7 Network Working Group R. Hinden
8 Request for Comments: 4193 Nokia
9 Category: Standards Track B. Haberman
14 Unique Local IPv6 Unicast Addresses
18 This document specifies an Internet standards track protocol for the
19 Internet community, and requests discussion and suggestions for
20 improvements. Please refer to the current edition of the "Internet
21 Official Protocol Standards" (STD 1) for the standardization state
22 and status of this protocol. Distribution of this memo is unlimited.
26 Copyright (C) The Internet Society (2005).
30 This document defines an IPv6 unicast address format that is globally
31 unique and is intended for local communications, usually inside of a
32 site. These addresses are not expected to be routable on the global
37 1. Introduction ....................................................2
38 2. Acknowledgements ................................................3
39 3. Local IPv6 Unicast Addresses ....................................3
40 3.1. Format .....................................................3
41 3.1.1. Background ..........................................4
42 3.2. Global ID ..................................................4
43 3.2.1. Locally Assigned Global IDs .........................5
44 3.2.2. Sample Code for Pseudo-Random Global ID Algorithm ...5
45 3.2.3. Analysis of the Uniqueness of Global IDs ............6
46 3.3. Scope Definition ...........................................6
47 4. Operational Guidelines ..........................................7
48 4.1. Routing ....................................................7
49 4.2. Renumbering and Site Merging ...............................7
50 4.3. Site Border Router and Firewall Packet Filtering ...........8
51 4.4. DNS Issues .................................................8
52 4.5. Application and Higher Level Protocol Issues ...............9
53 4.6. Use of Local IPv6 Addresses for Local Communication ........9
54 4.7. Use of Local IPv6 Addresses with VPNs .....................10
58 Hinden & Haberman Standards Track [Page 1]
60 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
63 5. Global Routing Considerations ..................................11
64 5.1. From the Standpoint of the Internet .......................11
65 5.2. From the Standpoint of a Site .............................11
66 6. Advantages and Disadvantages ...................................12
67 6.1. Advantages ................................................12
68 6.2. Disadvantages .............................................13
69 7. Security Considerations ........................................13
70 8. IANA Considerations ............................................13
71 9. References .....................................................13
72 9.1. Normative References ......................................13
73 9.2. Informative References ....................................14
77 This document defines an IPv6 unicast address format that is globally
78 unique and is intended for local communications [IPV6]. These
79 addresses are called Unique Local IPv6 Unicast Addresses and are
80 abbreviated in this document as Local IPv6 addresses. They are not
81 expected to be routable on the global Internet. They are routable
82 inside of a more limited area such as a site. They may also be
83 routed between a limited set of sites.
85 Local IPv6 unicast addresses have the following characteristics:
87 - Globally unique prefix (with high probability of uniqueness).
89 - Well-known prefix to allow for easy filtering at site
92 - Allow sites to be combined or privately interconnected without
93 creating any address conflicts or requiring renumbering of
94 interfaces that use these prefixes.
96 - Internet Service Provider independent and can be used for
97 communications inside of a site without having any permanent or
98 intermittent Internet connectivity.
100 - If accidentally leaked outside of a site via routing or DNS,
101 there is no conflict with any other addresses.
103 - In practice, applications may treat these addresses like global
106 This document defines the format of Local IPv6 addresses, how to
107 allocate them, and usage considerations including routing, site
108 border routers, DNS, application support, VPN usage, and guidelines
109 for how to use for local communication inside a site.
114 Hinden & Haberman Standards Track [Page 2]
116 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
119 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
120 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
121 document are to be interpreted as described in [RFC2119].
125 The underlying idea of creating Local IPv6 addresses described in
126 this document has been proposed a number of times by a variety of
127 people. The authors of this document do not claim exclusive credit.
