rfc9288xml2.original.xml   rfc9288.xml 
<?xml version="1.0" encoding="UTF-8"?> <?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd"> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" cons
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> ensus="true" docName="draft-ietf-opsec-ipv6-eh-filtering-10" indexInclude="true"
<!-- try to enforce the ID-nits conventions and DTD validity --> ipr="trust200902" number="9288" prepTime="2022-08-18T16:08:19" scripts="Common,
<?rfc strict="no" ?> <!-- items used when reviewing the document --> Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="2" tocIncl
<?rfc comments="no" ?> <!-- controls display of <cref> elements --> ude="true" xml:lang="en">
<?rfc inline="no" ?> <!-- when no, put comments at end in comments section, <link href="https://datatracker.ietf.org/doc/draft-ietf-opsec-ipv6-eh-filterin
otherwise, put inline --> g-10" rel="prev"/>
<?rfc editing="no" ?> <!-- when yes, insert editing marks --> <link href="https://dx.doi.org/10.17487/rfc9288" rel="alternate"/>
<link href="urn:issn:2070-1721" rel="alternate"/>
<!-- create table of contents (set it options). <front>
Note the table of contents may be omitted <title abbrev="Filtering of IPv6 Packets with EHs">Recommendations on the Fi
for very short documents --> ltering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers</ti
tle>
<?rfc toc="yes"?><?rfc tocompact="yes"?> <seriesInfo name="RFC" value="9288" stream="IETF"/>
<?rfc tocdepth="2"?>
<!-- choose the options for the references. Some like
symbolic tags in the references (and citations)
and others prefer numbers. -->
<?rfc symrefs="yes"?><?rfc sortrefs="yes" ?>
<!-- these two save paper: start new paragraphs from the same page etc. -->
<?rfc compact="yes" ?><?rfc subcompact="no" ?>
<!-- end of list of processing instructions -->
<!-- Information about the document.
categories values: std, bcp, info, exp, and historic
For Internet-Drafts, specify attribute "ipr".
(ipr values are: full3667, noModification3667, noDerivatives3667),
Also for Internet-Drafts, can specify values for
attributes "iprExtract", and "docName". Note
that the value for iprExtract is the anchor attribute
value of a section that can be extracted, and is only
useful when the value of "ipr" is not "full3667". -->
<!-- TODO: verify which attributes are specified only
by the RFC editor. It appears that attributes
"number", "obsoletes", "updates", and "seriesNo"
are specified by the RFC editor (and not by
the document author). -->
<rfc
category="info"
ipr="trust200902"
docName="draft-ietf-opsec-ipv6-eh-filtering-10" >
<front>
<title abbrev="Filtering of IPv6 packets with EHs">Recommendations on the Fi
ltering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers</ti
tle>
<!-- add 'role="editor"' below for the editors if appropriate -->
<author fullname="Fernando Gont" initials="F." surname="Gont"> <author fullname="Fernando Gont" initials="F." surname="Gont">
<organization abbrev="SI6 Networks" showOnFrontPage="true">SI6 Networks</o
<organization abbrev="EdgeUno">EdgeUno</organization> rganization>
<address> <address>
<postal> <postal>
<street>Segurola y Habana 4310, 7mo Piso</street> <street>Segurola y Habana 4310 7mo piso</street>
<city>Villa Devoto</city> <city>Ciudad Autonoma de Buenos Aires</city>
<region>Ciudad Autonoma de Buenos Aires</region>
<country>Argentina</country> <country>Argentina</country>
</postal> </postal>
<email>fernando.gont@edgeuno.com</email> <email>fgont@si6networks.com</email>
<uri>https://www.edgeuno.com</uri> <uri>https://www.si6networks.com</uri>
</address> </address>
</author> </author>
<author fullname="Will (Shucheng) Liu" initials="W." surname="Liu">
<author fullname="Will (Shucheng) Liu" initials="W." surname="Liu"> <organization showOnFrontPage="true">Huawei Technologies</organization>
<organization>Huawei Technologies</organization>
<address> <address>
<postal> <postal>
<street>Bantian, Longgang District</street> <street>Bantian, Longgang District</street>
<city>Shenzhen</city> <city>Shenzhen</city>
<code>518129</code> <code>518129</code>
<country>P.R. China</country> <country>China</country>
</postal> </postal>
<email>liushucheng@huawei.com</email> <email>liushucheng@huawei.com</email>
</address> </address>
</author>
<!--
<author fullname="Ronald P. Bonica" initials="R." surname="Bonica">
<organization>Juniper Networks</organization>
<address>
<postal>
<street>2251 Corporate Park Drive</street>
<city>Herndon</city>
<region>VA</region>
<code>20171</code>
<country>US</country>
</postal>
<phone>571 250 5819</phone>
<email>rbonica@juniper.net</email>
</address>
</author> </author>
<date month="08" year="2022"/>
<date /> <area>Operations and Management (ops)</area>
<!-- month="May" is no longer necessary note also, day="30" is optional -->
<area>Operations and Management (ops)</area> <!-- WG name at the upperlef
t corner of the doc,
IETF fine for individual submissions -->
<workgroup>opsec</workgroup> <workgroup>opsec</workgroup>
<keyword>Denial of Service</keyword>
<abstract> <keyword>Distributed Denial of Service</keyword>
<t> <keyword>DoS</keyword>
<keyword>DDoS</keyword>
<keyword>ACL</keyword>
<keyword>filtering policy</keyword>
<abstract pn="section-abstract">
<t indent="0" pn="section-abstract-1">
This document analyzes the security implications of IPv6 Extension Headers an d associated IPv6 options. Additionally, it discusses the operational and This document analyzes the security implications of IPv6 Extension Headers an d associated IPv6 options. Additionally, it discusses the operational and
interoperability implications of discarding packets based on the interoperability implications of discarding packets based on the
IPv6 Extension Headers and IPv6 options they contain. Finally, it provides ad vice on the filtering of such IPv6 IPv6 Extension Headers and IPv6 options they contain. Finally, it provides ad vice on the filtering of such IPv6
packets at transit routers for traffic not directed to them, for those cases where such filtering is deemed as necessary. packets at transit routers for traffic not directed to them, for those cases where such filtering is deemed as necessary.
</t> </t>
</abstract> </abstract>
<boilerplate>
</front> <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc=
"exclude" pn="section-boilerplate.1">
<middle> <name slugifiedName="name-status-of-this-memo">Status of This Memo</name
>
<section title="Introduction" anchor="intro"> <t indent="0" pn="section-boilerplate.1-1">
<t>IPv6 Extension Headers (EHs) allow for the extension of the IPv6 This document is not an Internet Standards Track specification; it i
protocol, and provide support for core functionality such as IPv6 s
fragmentation. However, common implementation limitations suggest that EHs p published for informational purposes.
resent a challenge for IPv6 packet routing equipment, particularly when the IPv6 </t>
header chain needs to be processed for e.g. enforcing ACLs or implementing othe <t indent="0" pn="section-boilerplate.1-2">
r functions <xref target="RFC9098"/>. This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are candidates for any level of Internet
Standard; see Section 2 of RFC 7841.
</t>
<t indent="0" pn="section-boilerplate.1-3">
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
<eref target="https://www.rfc-editor.org/info/rfc9288" brackets="non
e"/>.
</t>
</section>
<section anchor="copyright" numbered="false" removeInRFC="false" toc="excl
ude" pn="section-boilerplate.2">
<name slugifiedName="name-copyright-notice">Copyright Notice</name>
<t indent="0" pn="section-boilerplate.2-1">
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
</t>
<t indent="0" pn="section-boilerplate.2-2">
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(<eref target="https://trustee.ietf.org/license-info" brackets="none
"/>) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Revised BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Revised BSD License.
</t>
</section>
</boilerplate>
<toc>
<section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" p
n="section-toc.1">
<name slugifiedName="name-table-of-contents">Table of Contents</name>
<ul bare="true" empty="true" indent="2" spacing="compact" pn="section-to
c.1-1">
<li pn="section-toc.1-1.1">
<t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref der
ivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref
derivedContent="" format="title" sectionFormat="of" target="name-introduction">
Introduction</xref></t>
</li>
<li pn="section-toc.1-1.2">
<t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" form
at="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" f
ormat="title" sectionFormat="of" target="name-terminology-and-assumptions">Termi
nology and Assumptions Employed in This Document</xref></t>
<ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio
n-toc.1-1.2.2">
<li pn="section-toc.1-1.2.2.1">
<t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.1.1"><
xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.
1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-te
rminology">Terminology</xref></t>
</li>
<li pn="section-toc.1-1.2.2.2">
<t indent="0" keepWithNext="true" pn="section-toc.1-1.2.2.2.1"><
xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.
2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ap
plicability-statement">Applicability Statement</xref></t>
</li>
<li pn="section-toc.1-1.2.2.3">
<t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent=
"2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-router-default-behavio
r-and">Router Default Behavior and Features</xref></t>
</li>
</ul>
</li>
<li pn="section-toc.1-1.3">
<t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" form
at="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" f
ormat="title" sectionFormat="of" target="name-ipv6-extension-headers">IPv6 Exten
sion Headers</xref></t>
<ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio
n-toc.1-1.3.2">
<li pn="section-toc.1-1.3.2.1">
<t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent=
"3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-general-discussion">Ge
neral Discussion</xref></t>
</li>
<li pn="section-toc.1-1.3.2.2">
<t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent=
"3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-general-security-impli
catio">General Security Implications</xref></t>
</li>
<li pn="section-toc.1-1.3.2.3">
<t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent=
"3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-rationale-for-our-advi
ce-on">Rationale for Our Advice on the Handling of IPv6 Packets with Specific IP
v6 Extension Headers</xref></t>
</li>
<li pn="section-toc.1-1.3.2.4">
<t indent="0" pn="section-toc.1-1.3.2.4.1"><xref derivedContent=
"3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-summary-of-advice-on-t
he-ha">Summary of Advice on the Handling of IPv6 Packets with Specific IPv6 Exte
nsion Headers</xref></t>
</li>
<li pn="section-toc.1-1.3.2.5">
<t indent="0" pn="section-toc.1-1.3.2.5.1"><xref derivedContent=
"3.5" format="counter" sectionFormat="of" target="section-3.5"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-advice-on-the-handling
-of-i">Advice on the Handling of IPv6 Packets with Specific IPv6 Extension Heade
rs</xref></t>
</li>
<li pn="section-toc.1-1.3.2.6">
<t indent="0" pn="section-toc.1-1.3.2.6.1"><xref derivedContent=
"3.6" format="counter" sectionFormat="of" target="section-3.6"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-advice-on-the-handling
-of-p">Advice on the Handling of Packets with Unknown IPv6 Extension Headers</xr
ef></t>
</li>
</ul>
</li>
<li pn="section-toc.1-1.4">
<t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" form
at="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" f
ormat="title" sectionFormat="of" target="name-ipv6-options">IPv6 Options</xref><
/t>
<ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio
n-toc.1-1.4.2">
<li pn="section-toc.1-1.4.2.1">
<t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent=
"4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-general-discussion-2">
General Discussion</xref></t>
</li>
<li pn="section-toc.1-1.4.2.2">
<t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent=
"4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-general-security-impli
cation">General Security Implications of IPv6 Options</xref></t>
</li>
<li pn="section-toc.1-1.4.2.3">
<t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent=
"4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-summary-of-advice-on-t
he-hand">Summary of Advice on the Handling of IPv6 Packets with Specific IPv6 Op
tions</xref></t>
</li>
<li pn="section-toc.1-1.4.2.4">
<t indent="0" pn="section-toc.1-1.4.2.4.1"><xref derivedContent=
"4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-advice-on-the-handling
-of-pa">Advice on the Handling of Packets with Specific IPv6 Options</xref></t>
</li>
<li pn="section-toc.1-1.4.2.5">
<t indent="0" pn="section-toc.1-1.4.2.5.1"><xref derivedContent=
"4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-advice-on-the-handling
-of-pac">Advice on the Handling of Packets with Unknown IPv6 Options</xref></t>
</li>
</ul>
</li>
<li pn="section-toc.1-1.5">
<t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" form
at="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" f
ormat="title" sectionFormat="of" target="name-iana-considerations">IANA Consider
ations</xref></t>
</li>
<li pn="section-toc.1-1.6">
<t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" form
at="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" f
ormat="title" sectionFormat="of" target="name-privacy-considerations">Privacy Co
nsiderations</xref></t>
</li>
<li pn="section-toc.1-1.7">
<t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" form
at="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" f
ormat="title" sectionFormat="of" target="name-security-considerations">Security
Considerations</xref></t>
</li>
<li pn="section-toc.1-1.8">
<t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" form
at="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" f
ormat="title" sectionFormat="of" target="name-references">References</xref></t>
<ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio
n-toc.1-1.8.2">
<li pn="section-toc.1-1.8.2.1">
<t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent=
"8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-normative-references">
Normative References</xref></t>
</li>
<li pn="section-toc.1-1.8.2.2">
<t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent=
"8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derived
Content="" format="title" sectionFormat="of" target="name-informative-references
">Informative References</xref></t>
</li>
</ul>
</li>
<li pn="section-toc.1-1.9">
<t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" forma
t="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent=""
format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgemen
ts</xref></t>
</li>
<li pn="section-toc.1-1.10">
<t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" form
at="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="
" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Add
resses</xref></t>
</li>
</ul>
</section>
</toc>
</front>
<middle>
<section anchor="intro" numbered="true" toc="include" removeInRFC="false" pn
="section-1">
<name slugifiedName="name-introduction">Introduction</name>
<t indent="0" pn="section-1-1">IPv6 Extension Headers (EHs) allow for the
extension of the IPv6
protocol and provide support for core functionality, such as IPv6
fragmentation. However, common implementation limitations suggest that EHs p
resent a challenge for IPv6 packet routing equipment, particularly when the IPv6
header chain needs to be processed for, as an example, enforcing Access Control
Lists (ACLs) or implementing other functions <xref target="RFC9098" format="def
ault" sectionFormat="of" derivedContent="RFC9098"/>.
</t> </t>
<t indent="0" pn="section-1-2">Several studies (e.g., <xref target="Huston
<t>Several studies (e.g. <xref target="Huston-2022"/>, <xref target="I-D.vyncke- -2022" format="default" sectionFormat="of" derivedContent="Huston-2022"/>, <xref
v6ops-james"/>, and <xref target="RFC7872"/>) suggest that there is widespread d target="I-D.vyncke-v6ops-james" format="default" sectionFormat="of" derivedCont
ropping of IPv6 packets that contain IPv6 Extension Headers (EHs). In some cases ent="JAMES"/>, and <xref target="RFC7872" format="default" sectionFormat="of" de
, such packet drops occur at transit routers. While some operators are known to rivedContent="RFC7872"/>) suggest that there is widespread dropping of IPv6 pack
intentionally drop packets that contain IPv6 EHs, it is possible that some of th ets that contain IPv6 EHs. In some cases, such packet drops occur at transit rou
e measured packet drops are the result of inappropriate advice in this area.</t> ters. While some operators are known to intentionally drop packets that contain
IPv6 EHs, it is possible that some of the measured packet drops are the result o
<t>This document analyzes both the general security implications of f inappropriate advice in this area.</t>
<t indent="0" pn="section-1-3">This document analyzes both the general sec
urity implications of
IPv6 EHs, as well as the security implications of IPv6 EHs, as well as the security implications of
specific EH and Option types. It also provides advice on the specific EH and option types. It also provides advice on the
filtering of IPv6 packets based on the IPv6 EHs and filtering of IPv6 packets based on the IPv6 EHs and
the IPv6 options they contain. Since the IPv6 options they contain. Since
various protocols may use IPv6 EHs (possibly with IPv6 various protocols may use IPv6 EHs (possibly with IPv6
options), discarding packets based on the IPv6 EHs or options), discarding packets based on the IPv6 EHs or
IPv6 options they contain can have implications on the proper IPv6 options they contain can have implications on the proper
functioning of such protocols. Thus, this document also attempts to functioning of such protocols. Thus, this document also attempts to
discuss the operational and interoperability implications of such discuss the operational and interoperability implications of such
filtering policies.</t> filtering policies.</t>
<t indent="0" pn="section-1-4">The resulting packet filtering policy typic
<t>The resulting packet filtering policy typically depends on where in the netwo ally depends on where in the network such policy is enforced. When the policy is
rk such policy is enforced: when the policy is enforced in a transit network, th enforced in a transit network, the policy typically follows a "deny-list" appro
e policy typically follows a "deny-list" approach, where only packets with clear ach, where only packets with clear negative implications are dropped. On the oth
negative implications are dropped. On the other hand, when the policy is enforc er hand, when the policy is enforced closer to the destination systems, the poli
ed closer to the destination systems, the policy typically follows an "accept-li cy typically follows an "accept-list" approach, where only traffic that is expec
st" approach, where only traffic that is expected to be received is allowed. The ted to be received is allowed. The advice in this document is aimed only at tran
advice in this document is aimed only at transit routers that may need to enfor sit routers that may need to enforce a filtering policy based on the IPv6 EHs an
ce a filtering policy based on the EHs and IPv6 options a packet may contain, fo d IPv6 options a packet may contain, following a "deny-list" approach; hence, it
llowing a "deny-list" approach, and hence is likely to be much more permissive t is likely to be much more permissive than a filtering policy to be employed at,
han a filtering policy to be employed at e.g. the edge of an enterprise network. for example, the edge of an enterprise network. The advice in this document is
The advice in this document is meant to improve the current situation of the dr meant to improve the current situation of the dropping of packets with IPv6 EHs
opping of packets with IPv6 EHs in the Internet <xref target="RFC7872"/> in such in the Internet <xref target="RFC7872" format="default" sectionFormat="of" deriv
cases where packets are being dropped due to inappropriate or missing guideline edContent="RFC7872"/> in such cases where packets are being dropped due to inapp
s.</t> ropriate or missing guidelines.</t>
<t indent="0" pn="section-1-5">This document is similar in nature to
<t>This document is similar in nature to <xref target="RFC7126" format="default" sectionFormat="of" derivedContent="RF
<xref target="RFC7126"/>, which addresses the same problem for the IPv4 case. C7126"/>, which addresses the same problem for the IPv4 case. However, in IPv6,
However, in IPv6, the problem space is compounded by the fact that IPv6 specifi the problem space is compounded by the fact that IPv6 specifies a number of IPv6
es a number of IPv6 EHs, and a number of IPv6 options which may be valid only wh EHs and a number of IPv6 options that may be valid only when included in specif
en included in specific EH types.</t> ic EH types.</t>
<t indent="0" pn="section-1-6">This document completes and complements the
<t>This document completes and complements the considerations for protecting the considerations for protecting the control plane from packets containing IP opti
control plane from packets containing IP options that can be found in <xref tar ons that can be found in <xref target="RFC6192" format="default" sectionFormat="
get="RFC6192"/>.</t> of" derivedContent="RFC6192"/>.</t>
<t indent="0" pn="section-1-7"><xref target="terms" format="default" secti
<t><xref target="terms"/> specifies the terminology and conventions employed thr onFormat="of" derivedContent="Section 2"/> specifies the terminology and convent
oughout this document. <xref target="ipv6-extension-headers-discussion"/> discus ions employed throughout this document. <xref target="ipv6-extension-headers-dis
ses IPv6 EHs and provides advice in the area of filtering IPv6 packets that cont cussion" format="default" sectionFormat="of" derivedContent="Section 3"/> discus
ain such IPv6 EHs. <xref target="ipv6-options-discussion"/> discusses IPv6 optio ses IPv6 EHs and provides advice in the area of filtering IPv6 packets that cont
ns and provides advice in the area of filtering IPv6 packets that contain such o ain such IPv6 EHs. <xref target="ipv6-options-discussion" format="default" secti
ptions. <!-- <xref target="upper-layer"/> specifies the filtering of packets ba onFormat="of" derivedContent="Section 4"/> discusses IPv6 options and provides a
sed on the upper-layer protocol. Specifically, it identifies upper-layer protoco dvice in the area of filtering IPv6 packets that contain such options.
ls that, for different reasons, should not be present in IPv6 packets. --> </t>
</t> </section>
<section anchor="terms" numbered="true" toc="include" removeInRFC="false" pn
<!-- ="section-2">
<t>While this document is similar in structure and nature to <xref target="RFC71 <name slugifiedName="name-terminology-and-assumptions">Terminology and Ass
23"/>, we note that this document is aimed at firewall administrators, an hence umptions Employed in This Document</name>
tends to be more restrictive than what an IPv6-version of <xref target="RFC7123" <section numbered="true" toc="include" removeInRFC="false" pn="section-2.1
/> would be.</t> ">
<name slugifiedName="name-terminology">Terminology</name>
</section> <t indent="0" pn="section-2.1-1">The terms "permit" (allow the traffic),
"drop" (drop with no notification to sender), and "reject" (drop with appropria
<section title="Terminology and Assumptions Employed in This Document" te notification to sender) are employed as defined in <xref target="RFC3871" for
anchor="terms"> mat="default" sectionFormat="of" derivedContent="RFC3871"/>. Throughout this doc
<section title="Terminology"> ument, we also employ the term "discard" as a generic term to indicate the act o
f discarding a packet, irrespective of whether the sender is notified of such a
<t>The terms "permit" (allow the traffic), "drop" (drop with no notification to drop and whether the specific filtering action is logged.
sender), and "reject" (drop with appropriate notification to sender) are employe
d as defined in <xref target="RFC3871"/>. Throughout this document we also emplo
y the term "discard" as a generic term to indicate the act of discarding a packe
t, irrespective of whether the sender is notified of such drops, and irrespectiv
e of whether the specific filtering action is logged.
</t>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target='RFC2119' /> <xref target='RFC8174' /> wh
en, and only when, they
appear in all capitals, as shown here.
</t> </t>
<t indent="0" pn="section-2.1-2">
</section> The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU
IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOUL
<section title="Applicability Statement"> D</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>N
<t>This document provides advice on the filtering of IPv6 packets with EHs at tr OT RECOMMENDED</bcp14>",
ansit routers for traffic not explicitly destined to them, for cases in which su "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to
ch filtering is deemed as necessary.</t> be interpreted as
</section> described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="o
f" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFor
<section title="Router Default Behavior and Features"> mat="of" derivedContent="RFC8174"/>
<t>This document assumes that nodes comply with the requirements in <xref target when, and only when, they appear in all capitals, as shown here.
="RFC7045"/>. Namely, </t>
<list style="hanging"> </section>
<t>"If a forwarding node discards a packet containing a standard IPv6 <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2
extension header, it MUST be the result of a configurable policy and ">
<name slugifiedName="name-applicability-statement">Applicability Stateme
nt</name>
<t indent="0" pn="section-2.2-1">This document provides advice on the fi
ltering of IPv6 packets with EHs at transit routers for traffic not explicitly d
estined to them, for cases in which such filtering is deemed as necessary.</t>
</section>
<section numbered="true" toc="include" removeInRFC="false" pn="section-2.3
">
<name slugifiedName="name-router-default-behavior-and">Router Default Be
havior and Features</name>
<t indent="0" pn="section-2.3-1">This document assumes that nodes comply
with the requirements in <xref target="RFC7045" format="default" sectionFormat=
"of" derivedContent="RFC7045"/>. Namely,
</t>
<blockquote pn="section-2.3-2">If a forwarding node discards a packet co
ntaining a standard IPv6
extension header, it <bcp14>MUST</bcp14> be the result of a configurable poli
cy and
not just the result of a failure to recognise such a header. This not just the result of a failure to recognise such a header. This
means that the discard policy for each standard type of extension means that the discard policy for each standard type of extension
header MUST be individually configurable. The default configuration header <bcp14>MUST</bcp14> be individually configurable. The default configu
SHOULD allow all standard extension headers."</t> ration
</list> <bcp14>SHOULD</bcp14> allow all standard extension headers.</blockquote>
<t indent="0" pn="section-2.3-3">
The advice provided in this document is only meant to guide an operator in confi The advice provided in this document is only meant to guide an operator
guring forwarding devices, and is not to be interpreted as advice regarding defa in configuring forwarding devices and is not to be interpreted as advice regard
ult configuration settings for network devices. That is, this document provides ing default configuration settings for network devices. That is, this document p
advice with respect to operational policies, but does not change the implementat rovides advice with respect to operational policies but does not change the impl
ion defaults required by <xref target="RFC7045"/><!-- and <xref target="draft-g ementation defaults required by <xref target="RFC7045" format="default" sectionF
ont-6man-ipv6-opt-transmit"/>-->. <!--We note that the advice provided in this d ormat="of" derivedContent="RFC7045"/>.
ocument is *not* meant to be employed by transit routers for transit traffic, si
nce such devices should not enforce this type of filtering policy on traffic not
directed to them. -->
</t>
<t>We recommend that configuration options are made available to govern the proc
essing of each IPv6 EH type and each IPv6 option type. Such configuration option
s should include the following possible settings:
<list style="symbols">
<t>Permit this IPv6 EH or IPv6 Option type.</t>
<t>Drop packets containing this IPv6 EH or option type.</t>
<t>Reject packets containing this IPv6 EH or option type (where the packet drop
is signaled with an ICMPv6 error message).</t>
<t>Rate-limit traffic containing this IPv6 EH or option type.</t>
<t>Ignore this IPv6 EH or option type (as if it was not present) and process the
packet according the rules for the remaining headers. We note that if a packet
carries forwarding information (e.g., in an IPv6 Routing Header) this might be a
n inappropriate or undesirable action.</t>
</list>
</t> </t>
<t indent="0" pn="section-2.3-4">We recommend that configuration options
<t>We note that special care needs to be taken when devices log packet drops/rej be made available to govern the processing of each IPv6 EH type and each IPv6 O
ects. Devices should count the number of packets dropped/rejected, but the loggi ption Type. Such configuration options should include the following possible set
ng of drop/reject events should be limited so as to not overburden device resour tings:
ces.</t> </t>
<ul spacing="normal" bare="false" empty="false" indent="3" pn="section-2
<t>Finally, we note that when discarding packets, it is generally desirable that .3-5">
the sender be signaled of the packet drop, since this is of use for trouble-sho <li pn="section-2.3-5.1">Permit this IPv6 EH or IPv6 Option Type.</li>
oting purposes. However, throughout this document (when recommending that packet <li pn="section-2.3-5.2">Drop packets containing this IPv6 EH or IPv6
s be discarded) we generically refer to the action as "discard" without specifyi Option Type.</li>
ng whether the sender is signaled of the packet drop.</t> <li pn="section-2.3-5.3">Reject packets containing this IPv6 EH or IPv
</section> 6 Option Type (where the packet drop is signaled with an ICMPv6 error message).<
</section> /li>
<li pn="section-2.3-5.4">Rate-limit traffic containing this IPv6 EH or
<section title="IPv6 Extension Headers" anchor="ipv6-extension-headers-discussio IPv6 Option Type.</li>
n"> <li pn="section-2.3-5.5">Ignore this IPv6 EH or IPv6 Option Type (as i
<section title="General Discussion"> f it was not present), and process the packet according the rules for the remain
<t>IPv6 <xref target="RFC8200"/> EHs allow for the extension of the IPv6 protoco ing headers. We note that if a packet carries forwarding information (e.g., in a
l. Since both IPv6 EHs and upper-layer protocols share the same namespace ("Next n IPv6 Routing Header (RH)), this might be an inappropriate or undesirable actio
Header" registry/namespace), <xref target="RFC7045"/> identifies which of the c n.</li>
urrently assigned Internet Protocol numbers identify IPv6 EHs vs. upper-layer pr </ul>
otocols. This document discusses the filtering of packets based on the IPv6 EHs <t indent="0" pn="section-2.3-6">We note that special care needs to be t
(as specified by <xref target="RFC7045"/>) they contain. <!-- Filtering of IPv6 aken when devices log packet drops/rejects. Devices should count the number of p
packets based on the upper-layer protocol is specified in <xref target="upper-la ackets dropped/rejected, but the logging of drop/reject events should be limited
yer"/>--></t> so as to not overburden device resources.</t>
<t indent="0" pn="section-2.3-7">Finally, we note that when discarding p
<t> ackets, it is generally desirable that the sender be signaled of the packet drop
<list style="hanging"> , since this is of use for trouble-shooting purposes. However, throughout this d
<t> ocument (when recommending that packets be discarded), we generically refer to t
NOTE: <xref target="RFC8200"/> specifies that non-fragmented IPv6 datagrams and he action as "discard" without specifying whether the sender is signaled of the
IPv6 First-Fragments must contain the entire IPv6 header chain <xref target="RFC packet drop.</t>
7112"/>. Therefore, intermediate systems can enforce the filtering policies disc </section>
ussed in this document, or resort to simply discarding the offending packets whe </section>
n they fail to comply with the requirements in <xref target="RFC8200"/>. We note <section anchor="ipv6-extension-headers-discussion" numbered="true" toc="inc
that, in order to implement filtering rules on the fast path, it may be necessa lude" removeInRFC="false" pn="section-3">
ry for the filtering device to limit the depth into the packet that can be inspe <name slugifiedName="name-ipv6-extension-headers">IPv6 Extension Headers</
cted before giving up. In circumstances where such name>
<section numbered="true" toc="include" removeInRFC="false" pn="section-3.1
">
<name slugifiedName="name-general-discussion">General Discussion</name>
<t indent="0" pn="section-3.1-1">IPv6 EHs <xref target="RFC8200" format=
"default" sectionFormat="of" derivedContent="RFC8200"/> allow for the extension
of the IPv6 protocol. Since both IPv6 EHs and upper-layer protocols share the sa
me namespace ("Next Header" registry/namespace), <xref target="RFC7045" format="
default" sectionFormat="of" derivedContent="RFC7045"/> identifies which of the c
urrently assigned Internet Protocol numbers identify IPv6 EHs vs. upper-layer pr
otocols. This document discusses the filtering of packets based on the IPv6 EHs
(as specified by <xref target="RFC7045" format="default" sectionFormat="of" deri
vedContent="RFC7045"/>) they contain.
