
990 [MC-THREAT] Ballardie A. and Crowcroft, J.; Multicast-Specific Secu-
991 rity Threats and Counter-Measures; In Proceedings "Sympo-
992 sium on Network and Distributed System Security", Febru-
995 [RFC-793] Postel, J., "Transmission Control Protocol", RFC 793,
998 [RFC-1034] Mockapetris, P., "Domain names - concepts and facili-
999 ties", RFC 1034, November 1987.
1001 [RFC-2147] Borman, D., "TCP and UDP over IPv6 Jumbograms", RFC 2147,
1004 [RFC-2205] Braden, B. (ed.), Zhang, L., Berson, S., Herzog, S. and
1005 S. Jamin, "Resource ReSerVation Protocol (RSVP)", RFC
1006 2205, September 1997.
1008 [RFC-2464] Crawford, M., "Transmission of IPv6 Packets over Ethernet
1009 Networks", RFC 2462, December 1998.
1011 [RFC-2492] G. Armitage, M. Jork, P. Schulter, G. Harter, IPv6 over
1012 ATM Networks", RFC 2492, January 1999.
1014 [RFC-2675] Borman, D., Deering, S. and Hinden, B., "IPv6
1018 Loughney (editor) February 16, 2004 [Page 17]
1027 Jumbograms", RFC 2675, August 1999.
1029 [RFC-2732] R. Hinden, B. Carpenter, L. Masinter, "Format for Literal
1030 IPv6 Addresses in URL's", RFC 2732, December 1999.
1032 [RFC-2851] M. Daniele, B. Haberman, S. Routhier, J. Schoenwaelder,
1033 "Textual Conventions for Internet Network Addresses", RFC
1036 [RFC-2893] Gilligan, R. and Nordmark, E., "Transition Mechanisms for
1037 IPv6 Hosts and Routers", RFC 2893, August 2000.
1039 [RFC-3569] S. Bhattacharyya, Ed., "An Overview of Source-Specific
1040 Multicast (SSM)", RFC 3569, July 2003.
1042 [SSM-ARCH] H. Holbrook, B. Cain, "Source-Specific Multicast for IP",
1043 draft-ietf- ssm-arch-03.txt, Work in Progress.
1045 13. Authors and Acknowledgements
1047 This document was written by the IPv6 Node Requirements design team:
1050 [jari.arkko@ericsson.com]
1053 [marc.blanchet@viagenie.qc.ca]
1056 [samita.chakrabarti@eng.sun.com]
1059 [alain.durand@sun.com]
1062 [gerard.gastaud@alcatel.fr]
1064 Jun-ichiro itojun Hagino
1068 [inoue@isl.rdc.toshiba.co.jp]
1071 [masahiro@isl.rdc.toshiba.co.jp]
1074 [john.loughney@nokia.com]
1078 Loughney (editor) February 16, 2004 [Page 18]
1088 [raraghun@cisco.com]
1091 [shouichi.sakane@jp.yokogawa.com]
1094 [dthaler@windows.microsoft.com]
1097 [juha.wiljakka@Nokia.com]
1099 The authors would like to thank Ran Atkinson, Jim Bound, Brian Car-
1100 penter, Ralph Droms, Christian Huitema, Adam Machalek, Thomas Narten,
1101 Juha Ollila and Pekka Savola for their comments.
1103 14. Editor's Contact Information
1105 Comments or questions regarding this document should be sent to the
1106 IPv6 Working Group mailing list (ipv6@ietf.org) or to:
1109 Nokia Research Center
1114 Phone: +358 50 483 6242
1115 Email: John.Loughney@Nokia.com
1119 The IETF takes no position regarding the validity or scope of any
1120 intellectual property or other rights that might be claimed to per-
1121 tain to the implementation or use of the technology described in this
1122 document or the extent to which any license under such rights might
1123 or might not be available; neither does it represent that it has made
1124 any effort to identify any such rights. Information on the IETF's
1125 procedures with respect to rights in standards-track and standards-
1126 related documentation can be found in BCP-11. Copies of claims of
1127 rights made available for publication and any assurances of licenses
1128 to be made available, or the result of an attempt made to obtain a
1129 general license or permission for the use of such proprietary rights
1130 by implementors or users of this specification can be obtained from
1131 the IETF Secretariat.
1133 The IETF invites any interested party to bring to its attention any
1134 copyrights, patents or patent applications, or other proprietary
1138 Loughney (editor) February 16, 2004 [Page 19]
1147 rights, which may cover technology that may be required to practice
1148 this standard. Please address the information to the IETF Executive
1198 Loughney (editor) February 16, 2004 [Page 20]