128 Credit goes to Brian Carpenter, Christian Huitema, Aidan Williams,
129 Andrew White, Charlie Perkins, and many others. The authors would
130 also like to thank Brian Carpenter, Charlie Perkins, Harald
131 Alvestrand, Keith Moore, Margaret Wasserman, Shannon Behrens, Alan
132 Beard, Hans Kruse, Geoff Huston, Pekka Savola, Christian Huitema, Tim
133 Chown, Steve Bellovin, Alex Zinin, Tony Hain, Bill Fenner, Sam
134 Hartman, and Elwyn Davies for their comments and suggestions on this
137 3. Local IPv6 Unicast Addresses
141 The Local IPv6 addresses are created using a pseudo-randomly
142 allocated global ID. They have the following format:
144 | 7 bits |1| 40 bits | 16 bits | 64 bits |
145 +--------+-+------------+-----------+----------------------------+
146 | Prefix |L| Global ID | Subnet ID | Interface ID |
147 +--------+-+------------+-----------+----------------------------+
151 Prefix FC00::/7 prefix to identify Local IPv6 unicast
154 L Set to 1 if the prefix is locally assigned.
155 Set to 0 may be defined in the future. See
156 Section 3.2 for additional information.
158 Global ID 40-bit global identifier used to create a
159 globally unique prefix. See Section 3.2 for
160 additional information.
162 Subnet ID 16-bit Subnet ID is an identifier of a subnet
165 Interface ID 64-bit Interface ID as defined in [ADDARCH].
170 Hinden & Haberman Standards Track [Page 3]
172 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
177 There were a range of choices available when choosing the size of the
178 prefix and Global ID field length. There is a direct tradeoff
179 between having a Global ID field large enough to support foreseeable
180 future growth and not using too much of the IPv6 address space
181 needlessly. A reasonable way of evaluating a specific field length
182 is to compare it to a projected 2050 world population of 9.3 billion
183 [POPUL] and the number of resulting /48 prefixes per person. A range
184 of prefix choices is shown in the following table:
186 Prefix Global ID Number of Prefixes % of IPv6
187 Length /48 Prefixes per Person Address Space
189 /11 37 137,438,953,472 15 0.049%
190 /10 38 274,877,906,944 30 0.098%
191 /9 39 549,755,813,888 59 0.195%
192 /8 40 1,099,511,627,776 118 0.391%
193 /7 41 2,199,023,255,552 236 0.781%
194 /6 42 4,398,046,511,104 473 1.563%
196 A very high utilization ratio of these allocations can be assumed
197 because the Global ID field does not require internal structure, and
198 there is no reason to be able to aggregate the prefixes.
200 The authors believe that a /7 prefix resulting in a 41-bit Global ID
201 space (including the L bit) is a good choice. It provides for a
202 large number of assignments (i.e., 2.2 trillion) and at the same time
203 uses less than .8% of the total IPv6 address space. It is unlikely
204 that this space will be exhausted. If more than this were to be
205 needed, then additional IPv6 address space could be allocated for
210 The allocation of Global IDs is pseudo-random [RANDOM]. They MUST
211 NOT be assigned sequentially or with well-known numbers. This is to
212 ensure that there is not any relationship between allocations and to
213 help clarify that these prefixes are not intended to be routed
214 globally. Specifically, these prefixes are not designed to
217 This document defines a specific local method to allocate Global IDs,
218 indicated by setting the L bit to 1. Another method, indicated by
219 clearing the L bit, may be defined later. Apart from the allocation
220 method, all Local IPv6 addresses behave and are treated identically.
226 Hinden & Haberman Standards Track [Page 4]
228 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
231 The local assignments are self-generated and do not need any central
232 coordination or assignment, but have an extremely high probability of
235 3.2.1. Locally Assigned Global IDs
237 Locally assigned Global IDs MUST be generated with a pseudo-random
238 algorithm consistent with [RANDOM]. Section 3.2.2 describes a
239 suggested algorithm. It is important that all sites generating
240 Global IDs use a functionally similar algorithm to ensure there is a
241 high probability of uniqueness.
243 The use of a pseudo-random algorithm to generate Global IDs in the
244 locally assigned prefix gives an assurance that any network numbered
245 using such a prefix is highly unlikely to have that address space
246 clash with any other network that has another locally assigned prefix
247 allocated to it. This is a particularly useful property when
248 considering a number of scenarios including networks that merge,
249 overlapping VPN address space, or hosts mobile between such networks.