</t>
<t indent="0" pn="section-3.1-2">
<xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC82
00"/> specifies that non-fragmented IPv6 datagrams and IPv6 First-Fragments must
contain the entire IPv6 header chain <xref target="RFC7112" format="default" se
ctionFormat="of" derivedContent="RFC7112"/>. Therefore, intermediate systems can
enforce the filtering policies discussed in this document or resort to simply d
iscarding the offending packets when they fail to include the entire IPv6 header
chain <xref target="RFC8200" format="default" sectionFormat="of" derivedContent
="RFC8200"/>. </t>
<t indent="0" pn="section-3.1-3">
We note that in order to implement filtering rules on the fast path, it may be n
ecessary for the filtering device to limit the depth into the packet that can be
inspected before giving up. In circumstances where such
a limitation exists, it is recommended that implementations provide a a limitation exists, it is recommended that implementations provide a
configuration option that specifies whether to discard packets if configuration option that specifies whether to discard packets if
the aforementioned limit is encountered. Operators may then the aforementioned limit is encountered. Operators may then
determine according to their own circumstances how such packets determine, according to their own circumstances, how such packets
will be handled. will be handled.
</t> </t>
</list> </section>
</t> <section anchor="ipv6-eh-general-implications" numbered="true" toc="includ
<!-- e" removeInRFC="false" pn="section-3.2">
<t>When processing a non-fragmented IPv6 datagram or an IPv6 First-Fragment, the <name slugifiedName="name-general-security-implicatio">General Security
packet must contain the entire IPv6 header chain <xref target="RFC7112"/>. An i Implications</name>
ntermediate system that processes a packet that fails to comply with this requir <t indent="0" pn="section-3.2-1">In some device architectures, IPv6 pack
ement should therefore drop the offending packets. ets that contain IPv6 EHs can cause the corresponding packets to be processed on
</t> the slow path and, hence, may be leveraged for the purpose of Denial-of-Service
</section> (DoS) attacks <xref target="RFC9098" format="default" sectionFormat="of" derive
dContent="RFC9098"/> <xref target="Cisco-EH" format="default" sectionFormat="of"
<section title="General Security Implications" anchor="ipv6-eh-general-implicati derivedContent="Cisco-EH"/> <xref target="FW-Benchmark" format="default" sectio
ons"> nFormat="of" derivedContent="FW-Benchmark"/>.
<t>In some device architectures, IPv6 packets that contain IPv6 EHs can cause th
e corresponding packets to be processed on the slow path, and hence may be lever
aged for the purpose of Denial of Service (DoS) attacks <xref target="RFC9098"/>
<xref target="Cisco-EH"/> <xref target="FW-Benchmark"/>.
</t> </t>
<t>Operators are urged to consider the IPv6 EH and IPv6 options handling capabil <t indent="0" pn="section-3.2-2">Operators are urged to consider the IPv
ities of their devices as they make deployment decisions in the future.</t> 6 EH and IPv6 options handling capabilities of their devices as they make deploy
</section> ment decisions in the future.</t>
</section>
<section title="Rationale for Our Advice on the Handling of IPv6 Packets with Sp <section anchor="ipv6-ehs-rationale" numbered="true" toc="include" removeI
ecific IPv6 Extension Headers" anchor="ipv6-ehs-rationale"> nRFC="false" pn="section-3.3">
<t> <name slugifiedName="name-rationale-for-our-advice-on">Rationale for Our
<list style="symbols"> Advice on the Handling of IPv6 Packets with Specific IPv6 Extension Headers</na
<t>IPv6 Packets with IPv6 Extension Headers (or options) that are not expected t me>
o traverse transit routers should be dropped.</t> <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3
.3-1">
<t>IPv6 Packets with IPv6 Extension Headers (or options) that are only <li pn="section-3.3-1.1">IPv6 packets with IPv6 Extension Headers (or
options) that are not expected to traverse transit routers should be dropped.</l
i>
<li pn="section-3.3-1.2">IPv6 packets with IPv6 Extension Headers (or
options) that are only
expected to traverse transit routers when a specific technology is expected to traverse transit routers when a specific technology is
employed, should be permitted (or dropped) based on the knowledge employed should be permitted (or dropped) based on the knowledge
regarding the use of such technology in transit provider in question regarding the use of such technology in the transit provider in question
(i.e. permit the packets if the technology is employed, or drop them) (i.e., permit the packets if the technology is employed, or drop them).
</t> </li>
<li pn="section-3.3-1.3">IPv6 packets with IPv6 Extension Headers (or
<t>IPv6 Packets with IPv6 Extension Headers (or options) that represent options) that represent
a concrete attack vector to network infrastructure devices should be dropped a concrete attack vector to network infrastructure devices should be dropped
.</t> .</li>
<li pn="section-3.3-1.4">IPv6 packets with any other IPv6 Extension He
<t>IPv6 packets with any other IPv6 Extension headers (or options) aders (or options)
should be permitted. This is an intentional trade-off made to should be permitted. This is an intentional trade-off made to
minimize ossification.</t> minimize ossification.</li>
</list> </ul>
</section>
</t> <section numbered="true" toc="include" removeInRFC="false" pn="section-3.4
</section> ">
<name slugifiedName="name-summary-of-advice-on-the-ha">Summary of Advice
<section title="Summary of Advice on the Handling of IPv6 Packets with Specific on the Handling of IPv6 Packets with Specific IPv6 Extension Headers</name>
IPv6 Extension Headers"> <t indent="0" pn="section-3.4-1">This section summarizes the advice prov
<t>This section summarizes the advice provided in <xref target="advice-ehs"/>, p ided in <xref target="advice-ehs" format="default" sectionFormat="of" derivedCon
roviding references to the specific sections in which a detailed analysis can be tent="Section 3.5"/>, providing references to the specific sections in which a d
found.</t> etailed analysis can be found.</t>
<table anchor="eh-table" align="center" pn="table-1">
<texttable title="Summary of Advice on the Handling of IPv6 Packets with Spe <name slugifiedName="name-summary-of-advice-on-the-han">Summary of Adv
cific IPv6 Extension Headers" style="all" anchor="eh-table"> ice on the Handling of IPv6 Packets with Specific IPv6 Extension Headers</name>
<ttcol align="center">EH type</ttcol> <thead>
<ttcol align="center">Filtering policy</ttcol> <tr>
<ttcol align="center">Reference</ttcol> <th align="center" colspan="1" rowspan="1">EH Type</th>
<c>IPv6 Hop-by-Hop Options (Proto=0)</c><c>Drop or Ignore</c><c><xref target="pr <th align="center" colspan="1" rowspan="1">Filtering Policy</th>
oto0"/></c> <th align="center" colspan="1" rowspan="1">Reference</th>
<c>Routing Header for IPv6 (Proto=43)</c><c>Drop only RHT0 and RHT1. Permit othe </tr>
r RH Types</c><c><xref target="proto43"/></c> </thead>
<c>Fragment Header for IPv6 (Proto=44)</c><c>Permit</c><c><xref target="proto44" <tbody>
/></c> <tr>
<c>Encapsulating Security Payload (Proto=50)</c><c>Permit</c><c><xref target="pr <td align="center" colspan="1" rowspan="1">Hop-by-Hop Options Head
oto50"/></c> er (Proto=0)</td>
<c>Authentication Header (Proto=51)</c><c>Permit</c><c><xref target="proto51"/>< <td align="center" colspan="1" rowspan="1">Drop or Ignore</td>
/c> <td align="center" colspan="1" rowspan="1">
<c>Destination Options for IPv6 (Proto=60)</c><c>Permit</c><c><xref target="prot <xref target="proto0" format="default" sectionFormat="of" derive
o60"/></c> dContent="Section 3.5.1"/></td>
<c>Mobility Header (Proto=135)</c><c>Permit</c><c><xref target="proto135"/></c> </tr>
<c>Host Identity Protocol (Proto=139)</c><c>Permit</c><c><xref target="proto139" <tr>
/></c> <td align="center" colspan="1" rowspan="1">Routing Header (Proto=4
<c>Shim6 Protocol (Proto=140)</c><c>Permit</c><c><xref target="proto140"/></c> 3)</td>
<c>Use for experimentation and testing (Proto=253 and <td align="center" colspan="1" rowspan="1">Drop only Routing Type
254)</c><c>Drop</c><c><xref target="proto253254"/></c> 0, Routing Type 1, and Routing Type 3. Permit other Routing Types</td>
</texttable> <td align="center" colspan="1" rowspan="1">
<xref target="proto43" format="default" sectionFormat="of" deriv
</section> edContent="Section 3.5.2"/></td>
</tr>
<section title="Advice on the Handling of IPv6 Packets with Specific IPv6 Extens <tr>
ion Headers" anchor="advice-ehs"> <td align="center" colspan="1" rowspan="1">Fragment Header (Proto=
44)</td>
<section title="IPv6 Hop-by-Hop Options (Protocol Number=0)" anchor="proto0"> <td align="center" colspan="1" rowspan="1">Permit</td>
<section title="Uses"> <td align="center" colspan="1" rowspan="1">
<t>The Hop-by-Hop Options header is used to carry optional information that may <xref target="proto44" format="default" sectionFormat="of" deriv
be examined by every node along a packet's delivery path. It is expected that no edContent="Section 3.5.3"/></td>
des will examine the Hop-by-Hop Options header if explicitly configured to do so </tr>
.</t> <tr>
<td align="center" colspan="1" rowspan="1">Encapsulating Security
<t>NOTE: A previous revision of the IPv6 core specification, <xref target="RFC24 Payload (Proto=50)</td>
60"/>, originally required that all nodes examined and processed the Hop-by-Hop <td align="center" colspan="1" rowspan="1">Permit</td>
Options header. However, even before the publication of <xref target="RFC8200"/> <td align="center" colspan="1" rowspan="1">
a number of implementations already provided the option of ignoring this header <xref target="proto50" format="default" sectionFormat="of" deriv
unless explicitly configured to examine it. edContent="Section 3.5.4"/></td>
</t> </tr>
<tr>
</section> <td align="center" colspan="1" rowspan="1">Authentication Header (
Proto=51)</td>
<section title="Specification"> <td align="center" colspan="1" rowspan="1">Permit</td>
<t>This EH is specified in <xref target="RFC8200"/>. As of May 2022, the followi <td align="center" colspan="1" rowspan="1">
ng options have been specified for the Hop-by-Hop Options EH: <xref target="proto51" format="default" sectionFormat="of" deriv
edContent="Section 3.5.5"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Destination Options Hea
der(Proto=60)</td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="proto60" format="default" sectionFormat="of" deriv
edContent="Section 3.5.6"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Mobility Header (Proto=
135)</td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="proto135" format="default" sectionFormat="of" deri
vedContent="Section 3.5.7"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Host Identity Protocol
(Proto=139)</td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="proto139" format="default" sectionFormat="of" deri
vedContent="Section 3.5.8"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Shim6 Protocol (Proto=1
40)</td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="proto140" format="default" sectionFormat="of" deri
vedContent="Section 3.5.9"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Use for experimentation
and testing (Proto=253 and
254)</td>
<td align="center" colspan="1" rowspan="1">Drop</td>
<td align="center" colspan="1" rowspan="1">
<xref target="proto253254" format="default" sectionFormat="of" d
erivedContent="Section 3.5.10"/></td>
</tr>
</tbody>
</table>
</section>
<section anchor="advice-ehs" numbered="true" toc="include" removeInRFC="fa
lse" pn="section-3.5">
<name slugifiedName="name-advice-on-the-handling-of-i">Advice on the Han
dling of IPv6 Packets with Specific IPv6 Extension Headers</name>
<section anchor="proto0" numbered="true" toc="exclude" removeInRFC="fals
e" pn="section-3.5.1">
<name slugifiedName="name-ipv6-hop-by-hop-options-pro">IPv6 Hop-by-Hop
Options (Protocol Number=0)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.1.1">
<name slugifiedName="name-uses">Uses</name>
<t indent="0" pn="section-3.5.1.1-1">The Hop-by-Hop (HBH) Options he
ader is used to carry optional information that may be examined by every node al
ong a packet's delivery path. It is expected that nodes will examine the Hop-by-
Hop Options header if explicitly configured to do so.</t>
<aside pn="section-3.5.1.1-2">
<t indent="0" pn="section-3.5.1.1-2.1">NOTE: A previous revision o
f the IPv6 core specification <xref target="RFC2460" format="default" sectionFor
mat="of" derivedContent="RFC2460"/> originally required all nodes to examine and
process the Hop-by-Hop Options header. However, even before the publication of
<xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC82
00"/>, a number of implementations already provided the option of ignoring this
header unless explicitly configured to examine it.
</t> </t>
<t> </aside>
<list style="symbols"> </section>
<t>Type 0x00: Pad1 <xref target="RFC8200"/></t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Type 0x01: PadN <xref target="RFC8200"/></t> -3.5.1.2">
<t>Type 0x05: Router Alert <xref target="RFC2711"/></t> <name slugifiedName="name-specification">Specification</name>
<t>Type 0x07: CALIPSO <xref target="RFC5570"/></t> <t indent="0" pn="section-3.5.1.2-1">This EH is specified in <xref t
<t>Type 0x08: SMF_DPD <xref target="RFC6621"/></t> arget="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>.
<t>Type 0x23: RPL Option <xref target="RFC9008"/></t> As of May 2022, the following options have been specified for the Hop-by-Hop Opt
<t>Type 0x26: Quick-Start <xref target="RFC4782"/></t> ions header:
<t>Type 0x4D: (Deprecated)</t>
<t>Type 0x63: RPL Option <xref target="RFC6553"/></t>
<t>Type 0x6D: MPL Option <xref target="RFC7731"/></t>
<!-- [fgont] THis one is deprecated... I guess no need to mention it, right? -->
<t>Type 0x8A: Endpoint Identification (Deprecated) <xref target="draft-ietf-nimr
od-eid"/></t>
<t>Type 0xC2: Jumbo Payload <xref target="RFC2675"/></t>
<t>Type 0xEE: IPv6 DFF Header <xref target="RFC6971"/></t>
<t>Type 0x1E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0x3E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0x5E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0x7E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0x9E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0xBE: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0xDE: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0xFE: RFC3692-style Experiment <xref target="RFC4727"/></t>
</list></t>
</section>
<section title="Specific Security Implications">
<t>Legacy nodes that process this extension header might be subject to Denial of
Service attacks.</t>
<t>NOTE: While <xref target="RFC8200"/> has removed this requirement, the deploy
ed base may still reflect the classical behavior for a while, and hence the pote
ntial security problems of this EH are still of concern.
</t> </t>
</section> <ul spacing="normal" bare="false" empty="false" indent="3" pn="secti
on-3.5.1.2-2">
<section title="Operational and Interoperability Impact if Blocked"> <li pn="section-3.5.1.2-2.1">Type 0x00: Pad1 <xref target="RFC8200
<t>Discarding packets containing a Hop-by-Hop Options EH would break any of the " format="default" sectionFormat="of" derivedContent="RFC8200"/></li>
protocols that rely on it for proper functioning. For example, it would break RS <li pn="section-3.5.1.2-2.2">Type 0x01: PadN <xref target="RFC8200
VP <xref target="RFC2205"/> and multicast deployments, and would cause IPv6 jumb " format="default" sectionFormat="of" derivedContent="RFC8200"/></li>
ograms to be discarded.</t> <li pn="section-3.5.1.2-2.3">Type 0x05: Router Alert <xref target=
</section> "RFC2711" format="default" sectionFormat="of" derivedContent="RFC2711"/></li>
<li pn="section-3.5.1.2-2.4">Type 0x07: CALIPSO <xref target="RFC5
<section title="Advice"> 570" format="default" sectionFormat="of" derivedContent="RFC5570"/></li>
<t>Nodes implementing <xref target="RFC8200"/> would already ignore this extensi <li pn="section-3.5.1.2-2.5">Type 0x08: SMF_DPD <xref target="RFC6
on header unless explicitly required to process it. For legacy (<xref target="RF 621" format="default" sectionFormat="of" derivedContent="RFC6621"/></li>
C2460"/>) nodes, the recommended configuration for the processing of these packe <li pn="section-3.5.1.2-2.6">Type 0x23: RPL Option <xref target="R
ts depends on the features and capabilities of the underlying platform, the conf FC9008" format="default" sectionFormat="of" derivedContent="RFC9008"/></li>
iguration of the platform, and also the deployment environment of the platform. <li pn="section-3.5.1.2-2.7">Type 0x26: Quick-Start <xref target="
On platforms that allow forwarding of packets with HBH Options on the fast path, RFC4782" format="default" sectionFormat="of" derivedContent="RFC4782"/></li>
we recommend that packets with a HBH Options EH be forwarded as normal. Otherwi <li pn="section-3.5.1.2-2.8">Type 0x4D: (Deprecated)</li>
se, on platforms in which processing of packets with a IPv6 HBH Options EH is ca <li pn="section-3.5.1.2-2.9">Type 0x63: RPL Option <xref target="R
rried out in the slow path, and an option is provided to rate-limit these packet FC6553" format="default" sectionFormat="of" derivedContent="RFC6553"/></li>
s, we recommend that this option be selected. Finally, when packets containing a <li pn="section-3.5.1.2-2.10">Type 0x6D: MPL Option <xref target="
HBH Options EH are processed in the slow-path, and the underlying platform does RFC7731" format="default" sectionFormat="of" derivedContent="RFC7731"/></li>
not have any mitigation options available for attacks based on these packets, w <li pn="section-3.5.1.2-2.11">Type 0x8A: Endpoint Identification (
e recommend that such platforms discard packets containing IPv6 HBH Options EHs. Deprecated) <xref target="NIMROD-EID" format="default" sectionFormat="of" derive
</t> dContent="NIMROD-EID"/></li>
<li pn="section-3.5.1.2-2.12">Type 0xC2: Jumbo Payload <xref targe
<t>Finally, we note that RPL (Routing Protocol for Low-Power and Lossy Networks) t="RFC2675" format="default" sectionFormat="of" derivedContent="RFC2675"/></li>
routers <xref target="RFC6550"/> must not discard packets based on the presenc <li pn="section-3.5.1.2-2.13">Type 0xEE: IPv6 DFF Header <xref tar
e of an IPv6 Hop-by-Hop Options EH, as this would break RPL.</t> get="RFC6971" format="default" sectionFormat="of" derivedContent="RFC6971"/></li
>
</section> <li pn="section-3.5.1.2-2.14">Type 0x1E: RFC3692-style Experiment
</section> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
27"/></li>
<section title="Routing Header for IPv6 (Protocol Number=43)" anchor="proto43"> <li pn="section-3.5.1.2-2.15">Type 0x3E: RFC3692-style Experiment
<section title="Uses"> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
<t>The Routing header is used by an IPv6 source to list one or more intermediate 27"/></li>
nodes to be "visited" on the way to a packet's destination. </t> <li pn="section-3.5.1.2-2.16">Type 0x5E: RFC3692-style Experiment
</section> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
27"/></li>
<section title="Specification"> <li pn="section-3.5.1.2-2.17">Type 0x7E: RFC3692-style Experiment
<t>This EH is specified in <xref target="RFC8200"/>. <xref target="RFC2460"/> ha <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
d originally specified the Routing Header Type 0, which was later obsoleted by < 27"/></li>
xref target="RFC5095"/>, and thus removed from <xref target="RFC8200"/>.</t> <li pn="section-3.5.1.2-2.18">Type 0x9E: RFC3692-style Experiment
<xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
<t>At of May 2022, the following Routing Types have been specified: 27"/></li>
<li pn="section-3.5.1.2-2.19">Type 0xBE: RFC3692-style Experiment
<list style="symbols"> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
<t>Type 0: Source Route (DEPRECATED) <xref target="RFC2460"/> <xref target="RFC5 27"/></li>
095"/></t> <li pn="section-3.5.1.2-2.20">Type 0xDE: RFC3692-style Experiment
<t>Type 1: Nimrod (DEPRECATED)</t> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
<t>Type 2: Type 2 Routing Header <xref target="RFC6275"/></t> 27"/></li>
<t>Type 3: RPL Source Route Header <xref target="RFC6554"/></t> <li pn="section-3.5.1.2-2.21">Type 0xFE: RFC3692-style Experiment
<t>Type 4: Segment Routing Header (SRH) <xref target="RFC8754"/></t> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
<t>Types 5-252: Unassigned </t> 27"/></li>
<t>Type 253: RFC3692-style Experiment 1 <xref target="RFC4727"/></t> </ul>
<t>Type 254: RFC3692-style Experiment 2 <xref target="RFC4727"/></t> </section>
<t>Type 255: Reserved</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</list> -3.5.1.3">
<name slugifiedName="name-specific-security-implicati">Specific Secu
rity Implications</name>
<t indent="0" pn="section-3.5.1.3-1">Legacy nodes that process this
extension header might be subject to DoS attacks.</t>
<aside pn="section-3.5.1.3-2">
<t indent="0" pn="section-3.5.1.3-2.1">NOTE: While <xref target="R
FC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/> has remov
ed the requirement for all nodes to examine and process the Hop-by-Hop Options h
eader, the deployed base may still reflect the legacy <xref target="RFC2460" for
mat="default" sectionFormat="of" derivedContent="RFC2460"/> behavior for a while
; hence, the potential security problems of this EH are still of concern.
</t> </t>
</aside>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specific Security Implications"> -3.5.1.4">
<t>The security implications of RHT0 have been discussed in detail in <xref targ <name slugifiedName="name-operational-and-interoperab">Operational a
et="Biondi2007"/> and <xref target="RFC5095"/>. RHT1 was never widely implemente nd Interoperability Impact If Blocked</name>
d. The security implications of RHT2, RHT3, and RHT4 (SRH) are discussed in <xre <t indent="0" pn="section-3.5.1.4-1">Discarding packets containing a
f target="RFC6275"/>, <xref target="RFC6554"/>, and <xref target="RFC8754"/>, r Hop-by-Hop Options header would break any of the protocols that rely on it for
espectively.</t> proper functioning. For example, it would break RSVP <xref target="RFC2205" form
</section> at="default" sectionFormat="of" derivedContent="RFC2205"/> and multicast deploym
ents and would cause IPv6 jumbograms to be discarded.</t>
<section title="Operational and Interoperability Impact if Blocked"> </section>
<t>Blocking packets containing a RHT0 or RHT1 has no operational implications, s <section numbered="true" toc="exclude" removeInRFC="false" pn="section
ince both have been deprecated. Blocking packets with a RHT2 would break Mobile -3.5.1.5">
IPv6. Packets with a RHT3 may be safely blocked at RPL domain boundaries, since <name slugifiedName="name-advice">Advice</name>
RHT3 headers are employed within a single RPL domain. Blocking packets with a RH <t indent="0" pn="section-3.5.1.5-1">Nodes implementing <xref target
T4 (SRH) will break Segment Routing (SR) deployments, if the filtering policy is ="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/> would
enforced on packets being forwarded within an SR domain.</t> already ignore this extension header unless explicitly required to process it. F
or legacy nodes <xref target="RFC2460" format="default" sectionFormat="of" deriv
<!--<t>However, blocking packets employing other routing header types will break edContent="RFC2460"/>, the recommended configuration for the processing of these
the protocols that rely on them.</t> --> packets depends on the features and capabilities of the underlying platform, th
</section> e configuration of the platform, and also the deployment environment of the plat
form. On platforms that allow the forwarding of packets with IPv6 HBH Options he
<section title="Advice"> aders on the fast path, we recommend that packets with IPv6 HBH Options headers
<t>Intermediate systems should discard packets containing a RHT0, RHT1, or RHT3. be forwarded as normal. Otherwise, on platforms in which the processing of packe
Other routing header types should be permitted, as required by <xref target="RF ts with IPv6 HBH Options headers is carried out in the slow path and an option i
C7045"/>.</t> s provided to rate-limit these packets, we recommend that this option be selecte
</section> d. Finally, when packets containing IPv6 HBH Options headers are processed in th
</section> e slow path and the underlying platform does not have any mitigation options ava
ilable for attacks based on these packets, we recommend that such platforms disc
<section title="Fragment Header for IPv6 (Protocol Number=44)" anchor="proto44"> ard packets containing IPv6 HBH Options headers.</t>
<section title="Uses"> <t indent="0" pn="section-3.5.1.5-2">Finally, we note that the Routi
<t>This EH provides the fragmentation functionality for IPv6.</t> ng Protocol for Low-Power and Lossy Networks (RPL) routers <xref target="RFC6550
</section> " format="default" sectionFormat="of" derivedContent="RFC6550"/> must not disca
rd packets based on the presence of an IPv6 Hop-by-Hop Options header, as this w
<section title="Specification"> ould break the RPL.</t>
<t>This EH is specified in <xref target="RFC8200"/>.</t> </section>
</section> </section>
<section anchor="proto43" numbered="true" toc="exclude" removeInRFC="fal
<section title="Specific Security Implications"> se" pn="section-3.5.2">
<t>The security implications of the Fragment Header range from Denial of Service <name slugifiedName="name-routing-header-protocol-num">Routing Header
attacks (e.g. based on flooding a target with IPv6 fragments) to information le (Protocol Number=43)</name>
akage attacks <xref target="RFC7739"/>.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -3.5.2.1">
<name slugifiedName="name-uses-2">Uses</name>
<section title="Operational and Interoperability Impact if Blocked"> <t indent="0" pn="section-3.5.2.1-1">The Routing Header is used by a
<t>Blocking packets that contain a Fragment Header will break any protocol that n IPv6 source to list one or more intermediate nodes to be "visited" on the way
may rely on fragmentation (e.g., the DNS <xref target="RFC1034"/>). However, IP to a packet's destination. </t>
fragmentation is known to introduce fragility to Internet communication <xref ta </section>
rget="RFC8900"/>.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -3.5.2.2">
<name slugifiedName="name-specification-2">Specification</name>
<section title="Advice"> <t indent="0" pn="section-3.5.2.2-1">This EH is specified in <xref t
<t>Intermediate systems should permit packets that contain a Fragment Header.</t arget="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>.
