Internet DRAFT - draft-gont-6man-ipv6-opt-transmit

draft-gont-6man-ipv6-opt-transmit







6man                                                             F. Gont
Internet-Draft                                    UTN-FRH / SI6 Networks
Updates: 2460 (if approved)                                       W. Liu
Intended status: Best Current Practice               Huawei Technologies
Expires: February 22, 2016                                     R. Bonica
                                                        Juniper Networks
                                                         August 21, 2015


              Transmission and Processing of IPv6 Options
                draft-gont-6man-ipv6-opt-transmit-02.txt

Abstract

   Various IPv6 options have been standardized since the core IPv6
   standard was first published.  This document updates RFC 2460 to
   clarify how nodes should deal with such IPv6 options and with any
   options that are defined in the future.  It complements [RFC7045],
   which offers a similar clarification regarding IPv6 Extension
   Headers.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on February 22, 2016.

Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect



Gont, et al.            Expires February 22, 2016               [Page 1]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction and Problem Statement  . . . . . . . . . . . . .   2
   2.  Terminology and Conventions Used in This Document . . . . . .   3
     2.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
     2.2.  Conventions . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Considerations for All IPv6 Options . . . . . . . . . . . . .   4
   4.  Processing of currently-defined IPv6 Options  . . . . . . . .   5
     4.1.  Hop-by-Hop Options Header . . . . . . . . . . . . . . . .   5
     4.2.  Destination Options Header  . . . . . . . . . . . . . . .   7
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .   9
   7.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  10
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  10
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  10
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  13
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  14

1.  Introduction and Problem Statement

   Various IPv6 options have been standardized since the core IPv6
   standard [RFC2460] was first published.  Except for the padding
   options (Pad1 and PadN), all the options that have so far been
   specified are meant to be employed with specific IPv6 Extension
   Header (EH) types.  Additionally, some options have specific
   requirements such as, for example, only allowing a single instance of
   the option in the corresponding IPv6 extension header.  This
   establishes some criteria for validating packets that employ IPv6
   options.

   [RFC2460] specifies that IPv6 extension headers (with the exception
   of the Hop-by-Hop Options extension header) are not examined or
   processed by any node along a packet's delivery path, until the
   packet reaches the node (or each of the set of nodes, in the case of
   multicast) identified in the Destination Address field of the IPv6
   header.  However, in practice this is not really the case: some
   routers, and a variety of middleboxes such as firewalls, load
   balancers, or packet classifiers, might inspect other parts of each
   packet [RFC7045].  Hence both end-nodes an intermediate nodes may end
   up inspecting the contents of extension headers and discard packets
   based on the presence of specific IPv6 options.





Gont, et al.            Expires February 22, 2016               [Page 2]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   This document clarifies the default processing of IPv6 options.  In
   those cases in which the specifications add additional constraints/
   requirements regarding IPv6 options, such additional constraints/
   requirements are also taken into account.

2.  Terminology and Conventions Used in This Document

2.1.  Terminology

   In the remainder of this document, the term "forwarding node" refers
   to any router, firewall, load balancer, prefix translator, or any
   other device or middlebox that forwards IPv6 packets with or without
   examining the packet in any way.

   In this document, "standard" IPv6 options are those specified in
   detail by IETF Standards Actions [RFC5226].  "Experimental" options
   include those defined by any Experimental RFC and the option types
   0x1E, 0x3E, 0x5E, 0x7E, 0x9E, 0xBE, 0xDE, and 0xFE, defined by
   [RFC3692] and [RFC4727] when used as experimental options.  "Defined"
   options are the "standard" options plus the "experimental" ones.