251 3.2.2. Sample Code for Pseudo-Random Global ID Algorithm
253 The algorithm described below is intended to be used for locally
254 assigned Global IDs. In each case the resulting global ID will be
255 used in the appropriate prefix as defined in Section 3.2.
257 1) Obtain the current time of day in 64-bit NTP format [NTP].
259 2) Obtain an EUI-64 identifier from the system running this
260 algorithm. If an EUI-64 does not exist, one can be created from
261 a 48-bit MAC address as specified in [ADDARCH]. If an EUI-64
262 cannot be obtained or created, a suitably unique identifier,
263 local to the node, should be used (e.g., system serial number).
265 3) Concatenate the time of day with the system-specific identifier
266 in order to create a key.
268 4) Compute an SHA-1 digest on the key as specified in [FIPS, SHA1];
269 the resulting value is 160 bits.
271 5) Use the least significant 40 bits as the Global ID.
273 6) Concatenate FC00::/7, the L bit set to 1, and the 40-bit Global
274 ID to create a Local IPv6 address prefix.
276 This algorithm will result in a Global ID that is reasonably unique
277 and can be used to create a locally assigned Local IPv6 address
282 Hinden & Haberman Standards Track [Page 5]
284 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
287 3.2.3. Analysis of the Uniqueness of Global IDs
289 The selection of a pseudo random Global ID is similar to the
290 selection of an SSRC identifier in RTP/RTCP defined in Section 8.1 of
291 [RTP]. This analysis is adapted from that document.
293 Since Global IDs are chosen randomly (and independently), it is
294 possible that separate networks have chosen the same Global ID. For
295 any given network, with one or more random Global IDs, that has
296 inter-connections to other such networks, having a total of N such
297 IDs, the probability that two or more of these IDs will collide can
298 be approximated using the formula:
300 P = 1 - exp(-N**2 / 2**(L+1))
302 where P is the probability of collision, N is the number of
303 interconnected Global IDs, and L is the length of the Global ID.
305 The following table shows the probability of a collision for a range
306 of connections using a 40-bit Global ID field.
308 Connections Probability of Collision
316 Based on this analysis, the uniqueness of locally generated Global
317 IDs is adequate for sites planning a small to moderate amount of
318 inter-site communication using locally generated Global IDs.
320 3.3. Scope Definition
322 By default, the scope of these addresses is global. That is, they
323 are not limited by ambiguity like the site-local addresses defined in
324 [ADDARCH]. Rather, these prefixes are globally unique, and as such,
325 their applicability is greater than site-local addresses. Their
326 limitation is in the routability of the prefixes, which is limited to
327 a site and any explicit routing agreements with other sites to
328 propagate them (also see Section 4.1). Also, unlike site-locals, a
329 site may have more than one of these prefixes and use them at the
338 Hinden & Haberman Standards Track [Page 6]
340 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
343 4. Operational Guidelines
345 The guidelines in this section do not require any change to the
346 normal routing and forwarding functionality in an IPv6 host or
347 router. These are configuration and operational usage guidelines.
351 Local IPv6 addresses are designed to be routed inside of a site in
352 the same manner as other types of unicast addresses. They can be
353 carried in any IPv6 routing protocol without any change.
355 It is expected that they would share the same Subnet IDs with
356 provider-based global unicast addresses, if they were being used
357 concurrently [GLOBAL].
359 The default behavior of exterior routing protocol sessions between
360 administrative routing regions must be to ignore receipt of and not
361 advertise prefixes in the FC00::/7 block. A network operator may
362 specifically configure prefixes longer than FC00::/7 for inter-site
365 If BGP is being used at the site border with an ISP, the default BGP
366 configuration must filter out any Local IPv6 address prefixes, both
367 incoming and outgoing. It must be set both to keep any Local IPv6
368 address prefixes from being advertised outside of the site as well as
369 to keep these prefixes from being learned from another site. The
370 exception to this is if there are specific /48 or longer routes
371 created for one or more Local IPv6 prefixes.