> The Routing Type 0 had originally been specified in <xref target="RFC2460" forma
</section> t="default" sectionFormat="of" derivedContent="RFC2460"/> and was later obsolete
</section> d by <xref target="RFC5095" format="default" sectionFormat="of" derivedContent="
RFC5095"/>; thus, it was removed from <xref target="RFC8200" format="default" se
<section title="Encapsulating Security Payload (Protocol Number=50)" anchor="pro ctionFormat="of" derivedContent="RFC8200"/>.</t>
to50"> <t indent="0" pn="section-3.5.2.2-2">As of May 2022, the following R
<section title="Uses"> outing Types have been specified:</t>
<t>This EH is employed for the IPsec suite <xref target="RFC4303"/>.</t> <ul spacing="normal" bare="false" empty="false" indent="3" pn="secti
</section> on-3.5.2.2-3">
<li pn="section-3.5.2.2-3.1">Type 0: Source Route (DEPRECATED) <xr
<section title="Specification"> ef target="RFC2460" format="default" sectionFormat="of" derivedContent="RFC2460"
<t>This EH is specified in <xref target="RFC4303"/>.</t> /> <xref target="RFC5095" format="default" sectionFormat="of" derivedContent="RF
</section> C5095"/></li>
<li pn="section-3.5.2.2-3.2">Type 1: Nimrod (DEPRECATED)</li>
<section title="Specific Security Implications"> <li pn="section-3.5.2.2-3.3">Type 2: Type 2 Routing Header <xref t
<t>Besides the general implications of IPv6 EHs, this EH could be employed to po arget="RFC6275" format="default" sectionFormat="of" derivedContent="RFC6275"/></
tentially perform a DoS attack at the destination system by wasting CPU resource li>
s in validating the contents of the packet.</t> <li pn="section-3.5.2.2-3.4">Type 3: RPL Source Route Header <xref
</section> target="RFC6554" format="default" sectionFormat="of" derivedContent="RFC6554"/>
</li>
<section title="Operational and Interoperability Impact if Blocked"> <li pn="section-3.5.2.2-3.5">Type 4: Segment Routing Header (SRH)
<t>Discarding packets that employ this EH would break IPsec deployments.</t> <xref target="RFC8754" format="default" sectionFormat="of" derivedContent="RFC87
</section> 54"/></li>
<li pn="section-3.5.2.2-3.6">Types 5-252: Unassigned</li>
<section title="Advice"> <li pn="section-3.5.2.2-3.7">Type 253: RFC3692-style Experiment 1
<t>Intermediate systems should permit packets containing the Encapsulating Secur <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
ity Payload EH.</t> 27"/></li>
</section> <li pn="section-3.5.2.2-3.8">Type 254: RFC3692-style Experiment 2
</section> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
27"/></li>
<section title="Authentication Header (Protocol Number=51)" anchor="proto51"> <li pn="section-3.5.2.2-3.9">Type 255: Reserved</li>
<section title="Uses"> </ul>
<t>The Authentication Header can be employed for provide authentication services </section>
in <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.2.3">
<name slugifiedName="name-specific-security-implicatio">Specific Sec
urity Implications</name>
<t indent="0" pn="section-3.5.2.3-1">The security implications of Ro
uting Headers of Routing Type 0 have been discussed in detail in <xref target="B
iondi-2007" format="default" sectionFormat="of" derivedContent="Biondi-2007"/> a
nd <xref target="RFC5095" format="default" sectionFormat="of" derivedContent="RF
C5095"/>. Routing Type 1 was never widely implemented. The security implications
of Routing Headers of Routing Type 2, Routing Type 3, and Routing Type 4 (SRH)
are discussed in <xref target="RFC6275" format="default" sectionFormat="of" deri
vedContent="RFC6275"/>, <xref target="RFC6554" format="default" sectionFormat="
of" derivedContent="RFC6554"/>, and <xref target="RFC8754" format="default" sect
ionFormat="of" derivedContent="RFC8754"/>, respectively.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.2.4">
<name slugifiedName="name-operational-and-interoperabi">Operational
and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-3.5.2.4-1">Blocking packets containing Rou
ting Headers of Routing Type 0 or Routing Type 1 has no operational implications
, since both have been deprecated. Blocking packets containing Routing Headers o
f Routing Type 2 would break Mobile IPv6. Packets containing Routing Headers of
Routing Type 3 may be safely blocked at RPL domain boundaries, since such header
s are employed within a single RPL domain. Blocking packets containing Routing H
eaders of Routing Type 4 (SRH) will break Segment Routing (SR) deployments if th
e filtering policy is enforced on packets being forwarded within an SR domain.</
t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.2.5">
<name slugifiedName="name-advice-2">Advice</name>
<t indent="0" pn="section-3.5.2.5-1">Intermediate systems should dis
card packets containing Routing Headers of Routing Type 0, Routing Type 1, or Ro
uting Type 3. Other Routing Types should be permitted, as required by <xref targ
et="RFC7045" format="default" sectionFormat="of" derivedContent="RFC7045"/>.</t>
</section>
</section>
<section anchor="proto44" numbered="true" toc="exclude" removeInRFC="fal
se" pn="section-3.5.3">
<name slugifiedName="name-fragment-header-protocol-nu">Fragment Header
(Protocol Number=44)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.3.1">
<name slugifiedName="name-uses-3">Uses</name>
<t indent="0" pn="section-3.5.3.1-1">This EH provides the fragmentat
ion and reassembly functionality for IPv6.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.3.2">
<name slugifiedName="name-specification-3">Specification</name>
<t indent="0" pn="section-3.5.3.2-1">This EH is specified in <xref t
arget="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>.<
/t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.3.3">
<name slugifiedName="name-specific-security-implication">Specific Se
curity Implications</name>
<t indent="0" pn="section-3.5.3.3-1">The security implications of th
e Fragment Header range from DoS attacks (e.g., based on flooding a target with
IPv6 fragments) to information leakage attacks <xref target="RFC7739" format="de
fault" sectionFormat="of" derivedContent="RFC7739"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.3.4">
<name slugifiedName="name-operational-and-interoperabil">Operational
and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-3.5.3.4-1">Blocking packets that contain a
Fragment Header will break any protocol that may rely on fragmentation (e.g., t
he DNS <xref target="RFC1034" format="default" sectionFormat="of" derivedContent
="RFC1034"/>). However, IP fragmentation is known to introduce fragility to Inte
rnet communication <xref target="RFC8900" format="default" sectionFormat="of" de
rivedContent="RFC8900"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.3.5">
<name slugifiedName="name-advice-3">Advice</name>
<t indent="0" pn="section-3.5.3.5-1">Intermediate systems should per
mit packets that contain a Fragment Header.</t>
</section>
</section>
<section anchor="proto50" numbered="true" toc="exclude" removeInRFC="fal
se" pn="section-3.5.4">
<name slugifiedName="name-encapsulating-security-payl">Encapsulating S
ecurity Payload (Protocol Number=50)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.4.1">
<name slugifiedName="name-uses-4">Uses</name>
<t indent="0" pn="section-3.5.4.1-1">This EH is employed for the IPs
ec suite <xref target="RFC4303" format="default" sectionFormat="of" derivedConte
nt="RFC4303"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.4.2">
<name slugifiedName="name-specification-4">Specification</name>
<t indent="0" pn="section-3.5.4.2-1">This EH is specified in <xref t
arget="RFC4303" format="default" sectionFormat="of" derivedContent="RFC4303"/>.<
/t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.4.3">
<name slugifiedName="name-specific-security-implications">Specific S
ecurity Implications</name>
<t indent="0" pn="section-3.5.4.3-1">Besides the general implication
s of IPv6 EHs, this EH could be employed to potentially perform a DoS attack at
the destination system by wasting CPU resources in validating the contents of th
e packet.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.4.4">
<name slugifiedName="name-operational-and-interoperabili">Operationa
l and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-3.5.4.4-1">Discarding packets that employ
this EH would break IPsec deployments.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.4.5">
<name slugifiedName="name-advice-4">Advice</name>
<t indent="0" pn="section-3.5.4.5-1">Intermediate systems should per
mit packets containing the Encapsulating Security Payload EH.</t>
</section>
</section>
<section anchor="proto51" numbered="true" toc="exclude" removeInRFC="fal
se" pn="section-3.5.5">
<name slugifiedName="name-authentication-header-proto">Authentication
Header (Protocol Number=51)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.5.1">
<name slugifiedName="name-uses-5">Uses</name>
<t indent="0" pn="section-3.5.5.1-1">The Authentication Header can b
e employed to provide authentication services in
IPv4 and IPv6.</t> IPv4 and IPv6.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specification"> -3.5.5.2">
<t>This EH is specified in <xref target="RFC4302"/>.</t> <name slugifiedName="name-specification-5">Specification</name>
</section> <t indent="0" pn="section-3.5.5.2-1">This EH is specified in <xref t
arget="RFC4302" format="default" sectionFormat="of" derivedContent="RFC4302"/>.<
<section title="Specific Security Implications"> /t>
<t>Besides the general implications of IPv6 EHs, this EH could be employed to po </section>
tentially perform a DoS attack at the destination system by wasting CPU resource <section numbered="true" toc="exclude" removeInRFC="false" pn="section
s in validating the contents of the packet.</t> -3.5.5.3">
</section> <name slugifiedName="name-specific-security-implications-2">Specific
Security Implications</name>
<section title="Operational and Interoperability Impact if Blocked"> <t indent="0" pn="section-3.5.5.3-1">Besides the general implication
<t>Discarding packets that employ this EH would break IPsec deployments.</t> s of IPv6 EHs, this EH could be employed to potentially perform a DoS attack at
</section> the destination system by wasting CPU resources in validating the contents of th
e packet.</t>
<section title="Advice"> </section>
<t>Intermediate systems should permit packets containing an Authentication Heade <section numbered="true" toc="exclude" removeInRFC="false" pn="section
r.</t> -3.5.5.4">
</section> <name slugifiedName="name-operational-and-interoperabilit">Operation
</section> al and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-3.5.5.4-1">Discarding packets that employ
<section title="Destination Options for IPv6 (Protocol Number=60)" anchor="proto this EH would break IPsec deployments.</t>
60"> </section>
<section title="Uses"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>The Destination Options header is used to carry optional information that nee -3.5.5.5">
ds be examined only by a packet's destination node(s).</t> <name slugifiedName="name-advice-5">Advice</name>
</section> <t indent="0" pn="section-3.5.5.5-1">Intermediate systems should per
mit packets containing an Authentication Header.</t>
<section title="Specification"> </section>
<t>This EH is specified in <xref target="RFC8200"/>. As of May 2022, the followi </section>
ng options have been specified for this EH: <section anchor="proto60" numbered="true" toc="exclude" removeInRFC="fal
se" pn="section-3.5.6">
<list style="symbols"> <name slugifiedName="name-destination-options-protoco">Destination Opt
<t>Type 0x00: Pad1 <xref target="RFC8200"/></t> ions (Protocol Number=60)</name>
<t>Type 0x01: PadN <xref target="RFC8200"/></t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Type 0x04: Tunnel Encapsulation Limit <xref target="RFC2473"/></t> -3.5.6.1">
<t>Type 0x0F: IPv6 Performance and Diagnostic Metrics (PDM) <xref target="RFC825 <name slugifiedName="name-uses-6">Uses</name>
0"/></t> <t indent="0" pn="section-3.5.6.1-1">The Destination Options (DO) he
<t>Type 0x4D: (Deprecated)</t> ader is used to carry optional information that needs be examined only by a pack
et's destination node(s).</t>
<t>Type 0xC9: Home Address <xref target="RFC6275"/></t> </section>
<t>Type 0x8A: Endpoint Identification (Deprecated) <xref target="draft-ietf-nimr <section numbered="true" toc="exclude" removeInRFC="false" pn="section
od-eid"/></t> -3.5.6.2">
<name slugifiedName="name-specification-6">Specification</name>
<t>Type 0x8B: ILNP Nonce <xref target="RFC6744"/></t> <t indent="0" pn="section-3.5.6.2-1">This EH is specified in <xref t
<t>Type 0x8C: Line-Identification Option <xref target="RFC6788"/></t> arget="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>.
<t>Type 0x1E: RFC3692-style Experiment <xref target="RFC4727"/></t> As of May 2022, the following options have been specified for this EH:
<t>Type 0x3E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0x5E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0x7E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0x9E: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0xBE: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0xDE: RFC3692-style Experiment <xref target="RFC4727"/></t>
<t>Type 0xFE: RFC3692-style Experiment <xref target="RFC4727"/></t>
</list>
</t> </t>
</section> <ul spacing="normal" bare="false" empty="false" indent="3" pn="secti
on-3.5.6.2-2">
<section title="Specific Security Implications"> <li pn="section-3.5.6.2-2.1">Type 0x00: Pad1 <xref target="RFC8200
<t>No security implications are known, other than the general implications of IP " format="default" sectionFormat="of" derivedContent="RFC8200"/></li>
v6 EHs. For a discussion of possible security implications of specific options s <li pn="section-3.5.6.2-2.2">Type 0x01: PadN <xref target="RFC8200
pecified for the DO header, please see the <xref target="opt-filtering"/>.</t> " format="default" sectionFormat="of" derivedContent="RFC8200"/></li>
</section> <li pn="section-3.5.6.2-2.3">Type 0x04: Tunnel Encapsulation Limit
<xref target="RFC2473" format="default" sectionFormat="of" derivedContent="RFC2
<section title="Operational and Interoperability Impact if Blocked"> 473"/></li>
<t>Discarding packets that contain a Destination Options header would break prot <li pn="section-3.5.6.2-2.4">Type 0x0F: IPv6 Performance and Diagn
ocols that rely on this EH type for conveying information, including protocols s ostic Metrics (PDM) <xref target="RFC8250" format="default" sectionFormat="of" d
uch as ILNP <xref target="RFC6740"/> and Mobile IPv6 <xref target="RFC6275"/>, a erivedContent="RFC8250"/></li>
nd IPv6 tunnels that employ the Tunnel Encapsulation Limit option.</t> <li pn="section-3.5.6.2-2.5">Type 0x4D: (Deprecated)</li>
</section> <li pn="section-3.5.6.2-2.6">Type 0xC9: Home Address <xref target=
"RFC6275" format="default" sectionFormat="of" derivedContent="RFC6275"/></li>
<section title="Advice"> <li pn="section-3.5.6.2-2.7">Type 0x8A: Endpoint Identification (D
<t>Intermediate systems should permit packets that contain a Destination Options eprecated) <xref target="NIMROD-EID" format="default" sectionFormat="of" derived
Header.</t> Content="NIMROD-EID"/></li>
</section> <li pn="section-3.5.6.2-2.8">Type 0x8B: ILNP Nonce <xref target="R
</section> FC6744" format="default" sectionFormat="of" derivedContent="RFC6744"/></li>
<li pn="section-3.5.6.2-2.9">Type 0x8C: Line-Identification Option
<section title="Mobility Header (Protocol Number=135)" anchor="proto135"> <xref target="RFC6788" format="default" sectionFormat="of" derivedContent="RFC6
<section title="Uses"> 788"/></li>
<t>The Mobility Header is an EH used by mobile nodes, correspondent nodes, and h <li pn="section-3.5.6.2-2.10">Type 0x1E: RFC3692-style Experiment
ome agents in all messaging related to the creation and management of bindings i <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
n Mobile IPv6.</t> 27"/></li>
</section> <li pn="section-3.5.6.2-2.11">Type 0x3E: RFC3692-style Experiment
<xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
<section title="Specification"> 27"/></li>
<t>This EH is specified in <xref target="RFC6275"/>.</t> <li pn="section-3.5.6.2-2.12">Type 0x5E: RFC3692-style Experiment
</section> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
27"/></li>
<section title="Specific Security Implications"> <li pn="section-3.5.6.2-2.13">Type 0x7E: RFC3692-style Experiment
<t>A thorough security assessment of the security implications of the Mobility H <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
eader and related mechanisms can be found in Section 15 of <xref target="RFC6275 27"/></li>
"/>.</t> <li pn="section-3.5.6.2-2.14">Type 0x9E: RFC3692-style Experiment
</section> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
27"/></li>
<section title="Operational and Interoperability Impact if Blocked"> <li pn="section-3.5.6.2-2.15">Type 0xBE: RFC3692-style Experiment
<t>Discarding packets containing this EH would break Mobile IPv6.</t> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
</section> 27"/></li>
<li pn="section-3.5.6.2-2.16">Type 0xDE: RFC3692-style Experiment
<section title="Advice"> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
<t>Intermediate systems should permit packets containing this EH.</t> 27"/></li>
</section> <li pn="section-3.5.6.2-2.17">Type 0xFE: RFC3692-style Experiment
</section> <xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC47
27"/></li>
<section title="Host Identity Protocol (Protocol Number=139)" anchor="proto139"> </ul>
<section title="Uses"> </section>
<t>This EH is employed with the Host Identity Protocol (HIP), a protocol that al <section numbered="true" toc="exclude" removeInRFC="false" pn="section
lows consenting hosts to securely establish and maintain shared IP-layer state, -3.5.6.3">
allowing separation of the identifier and locator roles of IP addresses, thereby <name slugifiedName="name-specific-security-implications-3">Specific
enabling continuity of communications across IP address changes.</t> Security Implications</name>
</section> <t indent="0" pn="section-3.5.6.3-1">No security implications are kn
own, other than the general security implications of IPv6 EHs. For a discussion
<section title="Specification"> of possible security implications of specific options specified for the DO heade
<t>This EH is specified in <xref target="RFC7401"/>.</t> r, please see <xref target="opt-filtering" format="default" sectionFormat="of" d
</section> erivedContent="Section 4.4"/>.</t>
</section>
<section title="Specific Security Implications"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>The security implications of the HIP header are discussed in detail in Sectio -3.5.6.4">
n 8 of <xref target="RFC6275"/>.</t> <name slugifiedName="name-operational-and-interoperability">Operatio
</section> nal and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-3.5.6.4-1">Discarding packets that contain
<section title="Operational and Interoperability Impact if Blocked"> a Destination Options header would break protocols that rely on this EH type fo
<t>Discarding packets that contain the Host Identity Protocol would break HIP de r conveying information (such as the Identifier-Locator Network Protocol (ILNP)
ployments.</t> <xref target="RFC6740" format="default" sectionFormat="of" derivedContent="RFC67
</section> 40"/> and Mobile IPv6 <xref target="RFC6275" format="default" sectionFormat="of"
derivedContent="RFC6275"/>), as well as IPv6 tunnels that employ the Tunnel Enc
<section title="Advice"> apsulation Limit option <xref target="RFC2473" format="default" sectionFormat="o
<t>Intermediate systems should permit packets that contain a Host Identity Proto f" derivedContent="RFC2473"/>.</t>
col EH.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -3.5.6.5">
<name slugifiedName="name-advice-6">Advice</name>
<section title="Shim6 Protocol (Protocol Number=140)" anchor="proto140"> <t indent="0" pn="section-3.5.6.5-1">Intermediate systems should per
<section title="Uses"> mit packets that contain a Destination Options header.</t>
<t>This EH is employed by the Shim6 <xref target="RFC5533"/> Protocol.</t> </section>
</section> </section>
<section anchor="proto135" numbered="true" toc="exclude" removeInRFC="fa
<section title="Specification"> lse" pn="section-3.5.7">
<t>This EH is specified in <xref target="RFC5533"/>.</t> <name slugifiedName="name-mobility-header-protocol-nu">Mobility Header
</section> (Protocol Number=135)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specific Security Implications"> -3.5.7.1">
<t>The specific security implications are discussed in detail in Section 16 of < <name slugifiedName="name-uses-7">Uses</name>
xref target="RFC5533"/>.</t> <t indent="0" pn="section-3.5.7.1-1">The Mobility Header is an EH us
</section> ed by mobile nodes, correspondent nodes, and home agents in all messaging relate
d to the creation and management of bindings in Mobile IPv6.</t>
<section title="Operational and Interoperability Impact if Blocked"> </section>
<t>Discarding packets that contain this EH will break Shim6.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -3.5.7.2">
<name slugifiedName="name-specification-7">Specification</name>
<section title="Advice"> <t indent="0" pn="section-3.5.7.2-1">This EH is specified in <xref t
<t>Intermediate systems should permit packets containing this EH.</t> arget="RFC6275" format="default" sectionFormat="of" derivedContent="RFC6275"/>.<
</section> /t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Use for experimentation and testing (Protocol Numbers=253 and 25 -3.5.7.3">
4)" anchor="proto253254"> <name slugifiedName="name-specific-security-implications-4">Specific
<section title="Uses"> Security Implications</name>
<t>These IPv6 EHs are employed for performing RFC3692-Style experiments (see <xr <t indent="0" pn="section-3.5.7.3-1">A thorough security assessment
ef target="RFC3692"/> for details).</t> of the security implications of the Mobility Header and related mechanisms can b
</section> e found in <xref target="RFC6275" sectionFormat="of" section="15" format="defaul
t" derivedLink="https://rfc-editor.org/rfc/rfc6275#section-15" derivedContent="R
<section title="Specification"> FC6275"/>.</t>
<t>These EHs are specified in <xref target="RFC3692"/> and <xref target="RFC4727 </section>
"/>.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -3.5.7.4">
<name slugifiedName="name-operational-and-interoperability-">Operati
<section title="Specific Security Implications"> onal and Interoperability Impact If Blocked</name>
<t>The security implications of these EHs will depend on their specific use.</t> <t indent="0" pn="section-3.5.7.4-1">Discarding packets containing t
</section> his EH would break Mobile IPv6.</t>
</section>
<section title="Operational and Interoperability Impact if Blocked"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>For obvious reasons, discarding packets that contain these EHs limits the abi -3.5.7.5">
lity to perform legitimate experiments across IPv6 routers. <name slugifiedName="name-advice-7">Advice</name>
<t indent="0" pn="section-3.5.7.5-1">Intermediate systems should per
mit packets that contain a Mobility Header.</t>
</section>
</section>
<section anchor="proto139" numbered="true" toc="exclude" removeInRFC="fa
lse" pn="section-3.5.8">
<name slugifiedName="name-host-identity-protocol-prot">Host Identity P
rotocol (Protocol Number=139)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.8.1">
<name slugifiedName="name-uses-8">Uses</name>
<t indent="0" pn="section-3.5.8.1-1">This EH is employed with the Ho
st Identity Protocol (HIP), which is a protocol that allows consenting hosts to
securely establish and maintain shared IP-layer state, allowing the separation o
f the identifier and locator roles of IP addresses, thereby enabling continuity
of communications across IP address changes.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.8.2">
<name slugifiedName="name-specification-8">Specification</name>
<t indent="0" pn="section-3.5.8.2-1">This EH is specified in <xref t
arget="RFC7401" format="default" sectionFormat="of" derivedContent="RFC7401"/>.<
/t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.8.3">
<name slugifiedName="name-specific-security-implications-5">Specific
Security Implications</name>
<t indent="0" pn="section-3.5.8.3-1">The security implications of th
e HIP header are discussed in detail in <xref target="RFC7401" sectionFormat="of
" section="8" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7401#s
ection-8" derivedContent="RFC7401"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.8.4">
<name slugifiedName="name-operational-and-interoperability-i">Operat
ional and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-3.5.8.4-1">Discarding packets that contain
a HIP header would break HIP deployments.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.8.5">
<name slugifiedName="name-advice-8">Advice</name>
<t indent="0" pn="section-3.5.8.5-1">Intermediate systems should per
mit packets that contain a HIP header.</t>
</section>
</section>
<section anchor="proto140" numbered="true" toc="exclude" removeInRFC="fa
lse" pn="section-3.5.9">
<name slugifiedName="name-shim6-protocol-protocol-num">Shim6 Protocol
(Protocol Number=140)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.9.1">
<name slugifiedName="name-uses-9">Uses</name>
<t indent="0" pn="section-3.5.9.1-1">This EH is employed by the Shim
6 protocol <xref target="RFC5533" format="default" sectionFormat="of" derivedCon
tent="RFC5533"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.9.2">
<name slugifiedName="name-specification-9">Specification</name>
<t indent="0" pn="section-3.5.9.2-1">This EH is specified in <xref t
arget="RFC5533" format="default" sectionFormat="of" derivedContent="RFC5533"/>.<
/t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.9.3">
<name slugifiedName="name-specific-security-implications-6">Specific
Security Implications</name>
<t indent="0" pn="section-3.5.9.3-1">The specific security implicati
ons are discussed in detail in <xref target="RFC5533" sectionFormat="of" section
="16" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5533#section-1
6" derivedContent="RFC5533"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.9.4">
<name slugifiedName="name-operational-and-interoperability-im">Opera
tional and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-3.5.9.4-1">Discarding packets that contain
this EH will break Shim6.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.9.5">
<name slugifiedName="name-advice-9">Advice</name>
<t indent="0" pn="section-3.5.9.5-1">Intermediate systems should per
mit packets containing this EH.</t>
</section>
</section>
<section anchor="proto253254" numbered="true" toc="exclude" removeInRFC=
"false" pn="section-3.5.10">
<name slugifiedName="name-use-for-experimentation-and">Use for Experim
entation and Testing (Protocol Numbers=253 and 254)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.10.1">
<name slugifiedName="name-uses-10">Uses</name>
<t indent="0" pn="section-3.5.10.1-1">These IPv6 EHs are employed fo
r performing RFC3692-style experiments (see <xref target="RFC3692" format="defau
lt" sectionFormat="of" derivedContent="RFC3692"/> for details).</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.10.2">
<name slugifiedName="name-specification-10">Specification</name>
<t indent="0" pn="section-3.5.10.2-1">These EHs are specified in <xr
ef target="RFC3692" format="default" sectionFormat="of" derivedContent="RFC3692"
/> and <xref target="RFC4727" format="default" sectionFormat="of" derivedContent
="RFC4727"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.10.3">
<name slugifiedName="name-specific-security-implications-7">Specific
Security Implications</name>
<t indent="0" pn="section-3.5.10.3-1">The security implications of t
hese EHs will depend on their specific use.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-3.5.10.4">
<name slugifiedName="name-operational-and-interoperability-im-2">Ope
rational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-3.5.10.4-1">For obvious reasons, discardin
g packets that contain these EHs limits the ability to perform legitimate experi
ments across IPv6 routers.
</t> </t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Advice"> -3.5.10.5">
<t>Operators should determine according to their own circumstances whether to di <name slugifiedName="name-advice-10">Advice</name>
scard packets containing these EHs.</t> <t indent="0" pn="section-3.5.10.5-1">Operators should determine, ac
<!-- cording to their own circumstances, whether to discard packets containing these
<t>Intermediate systems should discard packets containing these EHs. Only in spe EHs.</t>
cific scenarios in which RFC3692-Style experiments are to be performed should th </section>
ese EHs be permitted.</t> --> </section>
</section> </section>
</section> <section anchor="unknown-headers" numbered="true" toc="include" removeInRF
C="false" pn="section-3.6">
</section> <name slugifiedName="name-advice-on-the-handling-of-p">Advice on the Han
<section title="Advice on the Handling of Packets with Unknown IPv6 Extension He dling of Packets with Unknown IPv6 Extension Headers</name>
aders" anchor="unknown-headers"> <t indent="0" pn="section-3.6-1">We refer to IPv6 EHs that have not been
<t>We refer to IPv6 EHs that have not been assigned an Internet Protocol Number assigned an Internet Protocol number by IANA (and marked as such) in <xref targ
by IANA (and marked as such) in <xref target="IANA-PROTOCOLS"/> as "unknown IPv6 et="IANA-PROTOCOLS" format="default" sectionFormat="of" derivedContent="IANA-PRO
extension headers" ("unknown IPv6 EHs"). TOCOLS"/> as "unknown IPv6 Extension Headers" ("unknown IPv6 EHs").
</t> </t>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section-3
<section title="Uses"> .6.1">
<t>New IPv6 EHs may be specified as part of future extensions to the IPv6 protoc <name slugifiedName="name-uses-11">Uses</name>
ol. <t indent="0" pn="section-3.6.1-1">New IPv6 EHs may be specified as pa
rt of future extensions to the IPv6 protocol.
</t> </t>
<t indent="0" pn="section-3.6.1-2">Since IPv6 EHs and upper-layer prot
<t>Since IPv6 EHs and Upper-layer protocols employ the same namespace, it is imp ocols employ the same namespace, it is impossible to tell whether an unknown Int
ossible to tell whether an unknown "Internet Protocol Number" is being employed ernet Protocol number is being employed for an IPv6 EH or an upper-layer protoco
for an IPv6 EH or an Upper-Layer protocol. l.