   The terms "permit" (allow the traffic), "drop" (drop with no
   notification to sender), and "reject" (drop with appropriate
   notification to sender) are employed as defined in [RFC3871].
   Throughout this document we also employ the term "discard" as a
   generic term to indicate the act of discarding a packet, irrespective
   of whether the sender is notified of such packet drops.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

2.2.  Conventions

   This document clarifies some basic validation of IPv6 options, and
   specifies the default processing of them.  We recommend that a
   configuration option is made available to govern the processing of
   each IPv6 option type, on a per-EH-type granularity.  Such
   configuration options may include the following possible settings:

   o  Permit this IPv6 Option type

   o  Drop (and log) packets containing this IPv6 option type

   o  Reject (and log) packets containing this IPv6 option type (where
      the packet drop is signaled with an ICMPv6 error message)





Gont, et al.            Expires February 22, 2016               [Page 3]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   o  Rate-limit the processing of packets containing this IPv6 option
      type

   o  Ignore this IPv6 option type (forwarding packets that contain
      them)

   We note that special care needs to be taken when devices log packet
   drops/rejects.  Devices should count the number of packets dropped/
   rejected, but the logging of drop/reject events should be limited so
   as to not overburden device resources.

   Finally, we note that when discarding packets, it is generally
   desirable that the sender be signaled of the packet drop, since this
   is of use for trouble-shooting purposes.  However, throughout this
   document (when recommending that packets be discarded) we generically
   refer to the action as "discard" without specifying whether the
   sender is signaled of the packet drop.

3.  Considerations for All IPv6 Options

   Forwarding nodes that discard packets (by default) based on the
   presence of IPv6 options are known to cause connectivity failures and
   deployment problems.  Any forwarding node along an IPv6 packet's
   path, which forwards the packet for any reason, SHOULD do so
   regardless of any IPv6 Destination Options that are present, as
   required by [RFC2460].  Exceptionally, if a forwarding node is
   designed to examine IPv6 Destination Options for any reason, such as
   firewalling, it MUST recognise and deal appropriately with all
   standard IPv6 options types and SHOULD recognise and deal
   appropriately with all experimental IPv6 options.  The list of
   standard and experimental option types is maintained by IANA (see
   [IANA-IPV6-PARAM]), and implementors are advised to check this list
   regularly for updates.

   In the case of some options meant to be included in IPv6 extension
   headers other than Hop-by-Hop Options, [RFC2460] requires destination
   hosts to discard the corresponding packet if the option is
   unrecognised.  However, intermediate forwarding nodes SHOULD NOT do
   this, since doing so might cause them to inadvertently discard
   traffic using a recently standardised IPv6 option not yet recognised
   by the intermediate node.  The exceptions to this rule are discussed
   next.

   If a forwarding node discards a packet containing a standard IPv6
   option, it MUST be the result of a configurable policy and not just
   the result of a failure to recognise such an option.  This means that
   the discard policy for each standard type of IPv6 option MUST be




Gont, et al.            Expires February 22, 2016               [Page 4]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   individually configurable.  The default configuration SHOULD allow
   all standard IPv6 options.

   Experimental IPv6 options SHOULD be treated in the same way as
   standard IPv6 options, including an individually configurable discard
   policy.

   A node that processes the contents of an extension header MUST
   discard the corresponding packet if it contains any defined options
   that are not meant for the extension header being processed.  This
   document requests IANA to add a new column to [IANA-IPV6-PARAM] to
   clearly mark the IPv6 Extension Header type(s) for which each option
   (defined by IETF Standards Action or IESG Approval) is valid.

   A node that processes the contents of an IPv6 extension header MAY
   discard the corresponding packet if it contains any options that have
   become deprecated.  Whether or not such packets are dropped SHOULD be
   configurable, and the default setting MUST be to not drop such
   packets.

   A node that processes the contents of an extension header and
   encounters an undefined (unrecognised) IPv6 option MUST react to such
   option according to the highest-order two bits of the option type, as
   specified by Section 4.2 of [RFC2460].

   A node that processes an IPv6 extension header MAY discard a packet
   containing any experimental IPv6 options.

4.  Processing of currently-defined IPv6 Options

   The following subsections provide advice on how to process the IPv6
   options that have been defined at the time of this writing, according
   to the rules specified in the previous sections.