373 For link-state IGPs, it is suggested that a site utilizing IPv6 local
374 address prefixes be contained within one IGP domain or area. By
375 containing an IPv6 local address prefix to a single link-state area
376 or domain, the distribution of prefixes can be controlled.
378 4.2. Renumbering and Site Merging
380 The use of Local IPv6 addresses in a site results in making
381 communication that uses these addresses independent of renumbering a
382 site's provider-based global addresses.
384 When merging multiple sites, the addresses created with these
385 prefixes are unlikely to need to be renumbered because all of the
386 addresses have a high probability of being unique. Routes for each
387 specific prefix would have to be configured to allow routing to work
388 correctly between the formerly separate sites.
394 Hinden & Haberman Standards Track [Page 7]
396 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
399 4.3. Site Border Router and Firewall Packet Filtering
401 While no serious harm will be done if packets with these addresses
402 are sent outside of a site via a default route, it is recommended
403 that routers be configured by default to keep any packets with Local
404 IPv6 addresses from leaking outside of the site and to keep any site
405 prefixes from being advertised outside of their site.
407 Site border routers and firewalls should be configured to not forward
408 any packets with Local IPv6 source or destination addresses outside
409 of the site, unless they have been explicitly configured with routing
410 information about specific /48 or longer Local IPv6 prefixes. This
411 will ensure that packets with Local IPv6 destination addresses will
412 not be forwarded outside of the site via a default route. The
413 default behavior of these devices should be to install a "reject"
414 route for these prefixes. Site border routers should respond with
415 the appropriate ICMPv6 Destination Unreachable message to inform the
416 source that the packet was not forwarded. [ICMPV6]. This feedback is
417 important to avoid transport protocol timeouts.
419 Routers that maintain peering arrangements between Autonomous Systems
420 throughout the Internet should obey the recommendations for site
421 border routers, unless configured otherwise.
425 At the present time, AAAA and PTR records for locally assigned local
426 IPv6 addresses are not recommended to be installed in the global DNS.
428 For background on this recommendation, one of the concerns about
429 adding AAAA and PTR records to the global DNS for locally assigned
430 Local IPv6 addresses stems from the lack of complete assurance that
431 the prefixes are unique. There is a small possibility that the same
432 locally assigned IPv6 Local addresses will be used by two different
433 organizations both claiming to be authoritative with different
434 contents. In this scenario, it is likely there will be a connection
435 attempt to the closest host with the corresponding locally assigned
436 IPv6 Local address. This may result in connection timeouts,
437 connection failures indicated by ICMP Destination Unreachable
438 messages, or successful connections to the wrong host. Due to this
439 concern, adding AAAA records for these addresses to the global DNS is
440 thought to be unwise.
442 Reverse (address-to-name) queries for locally assigned IPv6 Local
443 addresses MUST NOT be sent to name servers for the global DNS, due to
444 the load that such queries would create for the authoritative name
445 servers for the ip6.arpa zone. This form of query load is not
446 specific to locally assigned Local IPv6 addresses; any current form
450 Hinden & Haberman Standards Track [Page 8]
452 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
455 of local addressing creates additional load of this kind, due to
456 reverse queries leaking out of the site. However, since allowing
457 such queries to escape from the site serves no useful purpose, there
458 is no good reason to make the existing load problems worse.
460 The recommended way to avoid sending such queries to nameservers for
461 the global DNS is for recursive name server implementations to act as
462 if they were authoritative for an empty d.f.ip6.arpa zone and return
463 RCODE 3 for any such query. Implementations that choose this
464 strategy should allow it to be overridden, but returning an RCODE 3
465 response for such queries should be the default, both because this
466 will reduce the query load problem and also because, if the site
467 administrator has not set up the reverse tree corresponding to the
468 locally assigned IPv6 Local addresses in use, returning RCODE 3 is in
469 fact the correct answer.