</t> </t>
</section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section-3
.6.2">
<section title="Specification"> <name slugifiedName="name-specification-11">Specification</name>
<t>The processing of unknown IPv6 EHs is specified in <xref target="RFC7045"/>.< <t indent="0" pn="section-3.6.2-1">The processing of unknown IPv6 EHs
/t> is specified in <xref target="RFC7045" format="default" sectionFormat="of" deriv
</section> edContent="RFC7045"/>.</t>
</section>
<section title="Specific Security Implications"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section-3
<t>For obvious reasons, it is impossible to determine specific security implicat .6.3">
ions of unknown IPv6 EHs.</t> <name slugifiedName="name-specific-security-implications-8">Specific S
</section> ecurity Implications</name>
<t indent="0" pn="section-3.6.3-1">For obvious reasons, it is impossib
<section title="Operational and Interoperability Impact if Blocked"> le to determine specific security implications of unknown IPv6 EHs.</t>
<t>As noted in <xref target="RFC7045"/>, discarding unknown IPv6 EHs may slow do </section>
wn the deployment of new IPv6 EHs and transport protocols. The corresponding IAN <section numbered="true" toc="exclude" removeInRFC="false" pn="section-3
A registry (<xref target="IANA-PROTOCOLS"/>) should be monitored such that filte .6.4">
ring rules are updated as new IPv6 EHs are standardized.</t> <name slugifiedName="name-operational-and-interoperability-im-3">Opera
tional and Interoperability Impact If Blocked</name>
<t>We note that since IPv6 EHs and upper-layer protocols share the same numberin <t indent="0" pn="section-3.6.4-1">As noted in <xref target="RFC7045"
g space, discarding unknown IPv6 EHs may result in packets encapsulating unknown format="default" sectionFormat="of" derivedContent="RFC7045"/>, discarding unkno
upper-layer protocols being discarded. wn IPv6 EHs may slow down the deployment of new IPv6 EHs and transport protocols
. The corresponding IANA registry, which is <xref target="IANA-PROTOCOLS" format
="default" sectionFormat="of" derivedContent="IANA-PROTOCOLS"/>, should be monit
ored such that filtering rules are updated as new IPv6 EHs are standardized.</t>
<t indent="0" pn="section-3.6.4-2">We note that since IPv6 EHs and upp
er-layer protocols share the same numbering space, discarding unknown IPv6 EHs m
ay result in packets encapsulating unknown upper-layer protocols being discarded
.
</t> </t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section-3
<section title="Advice"> .6.5">
<t>Operators should determine according to their own circumstances whether to di <name slugifiedName="name-advice-11">Advice</name>
scard packets containing unknown IPv6 EHs.</t> <t indent="0" pn="section-3.6.5-1">Operators should determine, accordi
</section> ng to their own circumstances, whether to discard packets containing unknown IPv
6 EHs.</t>
</section> </section>
</section>
</section> </section>
<section anchor="ipv6-options-discussion" numbered="true" toc="include" remo
<section title="IPv6 Options" anchor="ipv6-options-discussion"> veInRFC="false" pn="section-4">
<section title="General Discussion" anchor="ipv6-options-general-discussion"> <name slugifiedName="name-ipv6-options">IPv6 Options</name>
<t>The following subsections describe specific security implications of differen <section anchor="ipv6-options-general-discussion" numbered="true" toc="inc
t IPv6 options, and provide advice regarding filtering packets that contain such lude" removeInRFC="false" pn="section-4.1">
options. <name slugifiedName="name-general-discussion-2">General Discussion</name
>
<t indent="0" pn="section-4.1-1">The following subsections describe spec
ific security implications of different IPv6 options and provide advice regardin
g filtering packets that contain such options.
</t> </t>
</section> </section>
<section anchor="ipv6-options-general-implications" numbered="true" toc="i
<section title="General Security Implications of IPv6 Options" anchor="ipv6-opti nclude" removeInRFC="false" pn="section-4.2">
ons-general-implications"> <name slugifiedName="name-general-security-implication">General Security
<t>The general security implications of IPv6 options are closely related to thos Implications of IPv6 Options</name>
e discussed in <xref target="ipv6-eh-general-implications"/> for IPv6 EHs. Essen <t indent="0" pn="section-4.2-1">The general security implications of IP
tially, packets that contain IPv6 options might need to be processed by an IPv6 v6 options are closely related to those discussed in <xref target="ipv6-eh-gener
router's general-purpose CPU,and hence could present a DDoS risk to that router' al-implications" format="default" sectionFormat="of" derivedContent="Section 3.2
s general-purpose CPU (and thus to the router itself). For some architectures, a "/> for IPv6 EHs. Essentially, packets that contain IPv6 options might need to b
possible mitigation would be to rate-limit the packets that are to be processed e processed by an IPv6 router's general-purpose CPU and, hence, could present a
by the general-purpose CPU (see e.g. <xref target="Cisco-EH"/>).</t> Distributed Denial-of-Service (DDoS) risk to that router's general-purpose CPU (
</section> and thus to the router itself). For some architectures, a possible mitigation wo
uld be to rate-limit the packets that are to be processed by the general-purpose
<section title="Summary of Advice on the Handling of IPv6 Packets with Specific CPU (see, e.g., <xref target="Cisco-EH" format="default" sectionFormat="of" der
IPv6 Extension Headers"> ivedContent="Cisco-EH"/>).</t>
<t>This section summarizes the advice provided in <xref target="advice-ehs"/>, p </section>
roviding references to the specific sections in which a detailed analysis can be <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3
found.</t> ">
<name slugifiedName="name-summary-of-advice-on-the-hand">Summary of Advi
<texttable title="Summary of Advice on the Handling of IPv6 Packets with Spe ce on the Handling of IPv6 Packets with Specific IPv6 Options</name>
cific IPv6 options" style="all" anchor="option-table"> <t indent="0" pn="section-4.3-1">This section summarizes the advice prov
<ttcol align="center">Option</ttcol> ided in <xref target="opt-filtering" format="default" sectionFormat="of" derived
<ttcol align="center">Filtering policy</ttcol> Content="Section 4.4"/>, and it includes references to the specific sections in
<ttcol align="center">Reference</ttcol> which a detailed analysis can be found.</t>
<c>Pad1 (Type=0x00)</c><c>Permit</c><c><xref target="x00"/></c> <table anchor="option-table" align="center" pn="table-2">
<c>PadN (Type=0x01)</c><c>Permit</c><c><xref target="x01"/></c> <name slugifiedName="name-summary-of-advice-on-the-handl">Summary of A
<c>Tunnel Encapsulation Limit (Type=0x04)</c><c>Permit</c><c><xref target="x04"/ dvice on the Handling of IPv6 Packets with Specific IPv6 Options</name>
></c> <thead>
<c>Router Alert (Type=0x05)</c><c>Permit based on needed functionality</c><c><xr <tr>
ef target="x05"/></c> <th align="center" colspan="1" rowspan="1">Option</th>
<c>CALIPSO (Type=0x07)</c><c>Permit based on needed functionality</c><c><xref ta <th align="center" colspan="1" rowspan="1">Filtering Policy</th>
rget="x07"/></c> <th align="center" colspan="1" rowspan="1">Reference</th>
<c>SMF_DPD (Type=0x08)</c><c>Permit based on needed functionality</c><c><xref ta </tr>
rget="x08"/></c> </thead>
<c>PDM Option (Type=0x0F)</c><c>Permit</c><c><xref target="x0F"/></c> <tbody>
<c>RPL Option (Type=0x23)</c><c>Permit</c><c><xref target="x23"/></c> <tr>
<c>Quick-Start (Type=0x26)</c><c>Permit</c><c><xref target="x26"/></c> <td align="center" colspan="1" rowspan="1">Pad1 (Type=0x00)</td>
<c>Deprecated (Type=0x4D)</c><c>Drop</c><c><xref target="x4D"/></c> <td align="center" colspan="1" rowspan="1">Permit</td>
<c>MPL Option (Type=0x6D)</c><c>Permit</c><c><xref target="x6D"/></c> <td align="center" colspan="1" rowspan="1">
<c>Jumbo Payload (Type=0C2)</c><c>Permit based on needed functionality</c><c><xr <xref target="x00" format="default" sectionFormat="of" derivedCo
ef target="xC2"/></c> ntent="Section 4.4.1"/></td>
<c>RPL Option (Type=0x63)</c><c>Drop in non-RPL routers</c><c><xref target="x63" </tr>
/></c> <tr>
<c>Endpoint Identification (Type=0x8A)</c><c>Drop</c><c><xref target="x8A"/></c> <td align="center" colspan="1" rowspan="1">PadN (Type=0x01)</td>
<c>ILNP Nonce (Type=0x8B)</c><c>Permit</c><c><xref target="x8B"/></c> <td align="center" colspan="1" rowspan="1">Permit</td>
<c>Line-Identification Option (Type=0x8C)</c><c>Drop</c><c><xref target="x8C"/>< <td align="center" colspan="1" rowspan="1">
/c> <xref target="x01" format="default" sectionFormat="of" derivedCo
<c>Home Address (Type=0xC9)</c><c>Permit</c><c><xref target="xC9"/></c> ntent="Section 4.4.2"/></td>
<c>IP_DFF (Type=0xEE)</c><c>Permit based on needed functionality</c><c><xref tar </tr>
get="xEE"/></c> <tr>
<c>RFC3692-style Experiment (Types = 0x1E, 0x3E, 0x5E, 0x7E, 0x9E, 0xBE, 0xDE, 0 <td align="center" colspan="1" rowspan="1">Tunnel Encapsulation Li
xFE)</c><c>Permit based on needed functionality</c><c><xref target="x1E"/></c> mit (Type=0x04)</td>
<td align="center" colspan="1" rowspan="1">Permit</td>
</texttable> <td align="center" colspan="1" rowspan="1">
<xref target="x04" format="default" sectionFormat="of" derivedCo
</section> ntent="Section 4.4.3"/></td>
</tr>
<section title="Advice on the Handling of Packets with Specific IPv6 Options" an <tr>
chor="opt-filtering"> <td align="center" colspan="1" rowspan="1">Router Alert (Type=0x05
<t>The following subsections contain a description of each of the IPv6 options t )</td>
hat have so far been specified, a summary of the security implications of each o <td align="center" colspan="1" rowspan="1">Permit based on needed
f such options, a discussion of possible functionality</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x05" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.4"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">CALIPSO (Type=0x07)</td
>
<td align="center" colspan="1" rowspan="1">Permit based on needed
functionality</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x07" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.5"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">SMF_DPD (Type=0x08)</td
>
<td align="center" colspan="1" rowspan="1">Permit based on needed
functionality</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x08" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.6"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">PDM Option (Type=0x0F)<
/td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x0F" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.7"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">RPL Option (Type=0x23)<
/td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x23" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.8"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Quick-Start (Type=0x26)
</td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x26" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.9"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Deprecated (Type=0x4D)<
/td>
<td align="center" colspan="1" rowspan="1">Drop</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x4D" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.10"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">MPL Option (Type=0x6D)<
/td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x6D" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.12"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Jumbo Payload (Type=0xC
2)</td>
<td align="center" colspan="1" rowspan="1">Permit based on needed
functionality</td>
<td align="center" colspan="1" rowspan="1">
<xref target="xC2" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.16"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">RPL Option (Type=0x63)<
/td>
<td align="center" colspan="1" rowspan="1">Drop</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x63" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.11"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Endpoint Identification
(Type=0x8A)</td>
<td align="center" colspan="1" rowspan="1">Drop</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x8A" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.13"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">ILNP Nonce (Type=0x8B)<
/td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x8B" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.14"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Line-Identification Opt
ion (Type=0x8C)</td>
<td align="center" colspan="1" rowspan="1">Drop</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x8C" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.15"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">Home Address (Type=0xC9
)</td>
<td align="center" colspan="1" rowspan="1">Permit</td>
<td align="center" colspan="1" rowspan="1">
<xref target="xC9" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.17"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">IP_DFF (Type=0xEE)</td>
<td align="center" colspan="1" rowspan="1">Permit based on needed
functionality</td>
<td align="center" colspan="1" rowspan="1">
<xref target="xEE" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.18"/></td>
</tr>
<tr>
<td align="center" colspan="1" rowspan="1">RFC3692-style Experimen
t (Types = 0x1E, 0x3E, 0x5E, 0x7E, 0x9E, 0xBE, 0xDE, 0xFE)</td>
<td align="center" colspan="1" rowspan="1">Permit based on needed
functionality</td>
<td align="center" colspan="1" rowspan="1">
<xref target="x1E" format="default" sectionFormat="of" derivedCo
ntent="Section 4.4.19"/></td>
</tr>
</tbody>
</table>
</section>
<section anchor="opt-filtering" numbered="true" toc="include" removeInRFC=
"false" pn="section-4.4">
<name slugifiedName="name-advice-on-the-handling-of-pa">Advice on the Ha
ndling of Packets with Specific IPv6 Options</name>
<t indent="0" pn="section-4.4-1">The following subsections contain a des
cription of each of the IPv6 options that have so far been specified, a summary
of the security implications of each of such options, a discussion of possible
interoperability implications if packets containing such options are interoperability implications if packets containing such options are
discarded, and specific advice regarding whether packets containing these op tions should be permitted.</t> discarded, and specific advice regarding whether packets containing these op tions should be permitted.</t>
<section anchor="x00" numbered="true" toc="exclude" removeInRFC="false"
<section title="Pad1 (Type=0x00)" anchor="x00"> pn="section-4.4.1">
<section title="Uses"> <name slugifiedName="name-pad1-type0x00">Pad1 (Type=0x00)</name>
<t>This option is used when necessary to align subsequent options and to pad out <section numbered="true" toc="exclude" removeInRFC="false" pn="section
the containing header to a multiple of 8 octets in length.</t> -4.4.1.1">
</section> <name slugifiedName="name-uses-12">Uses</name>
<t indent="0" pn="section-4.4.1.1-1">This option is used when necess
<section title="Specification"> ary to align subsequent options and to pad out the containing header to a multip
<t>This option is specified in <xref target="RFC8200"/>.</t> le of 8 octets in length.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specific Security Implications"> -4.4.1.2">
<t>None.</t> <name slugifiedName="name-specification-12">Specification</name>
</section> <t indent="0" pn="section-4.4.1.2-1">This option is specified in <xr
ef target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"
<section title="Operational and Interoperability Impact if Blocked"> />.</t>
<t>Discarding packets that contain this option would potentially break any proto </section>
col that relies on IPv6 options.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.1.3">
<name slugifiedName="name-specific-security-implications-9">Specific
<section title="Advice"> Security Implications</name>
<t>Intermediate systems should not discard packets based on the presence of this <t indent="0" pn="section-4.4.1.3-1">None.</t>
option.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.1.4">
<name slugifiedName="name-operational-and-interoperability-im-4">Ope
<section title="PadN (Type=0x01)" anchor="x01"> rational and Interoperability Impact If Blocked</name>
<section title="Uses"> <t indent="0" pn="section-4.4.1.4-1">Discarding packets that contain
<t>This option is used when necessary to align subsequent options and to pad out this option would potentially break any protocol that relies on IPv6 options.</
the containing header to a multiple of 8 octets in length.</t> t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specification"> -4.4.1.5">
<t>This option is specified in <xref target="RFC8200"/>.</t> <name slugifiedName="name-advice-12">Advice</name>
</section> <t indent="0" pn="section-4.4.1.5-1">Intermediate systems should not
discard packets based on the presence of this option.</t>
<section title="Specific Security Implications"> </section>
<t>Because of the possible size of this option, it could be leveraged as a large </section>
-bandwidth covert channel.</t> <section anchor="x01" numbered="true" toc="exclude" removeInRFC="false"
</section> pn="section-4.4.2">
<name slugifiedName="name-padn-type0x01">PadN (Type=0x01)</name>
<section title="Operational and Interoperability Impact if Blocked"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Discarding packets that contain this option would potentially break any proto -4.4.2.1">
col that relies on IPv6 options.</t> <name slugifiedName="name-uses-13">Uses</name>
</section> <t indent="0" pn="section-4.4.2.1-1">This option is used when necess
ary to align subsequent options and to pad out the containing header to a multip
<section title="Advice"> le of 8 octets in length.</t>
<t>Intermediate systems should not discard IPv6 packets based on the presence of </section>
this option.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.2.2">
</section> <name slugifiedName="name-specification-13">Specification</name>
<t indent="0" pn="section-4.4.2.2-1">This option is specified in <xr
<section title="Tunnel Encapsulation Limit (Type=0x04)" anchor="x04"> ef target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"
<section title="Uses"> />.</t>
<t>The Tunnel Encapsulation Limit option can be employed to specify how many fur </section>
ther levels of nesting the packet is permitted to undergo.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.2.3">
<name slugifiedName="name-specific-security-implications-10">Specifi
<section title="Specification"> c Security Implications</name>
<t>This option is specified in <xref target="RFC2473"/>.</t> <t indent="0" pn="section-4.4.2.3-1">Because of the possible size of
</section> this option, it could be leveraged as a large-bandwidth covert channel.</t>
</section>
<section title="Specific Security Implications"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Those described in <xref target="RFC2473"/>.</t> -4.4.2.4">
</section> <name slugifiedName="name-operational-and-interoperability-im-5">Ope
rational and Interoperability Impact If Blocked</name>
<section title="Operational and Interoperability Impact if Blocked"> <t indent="0" pn="section-4.4.2.4-1">Discarding packets that contain
<t>Discarding packets based on the presence of this option could result in tunne this option would potentially break any protocol that relies on IPv6 options.</
l traffic being discarded.</t> t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Advice"> -4.4.2.5">
<t>Intermediate systems should not discard packets based on the presence of this <name slugifiedName="name-advice-13">Advice</name>
option.</t> <t indent="0" pn="section-4.4.2.5-1">Intermediate systems should not
</section> discard IPv6 packets based on the presence of this option.</t>
</section> </section>
</section>
<section title="Router Alert (Type=0x05)" anchor="x05"> <section anchor="x04" numbered="true" toc="exclude" removeInRFC="false"
<section title="Uses"> pn="section-4.4.3">
<t>The Router Alert option <xref target="RFC2711"/> is employed by a number of p <name slugifiedName="name-tunnel-encapsulation-limit-">Tunnel Encapsul
rotocols, including the Resource reSerVation Protocol (RSVP) <xref target="RFC22 ation Limit (Type=0x04)</name>
05"/>, Multicast Listener Discovery (MLD) <xref target="RFC2710"/> <xref target= <section numbered="true" toc="exclude" removeInRFC="false" pn="section
"RFC3810"/>, Multicast Router Discovery (MRD) <xref target="RFC4286"/>, and Gene -4.4.3.1">
ral Internet Signaling Transport (GIST) <xref target="RFC5971"/>. Its usage is d <name slugifiedName="name-uses-14">Uses</name>
iscussed in detail in <xref target="RFC6398"/>. <t indent="0" pn="section-4.4.3.1-1">The Tunnel Encapsulation Limit
option can be employed to specify how many further levels of nesting the packet
is permitted to undergo.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.3.2">
<name slugifiedName="name-specification-14">Specification</name>
<t indent="0" pn="section-4.4.3.2-1">This option is specified in <xr
ef target="RFC2473" format="default" sectionFormat="of" derivedContent="RFC2473"
/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.3.3">
<name slugifiedName="name-specific-security-implications-11">Specifi
c Security Implications</name>
<t indent="0" pn="section-4.4.3.3-1">These are discussed in <xref ta
rget="RFC2473" format="default" sectionFormat="of" derivedContent="RFC2473"/>.</
t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.3.4">
<name slugifiedName="name-operational-and-interoperability-im-6">Ope
rational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.3.4-1">Discarding packets based on the
presence of this option could result in tunnel traffic being discarded.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.3.5">
<name slugifiedName="name-advice-14">Advice</name>
<t indent="0" pn="section-4.4.3.5-1">Intermediate systems should not
discard packets based on the presence of this option.</t>
</section>
</section>
<section anchor="x05" numbered="true" toc="exclude" removeInRFC="false"
pn="section-4.4.4">
<name slugifiedName="name-router-alert-type0x05">Router Alert (Type=0x
05)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.4.1">
<name slugifiedName="name-uses-15">Uses</name>
<t indent="0" pn="section-4.4.4.1-1">The Router Alert option <xref t
arget="RFC2711" format="default" sectionFormat="of" derivedContent="RFC2711"/> i
s employed by a number of protocols, including the Resource reSerVation Protocol
(RSVP) <xref target="RFC2205" format="default" sectionFormat="of" derivedConten
t="RFC2205"/>, Multicast Listener Discovery (MLD) <xref target="RFC2710" format=
"default" sectionFormat="of" derivedContent="RFC2710"/> <xref target="RFC3810" f
ormat="default" sectionFormat="of" derivedContent="RFC3810"/>, Multicast Router
Discovery (MRD) <xref target="RFC4286" format="default" sectionFormat="of" deriv
edContent="RFC4286"/>, and General Internet Signaling Transport (GIST) <xref tar
get="RFC5971" format="default" sectionFormat="of" derivedContent="RFC5971"/>. It
s usage is discussed in detail in <xref target="RFC6398" format="default" sectio
nFormat="of" derivedContent="RFC6398"/>.
</t> </t>
</section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.4.2">
<section title="Specification"> <name slugifiedName="name-specification-15">Specification</name>
<t>This option is specified in <xref target="RFC2711"/>.</t> <t indent="0" pn="section-4.4.4.2-1">This option is specified in <xr
</section> ef target="RFC2711" format="default" sectionFormat="of" derivedContent="RFC2711"
/>.</t>
<section title="Specific Security Implications" anchor="ra-usage"> </section>
<t>Since this option causes the contents of the packet to be inspected by the ha <section anchor="ra-usage" numbered="true" toc="exclude" removeInRFC="
ndling device, this option could be leveraged for performing DoS attacks. The se false" pn="section-4.4.4.3">
curity implications of the Router Alert option are discussed in detail in <xref <name slugifiedName="name-specific-security-implications-12">Specifi
target="RFC6398"/>.</t> c Security Implications</name>
</section> <t indent="0" pn="section-4.4.4.3-1">Since this option causes the co
ntents of the packet to be inspected by the handling device, this option could b
<section title="Operational and Interoperability Impact if Blocked"> e leveraged for performing DoS attacks. The security implications of the Router
<t>Discarding packets that contain this option would break any protocols that re Alert option are discussed in detail in <xref target="RFC6398" format="default"
ly on them, such as RSVP and multicast deployments. Please see <xref target="ra- sectionFormat="of" derivedContent="RFC6398"/>.</t>
usage"/> for further details.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.4.4">
<section title="Advice"> <name slugifiedName="name-operational-and-interoperability-im-7">Ope
<t>Packets containing this option should be permitted in environments where supp rational and Interoperability Impact If Blocked</name>
ort for RSVP, multicast routing, or similar protocols is desired.</t> <t indent="0" pn="section-4.4.4.4-1">Discarding packets that contain
</section> this option would break any protocols that rely on them, such as RSVP and multi
</section> cast deployments. Please see <xref target="ra-usage" format="default" sectionFor
mat="of" derivedContent="Section 4.4.4.3"/> for further details.</t>
<section title="CALIPSO (Type=0x07)" anchor="x07"> </section>
<section title="Uses"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>This option is used for encoding explicit packet Sensitivity Labels on IPv6 p -4.4.4.5">
ackets. It is intended for use only within Multi-Level Secure (MLS) networking <name slugifiedName="name-advice-15">Advice</name>
environments that are both trusted and trustworthy.</t> <t indent="0" pn="section-4.4.4.5-1">Packets containing this option
</section> should be permitted in environments where support for RSVP, multicast routing, o
r similar protocols is required.</t>
<section title="Specification"> </section>
<t>This option is specified in <xref target="RFC5570"/>.</t> </section>
</section> <section anchor="x07" numbered="true" toc="exclude" removeInRFC="false"
pn="section-4.4.5">
<section title="Specific Security Implications"> <name slugifiedName="name-calipso-type0x07">CALIPSO (Type=0x07)</name>
<t>Presence of this option in a packet does not by itself create any <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.5.1">
<name slugifiedName="name-uses-16">Uses</name>
<t indent="0" pn="section-4.4.5.1-1">This option is used for encodin
g explicit packet Sensitivity Labels on IPv6 packets. It is intended for use on
ly within Multi-Level Secure (MLS) networking environments that are both trusted
and trustworthy.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.5.2">
<name slugifiedName="name-specification-16">Specification</name>
<t indent="0" pn="section-4.4.5.2-1">This option is specified in <xr
ef target="RFC5570" format="default" sectionFormat="of" derivedContent="RFC5570"
/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.5.3">
<name slugifiedName="name-specific-security-implications-13">Specifi
c Security Implications</name>
<t indent="0" pn="section-4.4.5.3-1">Presence of this option in a pa
cket does not by itself create any
specific new threat. Packets with this option ought not normally be specific new threat. Packets with this option ought not normally be
seen on the global public Internet.</t> seen on the global public Internet.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Operational and Interoperability Impact if Blocked"> -4.4.5.4">
<t>If packets with this option are discarded or if the option is <name slugifiedName="name-operational-and-interoperability-im-8">Ope
rational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.5.4-1">If packets with this option are
discarded or if the option is
stripped from the packet during transmission from source to stripped from the packet during transmission from source to
destination, then the packet itself is likely to be discarded by the destination, then the packet itself is likely to be discarded by the
receiver because it is not properly labeled. In some cases, the receiver because it is not properly labeled. In some cases, the
receiver might receive the packet but associate an incorrect receiver might receive the packet but associate an incorrect
sensitivity label with the received data from the packet whose CALIPSO Sensitivity Label with the received data from the packet whose Common
was stripped by a middle-box (such as a packet-scrubber). Associating Architecture Label
an IPv6 Security Option (CALIPSO)
incorrect sensitivity label can cause the received information was stripped by a middlebox (such as a packet scrubber). Associating a
either to be handled as more sensitive than it really is n
incorrect Sensitivity Label can cause the received information
to be handled either as more sensitive than it really is
("upgrading") or as less sensitive than it really is ("upgrading") or as less sensitive than it really is
("downgrading"), either of which is problematic. As noted in <xref tar ("downgrading"), either of which is problematic. As noted in <xref t
get="RFC5570"/>, IPsec <xref target="RFC4301"/> <xref target="RFC4302"/> <xref t arget="RFC5570" format="default" sectionFormat="of" derivedContent="RFC5570"/>,
arget="RFC4303"/> can be employed to protect the CALIPSO option.</t> IPsec <xref target="RFC4301" format="default" sectionFormat="of" derivedContent=
</section> "RFC4301"/> <xref target="RFC4302" format="default" sectionFormat="of" derivedCo
ntent="RFC4302"/> <xref target="RFC4303" format="default" sectionFormat="of" der
<section title="Advice"> ivedContent="RFC4303"/> can be employed to protect the CALIPSO.</t>
<t> </section>
Recommendations for handling the CALIPSO option depend on the deployment environ <section numbered="true" toc="exclude" removeInRFC="false" pn="section
ment, rather than whether an intermediate system -4.4.5.5">
<name slugifiedName="name-advice-16">Advice</name>
<t indent="0" pn="section-4.4.5.5-1">
Recommendations for handling the CALIPSO depend on the deployment environment ra
ther than on whether an intermediate system
happens to be deployed as a transit device (e.g., IPv6 transit router).</t> happens to be deployed as a transit device (e.g., IPv6 transit router).</t>
<t indent="0" pn="section-4.4.5.5-2">Explicit configuration is the o
<t>Explicit configuration is the only method via which an intermediate system nly method via which an intermediate system
can know whether that particular intermediate system has been can know whether that particular intermediate system has been
deployed within a Multi-Level Secure (MLS) environment. In many cases, deployed within an MLS environment. In many cases,
ordinary commercial intermediate systems (e.g., IPv6 routers and firewalls) ordinary commercial intermediate systems (e.g., IPv6 routers and firewalls)
are the majority of the deployed intermediate systems inside an MLS are the majority of the deployed intermediate systems inside an MLS
network environment. </t> network environment. </t>
<t indent="0" pn="section-4.4.5.5-3">For intermediate systems that D
<t>For Intermediate systems that DO NOT implement <xref target="RFC5570"/>, ther O NOT implement <xref target="RFC5570" format="default" sectionFormat="of" deriv
e edContent="RFC5570"/>, there
should be a configuration option to EITHER (a) drop packets containing should be a configuration option to either (a) drop packets containing
the CALIPSO option OR (b) to ignore the presence of the CALIPSO option the CALIPSO or (b) ignore the presence of the CALIPSO
and forward the packets normally. In non-MLS environments, such and forward the packets normally. In non-MLS environments, such
intermediate systems should have this configuration option set to (a) intermediate systems should have this configuration option set to (a)
above. In MLS environments, such intermediate systems should above. In MLS environments, such intermediate systems should
have this option set to (b) above. The default setting for this configuration have this option set to (b) above. The default setting for this configuration
option should be set to (a) above, because MLS environments are much option should be set to (a) above, because MLS environments are much
less common than non-MLS environments. less common than non-MLS environments.