4.1.  Hop-by-Hop Options Header

   A node that processes the Hop-by-Hop Options extension header MUST
   discard the corresponding packet if it contains any options that are
   not valid for the Hop-by-Hop Options extension header
   [IANA-IPV6-PARAM].

   A node that processes the Hop-by-Hop Options extension header MUST
   discard a packet containing multiple instances (i.e., more than one)
   of this option in the Hop-by-Hop Options extension header:

   o  Type 0x05: Router Alert [RFC2711]





Gont, et al.            Expires February 22, 2016               [Page 5]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


      NOTE: The rationale for discarding the packet is that [RFC2711]
      forbids multiple instances of this option.

   A node that processes the Hop-by-Hop Options extension header MUST
   discard a packet that carries a Fragment Header and also contains
   this option in the Hop-by-Hop Options extension header:

   o  Type 0xC2: Jumbo Payload [RFC2675]

      NOTE: The rationale for discarding the packet is that [RFC2675]
      forbids the use of the Jumbo Payload Option in packets that carry
      a Fragment Header.

   A node that processes the Hop-by-Hop Options extension header MAY
   discard a packet containing any of the following options in that
   header:

   o  Type=0x4D: Deprecated

      NOTE: The rationale for discarding the packet is that the
      aforementioned option has been deprecated.

   A node that processes the Hop-by-Hop Options extension header MAY
   discard a packet containing any of the following options in that
   header:

   o  Type 0x1E: RFC3692-style Experiment [RFC4727]

   o  Type 0x3E: RFC3692-style Experiment [RFC4727]

   o  Type 0x5E: RFC3692-style Experiment [RFC4727]

   o  Type 0x7E: RFC3692-style Experiment [RFC4727]

   o  Type 0x9E: RFC3692-style Experiment [RFC4727]

   o  Type 0xBE: RFC3692-style Experiment [RFC4727]

   o  Type 0xDE: RFC3692-style Experiment [RFC4727]

   o  Type 0xFE: RFC3692-style Experiment [RFC4727]

      NOTE: This is in line with the corresponding specification in
      [RFC7045] for experimental extension headers.







Gont, et al.            Expires February 22, 2016               [Page 6]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


4.2.  Destination Options Header

   A node that processes the Destination Options header MUST discard a
   packet containing any options that are not valid for the Destination
   Options header [IANA-IPV6-PARAM].

   A node that processes the Destination Options extension header MAY
   discard a packet containing any of the following options in that
   header:

   o  Type 0x8A: Endpoint Identification [nimrod-eid] [NIMROD-DOC]

   o  Type 0x4D: Deprecated

      NOTE: The rationale for discarding the packet is that the
      aforementioned options have been deprecated.

   A node that processes the Destination Options extension header MAY
   discard a packet containing any of the following options in that
   header:

   o  Type 0x1E: RFC3692-style Experiment [RFC4727]

   o  Type 0x3E: RFC3692-style Experiment [RFC4727]

   o  Type 0x5E: RFC3692-style Experiment [RFC4727]

   o  Type 0x7E: RFC3692-style Experiment [RFC4727]

   o  Type 0x9E: RFC3692-style Experiment [RFC4727]

   o  Type 0xBE: RFC3692-style Experiment [RFC4727]

   o  Type 0xDE: RFC3692-style Experiment [RFC4727]

   o  Type 0xFE: RFC3692-style Experiment [RFC4727]

      NOTE: This is in line with the corresponding specification in
      [RFC7045] for experimental extension headers.

5.  IANA Considerations

   IANA is requested to add an extra column entitled "Extension Header
   Types" to the "Destination Options and Hop-by-Hop Options" registry
   [IANA-IPV6-PARAM], to clearly mark the IPv6 Extension Header types
   for which each option (defined by IETF Standards Action or IESG
   Approval) is valid (see the list below).  This also applies to
   Destination Options and Hop-by-Hop Options defined in the future.