471 4.5. Application and Higher Level Protocol Issues
473 Application and other higher level protocols can treat Local IPv6
474 addresses in the same manner as other types of global unicast
475 addresses. No special handling is required. This type of address
476 may not be reachable, but that is no different from other types of
477 IPv6 global unicast address. Applications need to be able to handle
478 multiple addresses that may or may not be reachable at any point in
479 time. In most cases, this complexity should be hidden in APIs.
481 From a host's perspective, the difference between Local IPv6 and
482 other types of global unicast addresses shows up as different
483 reachability and could be handled by default in that way. In some
484 cases, it is better for nodes and applications to treat them
485 differently from global unicast addresses. A starting point might be
486 to give them preference over global unicast, but fall back to global
487 unicast if a particular destination is found to be unreachable. Much
488 of this behavior can be controlled by how they are allocated to nodes
489 and put into the DNS. However, it is useful if a host can have both
490 types of addresses and use them appropriately.
492 Note that the address selection mechanisms of [ADDSEL], and in
493 particular the policy override mechanism replacing default address
494 selection, are expected to be used on a site where Local IPv6
495 addresses are configured.
497 4.6. Use of Local IPv6 Addresses for Local Communication
499 Local IPv6 addresses, like global scope unicast addresses, are only
500 assigned to nodes if their use has been enabled (via IPv6 address
501 autoconfiguration [ADDAUTO], DHCPv6 [DHCP6], or manually). They are
506 Hinden & Haberman Standards Track [Page 9]
508 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
511 not created automatically in the way that IPv6 link-local addresses
512 are and will not appear or be used unless they are purposely
515 In order for hosts to autoconfigure Local IPv6 addresses, routers
516 have to be configured to advertise Local IPv6 /64 prefixes in router
517 advertisements, or a DHCPv6 server must have been configured to
518 assign them. In order for a node to learn the Local IPv6 address of
519 another node, the Local IPv6 address must have been installed in a
520 naming system (e.g., DNS, proprietary naming system, etc.) For these
521 reasons, controlling their usage in a site is straightforward.
523 To limit the use of Local IPv6 addresses the following guidelines
526 - Nodes that are to only be reachable inside of a site: The local
527 DNS should be configured to only include the Local IPv6
528 addresses of these nodes. Nodes with only Local IPv6 addresses
529 must not be installed in the global DNS.
531 - Nodes that are to be limited to only communicate with other
532 nodes in the site: These nodes should be set to only
533 autoconfigure Local IPv6 addresses via [ADDAUTO] or to only
534 receive Local IPv6 addresses via [DHCP6]. Note: For the case
535 where both global and Local IPv6 prefixes are being advertised
536 on a subnet, this will require a switch in the devices to only
537 autoconfigure Local IPv6 addresses.
539 - Nodes that are to be reachable from inside of the site and from
540 outside of the site: The DNS should be configured to include
541 the global addresses of these nodes. The local DNS may be
542 configured to also include the Local IPv6 addresses of these
545 - Nodes that can communicate with other nodes inside of the site
546 and outside of the site: These nodes should autoconfigure global
547 addresses via [ADDAUTO] or receive global address via [DHCP6].
548 They may also obtain Local IPv6 addresses via the same
551 4.7. Use of Local IPv6 Addresses with VPNs
553 Local IPv6 addresses can be used for inter-site Virtual Private
554 Networks (VPN) if appropriate routes are set up. Because the
555 addresses are unique, these VPNs will work reliably and without the
556 need for translation. They have the additional property that they
557 will continue to work if the individual sites are renumbered or
562 Hinden & Haberman Standards Track [Page 10]
564 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
567 5. Global Routing Considerations
569 Section 4.1 provides operational guidelines that forbid default
570 routing of local addresses between sites. Concerns were raised to
571 the IPv6 working group and to the IETF as a whole that sites may
572 attempt to use local addresses as globally routed provider-
573 independent addresses. This section describes why using local
574 addresses as globally-routed provider-independent addresses is
577 5.1. From the Standpoint of the Internet
579 There is a mismatch between the structure of IPv6 local addresses and
580 the normal IPv6 wide area routing model. The /48 prefix of an IPv6
581 local addresses fits nowhere in the normal hierarchy of IPv6 unicast
582 addresses. Normal IPv6 unicast addresses can be routed
583 hierarchically down to physical subnet (link) level and only have to
584 be flat-routed on the physical subnet. IPv6 local addresses would
585 have to be flat-routed even over the wide area Internet.