</t> </t>
<t indent="0" pn="section-4.4.5.5-4">For intermediate systems that D
<t>For Intermediate systems that DO implement <xref target="RFC5570"/>, there sh O implement <xref target="RFC5570" format="default" sectionFormat="of" derivedCo
ould ntent="RFC5570"/>, there should
be configuration options (a) and (b) from the preceding paragraph and be configuration options (a) and (b) from the preceding paragraph and
also a third configuration option (c) to process packets containing also a third configuration option (c) to process packets containing
a CALIPSO option as per <xref target="RFC5570"/>. When deployed in non-MLS a CALIPSO as per <xref target="RFC5570" format="default" sectionFormat="of" der ivedContent="RFC5570"/>. When deployed in non-MLS
environments, such intermediate systems should have this configuration environments, such intermediate systems should have this configuration
option set to (a) above. When deployed in MLS environments, such option set to (a) above. When deployed in MLS environments, such
intermediate systems should have this set to (c). The default setting intermediate systems should have this configuration option set to (c). The def
for this configuration option MAY be set to (a) above, because MLS ault setting
for this configuration option <bcp14>MAY</bcp14> be set to (a) above, because M
LS
environments are much less common than non-MLS environments. environments are much less common than non-MLS environments.
</t> </t>
</section> </section>
</section> </section>
<section anchor="x08" numbered="true" toc="exclude" removeInRFC="false"
<section title="SMF_DPD (Type=0x08)" anchor="x08"> pn="section-4.4.6">
<section title="Uses"> <name slugifiedName="name-smf_dpd-type0x08">SMF_DPD (Type=0x08)</name>
<t>This option is employed in the (experimental) Simplified Multicast Forwarding <section numbered="true" toc="exclude" removeInRFC="false" pn="section
(SMF) for unique packet identification for IPv6 I-DPD, and as a mechanism to gu -4.4.6.1">
arantee non-collision of hash values for different packets when H-DPD is used.</ <name slugifiedName="name-uses-17">Uses</name>
t> <t indent="0" pn="section-4.4.6.1-1">This option is employed in the
</section> (experimental) Simplified Multicast Forwarding (SMF) for unique packet identific
ation for IPv6 Identification-based DPD (I-DPD) and as a mechanism to guarantee
<section title="Specification"> non-collision of hash values for different packets when Hash-based DPD (H-DPD) i
<t>This option is specified in <xref target="RFC6621"/>.</t> s used.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specific Security Implications"> -4.4.6.2">
<t>None. The use of transient numeric identifiers is subject to the security and <name slugifiedName="name-specification-17">Specification</name>
privacy considerations discussed in <xref target="I-D.irtf-pearg-numeric-ids-ge <t indent="0" pn="section-4.4.6.2-1">This option is specified in <xr
neration"/>.</t> ef target="RFC6621" format="default" sectionFormat="of" derivedContent="RFC6621"
</section> />.</t>
</section>
<section title="Operational and Interoperability Impact if Blocked"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Dropping packets containing this option within a MANET domain would break SMF -4.4.6.3">
. However, dropping such packets at the border of such domain would have no nega <name slugifiedName="name-specific-security-implications-14">Specifi
tive impact.</t> c Security Implications</name>
</section> <t indent="0" pn="section-4.4.6.3-1">None. The use of transient nume
ric identifiers is subject to the security and privacy considerations discussed
<section title="Advice"> in <xref target="I-D.irtf-pearg-numeric-ids-generation" format="default" section
<t>Intermediate systems that are not within a MANET domain should discard packet Format="of" derivedContent="NUMERIC-IDS"/>.</t>
s that contain this option.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.6.4">
<name slugifiedName="name-operational-and-interoperability-im-9">Ope
<section title="PDM (Type=0x0F)" anchor="x0F"> rational and Interoperability Impact If Blocked</name>
<section title="Uses"> <t indent="0" pn="section-4.4.6.4-1">Dropping packets containing thi
<t>This option is employed to convey sequence numbers and timing information in s option within a Mobile Ad Hoc Network (MANET) domain would break SMF. However,
IPv6 packets as a basis for measurements.</t> dropping such packets at the border of such domain would have no negative impac
</section> t.</t>
</section>
<section title="Specification"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>This option is specified in <xref target="RFC8250"/>.</t> -4.4.6.5">
</section> <name slugifiedName="name-advice-17">Advice</name>
<t indent="0" pn="section-4.4.6.5-1">Intermediate systems that are n
<section title="Specific Security Implications"> ot within a MANET domain should discard packets that contain this option.</t>
<t>Those specified in <xref target="RFC8250"/>. Additionally, since the options </section>
employs transient numeric identifiers, implementations may be subject to the iss </section>
ues discussed in <xref target="I-D.irtf-pearg-numeric-ids-generation"/>.</t> <section anchor="x0F" numbered="true" toc="exclude" removeInRFC="false"
</section> pn="section-4.4.7">
<name slugifiedName="name-pdm-type0x0f">PDM (Type=0x0F)</name>
<section title="Operational and Interoperability Impact if Blocked"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Dropping packets containing this option will result in negative interoperaibl -4.4.7.1">
ity implications for traffic employing this option as a basis for measurements.< <name slugifiedName="name-uses-18">Uses</name>
/t> <t indent="0" pn="section-4.4.7.1-1">This option is employed to conv
</section> ey sequence numbers and timing information in IPv6 packets as a basis for measur
ements.</t>
<section title="Advice"> </section>
<t>Intermediate systems should not discard packets based on the presence of this <section numbered="true" toc="exclude" removeInRFC="false" pn="section
option.</t> -4.4.7.2">
</section> <name slugifiedName="name-specification-18">Specification</name>
<t indent="0" pn="section-4.4.7.2-1">This option is specified in <xr
</section> ef target="RFC8250" format="default" sectionFormat="of" derivedContent="RFC8250"
/>.</t>
<section title="RPL Option (Type=0x23)" anchor="x23"> </section>
<section title="Uses"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>The RPL Option provides a mechanism to include routing information with each -4.4.7.3">
datagram that an RPL router forwards.</t> <name slugifiedName="name-specific-security-implications-15">Specifi
</section> c Security Implications</name>
<t indent="0" pn="section-4.4.7.3-1">These are discussed in <xref ta
<section title="Specification"> rget="RFC8250" format="default" sectionFormat="of" derivedContent="RFC8250"/>. A
<t>This option is specified in <xref target="RFC9008"/>.</t> dditionally, since this option employs transient numeric identifiers, implementa
</section> tions may be subject to the issues discussed in <xref target="I-D.irtf-pearg-num
eric-ids-generation" format="default" sectionFormat="of" derivedContent="NUMERIC
<section title="Specific Security Implications"> -IDS"/>.</t>
<t>Those described in <xref target="RFC9008"/>.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.7.4">
<section title="Operational and Interoperability Impact if Blocked"> <name slugifiedName="name-operational-and-interoperability-im-10">Op
<t>This option can survive outside of an RPL instance. As a result, discarding p erational and Interoperability Impact If Blocked</name>
ackets based on the presence of this option would break some use cases for RPL ( <t indent="0" pn="section-4.4.7.4-1">Dropping packets containing thi
see <xref target="RFC9008"/>).</t> s option will result in negative interoperability implications for traffic emplo
</section> ying this option as a basis for measurements.</t>
</section>
<section title="Advice"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Intermediate systems should not discard IPv6 packets based on the presence of -4.4.7.5">
this option.</t> <name slugifiedName="name-advice-18">Advice</name>
</section> <t indent="0" pn="section-4.4.7.5-1">Intermediate systems should not
</section> discard packets based on the presence of this option.</t>
</section>
<section title="Quick-Start (Type=0x26)" anchor="x26"> </section>
<section title="Uses"> <section anchor="x23" numbered="true" toc="exclude" removeInRFC="false"
<t>This IP Option is used in the specification of Quick-Start for pn="section-4.4.8">
<name slugifiedName="name-rpl-option-type0x23">RPL Option (Type=0x23)<
/name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.8.1">
<name slugifiedName="name-uses-19">Uses</name>
<t indent="0" pn="section-4.4.8.1-1">The RPL Option provides a mecha
nism to include routing information in each datagram that a RPL router forwards.
</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.8.2">
<name slugifiedName="name-specification-19">Specification</name>
<t indent="0" pn="section-4.4.8.2-1">This option is specified in <xr
ef target="RFC9008" format="default" sectionFormat="of" derivedContent="RFC9008"
/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.8.3">
<name slugifiedName="name-specific-security-implications-16">Specifi
c Security Implications</name>
<t indent="0" pn="section-4.4.8.3-1">These are discussed in <xref ta
rget="RFC9008" format="default" sectionFormat="of" derivedContent="RFC9008"/>.</
t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.8.4">
<name slugifiedName="name-operational-and-interoperability-im-11">Op
erational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.8.4-1">This option can survive outside
of a RPL instance. As a result, discarding packets based on the presence of thi
s option would break some use cases for RPL (see <xref target="RFC9008" format="
default" sectionFormat="of" derivedContent="RFC9008"/>).</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.8.5">
<name slugifiedName="name-advice-19">Advice</name>
<t indent="0" pn="section-4.4.8.5-1">Intermediate systems should not
discard IPv6 packets based on the presence of this option.</t>
</section>
</section>
<section anchor="x26" numbered="true" toc="exclude" removeInRFC="false"
pn="section-4.4.9">
<name slugifiedName="name-quick-start-type0x26">Quick-Start (Type=0x26
)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.9.1">
<name slugifiedName="name-uses-20">Uses</name>
<t indent="0" pn="section-4.4.9.1-1">This IP option is used in the s
pecification of Quick-Start for
TCP and IP, which is an experimental mechanism that allows transport TCP and IP, which is an experimental mechanism that allows transport
protocols, in cooperation with routers, to determine an allowed protocols, in cooperation with routers, to determine an allowed
sending rate at the start and, at times, in the middle of a data sending rate at the start and, at times, in the middle of a data
transfer (e.g., after an idle period) <xref target="RFC4782"/>.</t> transfer (e.g., after an idle period) <xref target="RFC4782" format="d
</section> efault" sectionFormat="of" derivedContent="RFC4782"/>.</t>
</section>
<section title="Specification"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>This option is specified in <xref target="RFC4782"/>, on the "Experimental" t -4.4.9.2">
rack.</t> <name slugifiedName="name-specification-20">Specification</name>
</section> <t indent="0" pn="section-4.4.9.2-1">This option is specified in <xr
ef target="RFC4782" format="default" sectionFormat="of" derivedContent="RFC4782"
<section title="Specific Security Implications"> /> on the "Experimental" track.</t>
<t>Section 9.6 of <xref target="RFC4782"/> notes that Quick-Start is </section>
vulnerable to two kinds of attacks: <list style="symbols"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>attacks to increase the routers' processing and state load, -4.4.9.3">
and,</t> <name slugifiedName="name-specific-security-implications-17">Specifi
c Security Implications</name>
<t>attacks with bogus Quick-Start Requests to temporarily tie up <t indent="0" pn="section-4.4.9.3-1"><xref target="RFC4782" sectionF
ormat="of" section="9.6" format="default" derivedLink="https://rfc-editor.org/rf
c/rfc4782#section-9.6" derivedContent="RFC4782"/> notes that Quick-Start is
vulnerable to two kinds of attacks: </t>
<ul spacing="normal" bare="false" empty="false" indent="3" pn="secti
on-4.4.9.3-2">
<li pn="section-4.4.9.3-2.1">attacks to increase the routers' proc
essing and state load
and</li>
<li pn="section-4.4.9.3-2.2">attacks with bogus Quick-Start Reques
ts to temporarily tie up
available Quick-Start bandwidth, preventing routers from available Quick-Start bandwidth, preventing routers from
approving Quick-Start Requests from other connections.</t> approving Quick-Start Requests from other connections</li>
</list></t> </ul>
<t indent="0" pn="section-4.4.9.3-3">We note that if routers in a gi
<t>We note that if routers in a given environment do not implement and enable th ven environment do not implement and enable the Quick-Start mechanism, only the
e Quick-Start mechanism, only the general security general security
implications of IP options (discussed in <xref target="ipv6-options-general-impl implications of IP options (discussed in <xref target="ipv6-options-general-impl
ications"/>) would apply.</t> ications" format="default" sectionFormat="of" derivedContent="Section 4.2"/>) wo
uld apply.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Operational and Interoperability Impact if Blocked"> -4.4.9.4">
<t>The Quick-Start functionality would be disabled, and additional <name slugifiedName="name-operational-and-interoperability-im-12">Op
delays in TCP's connection establishment (for example) could be introd erational and Interoperability Impact If Blocked</name>
uced. <t indent="0" pn="section-4.4.9.4-1">If packets with IPv6 Quick Star
(Please see Section 4.7.2 of <xref target="RFC4782"/>.) We note, t options are blocked, the host trying to establish a TCP
connection will fall back to not including the Quick Start option --
this means that the
feature will be disabled, and additional delays in connection establi
shment
will be introduced (as discussed in <xref target="RFC4782" sectionFor
mat="of" section="4.7.2" format="default" derivedLink="https://rfc-editor.org/rf
c/rfc4782#section-4.7.2" derivedContent="RFC4782"/>). We note,
however, that Quick-Start has been proposed as a mechanism that could however, that Quick-Start has been proposed as a mechanism that could
be of use in controlled environments, and not as a mechanism that be of use in controlled environments and not as a mechanism that
would be intended or appropriate for ubiquitous deployment in the would be intended or appropriate for ubiquitous deployment in the
global Internet <xref target="RFC4782"/>.</t> global Internet <xref target="RFC4782" format="default" sectionFormat=
</section> "of" derivedContent="RFC4782"/>.</t>
</section>
<section title="Advice"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Intermediate systems should not discard IPv6 packets based on the p -4.4.9.5">
resence of this option.</t> <name slugifiedName="name-advice-20">Advice</name>
<t indent="0" pn="section-4.4.9.5-1">Intermediate systems should not
</section> discard IPv6 packets based on the presence of this option.</t>
</section> </section>
</section>
<section title="Deprecated (Type=0x4D)" anchor="x4D"> <section anchor="x4D" numbered="true" toc="exclude" removeInRFC="false"
<section title="Uses"> pn="section-4.4.10">
<t>No information has been found about this option type.</t> <name slugifiedName="name-deprecated-type0x4d">Deprecated (Type=0x4D)<
</section> /name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specification"> -4.4.10.1">
<t>No information has been found about this option type.</t> <name slugifiedName="name-uses-21">Uses</name>
</section> <t indent="0" pn="section-4.4.10.1-1">No information has been found
about this option type.</t>
<section title="Specific Security Implications"> </section>
<t>No information has been found about this option type, and hence it has been i <section numbered="true" toc="exclude" removeInRFC="false" pn="section
mpossible to perform the corresponding security assessment.</t> -4.4.10.2">
</section> <name slugifiedName="name-specification-21">Specification</name>
<t indent="0" pn="section-4.4.10.2-1">No information has been found
<section title="Operational and Interoperability Impact if Blocked"> about this option type.</t>
<t>Unknown.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.10.3">
<section title="Advice"> <name slugifiedName="name-specific-security-implications-18">Specifi
<t>Intermediate systems should discard packets that contain this option.</t> c Security Implications</name>
</section> <t indent="0" pn="section-4.4.10.3-1">No information has been found
</section> about this option type; hence, it has been impossible to perform the correspondi
ng security assessment.</t>
<section title="RPL Option (Type=0x63)" anchor="x63"> </section>
<section title="Uses"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>The RPL Option provides a mechanism to include routing information with each -4.4.10.4">
datagram that an RPL router forwards.</t> <name slugifiedName="name-operational-and-interoperability-im-13">Op
</section> erational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.10.4-1">Unknown.</t>
<section title="Specification"> </section>
<t>This option was originally specified in <xref target="RFC6553"/>. It has been <section numbered="true" toc="exclude" removeInRFC="false" pn="section
deprecated by <xref target="RFC9008"/>.</t> -4.4.10.5">
</section> <name slugifiedName="name-advice-21">Advice</name>
<t indent="0" pn="section-4.4.10.5-1">Intermediate systems should di
<section title="Specific Security Implications"> scard packets that contain this option.</t>
<t>Those described in <xref target="RFC9008"/>.</t> </section>
</section> </section>
<section anchor="x63" numbered="true" toc="exclude" removeInRFC="false"
<section title="Operational and Interoperability Impact if Blocked"> pn="section-4.4.11">
<t>This option is meant to be employed within an RPL instance. As a result, disc <name slugifiedName="name-rpl-option-type0x63">RPL Option (Type=0x63)<
arding packets based on the presence of this option outside of an RPL instance w /name>
ill not result in interoperability implications.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.11.1">
<name slugifiedName="name-uses-22">Uses</name>
<section title="Advice"> <t indent="0" pn="section-4.4.11.1-1">The RPL Option provides a mech
<t>Non-RPL routers should discard packets that contain an RPL option.</t> anism to include routing information in each datagram that a RPL router forwards
</section> .</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="MPL Option (Type=0x6D)" anchor="x6D"> -4.4.11.2">
<section title="Uses"> <name slugifiedName="name-specification-22">Specification</name>
<t>This option is used with the Multicast Protocol for Low power and Lossy Netwo <t indent="0" pn="section-4.4.11.2-1">This option was originally spe
rks (MPL), that provides IPv6 multicast forwarding in cified in <xref target="RFC6553" format="default" sectionFormat="of" derivedCont
ent="RFC6553"/>. It has been deprecated by <xref target="RFC9008" format="defaul
t" sectionFormat="of" derivedContent="RFC9008"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.11.3">
<name slugifiedName="name-specific-security-implications-19">Specifi
c Security Implications</name>
<t indent="0" pn="section-4.4.11.3-1">These are discussed in <xref t
arget="RFC6553" sectionFormat="of" section="5" format="default" derivedLink="htt
ps://rfc-editor.org/rfc/rfc6553#section-5" derivedContent="RFC6553"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.11.4">
<name slugifiedName="name-operational-and-interoperability-im-14">Op
erational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.11.4-1">This option is meant to be emp
loyed within a RPL instance. As a result, discarding packets based on the presen
ce of this option outside of a RPL instance will not result in interoperability
implications.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.11.5">
<name slugifiedName="name-advice-22">Advice</name>
<t indent="0" pn="section-4.4.11.5-1">Intermediate systems should di
scard packets that contain a RPL Option.</t>
</section>
</section>
<section anchor="x6D" numbered="true" toc="exclude" removeInRFC="false"
pn="section-4.4.12">
<name slugifiedName="name-mpl-option-type0x6d">MPL Option (Type=0x6D)<
/name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.12.1">
<name slugifiedName="name-uses-23">Uses</name>
<t indent="0" pn="section-4.4.12.1-1">This option is used with the M
ulticast Protocol for Low power and Lossy Networks (MPL), which provides IPv6 mu
lticast forwarding in
constrained networks.</t> constrained networks.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specification"> -4.4.12.2">
<t>This option is specified in <xref target="RFC7731"/>, and is meant to be incl <name slugifiedName="name-specification-23">Specification</name>
uded only in Hop-by-Hop Option headers.</t> <t indent="0" pn="section-4.4.12.2-1">This option is specified in <x
</section> ref target="RFC7731" format="default" sectionFormat="of" derivedContent="RFC7731
"/> and is meant to be included only in Hop-by-Hop Options headers.</t>
<section title="Specific Security Implications"> </section>
<t>Those described in <xref target="RFC7731"/>.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.12.3">
<name slugifiedName="name-specific-security-implications-20">Specifi
<section title="Operational and Interoperability Impact if Blocked"> c Security Implications</name>
<t>Dropping packets that contain an MPL option within an MPL network would break <t indent="0" pn="section-4.4.12.3-1">These are discussed in <xref t
the Multicast Protocol for Low power and Lossy Networks (MPL). However, droppin arget="RFC7731" format="default" sectionFormat="of" derivedContent="RFC7731"/>.<
g such packets at the border of such networks will have no negative impact.</t> /t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Advice"> -4.4.12.4">
<t>Intermediate systems should not discard packets based on the presence of this <name slugifiedName="name-operational-and-interoperability-im-15">Op
option. However, since this option has been specified for the Hop-by-Hop Option erational and Interoperability Impact If Blocked</name>
s, such systems should consider the discussion in <xref target="proto0"/>.</t> <t indent="0" pn="section-4.4.12.4-1">Dropping packets that contain
</section> an MPL Option within an MPL network would break the MPL. However, dropping such
</section> packets at the border of such networks will have no negative impact.</t>
</section>
<section title="Endpoint Identification (Type=0x8A)" anchor="x8A"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Uses"> -4.4.12.5">
<t>The Endpoint Identification option was meant to be used with the Nimrod routi <name slugifiedName="name-advice-23">Advice</name>
ng architecture <xref target="NIMROD-DOC"/>, but has never seen widespread deplo <t indent="0" pn="section-4.4.12.5-1">Intermediate systems should no
yment.</t> t discard packets based on the presence of this option. However, since this opti
</section> on has been specified for the Hop-by-Hop Options header, such systems should con
sider the discussion in <xref target="proto0" format="default" sectionFormat="of
<section title="Specification"> " derivedContent="Section 3.5.1"/>.</t>
<t>This option is specified in <xref target="NIMROD-DOC"/>.</t> </section>
</section> </section>
<section anchor="x8A" numbered="true" toc="exclude" removeInRFC="false"
<section title="Specific Security Implications"> pn="section-4.4.13">
<t>Undetermined.</t> <name slugifiedName="name-endpoint-identification-typ">Endpoint Identi
</section> fication (Type=0x8A)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Operational and Interoperability Impact if Blocked"> -4.4.13.1">
<t>None.</t> <name slugifiedName="name-uses-24">Uses</name>
</section> <t indent="0" pn="section-4.4.13.1-1">The Endpoint Identification op
tion was meant to be used with the Nimrod routing architecture <xref target="NIM
<section title="Advice"> ROD-DOC" format="default" sectionFormat="of" derivedContent="NIMROD-DOC"/> but h
<t>Intermediate systems should discard packets that contain this option.</t> as never seen widespread deployment.</t>
</section> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.13.2">
<section title="ILNP Nonce (Type=0x8B)" anchor="x8B"> <name slugifiedName="name-specification-24">Specification</name>
<section title="Uses"> <t indent="0" pn="section-4.4.13.2-1">This option is specified in <x
<t>This option is employed by Identifier-Locator Network Protocol for IPv6 (ILNP ref target="NIMROD-DOC" format="default" sectionFormat="of" derivedContent="NIMR
v6) for providing protection against off-path attacks for packets when ILNPv6 is OD-DOC"/>.</t>
in use, and as a signal during initial network-layer session creation that ILNP </section>
v6 is proposed for use with this network-layer session, rather than classic IPv6 <section numbered="true" toc="exclude" removeInRFC="false" pn="section
.</t> -4.4.13.3">
</section> <name slugifiedName="name-specific-security-implications-21">Specifi
c Security Implications</name>
<section title="Specification"> <t indent="0" pn="section-4.4.13.3-1">Undetermined.</t>
<t>This option is specified in <xref target="RFC6744"/>.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.13.4">
<section title="Specific Security Implications"> <name slugifiedName="name-operational-and-interoperability-im-16">Op
<t>Those described in <xref target="RFC6744"/>.</t> erational and Interoperability Impact If Blocked</name>
</section> <t indent="0" pn="section-4.4.13.4-1">None.</t>
</section>
<section title="Operational and Interoperability Impact if Blocked"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>Discarding packets that contain this option will break INLPv6 deployments.</t -4.4.13.5">
> <name slugifiedName="name-advice-24">Advice</name>
</section> <t indent="0" pn="section-4.4.13.5-1">Intermediate systems should di
scard packets that contain this option.</t>
<section title="Advice"> </section>
<t>Intermediate systems should not discard packets based on the presence of this </section>
option.</t> <section anchor="x8B" numbered="true" toc="exclude" removeInRFC="false"
</section> pn="section-4.4.14">
</section> <name slugifiedName="name-ilnp-nonce-type0x8b">ILNP Nonce (Type=0x8B)<
/name>
<section title="Line-Identification Option (Type=0x8C)" anchor="x8C"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Uses"> -4.4.14.1">
<t>This option is used by an Edge Router to identify the subscriber premises in <name slugifiedName="name-uses-25">Uses</name>
scenarios where several subscriber premises may be logically connected to the sa <t indent="0" pn="section-4.4.14.1-1">This option is employed by the
me interface of an Edge Router.</t> Identifier-Locator Network Protocol for IPv6 (ILNPv6) to provide protection aga
inst off-path attacks for packets when ILNPv6 is in use and as a signal during i
<!-- nitial network-layer session creation that ILNPv6 is proposed for use with this
The Line-Identification Option (LIO) is a destination option that can network-layer session, rather than classic IPv6.</t>
be included in IPv6 datagrams that tunnel Router Solicitation and </section>
Router Advertisement messages. The use of the Line-ID option in any <section numbered="true" toc="exclude" removeInRFC="false" pn="section
other IPv6 datagrams is not defined by this document. Multiple Line- -4.4.14.2">
ID destination options MUST NOT be present in the same IPv6 datagram. <name slugifiedName="name-specification-25">Specification</name>
The LIO has no alignment requirement. <t indent="0" pn="section-4.4.14.2-1">This option is specified in <x
</section> ref target="RFC6744" format="default" sectionFormat="of" derivedContent="RFC6744
"/>.</t>
<section title="Specification"> </section>
<t>This option is specified in <xref target="RFC6788"/>.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.14.3">
<name slugifiedName="name-specific-security-implications-22">Specifi
<section title="Specific Security Implications"> c Security Implications</name>
<t>Those described in <xref target="RFC6788"/>.</t> <t indent="0" pn="section-4.4.14.3-1">These are discussed in <xref t
</section> arget="RFC6744" format="default" sectionFormat="of" derivedContent="RFC6744"/>.<
/t>
<section title="Operational and Interoperability Impact if Blocked"> </section>
<t>Since this option is meant to be employed in Router Solicitation messages, di <section numbered="true" toc="exclude" removeInRFC="false" pn="section
scarding packets based on the presence of this option at intermediate systems wi -4.4.14.4">
ll result in no interoperability implications.</t> <name slugifiedName="name-operational-and-interoperability-im-17">Op
</section> erational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.14.4-1">Discarding packets that contai
<section title="Advice"> n this option will break ILNPv6 deployments.</t>
<t>Intermediate devices should discard packets that contain this option.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.14.5">
<name slugifiedName="name-advice-25">Advice</name>
<section title="Jumbo Payload (Type=0XC2)" anchor="xC2"> <t indent="0" pn="section-4.4.14.5-1">Intermediate systems should no
<section title="Uses"> t discard packets based on the presence of this option.</t>
<t>The Jumbo payload option provides the means of specifying payloads larger tha </section>
n 65535 bytes.</t> </section>
</section> <section anchor="x8C" numbered="true" toc="exclude" removeInRFC="false"
pn="section-4.4.15">
<section title="Specification"> <name slugifiedName="name-line-identification-option-">Line-Identifica
<t>This option is specified in <xref target="RFC2675"/>.</t> tion Option (Type=0x8C)</name>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.15.1">
<section title="Specific Security Implications"> <name slugifiedName="name-uses-26">Uses</name>
<t>There are no specific issues arising from this option, except for improper va <t indent="0" pn="section-4.4.15.1-1">This option is used by an Edge
lidity checks of the option and associated packet lengths.</t> Router to identify the subscriber premises in scenarios where several subscribe
</section> r premises may be logically connected to the same interface of an Edge Router.</
t>
<section title="Operational and Interoperability Impact if Blocked"> </section>
<t>Discarding packets based on the presence of this option will cause IPv6 jumbo <section numbered="true" toc="exclude" removeInRFC="false" pn="section
grams to be discarded.</t> -4.4.15.2">
</section> <name slugifiedName="name-specification-26">Specification</name>
<t indent="0" pn="section-4.4.15.2-1">This option is specified in <x
<section title="Advice"> ref target="RFC6788" format="default" sectionFormat="of" derivedContent="RFC6788
<t>An operator should permit this option only in specific scenarios in which sup "/>.</t>
port for IPv6 jumbograms is desired. </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.15.3">
<name slugifiedName="name-specific-security-implications-23">Specifi
c Security Implications</name>
<t indent="0" pn="section-4.4.15.3-1">These are discussed in <xref t
arget="RFC6788" format="default" sectionFormat="of" derivedContent="RFC6788"/>.<
/t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.15.4">
<name slugifiedName="name-operational-and-interoperability-im-18">Op
erational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.15.4-1">Since this option is meant to
be used when tunneling Neighbor Discovery messages in some broadband network dep
loyment scenarios, discarding packets based on the presence of this option at in
termediate systems will result in no interoperability implications.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.15.5">
<name slugifiedName="name-advice-26">Advice</name>
<t indent="0" pn="section-4.4.15.5-1">Intermediate systems should di
scard packets that contain this option.</t>
</section>
</section>
<section anchor="xC2" numbered="true" toc="exclude" removeInRFC="false"
pn="section-4.4.16">
<name slugifiedName="name-jumbo-payload-type0xc2">Jumbo Payload (Type=
0XC2)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.16.1">
<name slugifiedName="name-uses-27">Uses</name>
<t indent="0" pn="section-4.4.16.1-1">The Jumbo Payload option provi
des the means for supporting payloads larger than 65535 bytes.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.16.2">
<name slugifiedName="name-specification-27">Specification</name>
<t indent="0" pn="section-4.4.16.2-1">This option is specified in <x
ref target="RFC2675" format="default" sectionFormat="of" derivedContent="RFC2675
"/>.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.16.3">
<name slugifiedName="name-specific-security-implications-24">Specifi
c Security Implications</name>
<t indent="0" pn="section-4.4.16.3-1">There are no specific issues a
rising from this option, except for improper validity checks of the option and a
ssociated packet lengths.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.16.4">
<name slugifiedName="name-operational-and-interoperability-im-19">Op
erational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.16.4-1">Discarding packets based on th
e presence of this option will cause IPv6 jumbograms to be discarded.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.16.5">
<name slugifiedName="name-advice-27">Advice</name>
<t indent="0" pn="section-4.4.16.5-1">An operator should permit this
option only in specific scenarios in which support for IPv6 jumbograms is requi
red.