Gont, et al.            Expires February 22, 2016               [Page 7]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   What follows is the initial list of IPv6 options and the
   corresponding marks that indicate which Extension Header type(s)
   these IPv6 options are valid for:

   +------+---------------------+------------------------------+-------+
   | Hex  |     Description     |          Reference           |   EH  |
   | Valu |                     |                              | Types |
   |  e   |                     |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0x00 |         Pad1        |          [RFC2460]           |   DH  |
   +------+---------------------+------------------------------+-------+
   | 0x01 |         PadN        |          [RFC2460]           |   DH  |
   +------+---------------------+------------------------------+-------+
   | 0xC2 |    Jumbo Payload    |          [RFC2675]           |   H   |
   +------+---------------------+------------------------------+-------+
   | 0x63 |      RPL Option     |          [RFC6553]           |   H   |
   +------+---------------------+------------------------------+-------+
   | 0x04 |        Tunnel       |          [RFC2473]           |   D   |
   |      | Encapsulation Limit |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0x05 |     Router Alert    |          [RFC2711]           |   H   |
   +------+---------------------+------------------------------+-------+
   | 0x26 |     Quick-Start     |          [RFC4782]           |   H   |
   +------+---------------------+------------------------------+-------+
   | 0x07 |       CALIPSO       |          [RFC5570]           |   H   |
   +------+---------------------+------------------------------+-------+
   | 0x08 |       SMF_DPD       |          [RFC6621]           |   H   |
   +------+---------------------+------------------------------+-------+
   | 0xC9 |     Home Address    |          [RFC6275]           |   D   |
   +------+---------------------+------------------------------+-------+
   | 0x8A |       Endpoint      |   [nimrod-eid][NIMROD-DOC]   |   D   |
   |      |    Identification   |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0x8B |      ILNP Nonce     |          [RFC6744]           |   D   |
   +------+---------------------+------------------------------+-------+
   | 0x8C | Line-Identification |          [RFC6788]           |   D   |
   |      |        Option       |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0x4D |      Deprecated     |                              |   U   |
   +------+---------------------+------------------------------+-------+
   | 0x6D |      MPL Option     |   [I-D.ietf-roll-trickle-    |   H   |
   |      |                     |            mcast]            |       |
   +------+---------------------+------------------------------+-------+
   | 0xEE |   IPv6 DFF Header   |          [RFC6971]           |   H   |
   +------+---------------------+------------------------------+-------+
   | 0x1E |    RFC3692-style    |          [RFC4727]           |   DH  |
   |      |      Experiment     |                              |       |
   +------+---------------------+------------------------------+-------+



Gont, et al.            Expires February 22, 2016               [Page 8]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   | 0x3E |    RFC3692-style    |          [RFC4727]           |   DH  |
   |      |      Experiment     |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0x5E |    RFC3692-style    |          [RFC4727]           |   DH  |
   |      |      Experiment     |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0x7E |    RFC3692-style    |          [RFC4727]           |   DH  |
   |      |      Experiment     |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0x9E |    RFC3692-style    |          [RFC4727]           |   DH  |
   |      |      Experiment     |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0xBE |    RFC3692-style    |          [RFC4727]           |   DH  |
   |      |      Experiment     |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0xDE |    RFC3692-style    |          [RFC4727]           |   DH  |
   |      |      Experiment     |                              |       |
   +------+---------------------+------------------------------+-------+
   | 0xFE |    RFC3692-style    |          [RFC4727]           |   DH  |
   |      |      Experiment     |                              |       |
   +------+---------------------+------------------------------+-------+

   Additionally, the following legend should be added to the registry:

   D: Destination Options Header
   H: Hop-by-Hop Options Header
   U: Unknown

6.  Security Considerations

   Forwarding nodes that operate as firewalls MUST conform to the
   requirements in this document.  In particular, packets containing
   standard IPv6 options are only to be discarded as a result of an
   intentionally configured policy.