587 Thus, packets whose destination address is an IPv6 local address
588 could be routed over the wide area only if the corresponding /48
589 prefix were carried by the wide area routing protocol in use, such as
590 BGP. This contravenes the operational assumption that long prefixes
591 will be aggregated into many fewer short prefixes, to limit the table
592 size and convergence time of the routing protocol. If a network uses
593 both normal IPv6 addresses [ADDARCH] and IPv6 local addresses, these
594 types of addresses will certainly not aggregate with each other,
595 since they differ from the most significant bit onwards. Neither
596 will IPv6 local addresses aggregate with each other, due to their
597 random bit patterns. This means that there would be a very
598 significant operational penalty for attempting to use IPv6 local
599 address prefixes generically with currently known wide area routing
602 5.2. From the Standpoint of a Site
604 There are a number of design factors in IPv6 local addresses that
605 reduce the likelihood that IPv6 local addresses will be used as
606 arbitrary global unicast addresses. These include:
608 - The default rules to filter packets and routes make it very
609 difficult to use IPv6 local addresses for arbitrary use across
610 the Internet. For a site to use them as general purpose unicast
611 addresses, it would have to make sure that the default rules
612 were not being used by all other sites and intermediate ISPs
613 used for their current and future communication.
618 Hinden & Haberman Standards Track [Page 11]
620 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
623 - They are not mathematically guaranteed to be unique and are not
624 registered in public databases. Collisions, while highly
625 unlikely, are possible and a collision can compromise the
626 integrity of the communications. The lack of public
627 registration creates operational problems.
629 - The addresses are allocated randomly. If a site had multiple
630 prefixes that it wanted to be used globally, the cost of
631 advertising them would be very high because they could not be
634 - They have a long prefix (i.e., /48) so a single local address
635 prefix doesn't provide enough address space to be used
636 exclusively by the largest organizations.
638 6. Advantages and Disadvantages
642 This approach has the following advantages:
644 - Provides Local IPv6 prefixes that can be used independently of
645 any provider-based IPv6 unicast address allocations. This is
646 useful for sites not always connected to the Internet or sites
647 that wish to have a distinct prefix that can be used to localize
648 traffic inside of the site.
650 - Applications can treat these addresses in an identical manner as
651 any other type of global IPv6 unicast addresses.
653 - Sites can be merged without any renumbering of the Local IPv6
656 - Sites can change their provider-based IPv6 unicast address
657 without disrupting any communication that uses Local IPv6
660 - Well-known prefix that allows for easy filtering at site
663 - Can be used for inter-site VPNs.
665 - If accidently leaked outside of a site via routing or DNS, there
666 is no conflict with any other addresses.
674 Hinden & Haberman Standards Track [Page 12]
676 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
681 This approach has the following disadvantages:
683 - Not possible to route Local IPv6 prefixes on the global Internet
684 with current routing technology. Consequentially, it is
685 necessary to have the default behavior of site border routers to
686 filter these addresses.
688 - There is a very low probability of non-unique locally assigned
689 Global IDs being generated by the algorithm in Section 3.2.3.
690 This risk can be ignored for all practical purposes, but it
691 leads to a theoretical risk of clashing address prefixes.
693 7. Security Considerations
695 Local IPv6 addresses do not provide any inherent security to the
696 nodes that use them. They may be used with filters at site
697 boundaries to keep Local IPv6 traffic inside of the site, but this is
698 no more or less secure than filtering any other type of global IPv6
701 Local IPv6 addresses do allow for address-based security mechanisms,
702 including IPsec, across end to end VPN connections.
704 8. IANA Considerations
706 The IANA has assigned the FC00::/7 prefix to "Unique Local Unicast".
710 9.1. Normative References
712 [ADDARCH] Hinden, R. and S. Deering, "Internet Protocol Version 6
713 (IPv6) Addressing Architecture", RFC 3513, April 2003.