</t> </t>
</section> </section>
</section> </section>
<section anchor="xC9" numbered="true" toc="exclude" removeInRFC="false"
<section title="Home Address (Type=0xC9)" anchor="xC9"> pn="section-4.4.17">
<section title="Uses"> <name slugifiedName="name-home-address-type0xc9">Home Address (Type=0x
<t>The Home Address option is used by a Mobile IPv6 node while away from home, t C9)</name>
o inform the recipient of the mobile node's home address.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.17.1">
<name slugifiedName="name-uses-28">Uses</name>
<section title="Specification"> <t indent="0" pn="section-4.4.17.1-1">The Home Address option is use
<t>This option is specified in <xref target="RFC6275"/>.</t> d by a Mobile IPv6 node while away from home to inform the recipient of the mobi
</section> le node's home address.</t>
</section>
<section title="Specific Security Implications"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>No (known) additional security implications than those described in <xref tar -4.4.17.2">
get="RFC6275"/>.</t> <name slugifiedName="name-specification-28">Specification</name>
</section> <t indent="0" pn="section-4.4.17.2-1">This option is specified in <x
ref target="RFC6275" format="default" sectionFormat="of" derivedContent="RFC6275
<section title="Operational and Interoperability Impact if Blocked"> "/>.</t>
<t>Discarding IPv6 packets based on the presence of this option will break Mobil </section>
e IPv6.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.17.3">
<name slugifiedName="name-specific-security-implications-25">Specifi
<section title="Advice"> c Security Implications</name>
<t>Intermediate systems should not discard IPv6 packets based on the presence of <t indent="0" pn="section-4.4.17.3-1">There are no (known) additiona
this option.</t> l security implications, other than those discussed in <xref target="RFC6275" fo
</section> rmat="default" sectionFormat="of" derivedContent="RFC6275"/>.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="IP_DFF (Type=0xEE)" anchor="xEE"> -4.4.17.4">
<section title="Uses"> <name slugifiedName="name-operational-and-interoperability-im-20">Op
<t>This option is employed with the (Experimental) Depth-First Forwarding (DFF) erational and Interoperability Impact If Blocked</name>
in Unreliable Networks.</t> <t indent="0" pn="section-4.4.17.4-1">Discarding IPv6 packets based
</section> on the presence of this option will break Mobile IPv6.</t>
</section>
<section title="Specification"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
<t>This option is specified in <xref target="RFC6971"/>.</t> -4.4.17.5">
</section> <name slugifiedName="name-advice-28">Advice</name>
<t indent="0" pn="section-4.4.17.5-1">Intermediate systems should no
<section title="Specific Security Implications"> t discard IPv6 packets based on the presence of this option.</t>
<t>Those specified in <xref target="RFC6971"/>.</t> </section>
</section> </section>
<section anchor="xEE" numbered="true" toc="exclude" removeInRFC="false"
<section title="Operational and Interoperability Impact if Blocked"> pn="section-4.4.18">
<t>Dropping packets containing this option within a routing domain that is runni <name slugifiedName="name-ip_dff-type0xee">IP_DFF (Type=0xEE)</name>
ng DFF would break DFF. However, dropping such packets at the border of such dom <section numbered="true" toc="exclude" removeInRFC="false" pn="section
ains will have no security implications.</t> -4.4.18.1">
</section> <name slugifiedName="name-uses-29">Uses</name>
<t indent="0" pn="section-4.4.18.1-1">This option is employed with t
<section title="Advice"> he (experimental) Depth-First Forwarding (DFF) in unreliable networks.</t>
<t>Intermediate systems that do not operate within a routing domain that is runn </section>
ing DFF should discard packets containing this option.</t> <section numbered="true" toc="exclude" removeInRFC="false" pn="section
</section> -4.4.18.2">
</section> <name slugifiedName="name-specification-29">Specification</name>
<t indent="0" pn="section-4.4.18.2-1">This option is specified in <x
<section title="RFC3692-style Experiment (Types = 0x1E, 0x3E, 0x5E, 0x7E, 0x9E, ref target="RFC6971" format="default" sectionFormat="of" derivedContent="RFC6971
0xBE, 0xDE, 0xFE)" anchor="x1E"> "/>.</t>
<section title="Uses"> </section>
<t>These options can be employed for performing RFC3692-style experime <section numbered="true" toc="exclude" removeInRFC="false" pn="section
nts. It is only appropriate to use these values in -4.4.18.3">
<name slugifiedName="name-specific-security-implications-26">Specifi
c Security Implications</name>
<t indent="0" pn="section-4.4.18.3-1">These are specified in <xref t
arget="RFC6971" format="default" sectionFormat="of" derivedContent="RFC6971"/>.<
/t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.18.4">
<name slugifiedName="name-operational-and-interoperability-im-21">Op
erational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.4.18.4-1">Dropping packets containing th
is option within a routing domain that is running DFF would break DFF. However,
dropping such packets at the border of such domains will have no operational or
interoperability implications.</t>
</section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.18.5">
<name slugifiedName="name-advice-29">Advice</name>
<t indent="0" pn="section-4.4.18.5-1">Intermediate systems that do n
ot operate within a routing domain that is running DFF should discard packets co
ntaining this option.</t>
</section>
</section>
<section anchor="x1E" numbered="true" toc="exclude" removeInRFC="false"
pn="section-4.4.19">
<name slugifiedName="name-rfc3692-style-experiment-ty">RFC3692-Style E
xperiment (Types = 0x1E, 0x3E, 0x5E, 0x7E, 0x9E, 0xBE, 0xDE, 0xFE)</name>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
-4.4.19.1">
<name slugifiedName="name-uses-30">Uses</name>
<t indent="0" pn="section-4.4.19.1-1">These options can be employed
for performing RFC3692-style experiments. It is only appropriate to use these va
lues in
explicitly configured experiments; they must not be shipped as default s in implementations.</t> explicitly configured experiments; they must not be shipped as default s in implementations.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specification"> -4.4.19.2">
<t>Specified in RFC 4727 <xref target="RFC4727"/> in the context of <name slugifiedName="name-specification-30">Specification</name>
<t indent="0" pn="section-4.4.19.2-1">These options are specified in
<xref target="RFC4727" format="default" sectionFormat="of" derivedContent="RFC4
727"/> in the context of
RFC3692-style experiments.</t> RFC3692-style experiments.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section
<section title="Specific Security Implications"> -4.4.19.3">
<t>The specific security implications will depend on the specific use of these <name slugifiedName="name-specific-security-implications-27">Specifi
options.</t> c Security Implications</name>
</section> <t indent="0" pn="section-4.4.19.3-1">The specific security implicat
ions will depend on the specific use of these options.</t>
<section title="Operational and Interoperability Impact if Blocked"> </section>
<t>For obvious reasons, discarding packets that contain these options limits the <section numbered="true" toc="exclude" removeInRFC="false" pn="section
ability to perform legitimate experiments across IPv6 routers.</t> -4.4.19.4">
</section> <name slugifiedName="name-operational-and-interoperability-im-22">Op
erational and Interoperability Impact If Blocked</name>
<section title="Advice"> <t indent="0" pn="section-4.4.19.4-1">For obvious reasons, discardin
<t>Operators should determine according to their own circumstances whether to di g packets that contain these options limits the ability to perform legitimate ex
scard packets containing these IPv6 options.</t> periments across IPv6 routers.</t>
<!-- </section>
<t>Intermediate systems should discard packets that contain these options. Only <section numbered="true" toc="exclude" removeInRFC="false" pn="section
in specific environments where RFC3692-style experiments are meant to be perform -4.4.19.5">
ed should these options be permitted.</t> --> <name slugifiedName="name-advice-30">Advice</name>
</section> <t indent="0" pn="section-4.4.19.5-1">Operators should determine, ac
</section> cording to their own circumstances, whether to discard packets containing these
IPv6 options.</t>
</section> </section>
</section>
<section title="Advice on the handling of Packets with Unknown IPv6 Options"> </section>
<section numbered="true" toc="include" removeInRFC="false" pn="section-4.5
<t>We refer to IPv6 options that have not been assigned an IPv6 option type in t ">
he corresponding registry (<xref target="IANA-IPV6-PARAM"/>) as "unknown IPv6 op <name slugifiedName="name-advice-on-the-handling-of-pac">Advice on the H
tions".</t> andling of Packets with Unknown IPv6 Options</name>
<t indent="0" pn="section-4.5-1">We refer to IPv6 options that have not
<section title="Uses"> been assigned an IPv6 Option Type in the corresponding registry, which is <xref
<t>New IPv6 options may be specified as part of future protocol work.< target="IANA-IPV6-PARAM" format="default" sectionFormat="of" derivedContent="IAN
/t> A-IPV6-PARAM"/>, as "unknown IPv6 options".</t>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section-4
.5.1">
<section title="Specification"> <name slugifiedName="name-uses-31">Uses</name>
<t>The processing of unknown IPv6 options is specified in <xref target="RFC8200" <t indent="0" pn="section-4.5.1-1">New IPv6 options may be specified a
/>.</t> s part of future protocol work.</t>
</section> </section>
<section numbered="true" toc="exclude" removeInRFC="false" pn="section-4
<section title="Specific Security Implications"> .5.2">
<t>For obvious reasons, it is impossible to determine specific security implica <name slugifiedName="name-specification-31">Specification</name>
tions of unknown IPv6 options.</t> <t indent="0" pn="section-4.5.2-1">The processing of unknown IPv6 opti
</section> ons is specified in <xref target="RFC8200" format="default" sectionFormat="of" d
erivedContent="RFC8200"/>.</t>
<section title="Operational and Interoperability Impact if Blocked"> </section>
<t>Discarding unknown IPv6 options may slow down the deployment of new IPv6 opti <section numbered="true" toc="exclude" removeInRFC="false" pn="section-4
ons. As noted in <xref target="draft-gont-6man-ipv6-opt-transmit"/>, the corresp .5.3">
onding IANA registry (<xref target="IANA-IPV6-PARAM"/> should be monitored such <name slugifiedName="name-specific-security-implications-28">Specific
that IPv6 option filtering rules are updated as new IPv6 options are standardize Security Implications</name>
d.</t> <t indent="0" pn="section-4.5.3-1">For obvious reasons, it is impossib
</section> le to determine specific security implications of unknown IPv6 options.</t>
</section>
<section title="Advice"> <section numbered="true" toc="exclude" removeInRFC="false" pn="section-4
.5.4">
<t>Operators should determine according to their own circumstances whether to di <name slugifiedName="name-operational-and-interoperability-im-23">Oper
scard packets containing unknown IPv6 options.</t> ational and Interoperability Impact If Blocked</name>
<t indent="0" pn="section-4.5.4-1">Discarding unknown IPv6 options may
</section> slow down the deployment of new IPv6 options. As noted in <xref target="I-D.gon
</section> t-6man-ipv6-opt-transmit" format="default" sectionFormat="of" derivedContent="IP
v6-OPTIONS"/>, the corresponding IANA registry, which is <xref target="IANA-IPV6
</section> -PARAM" format="default" sectionFormat="of" derivedContent="IANA-IPV6-PARAM"/>,
should be monitored such that IPv6 option filtering rules are updated as new IPv
<section anchor="IANA" title="IANA Considerations"> 6 options are standardized.</t>
<t>This document has no actions for IANA.</t> </section>
</section> <section numbered="true" toc="exclude" removeInRFC="false" pn="section-4
.5.5">
<section title="Privacy Considerations" anchor="Privacy" > <name slugifiedName="name-advice-31">Advice</name>
<t> <t indent="0" pn="section-4.5.5-1">Operators should determine, accordi
ng to their own circumstances, whether to discard packets containing unknown IPv
6 options.</t>
</section>
</section>
</section>
<section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn=
"section-5">
<name slugifiedName="name-iana-considerations">IANA Considerations</name>
<t indent="0" pn="section-5-1">This document has no IANA actions.</t>
</section>
<section anchor="Privacy" numbered="true" toc="include" removeInRFC="false"
pn="section-6">
<name slugifiedName="name-privacy-considerations">Privacy Considerations</
name>
<t indent="0" pn="section-6-1">
There are no privacy considerations associated with this document. There are no privacy considerations associated with this document.
</t> </t>
</section> </section>
<section anchor="Security" numbered="true" toc="include" removeInRFC="false"
<section title="Security Considerations" anchor="Security" > pn="section-7">
<t> <name slugifiedName="name-security-considerations">Security Considerations
This document provides advice on the filtering of IPv6 packets that contain IPv6 </name>
EHs (and possibly IPv6 options) at IPv6 transit routers. It is meant to improve <t indent="0" pn="section-7-1">
the current situation of widespread dropping of such IPv6 packets in those case This document provides advice on the filtering of IPv6 packets that contain IPv6
s where the drops result from improper configuration defaults, or inappropriate EHs (and possibly IPv6 options) at IPv6 transit routers. It is meant to improve
advice in this area. the current situation of widespread dropping of such IPv6 packets in those case
s where the drops result from improper configuration defaults or inappropriate a
dvice in this area.
</t> </t>
<t> <t indent="0" pn="section-7-2">
As discussed in Section <xref target="ipv6-ehs-rationale"/> of this document, As discussed in <xref target="ipv6-ehs-rationale" format="default" sectionFor
one of the mat="of" derivedContent="Section 3.3"/>, one of the
underlying principles for the advice provided in this document is underlying principles for the advice provided in this document is
that IPv6 packets with specific EHs or options which may represent an that IPv6 packets with specific EHs or options that may represent an
attack vector for infrastructure devices should be dropped. While attack vector for infrastructure devices should be dropped. While
this policy helps mitigate some specific attack vectors, the this policy helps mitigate some specific attack vectors, the
recommendations in this document will not help to mitigate recommendations in this document will not help to mitigate
vulnerabilities based on implementation errors <xref target="RFC9098"/>. vulnerabilities based on implementation errors <xref target="RFC9098" format= "default" sectionFormat="of" derivedContent="RFC9098"/>.
</t> </t>
<t indent="0" pn="section-7-3">We also note that depending on the router a
<t>We also note that depending on the router architecture, attempts to filter pa rchitecture, attempts to filter packets based on the presence of IPv6 EHs or opt
ckets ased on the presence of IPv6 EHs or options might itself represent an atta ions might itself represent an attack vector to network infrastructure devices <
ck vector to network infrastructure devices <xref target="RFC9098"/>.</t> xref target="RFC9098" format="default" sectionFormat="of" derivedContent="RFC909
</section> 8"/>.</t>
</section>
<section title="Acknowledgements"> </middle>
<t>The authors would like to thank Ron Bonica for his work on earlier versions o <back>
f this document.</t> <displayreference target="I-D.irtf-pearg-numeric-ids-generation" to="NUMERIC
<t>The authors of this document would like to thank (in alphabetical order) Mika -IDS"/>
el Abrahamsson, Brian Carpenter, Tim Chown, Roman Danyliw, Darren Dukes, Lars Eg <displayreference target="I-D.vyncke-v6ops-james" to="JAMES"/>
gert, David Farmer, Mike Heard, Bob Hinden, Christian Huitema, Benjamin Kaduk, E <displayreference target="I-D.gont-6man-ipv6-opt-transmit" to="IPv6-OPTIONS"
rik Kline, Murray Kucherawy, Jen Linkova, Carlos Pignataro, Alvaro Retana, Maria />
Ines Robles, Zaheduzzaman Sarker, Donald Smith, Pascal Thubert, Ole Troan, Gunt <references pn="section-8">
er Van De Velde, Eric Vyncke, and Robert Wilton, for providing valuable comments <name slugifiedName="name-references">References</name>
on earlier versions of this document.</t> <references pn="section-8.1">
<t>This document borrows some text and analysis from <xref target="RFC7126"/>, a <name slugifiedName="name-normative-references">Normative References</na
uthored by Fernando Gont, Randall Atkinson, and Carlos Pignataro.</t> me>
<reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1
<t>The authors would like to thank Warren Kumari and Eric Vyncke for their guida 034" quoteTitle="true" derivedAnchor="RFC1034">
nce during the publication process of this document.</t> <front>
<title>Domain names - concepts and facilities</title>
<t>Fernando would also like to thank Brian Carpenter and Ran Atkinson who, over <author initials="P." surname="Mockapetris" fullname="P. Mockapetris
the years, have answered many questions and provided valuable comments that have ">
benefited his protocol-related work (including the present document).</t> <organization showOnFrontPage="true"/>
</section> </author>
<date year="1987" month="November"/>
</middle> <abstract>
<t indent="0">This RFC is the revised basic definition of The Doma
<back> in Name System. It obsoletes RFC-882. This memo describes the domain style nam
<references title="Normative References"> es and their used for host address look up and electronic mail forwarding. It d
<?rfc include="reference.RFC.1034" ?> iscusses the clients and servers in the domain name system and the protocol used
<?rfc include="reference.RFC.5570" ?> between them.</t>
<?rfc include="reference.RFC.2119" ?> </abstract>
<?rfc include="reference.RFC.8174" ?> </front>
<seriesInfo name="STD" value="13"/>
<?rfc include="reference.RFC.2205" ?> <seriesInfo name="RFC" value="1034"/>
<seriesInfo name="DOI" value="10.17487/RFC1034"/>
<?rfc include="reference.RFC.2675" ?> </reference>
<?rfc include="reference.RFC.4301" ?> <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2
<?rfc include="reference.RFC.4302" ?> 119" quoteTitle="true" derivedAnchor="RFC2119">
<?rfc include="reference.RFC.4303" ?> <front>
<title>Key words for use in RFCs to Indicate Requirement Levels</tit
<?rfc include="reference.RFC.6275" ?> le>
<?rfc include="reference.RFC.7401" ?> <author fullname="S. Bradner" initials="S" surname="Bradner"/>
<?rfc include="reference.RFC.5533" ?> <date month="March" year="1997"/>
<?rfc include="reference.RFC.3692" ?> <abstract>
<?rfc include="reference.RFC.4727" ?> <t indent="0">In many standards track documents several words are
<?rfc include="reference.RFC.2710" ?> used to signify the requirements in the specification. These words are often ca
<?rfc include="reference.RFC.3810" ?> pitalized. This document defines these words as they should be interpreted in I
<?rfc include="reference.RFC.4286" ?> ETF documents. This document specifies an Internet Best Current Practices for t
<?rfc include="reference.RFC.5971" ?> he Internet Community, and requests discussion and suggestions for improvements.
<?rfc include="reference.RFC.2711" ?> </t>
<?rfc include="reference.RFC.5095" ?> </abstract>
<?rfc include="reference.RFC.6550" ?> </front>
<?rfc include="reference.RFC.6621" ?> <seriesInfo name="BCP" value="14"/>
<?rfc include="reference.RFC.6971" ?> <seriesInfo name="RFC" value="2119"/>
<?rfc include="reference.RFC.7045" ?> <seriesInfo name="DOI" value="10.17487/RFC2119"/>
<?rfc include="reference.RFC.7112" ?> </reference>
<?rfc include="reference.RFC.4782" ?> <reference anchor="RFC2205" target="https://www.rfc-editor.org/info/rfc2
<?rfc include="reference.RFC.6788" ?> 205" quoteTitle="true" derivedAnchor="RFC2205">
<?rfc include="reference.RFC.6740" ?> <front>
<?rfc include="reference.RFC.6744" ?> <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional
<?rfc include="reference.RFC.2473" ?> Specification</title>
<?rfc include="reference.RFC.6553" ?> <author fullname="R. Braden" initials="R" role="editor" surname="Bra
<?rfc include="reference.RFC.6554" ?> den"/>
<?rfc include="reference.RFC.6398" ?> <author fullname="L. Zhang" initials="L" surname="Zhang"/>
<?rfc include="reference.RFC.8754" ?> <author fullname="S. Berson" initials="S" surname="Berson"/>
<author fullname="S. Herzog" initials="S" surname="Herzog"/>
<?rfc include="reference.RFC.9008" ?> <author fullname="S. Jamin" initials="S" surname="Jamin"/>
<date month="September" year="1997"/>
<?rfc include="reference.RFC.7731" ?> <abstract>
<?rfc include="reference.RFC.8200" ?> <t indent="0">This memo describes version 1 of RSVP, a resource re
<?rfc include="reference.RFC.8250" ?> servation setup protocol designed for an integrated services Internet. RSVP pro
<?rfc include="reference.RFC.8900" ?> vides receiver-initiated setup of resource reservations for multicast or unicast
</references> data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
</abstract>
<references title="Informative References"> </front>
<?rfc include="reference.RFC.2460" ?> <seriesInfo name="RFC" value="2205"/>
<?rfc include="reference.RFC.3871" ?> <seriesInfo name="DOI" value="10.17487/RFC2205"/>
<?rfc include="reference.RFC.6192" ?> </reference>
<?rfc include="reference.RFC.7126" ?> <reference anchor="RFC2473" target="https://www.rfc-editor.org/info/rfc2
<?rfc include="reference.RFC.7739" ?> 473" quoteTitle="true" derivedAnchor="RFC2473">
<front>
<?rfc include="reference.I-D.irtf-pearg-numeric-ids-generation" ?> <title>Generic Packet Tunneling in IPv6 Specification</title>
<author fullname="A. Conta" initials="A" surname="Conta"/>
<?rfc include="reference.RFC.9098" ?> <author fullname="S. Deering" initials="S" surname="Deering"/>
<date month="December" year="1998"/>
<?rfc include="reference.RFC.7872" ?> <abstract>
<t indent="0">This document defines the model and generic mechanis
<?rfc include="reference.I-D.vyncke-v6ops-james" ?> ms for IPv6 encapsulation of Internet packets, such as IPv6 and IPv4. [STANDARDS
-TRACK]</t>
<reference anchor="Huston-2022" target="https://iepg.org/2022-03-20-ietf11 </abstract>
3/huston-v6frag.pdf"> </front>
<front> <seriesInfo name="RFC" value="2473"/>
<title>IPv6 Fragmentation and EH Behaviours</title> <seriesInfo name="DOI" value="10.17487/RFC2473"/>
</reference>
<author fullname="Geoff Huston" initials="G." surname="Huston"> <reference anchor="RFC2675" target="https://www.rfc-editor.org/info/rfc2
<organization abbrev="APNIC"/> 675" quoteTitle="true" derivedAnchor="RFC2675">
<address> <front>
<email>gih@apnic.net</email> <title>IPv6 Jumbograms</title>
<uri>https://www.apnic.net</uri> <author fullname="D. Borman" initials="D" surname="Borman"/>
</address> <author fullname="S. Deering" initials="S" surname="Deering"/>
</author> <author fullname="R. Hinden" initials="R" surname="Hinden"/>
<date month="August" year="1999"/>
<author fullname="Joao Damas" initials="J." surname="Damas"> <abstract>
<organization abbrev="APNIC"/> <t indent="0">This document describes the IPv6 Jumbo Payload optio
</author> n, which provides the means of specifying such large payload lengths. It also d
escribes the changes needed to TCP and UDP to make use of jumbograms. [STANDARDS
<date month="March" year="2022"/> -TRACK]</t>
</front> </abstract>
</front>
<seriesInfo name="" <seriesInfo name="RFC" value="2675"/>
value="IEPG Meeting - March 2022 @ IETF 113"/> <seriesInfo name="DOI" value="10.17487/RFC2675"/>
</reference> </reference>
<reference anchor="RFC2710" target="https://www.rfc-editor.org/info/rfc2
<!-- 710" quoteTitle="true" derivedAnchor="RFC2710">
<reference anchor="Vyncke-2022" target="https://iepg.org/2022-03-20-ietf11 <front>
3/james-IEPG.pdf"> <title>Multicast Listener Discovery (MLD) for IPv6</title>
<front> <author fullname="S. Deering" initials="S" surname="Deering"/>
<title>Just Another Measurement of Extension Header Survivability (JAM <author fullname="W. Fenner" initials="W" surname="Fenner"/>
ES)</title> <author fullname="B. Haberman" initials="B" surname="Haberman"/>
<date month="October" year="1999"/>
<author fullname="Eric Vyncke" initials="E." surname="Vyncke"> <abstract>
<t indent="0">This document specifies the protocol used by an IPv6
</author> router to discover the presence of multicast listeners (that is, nodes wishing
to receive multicast packets) on its directly attached links, and to discover sp
<author fullname="Raphael Leas" initials="R." surname="Leas"> ecifically which multicast addresses are of interest to those neighboring nodes.