   These requirements do not affect a firewall's ability to filter out
   traffic containing unwanted or suspect IPv6 options, if configured to
   do so.  However, the changes do require firewalls to be capable of
   permitting any or all IPv6 options, if configured to do so.  The
   default configurations are intended to allow normal use of any
   standard IPv6 option, avoiding the interoperability issues described
   in Section 1 and Section 3.

   As noted above, the default configuration might discard packets
   containing experimental IPv6 options.






Gont, et al.            Expires February 22, 2016               [Page 9]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


7.  Acknowledgements

   This document is heavily based on [RFC7045], authored by Brian
   Carpenter and Sheng Jiang.

   The authors of this document would like to thank (in alphabetical
   order) Brian Carpenter, Mike Heard, and Jen Linkova, for providing
   valuable comments on earlier versions of this document.

8.  References

8.1.  Normative References

   [RFC1034]  Mockapetris, P., "Domain names - concepts and facilities",
              STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987,
              <http://www.rfc-editor.org/info/rfc1034>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC2205]  Braden, R., Ed., Zhang, L., Berson, S., Herzog, S., and S.
              Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1
              Functional Specification", RFC 2205, DOI 10.17487/RFC2205,
              September 1997, <http://www.rfc-editor.org/info/rfc2205>.

   [RFC2460]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
              December 1998, <http://www.rfc-editor.org/info/rfc2460>.

   [RFC2473]  Conta, A. and S. Deering, "Generic Packet Tunneling in
              IPv6 Specification", RFC 2473, DOI 10.17487/RFC2473,
              December 1998, <http://www.rfc-editor.org/info/rfc2473>.

   [RFC2675]  Borman, D., Deering, S., and R. Hinden, "IPv6 Jumbograms",
              RFC 2675, DOI 10.17487/RFC2675, August 1999,
              <http://www.rfc-editor.org/info/rfc2675>.

   [RFC2710]  Deering, S., Fenner, W., and B. Haberman, "Multicast
              Listener Discovery (MLD) for IPv6", RFC 2710,
              DOI 10.17487/RFC2710, October 1999,
              <http://www.rfc-editor.org/info/rfc2710>.

   [RFC2711]  Partridge, C. and A. Jackson, "IPv6 Router Alert Option",
              RFC 2711, DOI 10.17487/RFC2711, October 1999,
              <http://www.rfc-editor.org/info/rfc2711>.




Gont, et al.            Expires February 22, 2016              [Page 10]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   [RFC3692]  Narten, T., "Assigning Experimental and Testing Numbers
              Considered Useful", BCP 82, RFC 3692,
              DOI 10.17487/RFC3692, January 2004,
              <http://www.rfc-editor.org/info/rfc3692>.

   [RFC4302]  Kent, S., "IP Authentication Header", RFC 4302,
              DOI 10.17487/RFC4302, December 2005,
              <http://www.rfc-editor.org/info/rfc4302>.

   [RFC4303]  Kent, S., "IP Encapsulating Security Payload (ESP)",
              RFC 4303, DOI 10.17487/RFC4303, December 2005,
              <http://www.rfc-editor.org/info/rfc4303>.

   [RFC4304]  Kent, S., "Extended Sequence Number (ESN) Addendum to
              IPsec Domain of Interpretation (DOI) for Internet Security
              Association and Key Management Protocol (ISAKMP)",
              RFC 4304, DOI 10.17487/RFC4304, December 2005,
              <http://www.rfc-editor.org/info/rfc4304>.

   [RFC4727]  Fenner, B., "Experimental Values In IPv4, IPv6, ICMPv4,
              ICMPv6, UDP, and TCP Headers", RFC 4727,
              DOI 10.17487/RFC4727, November 2006,
              <http://www.rfc-editor.org/info/rfc4727>.