715 [FIPS] "Federal Information Processing Standards Publication",
716 (FIPS PUB) 180-1, Secure Hash Standard, 17 April 1995.
718 [GLOBAL] Hinden, R., Deering, S., and E. Nordmark, "IPv6 Global
719 Unicast Address Format", RFC 3587, August 2003.
721 [ICMPV6] Conta, A. and S. Deering, "Internet Control Message
722 Protocol (ICMPv6) for the Internet Protocol Version 6
723 (IPv6) Specification", RFC 2463, December 1998.
730 Hinden & Haberman Standards Track [Page 13]
732 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
735 [IPV6] Deering, S. and R. Hinden, "Internet Protocol, Version 6
736 (IPv6) Specification", RFC 2460, December 1998.
738 [NTP] Mills, D., "Network Time Protocol (Version 3)
739 Specification, Implementation and Analysis", RFC 1305,
742 [RANDOM] Eastlake, D., 3rd, Schiller, J., and S. Crocker,
743 "Randomness Requirements for Security", BCP 106, RFC 4086,
746 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
747 Requirement Levels", BCP 14, RFC 2119, March 1997.
749 [SHA1] Eastlake 3rd, D. and P. Jones, "US Secure Hash Algorithm 1
750 (SHA1)", RFC 3174, September 2001.
752 9.2. Informative References
754 [ADDAUTO] Thomson, S. and T. Narten, "IPv6 Stateless Address
755 Autoconfiguration", RFC 2462, December 1998.
757 [ADDSEL] Draves, R., "Default Address Selection for Internet
758 Protocol version 6 (IPv6)", RFC 3484, February 2003.
760 [DHCP6] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and
761 M. Carney, "Dynamic Host Configuration Protocol for IPv6
762 (DHCPv6)", RFC 3315, July 2003.
764 [POPUL] Population Reference Bureau, "World Population Data Sheet
765 of the Population Reference Bureau 2002", August 2002.
767 [RTP] Schulzrinne, H., Casner, S., Frederick, R., and V.
768 Jacobson, "RTP: A Transport Protocol for Real-Time
769 Applications", STD 64, RFC 3550, July 2003.
786 Hinden & Haberman Standards Track [Page 14]
788 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
796 Mountain View, CA 94043
799 Phone: +1 650 625-2004
800 EMail: bob.hinden@nokia.com
804 Johns Hopkins University
806 11100 Johns Hopkins Road
810 Phone: +1 443 778 1319
811 EMail: brian@innovationslab.net
842 Hinden & Haberman Standards Track [Page 15]
844 RFC 4193 Unique Local IPv6 Unicast Addresses October 2005
847 Full Copyright Statement
849 Copyright (C) The Internet Society (2005).
851 This document is subject to the rights, licenses and restrictions
852 contained in BCP 78, and except as set forth therein, the authors
853 retain all their rights.
855 This document and the information contained herein are provided on an
856 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
857 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
858 ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
859 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
860 INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
861 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
863 Intellectual Property
865 The IETF takes no position regarding the validity or scope of any
866 Intellectual Property Rights or other rights that might be claimed to
867 pertain to the implementation or use of the technology described in
868 this document or the extent to which any license under such rights
869 might or might not be available; nor does it represent that it has
870 made any independent effort to identify any such rights. Information
871 on the procedures with respect to rights in RFC documents can be
872 found in BCP 78 and BCP 79.
874 Copies of IPR disclosures made to the IETF Secretariat and any
875 assurances of licenses to be made available, or the result of an
876 attempt made to obtain a general license or permission for the use of
877 such proprietary rights by implementers or users of this
878 specification can be obtained from the IETF on-line IPR repository at
879 http://www.ietf.org/ipr.
881 The IETF invites any interested party to bring to its attention any
882 copyrights, patents or patent applications, or other proprietary
883 rights that may cover technology that may be required to implement
884 this standard. Please address the information to the IETF at ietf-
889 Funding for the RFC Editor function is currently provided by the
898 Hinden & Haberman Standards Track [Page 16]