<organization/> [STANDARDS-TRACK]</t>
</author> </abstract>
</front>
<author fullname="Justin Iurman" initials="J." surname="Iurman"> <seriesInfo name="RFC" value="2710"/>
<organization/> <seriesInfo name="DOI" value="10.17487/RFC2710"/>
</author> </reference>
<reference anchor="RFC2711" target="https://www.rfc-editor.org/info/rfc2
<date month="March" year="2022"/> 711" quoteTitle="true" derivedAnchor="RFC2711">
</front> <front>
<title>IPv6 Router Alert Option</title>
<seriesInfo name="" <author fullname="C. Partridge" initials="C" surname="Partridge"/>
value="IEPG Meeting - March 2022 @ IETF 113"/> <author fullname="A. Jackson" initials="A" surname="Jackson"/>
</reference> <date month="October" year="1999"/>
<abstract>
<reference anchor="draft-ietf-nimrod-eid"> <t indent="0">This memo describes a new IPv6 Hop-by-Hop Option typ
<front> e that alerts transit routers to more closely examine the contents of an IP data
<title>Endpoint Identifier Destination Option</title> gram. [STANDARDS-TRACK]</t>
</abstract>
<author fullname="Charles Lynn" initials="C.L." surname="Lynn"> </front>
<organization>BBN Systems and Technologies</organization> <seriesInfo name="RFC" value="2711"/>
</author> <seriesInfo name="DOI" value="10.17487/RFC2711"/>
</reference>
<date month="November" year="1995"/> <reference anchor="RFC3692" target="https://www.rfc-editor.org/info/rfc3
</front> 692" quoteTitle="true" derivedAnchor="RFC3692">
<front>
<seriesInfo name="" <title>Assigning Experimental and Testing Numbers Considered Useful<
value="IETF Internet Draft, draft-ietf-nimrod-eid-00.txt"/> /title>
</reference> <author fullname="T. Narten" initials="T" surname="Narten"/>
<reference anchor="NIMROD-DOC"> <date month="January" year="2004"/>
<front> <abstract>
<title>http://ana-3.lcs.mit.edu/~jnc/nimrod/</title> <t indent="0">When experimenting with or extending protocols, it i
<author initials="" surname="Nimrod Documentation Page" f s often necessary to use some sort of protocol number or constant in order to ac
ullname="Nimrod Documentation Page"> tually test or experiment with the new function, even when testing in a closed e
<organization></organization> nvironment. For example, to test a new DHCP option, one needs an option number
</author> to identify the new function. This document recommends that when writing IANA C
<date year=""/> onsiderations sections, authors should consider assigning a small range of numbe
</front> rs for experimentation purposes that implementers can use when testing protocol
</reference> extensions or other new features. This document reserves some ranges of numbers
for experimentation purposes in specific protocols where the need to support ex
<reference anchor="Biondi2007" target="http://www.secdev.org/conf/IPv6_RH_ perimentation has been identified.</t>
security-csw07.pdf"> </abstract>
<front> </front>
<title>IPv6 Routing Header Security</title> <seriesInfo name="BCP" value="82"/>
<seriesInfo name="RFC" value="3692"/>
<author fullname="P. Biondi" initials="P." surname="Biondi"> <seriesInfo name="DOI" value="10.17487/RFC3692"/>
<organization/> </reference>
</author> <reference anchor="RFC3810" target="https://www.rfc-editor.org/info/rfc3
810" quoteTitle="true" derivedAnchor="RFC3810">
<author fullname="A. Ebalard" initials="A." surname="Ebalard"> <front>
<organization/> <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</titl
</author> e>
<author fullname="R. Vida" initials="R" role="editor" surname="Vida"
<date year="2007"/> />
</front> <author fullname="L. Costa" initials="L" role="editor" surname="Cost
a"/>
<seriesInfo name="CanSecWest 2007" <date month="June" year="2004"/>
value="Security Conference"/> <abstract>
</reference> <t indent="0">This document updates RFC 2710, and it specifies Ver
sion 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD is used by an I
<reference anchor="IANA-PROTOCOLS" Pv6 router to discover the presence of multicast listeners on directly attached
target="https://www.iana.org/assignments/protocol-numbers/proto links, and to discover which multicast addresses are of interest to those neighb
col-numbers.xhtml"> oring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the
<front> ability for a node to report interest in listening to packets with a particular
<title>Protocol Numbers</title> multicast address only from specific source addresses or from all sources except
for specific source addresses. [STANDARDS-TRACK]</t>
<author fullname=""> </abstract>
<organization>Internet Assigned Numbers Authority</organization> </front>
</author> <seriesInfo name="RFC" value="3810"/>
<seriesInfo name="DOI" value="10.17487/RFC3810"/>
<date year="2014"/> </reference>
</front> <reference anchor="RFC4286" target="https://www.rfc-editor.org/info/rfc4
286" quoteTitle="true" derivedAnchor="RFC4286">
<format target="https://www.iana.org/assignments/protocol-numbers/protoc <front>
ol-numbers.txt" <title>Multicast Router Discovery</title>
type="TXT"/> <author fullname="B. Haberman" initials="B" surname="Haberman"/>
</reference> <author fullname="J. Martin" initials="J" surname="Martin"/>
<date month="December" year="2005"/>
<reference anchor="IANA-IPV6-PARAM" <abstract>
target="https://www.iana.org/assignments/ipv6-parameters/ipv6-p <t indent="0">The concept of Internet Group Management Protocol (I
arameters.xhtml"> GMP) and Multicast Listener Discovery (MLD) snooping requires the ability to ide
<front> ntify the location of multicast routers. Since snooping is not standardized, the
<title>Internet Protocol Version 6 (IPv6) Parameters</title> re are many mechanisms in use to identify the multicast routers. However, this c
an lead to interoperability issues between multicast routers and snooping switch
<author fullname=""> es from different vendors.</t>
<organization>Internet Assigned Numbers Authority</organization> <t indent="0">This document introduces a general mechanism that al
</author> lows for the discovery of multicast routers. This new mechanism, Multicast Route
r Discovery (MRD), introduces a standardized means of identifying multicast rout
<date month="December" year="2013"/> ers without a dependency on particular multicast routing protocols. [STANDARDS-T
</front> RACK]</t>
</reference> </abstract>
</front>
<reference anchor="FW-Benchmark" target="https://www.ipv6hackers.org/files/m <seriesInfo name="RFC" value="4286"/>
eetings/ipv6-hackers-1/zack-ipv6hackers1-firewall-security-assessment-and-benchm <seriesInfo name="DOI" value="10.17487/RFC4286"/>
arking.pdf"> </reference>
<front> <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4
<title abbrev="Firewall Benchmarking">Firewall Security Assessment and Benchma 301" quoteTitle="true" derivedAnchor="RFC4301">
rking IPv6 Firewall Load Tests</title> <front>
<author initials="E." surname="Zack" fullname="Eldad Zack"> <title>Security Architecture for the Internet Protocol</title>
</author> <author fullname="S. Kent" initials="S" surname="Kent"/>
<date year=""/> <author fullname="K. Seo" initials="K" surname="Seo"/>
</front> <date month="December" year="2005"/>
<seriesInfo name="" value="IPv6 Hackers Meeting #1, Berlin, Germa <abstract>
ny. June 30, 2013"/> <t indent="0">This document describes an updated version of the "S
<!-- July 27 - August 1 --> ecurity Architecture for IP", which is designed to provide security services for
</reference> traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [ST
ANDARDS-TRACK]</t>
<reference anchor="Cisco-EH" target="https://www.cisco.com/en/US/technologie </abstract>
s/tk648/tk872/technologies_white_paper0900aecd8054d37d.pdf"> </front>
<front> <seriesInfo name="RFC" value="4301"/>
<title abbrev="Cisco IPv6 EH">IPv6 Extension Headers Review and Considerations <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</title> </reference>
<author initials="" surname="Cisco Systems" fullname="Cisco Systems"> <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4
302" quoteTitle="true" derivedAnchor="RFC4302">
<front>
<title>IP Authentication Header</title>
<author fullname="S. Kent" initials="S" surname="Kent"/>
<date month="December" year="2005"/>
<abstract>
<t indent="0">This document describes an updated version of the IP
Authentication Header (AH), which is designed to provide authentication service
s in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARD
S-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="4302"/>
<seriesInfo name="DOI" value="10.17487/RFC4302"/>
</reference>
<reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4
303" quoteTitle="true" derivedAnchor="RFC4303">
<front>
<title>IP Encapsulating Security Payload (ESP)</title>
<author fullname="S. Kent" initials="S" surname="Kent"/>
<date month="December" year="2005"/>
<abstract>
<t indent="0">This document describes an updated version of the En
capsulating Security Payload (ESP) protocol, which is designed to provide a mix
of security services in IPv4 and IPv6. ESP is used to provide confidentiality,
data origin authentication, connectionless integrity, an anti-replay service (a
form of partial sequence integrity), and limited traffic flow confidentiality.
This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="4303"/>
<seriesInfo name="DOI" value="10.17487/RFC4303"/>
</reference>
<reference anchor="RFC4727" target="https://www.rfc-editor.org/info/rfc4
727" quoteTitle="true" derivedAnchor="RFC4727">
<front>
<title>Experimental Values In IPv4, IPv6, ICMPv4, ICMPv6, UDP, and T
CP Headers</title>
<author fullname="B. Fenner" initials="B" surname="Fenner"/>
<date month="November" year="2006"/>
<abstract>
<t indent="0">When experimenting with or extending protocols, it i
s often necessary to use some sort of protocol number or constant in order to ac
tually test or experiment with the new function, even when testing in a closed e
nvironment. This document reserves some ranges of numbers for experimentation p
urposes in specific protocols where the need to support experimentation has been
identified, and it describes the numbers that have already been reserved by oth
er documents. [STANDARDS-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="4727"/>
<seriesInfo name="DOI" value="10.17487/RFC4727"/>
</reference>
<reference anchor="RFC4782" target="https://www.rfc-editor.org/info/rfc4
782" quoteTitle="true" derivedAnchor="RFC4782">
<front>
<title>Quick-Start for TCP and IP</title>
<author fullname="S. Floyd" initials="S" surname="Floyd"/>
<author fullname="M. Allman" initials="M" surname="Allman"/>
<author fullname="A. Jain" initials="A" surname="Jain"/>
<author fullname="P. Sarolahti" initials="P" surname="Sarolahti"/>
<date month="January" year="2007"/>
<abstract>
<t indent="0">This document specifies an optional Quick-Start mech
anism for transport protocols, in cooperation with routers, to determine an allo
wed sending rate at the start and, at times, in the middle of a data transfer (e
.g., after an idle period). While Quick-Start is designed to be used by a range
of transport protocols, in this document we only specify its use with TCP. Quick
-Start is designed to allow connections to use higher sending rates when there i
s significant unused bandwidth along the path, and the sender and all of the rou
ters along the path approve the Quick-Start Request.</t>
<t indent="0">This document describes many paths where Quick-Start
Requests would not be approved. These paths include all paths containing router
s, IP tunnels, MPLS paths, and the like that do not support Quick- Start. These
paths also include paths with routers or middleboxes that drop packets containin
g IP options. Quick-Start Requests could be difficult to approve over paths that
include multi-access layer- two networks. This document also describes environm
ents where the Quick-Start process could fail with false positives, with the sen
der incorrectly assuming that the Quick-Start Request had been approved by all o
f the routers along the path. As a result of these concerns, and as a result of
the difficulties and seeming absence of motivation for routers, such as core rou
ters to deploy Quick-Start, Quick-Start is being proposed as a mechanism that co
uld be of use in controlled environments, and not as a mechanism that would be i
ntended or appropriate for ubiquitous deployment in the global Internet. This me
mo defines an Experimental Protocol for the Internet community.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="4782"/>
<seriesInfo name="DOI" value="10.17487/RFC4782"/>
</reference>
<reference anchor="RFC5095" target="https://www.rfc-editor.org/info/rfc5
095" quoteTitle="true" derivedAnchor="RFC5095">
<front>
<title>Deprecation of Type 0 Routing Headers in IPv6</title>
<author fullname="J. Abley" initials="J" surname="Abley"/>
<author fullname="P. Savola" initials="P" surname="Savola"/>
<author fullname="G. Neville-Neil" initials="G" surname="Neville-Nei
l"/>
<date month="December" year="2007"/>
<abstract>
<t indent="0">The functionality provided by IPv6's Type 0 Routing
Header can be exploited in order to achieve traffic amplification over a remote
path for the purposes of generating denial-of-service traffic. This document up
dates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers
, in light of this security concern. [STANDARDS-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="5095"/>
<seriesInfo name="DOI" value="10.17487/RFC5095"/>
</reference>
<reference anchor="RFC5533" target="https://www.rfc-editor.org/info/rfc5
533" quoteTitle="true" derivedAnchor="RFC5533">
<front>
<title>Shim6: Level 3 Multihoming Shim Protocol for IPv6</title>
<author fullname="E. Nordmark" initials="E" surname="Nordmark"/>
<author fullname="M. Bagnulo" initials="M" surname="Bagnulo"/>
<date month="June" year="2009"/>
<abstract>
<t indent="0">This document defines the Shim6 protocol, a layer 3
shim for providing locator agility below the transport protocols, so that multih
oming can be provided for IPv6 with failover and load-sharing properties, withou
t assuming that a multihomed site will have a provider-independent IPv6 address
prefix announced in the global IPv6 routing table. The hosts in a site that has
multiple provider- allocated IPv6 address prefixes will use the Shim6 protocol
specified in this document to set up state with peer hosts so that the state can
later be used to failover to a different locator pair, should the original one
stop working. [STANDARDS-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="5533"/>
<seriesInfo name="DOI" value="10.17487/RFC5533"/>
</reference>
<reference anchor="RFC5570" target="https://www.rfc-editor.org/info/rfc5
570" quoteTitle="true" derivedAnchor="RFC5570">
<front>
<title>Common Architecture Label IPv6 Security Option (CALIPSO)</tit
le>
<author fullname="M. StJohns" initials="M" surname="StJohns"/>
<author fullname="R. Atkinson" initials="R" surname="Atkinson"/>
<author fullname="G. Thomas" initials="G" surname="Thomas"/>
<date month="July" year="2009"/>
<abstract>
<t indent="0">This document describes an optional method for encod
ing explicit packet Sensitivity Labels on IPv6 packets. It is intended for use
only within Multi-Level Secure (MLS) networking environments that are both trust
ed and trustworthy. This memo provides information for the Internet community.<
/t>
</abstract>
</front>
<seriesInfo name="RFC" value="5570"/>
<seriesInfo name="DOI" value="10.17487/RFC5570"/>
</reference>
<reference anchor="RFC5971" target="https://www.rfc-editor.org/info/rfc5
971" quoteTitle="true" derivedAnchor="RFC5971">
<front>
<title>GIST: General Internet Signalling Transport</title>
<author fullname="H. Schulzrinne" initials="H" surname="Schulzrinne"
/>
<author fullname="R. Hancock" initials="R" surname="Hancock"/>
<date month="October" year="2010"/>
<abstract>
<t indent="0">This document specifies protocol stacks for the rout
ing and transport of per-flow signalling messages along the path taken by that f
low through the network. The design uses existing transport and security protoc
ols under a common messaging layer, the General Internet Signalling Transport (G
IST), which provides a common service for diverse signalling applications. GIST
does not handle signalling application state itself, but manages its own intern
al state and the configuration of the underlying transport and security protocol
s to enable the transfer of messages in both directions along the flow path. Th
e combination of GIST and the lower layer transport and security protocols provi
des a solution for the base protocol component of the "Next Steps in Signalling"
(NSIS) framework. This document defines an Experimental Protocol for the Inter
net community.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="5971"/>
<seriesInfo name="DOI" value="10.17487/RFC5971"/>
</reference>
<reference anchor="RFC6275" target="https://www.rfc-editor.org/info/rfc6
275" quoteTitle="true" derivedAnchor="RFC6275">
<front>
<title>Mobility Support in IPv6</title>
<author fullname="C. Perkins" initials="C" role="editor" surname="Pe
rkins"/>
<author fullname="D. Johnson" initials="D" surname="Johnson"/>
<author fullname="J. Arkko" initials="J" surname="Arkko"/>
<date month="July" year="2011"/>
<abstract>
<t indent="0">This document specifies Mobile IPv6, a protocol that
allows nodes to remain reachable while moving around in the IPv6 Internet. Eac
h mobile node is always identified by its home address, regardless of its curren
t point of attachment to the Internet. While situated away from its home, a mob
ile node is also associated with a care-of address, which provides information a
bout the mobile node's current location. IPv6 packets addressed to a mobile nod
e's home address are transparently routed to its care-of address. The protocol
enables IPv6 nodes to cache the binding of a mobile node's home address with its
care-of address, and to then send any packets destined for the mobile node dire
ctly to it at this care-of address. To support this operation, Mobile IPv6 defi
nes a new IPv6 protocol and a new destination option. All IPv6 nodes, whether m
obile or stationary, can communicate with mobile nodes. This document obsoletes
RFC 3775. [STANDARDS-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6275"/>
<seriesInfo name="DOI" value="10.17487/RFC6275"/>
</reference>
<reference anchor="RFC6398" target="https://www.rfc-editor.org/info/rfc6
398" quoteTitle="true" derivedAnchor="RFC6398">
<front>
<title>IP Router Alert Considerations and Usage</title>
<author fullname="F. Le Faucheur" initials="F" role="editor" surname
="Le Faucheur"/>
<date month="October" year="2011"/>
<abstract>
<t indent="0">The IP Router Alert Option is an IP option that aler
ts transit routers to more closely examine the contents of an IP packet. The Re
source reSerVation Protocol (RSVP), Pragmatic General Multicast (PGM), the Inter
net Group Management Protocol (IGMP), Multicast Listener Discovery (MLD), Multic
ast Router Discovery (MRD), and General Internet Signaling Transport (GIST) are
some of the protocols that make use of the IP Router Alert Option. This documen
t discusses security aspects and usage guidelines around the use of the current
IP Router Alert Option, thereby updating RFC 2113 and RFC 2711. Specifically, i
t provides recommendations against using the Router Alert in the end-to-end open
Internet and identifies controlled environments where protocols depending on Ro
uter Alert can be used safely. It also provides recommendations about protectio
n approaches for service providers. Finally, it provides brief guidelines for R
outer Alert implementation on routers. This memo documents an Internet Best Cur
rent Practice.</t>
</abstract>
</front>
<seriesInfo name="BCP" value="168"/>
<seriesInfo name="RFC" value="6398"/>
<seriesInfo name="DOI" value="10.17487/RFC6398"/>
</reference>
<reference anchor="RFC6550" target="https://www.rfc-editor.org/info/rfc6
550" quoteTitle="true" derivedAnchor="RFC6550">
<front>
<title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</
title>
<author fullname="T. Winter" initials="T" role="editor" surname="Win
ter"/>
<author fullname="P. Thubert" initials="P" role="editor" surname="Th
ubert"/>
<author fullname="A. Brandt" initials="A" surname="Brandt"/>
<author fullname="J. Hui" initials="J" surname="Hui"/>
<author fullname="R. Kelsey" initials="R" surname="Kelsey"/>
<author fullname="P. Levis" initials="P" surname="Levis"/>
<author fullname="K. Pister" initials="K" surname="Pister"/>
<author fullname="R. Struik" initials="R" surname="Struik"/>
<author fullname="JP. Vasseur" initials="JP" surname="Vasseur"/>
<author fullname="R. Alexander" initials="R" surname="Alexander"/>
<date month="March" year="2012"/>
<abstract>
<t indent="0">Low-Power and Lossy Networks (LLNs) are a class of n
etwork in which both the routers and their interconnect are constrained. LLN ro
uters typically operate with constraints on processing power, memory, and energy
(battery power). Their interconnects are characterized by high loss rates, low
data rates, and instability. LLNs are comprised of anything from a few dozen t
o thousands of routers. Supported traffic flows include point-to-point (between
devices inside the LLN), point-to-multipoint (from a central control point to a
subset of devices inside the LLN), and multipoint-to-point (from devices inside
the LLN towards a central control point). This document specifies the IPv6 Rou
ting Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism
whereby multipoint-to-point traffic from devices inside the LLN towards a centr
al control point as well as point-to-multipoint traffic from the central control
point to the devices inside the LLN are supported. Support for point-to-point
traffic is also available. [STANDARDS-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6550"/>
<seriesInfo name="DOI" value="10.17487/RFC6550"/>
</reference>
<reference anchor="RFC6553" target="https://www.rfc-editor.org/info/rfc6
553" quoteTitle="true" derivedAnchor="RFC6553">
<front>
<title>The Routing Protocol for Low-Power and Lossy Networks (RPL) O
ption for Carrying RPL Information in Data-Plane Datagrams</title>
<author fullname="J. Hui" initials="J" surname="Hui"/>
<author fullname="JP. Vasseur" initials="JP" surname="Vasseur"/>
<date month="March" year="2012"/>
<abstract>
<t indent="0">The Routing Protocol for Low-Power and Lossy Network
s (RPL) includes routing information in data-plane datagrams to quickly identify
inconsistencies in the routing topology. This document describes the RPL Optio
n for use among RPL routers to include such routing information. [STANDARDS-TRAC
K]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6553"/>
<seriesInfo name="DOI" value="10.17487/RFC6553"/>
</reference>
<reference anchor="RFC6554" target="https://www.rfc-editor.org/info/rfc6
554" quoteTitle="true" derivedAnchor="RFC6554">
<front>
<title>An IPv6 Routing Header for Source Routes with the Routing Pro
tocol for Low-Power and Lossy Networks (RPL)</title>
<author fullname="J. Hui" initials="J" surname="Hui"/>
<author fullname="JP. Vasseur" initials="JP" surname="Vasseur"/>
<author fullname="D. Culler" initials="D" surname="Culler"/>
<author fullname="V. Manral" initials="V" surname="Manral"/>
<date month="March" year="2012"/>
<abstract>
<t indent="0">In Low-Power and Lossy Networks (LLNs), memory const
raints on routers may limit them to maintaining, at most, a few routes. In some
configurations, it is necessary to use these memory-constrained routers to deli
ver datagrams to nodes within the LLN. The Routing Protocol for Low-Power and L
ossy Networks (RPL) can be used in some deployments to store most, if not all, r
outes on one (e.g., the Directed Acyclic Graph (DAG) root) or a few routers and
forward the IPv6 datagram using a source routing technique to avoid large routin
g tables on memory-constrained routers. This document specifies a new IPv6 Rout
ing header type for delivering datagrams within a RPL routing domain. [STANDARDS
-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6554"/>
<seriesInfo name="DOI" value="10.17487/RFC6554"/>
</reference>
<reference anchor="RFC6621" target="https://www.rfc-editor.org/info/rfc6
621" quoteTitle="true" derivedAnchor="RFC6621">
<front>
<title>Simplified Multicast Forwarding</title>
<author fullname="J. Macker" initials="J" role="editor" surname="Mac
ker"/>
<date month="May" year="2012"/>
<abstract>
<t indent="0">This document describes a Simplified Multicast Forwa
rding (SMF) mechanism that provides basic Internet Protocol (IP) multicast forwa
rding suitable for limited wireless mesh and mobile ad hoc network (MANET) use.
It is mainly applicable in situations where efficient flooding represents an ac
ceptable engineering design trade-off. It defines techniques for multicast dupl
icate packet detection (DPD), to be applied in the forwarding process, for both
IPv4 and IPv6 protocol use. This document also specifies optional mechanisms fo
r using reduced relay sets to achieve more efficient multicast data distribution
within a mesh topology as compared to Classic Flooding. Interactions with othe
r protocols, such as use of information provided by concurrently running unicast
routing protocols or interaction with other multicast protocols, as well as mul
tiple deployment approaches are also described. Distributed algorithms for sele
cting reduced relay sets and related discussion are provided in the appendices.
Basic issues relating to the operation of multicast MANET border routers are di
scussed, but ongoing work remains in this area and is beyond the scope of this d
ocument. This document defines an Experimental Protocol for the Internet commun
ity.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6621"/>
<seriesInfo name="DOI" value="10.17487/RFC6621"/>
</reference>
<reference anchor="RFC6740" target="https://www.rfc-editor.org/info/rfc6
740" quoteTitle="true" derivedAnchor="RFC6740">
<front>
<title>Identifier-Locator Network Protocol (ILNP) Architectural Desc
ription</title>
<author fullname="RJ Atkinson" initials="RJ" surname="Atkinson"/>
<author fullname="SN Bhatti" initials="SN" surname="Bhatti"/>
<date month="November" year="2012"/>
<abstract>
<t indent="0">This document provides an architectural description
and the concept of operations for the Identifier-Locator Network Protocol (ILNP)
, which is an experimental, evolutionary enhancement to IP. This is a product o
f the IRTF Routing Research Group. This document defines an Experimental Protoc
ol for the Internet community.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6740"/>
<seriesInfo name="DOI" value="10.17487/RFC6740"/>
</reference>
<reference anchor="RFC6744" target="https://www.rfc-editor.org/info/rfc6
744" quoteTitle="true" derivedAnchor="RFC6744">
<front>
<title>IPv6 Nonce Destination Option for the Identifier-Locator Netw
ork Protocol for IPv6 (ILNPv6)</title>
<author fullname="RJ Atkinson" initials="RJ" surname="Atkinson"/>
<author fullname="SN Bhatti" initials="SN" surname="Bhatti"/>
<date month="November" year="2012"/>
<abstract>
<t indent="0">The Identifier-Locator Network Protocol (ILNP) is an
experimental, evolutionary enhancement to IP. ILNP has multiple instantiations
. This document describes an experimental Nonce Destination Option used only wi
th ILNP for IPv6 (ILNPv6). This document is a product of the IRTF Routing Resea
rch Group. This document defines an Experimental Protocol for the Internet comm
unity.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6744"/>
<seriesInfo name="DOI" value="10.17487/RFC6744"/>
</reference>
<reference anchor="RFC6788" target="https://www.rfc-editor.org/info/rfc6
788" quoteTitle="true" derivedAnchor="RFC6788">
<front>
<title>The Line-Identification Option</title>
<author fullname="S. Krishnan" initials="S" surname="Krishnan"/>
<author fullname="A. Kavanagh" initials="A" surname="Kavanagh"/>
<author fullname="B. Varga" initials="B" surname="Varga"/>
<author fullname="S. Ooghe" initials="S" surname="Ooghe"/>
<author fullname="E. Nordmark" initials="E" surname="Nordmark"/>
<date month="November" year="2012"/>
<abstract>
<t indent="0">In Ethernet-based aggregation networks, several subs
criber premises may be logically connected to the same interface of an Edge Rout
er. This document proposes a method for the Edge Router to identify the subscri
ber premises using the contents of the received Router Solicitation messages. T
he applicability is limited to broadband network deployment scenarios in which m
ultiple user ports are mapped to the same virtual interface on the Edge Router.
[STANDARDS-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6788"/>
<seriesInfo name="DOI" value="10.17487/RFC6788"/>
</reference>
<reference anchor="RFC6971" target="https://www.rfc-editor.org/info/rfc6
971" quoteTitle="true" derivedAnchor="RFC6971">
<front>
<title>Depth-First Forwarding (DFF) in Unreliable Networks</title>
<author fullname="U. Herberg" initials="U" role="editor" surname="He
rberg"/>
<author fullname="A. Cardenas" initials="A" surname="Cardenas"/>
<author fullname="T. Iwao" initials="T" surname="Iwao"/>
<author fullname="M. Dow" initials="M" surname="Dow"/>
<author fullname="S. Cespedes" initials="S" surname="Cespedes"/>
<date month="June" year="2013"/>
<abstract>
<t indent="0">This document specifies the Depth-First Forwarding (
DFF) protocol for IPv6 networks, a data-forwarding mechanism that can increase r
eliability of data delivery in networks with dynamic topology and/or lossy links
. The protocol operates entirely on the forwarding plane but may interact with
the routing plane. DFF forwards data packets using a mechanism similar to a "de
pth-first search" for the destination of a packet. The routing plane may be inf
ormed of failures to deliver a packet or loops. This document specifies the DFF
mechanism both for IPv6 networks (as specified in RFC 2460) and for "mesh-under
" Low-Power Wireless Personal Area Networks (LoWPANs), as specified in RFC 4944.