   [RFC4782]  Floyd, S., Allman, M., Jain, A., and P. Sarolahti, "Quick-
              Start for TCP and IP", RFC 4782, DOI 10.17487/RFC4782,
              January 2007, <http://www.rfc-editor.org/info/rfc4782>.

   [RFC5095]  Abley, J., Savola, P., and G. Neville-Neil, "Deprecation
              of Type 0 Routing Headers in IPv6", RFC 5095,
              DOI 10.17487/RFC5095, December 2007,
              <http://www.rfc-editor.org/info/rfc5095>.

   [RFC5201]  Moskowitz, R., Nikander, P., Jokela, P., Ed., and T.
              Henderson, "Host Identity Protocol", RFC 5201,
              DOI 10.17487/RFC5201, April 2008,
              <http://www.rfc-editor.org/info/rfc5201>.

   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 5226,
              DOI 10.17487/RFC5226, May 2008,
              <http://www.rfc-editor.org/info/rfc5226>.

   [RFC5533]  Nordmark, E. and M. Bagnulo, "Shim6: Level 3 Multihoming
              Shim Protocol for IPv6", RFC 5533, DOI 10.17487/RFC5533,
              June 2009, <http://www.rfc-editor.org/info/rfc5533>.





Gont, et al.            Expires February 22, 2016              [Page 11]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   [RFC5570]  StJohns, M., Atkinson, R., and G. Thomas, "Common
              Architecture Label IPv6 Security Option (CALIPSO)",
              RFC 5570, DOI 10.17487/RFC5570, July 2009,
              <http://www.rfc-editor.org/info/rfc5570>.

   [RFC6275]  Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility
              Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July
              2011, <http://www.rfc-editor.org/info/rfc6275>.

   [RFC6398]  Le Faucheur, F., Ed., "IP Router Alert Considerations and
              Usage", BCP 168, RFC 6398, DOI 10.17487/RFC6398, October
              2011, <http://www.rfc-editor.org/info/rfc6398>.

   [RFC6550]  Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J.,
              Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur,
              JP., and R. Alexander, "RPL: IPv6 Routing Protocol for
              Low-Power and Lossy Networks", RFC 6550,
              DOI 10.17487/RFC6550, March 2012,
              <http://www.rfc-editor.org/info/rfc6550>.

   [RFC6553]  Hui, J. and JP. Vasseur, "The Routing Protocol for Low-
              Power and Lossy Networks (RPL) Option for Carrying RPL
              Information in Data-Plane Datagrams", RFC 6553,
              DOI 10.17487/RFC6553, March 2012,
              <http://www.rfc-editor.org/info/rfc6553>.

   [RFC6554]  Hui, J., Vasseur, JP., Culler, D., and V. Manral, "An IPv6
              Routing Header for Source Routes with the Routing Protocol
              for Low-Power and Lossy Networks (RPL)", RFC 6554,
              DOI 10.17487/RFC6554, March 2012,
              <http://www.rfc-editor.org/info/rfc6554>.

   [RFC6621]  Macker, J., Ed., "Simplified Multicast Forwarding",
              RFC 6621, DOI 10.17487/RFC6621, May 2012,
              <http://www.rfc-editor.org/info/rfc6621>.

   [RFC6740]  Atkinson, RJ. and SN. Bhatti, "Identifier-Locator Network
              Protocol (ILNP) Architectural Description", RFC 6740,
              DOI 10.17487/RFC6740, November 2012,
              <http://www.rfc-editor.org/info/rfc6740>.

   [RFC6744]  Atkinson, RJ. and SN. Bhatti, "IPv6 Nonce Destination
              Option for the Identifier-Locator Network Protocol for
              IPv6 (ILNPv6)", RFC 6744, DOI 10.17487/RFC6744, November
              2012, <http://www.rfc-editor.org/info/rfc6744>.






Gont, et al.            Expires February 22, 2016              [Page 12]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   [RFC6788]  Krishnan, S., Kavanagh, A., Varga, B., Ooghe, S., and E.
              Nordmark, "The Line-Identification Option", RFC 6788,
              DOI 10.17487/RFC6788, November 2012,
              <http://www.rfc-editor.org/info/rfc6788>.

   [RFC6971]  Herberg, U., Ed., Cardenas, A., Iwao, T., Dow, M., and S.
              Cespedes, "Depth-First Forwarding (DFF) in Unreliable
              Networks", RFC 6971, DOI 10.17487/RFC6971, June 2013,
              <http://www.rfc-editor.org/info/rfc6971>.

   [RFC7045]  Carpenter, B. and S. Jiang, "Transmission and Processing
              of IPv6 Extension Headers", RFC 7045,
              DOI 10.17487/RFC7045, December 2013,
              <http://www.rfc-editor.org/info/rfc7045>.

   [RFC7112]  Gont, F., Manral, V., and R. Bonica, "Implications of
              Oversized IPv6 Header Chains", RFC 7112,
              DOI 10.17487/RFC7112, January 2014,
              <http://www.rfc-editor.org/info/rfc7112>.

8.2.  Informative References

   [Biondi2007]
              Biondi, P. and A. Ebalard, "IPv6 Routing Header Security",
              CanSecWest 2007 Security Conference, 2007,
              <http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf>.

   [I-D.ietf-roll-trickle-mcast]
              Hui, J. and R. Kelsey, "Multicast Protocol for Low power
              and Lossy Networks (MPL)", draft-ietf-roll-trickle-
              mcast-12 (work in progress), June 2015.

   [I-D.ietf-v6ops-ipv6-ehs-in-real-world]
              Gont, F., Linkova, J., Chown, T., and S. LIU,
              "Observations on IPv6 EH Filtering in the Real World",
              draft-ietf-v6ops-ipv6-ehs-in-real-world-00 (work in
              progress), April 2015.

   [IANA-IPV6-PARAM]
              Internet Assigned Numbers Authority, "Internet Protocol
              Version 6 (IPv6) Parameters", December 2013,
              <http://www.iana.org/assignments/ipv6-parameters/
              ipv6-parameters.xhtml>.

   [NIMROD-DOC]
              Nimrod Documentation Page, ,
              "http://ana-3.lcs.mit.edu/~jnc/nimrod/".




Gont, et al.            Expires February 22, 2016              [Page 13]

Internet-Draft      Transm. and Proc. of IPv6 Options        August 2015


   [nimrod-eid]
              Lynn, C., "Endpoint Identifier Destination Option",  IETF
              Internet Draft, draft-ietf-nimrod-eid-00.txt, November
              1995.

   [RFC3871]  Jones, G., Ed., "Operational Security Requirements for
              Large Internet Service Provider (ISP) IP Network
              Infrastructure", RFC 3871, DOI 10.17487/RFC3871, September
              2004, <http://www.rfc-editor.org/info/rfc3871>.

   [RFC7126]  Gont, F., Atkinson, R., and C. Pignataro, "Recommendations
              on Filtering of IPv4 Packets Containing IPv4 Options",
              BCP 186, RFC 7126, DOI 10.17487/RFC7126, February 2014,
              <http://www.rfc-editor.org/info/rfc7126>.

Authors' Addresses

   Fernando Gont
   UTN-FRH / SI6 Networks
   Evaristo Carriego 2644
   Haedo, Provincia de Buenos Aires  1706
   Argentina

   Phone: +54 11 4650 8472
   Email: fgont@si6networks.com
   URI:   http://www.si6networks.com


   Will(Shucheng) Liu
   Huawei Technologies
   Bantian, Longgang District
   Shenzhen  518129
   P.R. China

   Email: liushucheng@huawei.com


   Ronald P. Bonica
   Juniper Networks
   2251 Corporate Park Drive
   Herndon, VA  20171
   US

   Phone: 571 250 5819
   Email: rbonica@juniper.net






Gont, et al.            Expires February 22, 2016              [Page 14]