The design of DFF assumes that the underlying link layer provides means to det
ect if a packet has been successfully delivered to the Next Hop or not. It is a
pplicable for networks with little traffic and is used for unicast transmissions
only.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6971"/>
<seriesInfo name="DOI" value="10.17487/RFC6971"/>
</reference>
<reference anchor="RFC7045" target="https://www.rfc-editor.org/info/rfc7
045" quoteTitle="true" derivedAnchor="RFC7045">
<front>
<title>Transmission and Processing of IPv6 Extension Headers</title>
<author fullname="B. Carpenter" initials="B" surname="Carpenter"/>
<author fullname="S. Jiang" initials="S" surname="Jiang"/>
<date month="December" year="2013"/>
<abstract>
<t indent="0">Various IPv6 extension headers have been standardise
d since the IPv6 standard was first published. This document updates RFC 2460 t
o clarify how intermediate nodes should deal with such extension headers and wit
h any that are defined in the future. It also specifies how extension headers s
hould be registered by IANA, with a corresponding minor update to RFC 2780.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="7045"/>
<seriesInfo name="DOI" value="10.17487/RFC7045"/>
</reference>
<reference anchor="RFC7112" target="https://www.rfc-editor.org/info/rfc7
112" quoteTitle="true" derivedAnchor="RFC7112">
<front>
<title>Implications of Oversized IPv6 Header Chains</title>
<author fullname="F. Gont" initials="F" surname="Gont"/>
<author fullname="V. Manral" initials="V" surname="Manral"/>
<author fullname="R. Bonica" initials="R" surname="Bonica"/>
<date month="January" year="2014"/>
<abstract>
<t indent="0">The IPv6 specification allows IPv6 Header Chains of
an arbitrary size. The specification also allows options that can, in turn, ext
end each of the headers. In those scenarios in which the IPv6 Header Chain or o
ptions are unusually long and packets are fragmented, or scenarios in which the
fragment size is very small, the First Fragment of a packet may fail to include
the entire IPv6 Header Chain. This document discusses the interoperability and
security problems of such traffic, and updates RFC 2460 such that the First Frag
ment of a packet is required to contain the entire IPv6 Header Chain.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="7112"/>
<seriesInfo name="DOI" value="10.17487/RFC7112"/>
</reference>
<reference anchor="RFC7401" target="https://www.rfc-editor.org/info/rfc7
401" quoteTitle="true" derivedAnchor="RFC7401">
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname="R. Moskowitz" initials="R" role="editor" surname="
Moskowitz"/>
<author fullname="T. Heer" initials="T" surname="Heer"/>
<author fullname="P. Jokela" initials="P" surname="Jokela"/>
<author fullname="T. Henderson" initials="T" surname="Henderson"/>
<date month="April" year="2015"/>
<abstract>
<t indent="0">This document specifies the details of the Host Iden
tity Protocol (HIP). HIP allows consenting hosts to securely establish and maint
ain shared IP-layer state, allowing separation of the identifier and locator rol
es of IP addresses, thereby enabling continuity of communications across IP addr
ess changes. HIP is based on a Diffie-Hellman key exchange, using public key ide
ntifiers from a new Host Identity namespace for mutual peer authentication. The
protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-m
iddle (MitM) attacks. When used together with another suitable security protocol
, such as the Encapsulating Security Payload (ESP), it provides integrity protec
tion and optional encryption for upper-layer protocols, such as TCP and UDP.</t>
<t indent="0">This document obsoletes RFC 5201 and addresses the c
oncerns raised by the IESG, particularly that of crypto agility. It also incorpo
rates lessons learned from the implementations of RFC 5201.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="7401"/>
<seriesInfo name="DOI" value="10.17487/RFC7401"/>
</reference>
<reference anchor="RFC7731" target="https://www.rfc-editor.org/info/rfc7
731" quoteTitle="true" derivedAnchor="RFC7731">
<front>
<title>Multicast Protocol for Low-Power and Lossy Networks (MPL)</ti
tle>
<author fullname="J. Hui" initials="J" surname="Hui"/>
<author fullname="R. Kelsey" initials="R" surname="Kelsey"/>
<date month="February" year="2016"/>
<abstract>
<t indent="0">This document specifies the Multicast Protocol for L
ow-Power and Lossy Networks (MPL), which provides IPv6 multicast forwarding in c
onstrained networks. MPL avoids the need to construct or maintain any multicast
forwarding topology, disseminating messages to all MPL Forwarders in an MPL Doma
in.</t>
<t indent="0">MPL has two modes of operation. One mode uses the Tr
ickle algorithm to manage control-plane and data-plane message transmissions and
is applicable for deployments with few multicast sources. The other mode uses c
lassic flooding. By providing both modes and parameterization of the Trickle alg
orithm, an MPL implementation can be used in a variety of multicast deployments
and can trade between dissemination latency and transmission efficiency.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="7731"/>
<seriesInfo name="DOI" value="10.17487/RFC7731"/>
</reference>
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8
174" quoteTitle="true" derivedAnchor="RFC8174">
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti
tle>
<author fullname="B. Leiba" initials="B" surname="Leiba"/>
<date month="May" year="2017"/>
<abstract>
<t indent="0">RFC 2119 specifies common key words that may be used
in protocol specifications. This document aims to reduce the ambiguity by clar
ifying that only UPPERCASE usage of the key words have the defined special meani
ngs.</t>
</abstract>
</front>
<seriesInfo name="BCP" value="14"/>
<seriesInfo name="RFC" value="8174"/>
<seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8
200" quoteTitle="true" derivedAnchor="RFC8200">
<front>
<title>Internet Protocol, Version 6 (IPv6) Specification</title>
<author fullname="S. Deering" initials="S" surname="Deering"/>
<author fullname="R. Hinden" initials="R" surname="Hinden"/>
<date month="July" year="2017"/>
<abstract>
<t indent="0">This document specifies version 6 of the Internet Pr
otocol (IPv6). It obsoletes RFC 2460.</t>
</abstract>
</front>
<seriesInfo name="STD" value="86"/>
<seriesInfo name="RFC" value="8200"/>
<seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>
<reference anchor="RFC8250" target="https://www.rfc-editor.org/info/rfc8
250" quoteTitle="true" derivedAnchor="RFC8250">
<front>
<title>IPv6 Performance and Diagnostic Metrics (PDM) Destination Opt
ion</title>
<author fullname="N. Elkins" initials="N" surname="Elkins"/>
<author fullname="R. Hamilton" initials="R" surname="Hamilton"/>
<author fullname="M. Ackermann" initials="M" surname="Ackermann"/>
<date month="September" year="2017"/>
<abstract>
<t indent="0">To assess performance problems, this document descri
bes optional headers embedded in each packet that provide sequence numbers and t
iming information as a basis for measurements. Such measurements may be interpr
eted in real time or after the fact. This document specifies the Performance an
d Diagnostic Metrics (PDM) Destination Options header. The field limits, calcul
ations, and usage in measurement of PDM are included in this document.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="8250"/>
<seriesInfo name="DOI" value="10.17487/RFC8250"/>
</reference>
<reference anchor="RFC8754" target="https://www.rfc-editor.org/info/rfc8
754" quoteTitle="true" derivedAnchor="RFC8754">
<front>
<title>IPv6 Segment Routing Header (SRH)</title>
<author fullname="C. Filsfils" initials="C" role="editor" surname="F
ilsfils"/>
<author fullname="D. Dukes" initials="D" role="editor" surname="Duke
s"/>
<author fullname="S. Previdi" initials="S" surname="Previdi"/>
<author fullname="J. Leddy" initials="J" surname="Leddy"/>
<author fullname="S. Matsushima" initials="S" surname="Matsushima"/>
<author fullname="D. Voyer" initials="D" surname="Voyer"/>
<date month="March" year="2020"/>
<abstract>
<t indent="0">Segment Routing can be applied to the IPv6 data plan
e using a new type of Routing Extension Header called the Segment Routing Header
(SRH). This document describes the SRH and how it is used by nodes that are Se
gment Routing (SR) capable.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="8754"/>
<seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>
<reference anchor="RFC8900" target="https://www.rfc-editor.org/info/rfc8
900" quoteTitle="true" derivedAnchor="RFC8900">
<front>
<title>IP Fragmentation Considered Fragile</title>
<author fullname="R. Bonica" initials="R" surname="Bonica"/>
<author fullname="F. Baker" initials="F" surname="Baker"/>
<author fullname="G. Huston" initials="G" surname="Huston"/>
<author fullname="R. Hinden" initials="R" surname="Hinden"/>
<author fullname="O. Troan" initials="O" surname="Troan"/>
<author fullname="F. Gont" initials="F" surname="Gont"/>
<date month="September" year="2020"/>
<abstract>
<t indent="0">This document describes IP fragmentation and explain
s how it introduces fragility to Internet communication.</t>
<t indent="0">This document also proposes alternatives to IP fragm
entation and provides recommendations for developers and network operators.</t>
</abstract>
</front>
<seriesInfo name="BCP" value="230"/>
<seriesInfo name="RFC" value="8900"/>
<seriesInfo name="DOI" value="10.17487/RFC8900"/>
</reference>
<reference anchor="RFC9008" target="https://www.rfc-editor.org/info/rfc9
008" quoteTitle="true" derivedAnchor="RFC9008">
<front>
<title>Using RPI Option Type, Routing Header for Source Routes, and
IPv6-in-IPv6 Encapsulation in the RPL Data Plane</title>
<author initials="M.I." surname="Robles" fullname="M.I. Robles">
<organization showOnFrontPage="true"/>
</author>
<author initials="M." surname="Richardson" fullname="M. Richardson">
<organization showOnFrontPage="true"/>
</author>
<author initials="P." surname="Thubert" fullname="P. Thubert">
<organization showOnFrontPage="true"/>
</author>
<date year="2021" month="April"/>
<abstract>
<t indent="0">This document looks at different data flows through
Low-Power and Lossy Networks (LLN) where RPL (IPv6 Routing Protocol for Low-Powe
r and Lossy Networks) is used to establish routing. The document enumerates the
cases where RPL Packet Information (RPI) Option Type (RFC 6553), RPL Source Rout
e Header (RFC 6554), and IPv6-in-IPv6 encapsulation are required in the data pla
ne. This analysis provides the basis upon which to design efficient compression
of these headers. This document updates RFC 6553 by adding a change to the RPI O
ption Type. Additionally, this document updates RFC 6550 by defining a flag in t
he DODAG Information Object (DIO) Configuration option to indicate this change a
nd updates RFC 8138 as well to consider the new Option Type when the RPL Option
is decompressed.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="9008"/>
<seriesInfo name="DOI" value="10.17487/RFC9008"/>
</reference>
</references>
<references pn="section-8.2">
<name slugifiedName="name-informative-references">Informative References
</name>
<reference anchor="Biondi-2007" target="http://www.secdev.org/conf/IPv6_
RH_security-csw07.pdf" quoteTitle="true" derivedAnchor="Biondi-2007">
<front>
<title>IPv6 Routing Header Security</title>
<author fullname="P. Biondi" initials="P." surname="Biondi">
<organization showOnFrontPage="true"/>
</author>
<author fullname="A. Ebalard" initials="A." surname="Ebalard">
<organization showOnFrontPage="true"/>
</author>
<date month="April" year="2007"/>
</front>
<refcontent>CanSecWest Security Conference</refcontent>
</reference>
<reference anchor="Cisco-EH" target="https://www.cisco.com/en/US/technol
ogies/tk648/tk872/technologies_white_paper0900aecd8054d37d.pdf" quoteTitle="true
" derivedAnchor="Cisco-EH">
<front>
<title abbrev="Cisco IPv6 EH">IPv6 Extension Headers Review and Cons
iderations</title>
<author initials="" surname="" fullname="">
<organization showOnFrontPage="true">Cisco Systems</organization>
</author>
<date month="October" year="2006"/>
</front>
<refcontent>Whitepaper</refcontent>
</reference>
<reference anchor="FW-Benchmark" target="https://www.ipv6hackers.org/fil
es/meetings/ipv6-hackers-1/zack-ipv6hackers1-firewall-security-assessment-and-be
nchmarking.pdf" quoteTitle="true" derivedAnchor="FW-Benchmark">
<front>
<title abbrev="Firewall Benchmarking">Firewall Security Assessment a
nd Benchmarking IPv6 Firewall Load Tests</title>
<author initials="E." surname="Zack" fullname="Eldad Zack">
</author> </author>
<date year=""/> <date month="June" year="2013"/>
</front> </front>
<seriesInfo name="" value="Whitepaper. October 2006"/> <refcontent>IPv6 Hackers Meeting #1, Berlin, Germany</refcontent>
<!-- July 27 - August 1 --> </reference>
</reference> <reference anchor="Huston-2022" target="https://iepg.org/2022-03-20-ietf
113/huston-v6frag.pdf" quoteTitle="true" derivedAnchor="Huston-2022">
<reference anchor="draft-gont-6man-ipv6-opt-transmit"> <front>
<front> <title>IPv6 Fragmentation and EH Behaviours</title>
<title>Transmission and Processing of IPv6 Options</title> <author fullname="Geoff Huston" initials="G." surname="Huston">
<organization abbrev="APNIC" showOnFrontPage="true"/>
<author fullname="Fernando Gont" initials="F." surname="Gont"> <address>
<organization>SI6 Networks / UTN-FRH</organization> <email>gih@apnic.net</email>
</author> <uri>https://www.apnic.net</uri>
<author fullname="Will Liu" initials="W." surname="Liu"> </address>
<organization></organization> </author>
</author> <author fullname="Joao Damas" initials="J." surname="Damas">
<author fullname="Ron Bonica" initials="R." surname="Bonica"> <organization abbrev="APNIC" showOnFrontPage="true"/>
<organization></organization> </author>
</author> <date month="March" year="2022"/>
<date month="August" year="2014"/> </front>
</front> <refcontent>IEPG Meeting at IETF 113"</refcontent>
</reference>
<reference anchor="IANA-IPV6-PARAM" target="https://www.iana.org/assignm
ents/ipv6-parameters" quoteTitle="true" derivedAnchor="IANA-IPV6-PARAM">
<front>
<title>Internet Protocol Version 6 (IPv6) Parameters</title>
<author>
<organization showOnFrontPage="true">IANA</organization>
</author>
</front>
</reference>
<reference anchor="IANA-PROTOCOLS" target="https://www.iana.org/assignme
nts/protocol-numbers" quoteTitle="true" derivedAnchor="IANA-PROTOCOLS">
<front>
<title>Protocol Numbers</title>
<author>
<organization showOnFrontPage="true">IANA</organization>
</author>
</front>
</reference>
<reference anchor="I-D.gont-6man-ipv6-opt-transmit" quoteTitle="true" ta
rget="https://datatracker.ietf.org/doc/html/draft-gont-6man-ipv6-opt-transmit-02
" derivedAnchor="IPv6-OPTIONS">
<front>
<title>Transmission and Processing of IPv6 Options</title>
<author fullname="Fernando Gont">
</author>
<author fullname="Will(Shucheng) Liu">
</author>
<author fullname="Ronald P. Bonica">
</author>
<date month="August" day="21" year="2015"/>
<abstract>
<t indent="0"> Various IPv6 options have been standardized since
the core IPv6
standard was first published. This document updates RFC 2460 to
clarify how nodes should deal with such IPv6 options and with any
options that are defined in the future. It complements [RFC7045],
which offers a similar clarification regarding IPv6 Extension
Headers.
<seriesInfo name="" </t>
value="IETF Internet Draft, work in progress"/> </abstract>
</reference> </front>
<seriesInfo name="Internet-Draft" value="draft-gont-6man-ipv6-opt-tran
smit-02"/>
<format type="TXT" target="https://www.ietf.org/archive/id/draft-gont-
6man-ipv6-opt-transmit-02.txt"/>
<refcontent>Work in Progress</refcontent>
</reference>
<reference anchor="I-D.vyncke-v6ops-james" quoteTitle="true" target="htt
ps://datatracker.ietf.org/doc/html/draft-vyncke-v6ops-james-02" derivedAnchor="J
AMES">
<front>
<title>Just Another Measurement of Extension header Survivability (J
AMES)</title>
<author fullname="Justin Iurman">
</author>
<date month="July" day="11" year="2022"/>
<abstract>
<t indent="0"> In 2016, RFC7872 has measured the drop of packets
with IPv6 extension
headers. This document presents a slightly different methodology
with more recent results. It is still work in progress.
</references> </t>
</abstract>
</front>
<seriesInfo name="Internet-Draft" value="draft-vyncke-v6ops-james-02"/
>
<format type="TXT" target="https://www.ietf.org/archive/id/draft-vynck
e-v6ops-james-02.txt"/>
<refcontent>Work in Progress</refcontent>
</reference>
<reference anchor="NIMROD-DOC" target="http://ana-3.lcs.mit.edu/~jnc/nim
rod" quoteTitle="true" derivedAnchor="NIMROD-DOC">
<front>
<title>Nimrod Documentation</title>
<author/>
</front>
</reference>
<reference anchor="NIMROD-EID" quoteTitle="true" target="https://datatra
cker.ietf.org/doc/html/draft-ietf-nimrod-eid-00" derivedAnchor="NIMROD-EID">
<front>
<title>Endpoint Identifier Destination Option</title>
<author initials="C." surname="Lynn" fullname="Dr. Charles W. Lynn J
r.">
</author>
<date month="March" day="2" year="1996"/>
</front>
<seriesInfo name="Internet-Draft" value="draft-ietf-nimrod-eid-00"/>
<refcontent>Work in Progress</refcontent>
</reference>
<reference anchor="I-D.irtf-pearg-numeric-ids-generation" quoteTitle="tr
ue" target="https://datatracker.ietf.org/doc/html/draft-irtf-pearg-numeric-ids-g
eneration-11" derivedAnchor="NUMERIC-IDS">
<front>
<title>On the Generation of Transient Numeric Identifiers</title>
<author fullname="Fernando Gont">
<organization showOnFrontPage="true">SI6 Networks</organization>
</author>
<author fullname="Ivan Arce">
<organization showOnFrontPage="true">Quarkslab</organization>
</author>
<date month="July" day="11" year="2022"/>
<abstract>
<t indent="0"> This document performs an analysis of the securit
y and privacy
implications of different types of "transient numeric identifiers"
used in IETF protocols, and tries to categorize them based on their
interoperability requirements and their associated failure severity
when such requirements are not met. Subsequently, it provides advice
on possible algorithms that could be employed to satisfy the
interoperability requirements of each identifier category, while
minimizing the negative security and privacy implications, thus
providing guidance to protocol designers and protocol implementers.
Finally, it describes a number of algorithms that have been employed
in real implementations to generate transient numeric identifiers,
and analyzes their security and privacy properties. This document is
a product of the Privacy Enhancement and Assessment Research Group
(PEARG) in the IRTF.
</back> </t>
</abstract>
</front>
<seriesInfo name="Internet-Draft" value="draft-irtf-pearg-numeric-ids-
generation-11"/>
<format type="TXT" target="https://www.ietf.org/archive/id/draft-irtf-
pearg-numeric-ids-generation-11.txt"/>
<refcontent>Work in Progress</refcontent>
</reference>
<reference anchor="RFC2460" target="https://www.rfc-editor.org/info/rfc2
460" quoteTitle="true" derivedAnchor="RFC2460">
<front>
<title>Internet Protocol, Version 6 (IPv6) Specification</title>
<author fullname="S. Deering" initials="S" surname="Deering"/>
<author fullname="R. Hinden" initials="R" surname="Hinden"/>
<date month="December" year="1998"/>
<abstract>
<t indent="0">This document specifies version 6 of the Internet Pr
otocol (IPv6), also sometimes referred to as IP Next Generation or IPng. [STANDA
RDS-TRACK]</t>
</abstract>
</front>
<seriesInfo name="RFC" value="2460"/>
<seriesInfo name="DOI" value="10.17487/RFC2460"/>
</reference>
<reference anchor="RFC3871" target="https://www.rfc-editor.org/info/rfc3
871" quoteTitle="true" derivedAnchor="RFC3871">
<front>
<title>Operational Security Requirements for Large Internet Service
Provider (ISP) IP Network Infrastructure</title>
<author fullname="G. Jones" initials="G" role="editor" surname="Jone
s"/>
<date month="September" year="2004"/>
<abstract>
<t indent="0">This document defines a list of operational security
requirements for the infrastructure of large Internet Service Provider (ISP) IP
networks (routers and switches). A framework is defined for specifying "profil
es", which are collections of requirements applicable to certain network topolog
y contexts (all, core-only, edge-only...). The goal is to provide network opera
tors a clear, concise way of communicating their security requirements to vendor
s. This memo provides information for the Internet community.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="3871"/>
<seriesInfo name="DOI" value="10.17487/RFC3871"/>
</reference>
<reference anchor="RFC6192" target="https://www.rfc-editor.org/info/rfc6
192" quoteTitle="true" derivedAnchor="RFC6192">
<front>
<title>Protecting the Router Control Plane</title>
<author fullname="D. Dugal" initials="D" surname="Dugal"/>
<author fullname="C. Pignataro" initials="C" surname="Pignataro"/>
<author fullname="R. Dunn" initials="R" surname="Dunn"/>
<date month="March" year="2011"/>
<abstract>
<t indent="0">This memo provides a method for protecting a router'
s control plane from undesired or malicious traffic. In this approach, all legit
imate router control plane traffic is identified. Once legitimate traffic has be
en identified, a filter is deployed in the router's forwarding plane. That filte
r prevents traffic not specifically identified as legitimate from reaching the r
outer's control plane, or rate-limits such traffic to an acceptable level.</t>
<t indent="0">Note that the filters described in this memo are app
lied only to traffic that is destined for the router, and not to all traffic tha
t is passing through the router. This document is not an Internet Standards Trac
k specification; it is published for informational purposes.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="6192"/>
<seriesInfo name="DOI" value="10.17487/RFC6192"/>
</reference>
<reference anchor="RFC7126" target="https://www.rfc-editor.org/info/rfc7
126" quoteTitle="true" derivedAnchor="RFC7126">
<front>
<title>Recommendations on Filtering of IPv4 Packets Containing IPv4
Options</title>
<author fullname="F. Gont" initials="F" surname="Gont"/>
<author fullname="R. Atkinson" initials="R" surname="Atkinson"/>
<author fullname="C. Pignataro" initials="C" surname="Pignataro"/>
<date month="February" year="2014"/>
<abstract>
<t indent="0">This document provides advice on the filtering of IP
v4 packets based on the IPv4 options they contain. Additionally, it discusses t
he operational and interoperability implications of dropping packets based on th
e IP options they contain.</t>
</abstract>
</front>
<seriesInfo name="BCP" value="186"/>
<seriesInfo name="RFC" value="7126"/>
<seriesInfo name="DOI" value="10.17487/RFC7126"/>
</reference>
<reference anchor="RFC7739" target="https://www.rfc-editor.org/info/rfc7
739" quoteTitle="true" derivedAnchor="RFC7739">
<front>
<title>Security Implications of Predictable Fragment Identification
Values</title>
<author fullname="F. Gont" initials="F" surname="Gont"/>
<date month="February" year="2016"/>
<abstract>
<t indent="0">IPv6 specifies the Fragment Header, which is employe
d for the fragmentation and reassembly mechanisms. The Fragment Header contains
an "Identification" field that, together with the IPv6 Source Address and the I
Pv6 Destination Address of a packet, identifies fragments that correspond to the
same original datagram, such that they can be reassembled together by the recei
ving host. The only requirement for setting the Identification field is that th
e corresponding value must be different than that employed for any other fragmen
ted datagram sent recently with the same Source Address and Destination Address.
Some implementations use a simple global counter for setting the Identificatio
n field, thus leading to predictable Identification values. This document analy
zes the security implications of predictable Identification values, and provides
implementation guidance for setting the Identification field of the Fragment He
ader, such that the aforementioned security implications are mitigated.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="7739"/>
<seriesInfo name="DOI" value="10.17487/RFC7739"/>
</reference>
<reference anchor="RFC7872" target="https://www.rfc-editor.org/info/rfc7
872" quoteTitle="true" derivedAnchor="RFC7872">
<front>
<title>Observations on the Dropping of Packets with IPv6 Extension H
eaders in the Real World</title>
<author fullname="F. Gont" initials="F" surname="Gont"/>
<author fullname="J. Linkova" initials="J" surname="Linkova"/>
<author fullname="T. Chown" initials="T" surname="Chown"/>
<author fullname="W. Liu" initials="W" surname="Liu"/>
<date month="June" year="2016"/>
<abstract>
<t indent="0">This document presents real-world data regarding the
extent to which packets with IPv6 Extension Headers (EHs) are dropped in the In
ternet (as originally measured in August 2014 and later in June 2015, with simil
ar results) and where in the network such dropping occurs. The aforementioned r
esults serve as a problem statement that is expected to trigger operational advi
ce on the filtering of IPv6 packets carrying IPv6 EHs so that the situation impr
oves over time. This document also explains how the results were obtained, such
that the corresponding measurements can be reproduced by other members of the c
ommunity and repeated over time to observe changes in the handling of packets wi
th IPv6 EHs.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="7872"/>
<seriesInfo name="DOI" value="10.17487/RFC7872"/>
</reference>
<reference anchor="RFC9098" target="https://www.rfc-editor.org/info/rfc9
098" quoteTitle="true" derivedAnchor="RFC9098">
<front>
<title>Operational Implications of IPv6 Packets with Extension Heade
rs</title>
<author fullname="F. Gont" initials="F" surname="Gont"/>
<author fullname="N. Hilliard" initials="N" surname="Hilliard"/>
<author fullname="G. Doering" initials="G" surname="Doering"/>
<author fullname="W. Kumari" initials="W" surname="Kumari"/>
<author fullname="G. Huston" initials="G" surname="Huston"/>
<author fullname="W. Liu" initials="W" surname="Liu"/>
<date month="September" year="2021"/>
<abstract>
<t indent="0">This document summarizes the operational implication
s of IPv6 extension headers specified in the IPv6 protocol specification (RFC 82
00) and attempts to analyze reasons why packets with IPv6 extension headers are
often dropped in the public Internet.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="9098"/>
<seriesInfo name="DOI" value="10.17487/RFC9098"/>
</reference>
</references>
</references>
<section numbered="false" toc="include" removeInRFC="false" pn="section-appe
ndix.a">
<name slugifiedName="name-acknowledgements">Acknowledgements</name>
<t indent="0" pn="section-appendix.a-1">The authors would like to thank <c
ontact fullname="Ron Bonica"/> for his work on earlier draft versions of this do
cument.</t>
<t indent="0" pn="section-appendix.a-2">The authors of this document would
like to thank (in alphabetical order) <contact fullname="Mikael Abrahamsson"/>,
<contact fullname="Brian Carpenter"/>, <contact fullname="Tim Chown"/>, <contac
t fullname="Roman Danyliw"/>, <contact fullname="Darren Dukes"/>, <contact fulln
ame="Lars Eggert"/>, <contact fullname="David Farmer"/>, <contact fullname="Mike
Heard"/>, <contact fullname="Bob Hinden"/>, <contact fullname="Christian Huitem
a"/>, <contact fullname="Benjamin Kaduk"/>, <contact fullname="Erik Kline"/>, <c
ontact fullname="Murray Kucherawy"/>, <contact fullname="Jen Linkova"/>, <contac
t fullname="Carlos Pignataro"/>, <contact fullname="Alvaro Retana"/>, <contact f
ullname="Maria Ines Robles"/>, <contact fullname="Zaheduzzaman Sarker"/>, <conta
ct fullname="Donald Smith"/>, <contact fullname="Pascal Thubert"/>, <contact ful
lname="Ole Troan"/>, <contact fullname="Gunter Van de Velde"/>, <contact fullnam
e="Éric Vyncke"/>, and <contact fullname="Robert Wilton"/> for providing valuabl
e comments on earlier draft versions of this document.</t>
<t indent="0" pn="section-appendix.a-3">This document borrows some text an
d analysis from <xref target="RFC7126" format="default" sectionFormat="of" deriv
edContent="RFC7126"/>, which is authored by <contact fullname="Fernando Gont"/>,
<contact fullname="Randall Atkinson"/>, and <contact fullname="Carlos Pignataro
"/>.</t>
<t indent="0" pn="section-appendix.a-4">The authors would like to thank <c
ontact fullname="Warren Kumari"/> and <contact fullname="Éric Vyncke"/> for thei
r guidance during the publication process for this document.</t>
<t indent="0" pn="section-appendix.a-5">Fernando would also like to thank
<contact fullname="Brian Carpenter"/> and <contact fullname="Ran Atkinson"/> who
, over the years, have answered many questions and provided valuable comments th
at have benefited his protocol-related work (including the present document).</t
>
</section>
<section anchor="authors-addresses" numbered="false" removeInRFC="false" toc
="include" pn="section-appendix.b">
<name slugifiedName="name-authors-addresses">Authors' Addresses</name>
<author fullname="Fernando Gont" initials="F." surname="Gont">
<organization abbrev="SI6 Networks" showOnFrontPage="true">SI6 Networks<
/organization>
<address>
<postal>
<street>Segurola y Habana 4310 7mo piso</street>
<city>Ciudad Autonoma de Buenos Aires</city>
<country>Argentina</country>
</postal>
<email>fgont@si6networks.com</email>
<uri>https://www.si6networks.com</uri>
</address>
</author>
<author fullname="Will (Shucheng) Liu" initials="W." surname="Liu">
<organization showOnFrontPage="true">Huawei Technologies</organization>
<address>
<postal>
<street>Bantian, Longgang District</street>
<city>Shenzhen</city>
<code>518129</code>
<country>China</country>
</postal>
<email>liushucheng@huawei.com</email>
</address>
</author>
</section>
</back>
</rfc> </rfc>
 End of changes. 63 change blocks. 
1725 lines changed or deleted 3703 lines changed or added

This html diff was produced by rfcdiff 1.48.