1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957
|
<pre>Internet Engineering Task Force (IETF) B. Carpenter
Request for Comments: 5887 Univ. of Auckland
Category: Informational R. Atkinson
ISSN: 2070-1721 Extreme Networks
H. Flinck
Nokia Siemens Networks
May 2010
<span class="h1">Renumbering Still Needs Work</span>
Abstract
This document reviews the existing mechanisms for site renumbering
for both IPv4 and IPv6, and it identifies operational issues with
those mechanisms. It also summarises current technical proposals for
additional mechanisms. Finally, there is a gap analysis identifying
possible areas for future work.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see <a href="./rfc5741#section-2">Section 2 of RFC 5741</a>.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
<a href="http://www.rfc-editor.org/info/rfc5887">http://www.rfc-editor.org/info/rfc5887</a>.
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
Provisions Relating to IETF Documents
(<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
<span class="grey">Carpenter, et al. Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
Table of Contents
<a href="#section-1">1</a>. Introduction ....................................................<a href="#page-3">3</a>
<a href="#section-2">2</a>. Existing Host-Related Mechanisms ................................<a href="#page-5">5</a>
<a href="#section-2.1">2.1</a>. DHCP .......................................................<a href="#page-5">5</a>
<a href="#section-2.2">2.2</a>. IPv6 Stateless Address Autoconfiguration ...................<a href="#page-6">6</a>
<a href="#section-2.3">2.3</a>. IPv6 ND Router/Prefix Advertisements .......................<a href="#page-7">7</a>
<a href="#section-2.4">2.4</a>. PPP ........................................................<a href="#page-7">7</a>
<a href="#section-2.5">2.5</a>. DNS Configuration ..........................................<a href="#page-8">8</a>
<a href="#section-2.6">2.6</a>. Dynamic Service Discovery ..................................<a href="#page-9">9</a>
<a href="#section-3">3</a>. Existing Router-Related Mechanisms ..............................<a href="#page-9">9</a>
<a href="#section-3.1">3.1</a>. Router Renumbering .........................................<a href="#page-9">9</a>
<a href="#section-4">4</a>. Existing Multi-Addressing Mechanism for IPv6 ...................<a href="#page-10">10</a>
<a href="#section-5">5</a>. Operational Issues with Renumbering Today ......................<a href="#page-11">11</a>
<a href="#section-5.1">5.1</a>. Host-Related Issues .......................................<a href="#page-11">11</a>
<a href="#section-5.1.1">5.1.1</a>. Network-Layer Issues ...............................<a href="#page-11">11</a>
<a href="#section-5.1.2">5.1.2</a>. Transport-Layer Issues .............................<a href="#page-13">13</a>
<a href="#section-5.1.3">5.1.3</a>. DNS Issues .........................................<a href="#page-14">14</a>
<a href="#section-5.1.4">5.1.4</a>. Application-Layer Issues ...........................<a href="#page-14">14</a>
<a href="#section-5.2">5.2</a>. Router-Related Issues .....................................<a href="#page-16">16</a>
<a href="#section-5.3">5.3</a>. Other Issues ..............................................<a href="#page-17">17</a>
<a href="#section-5.3.1">5.3.1</a>. NAT State Issues ...................................<a href="#page-17">17</a>
<a href="#section-5.3.2">5.3.2</a>. Mobility Issues ....................................<a href="#page-18">18</a>
<a href="#section-5.3.3">5.3.3</a>. Multicast Issues ...................................<a href="#page-18">18</a>
<a href="#section-5.3.4">5.3.4</a>. Management Issues ..................................<a href="#page-19">19</a>
<a href="#section-5.3.5">5.3.5</a>. Security Issues ....................................<a href="#page-21">21</a>
<a href="#section-6">6</a>. Proposed Mechanisms ............................................<a href="#page-22">22</a>
<a href="#section-6.1">6.1</a>. SHIM6 .....................................................<a href="#page-22">22</a>
<a href="#section-6.2">6.2</a>. MANET Proposals ...........................................<a href="#page-22">22</a>
<a href="#section-6.3">6.3</a>. Other IETF Work ...........................................<a href="#page-23">23</a>
<a href="#section-6.4">6.4</a>. Other Proposals ...........................................<a href="#page-23">23</a>
<a href="#section-7">7</a>. Gaps ...........................................................<a href="#page-24">24</a>
<a href="#section-7.1">7.1</a>. Host-Related Gaps .........................................<a href="#page-24">24</a>
<a href="#section-7.2">7.2</a>. Router-Related Gaps .......................................<a href="#page-25">25</a>
<a href="#section-7.3">7.3</a>. Operational Gaps ..........................................<a href="#page-25">25</a>
<a href="#section-7.4">7.4</a>. Other Gaps ................................................<a href="#page-26">26</a>
<a href="#section-8">8</a>. Security Considerations ........................................<a href="#page-26">26</a>
<a href="#section-9">9</a>. Acknowledgements ...............................................<a href="#page-27">27</a>
<a href="#section-10">10</a>. Informative References ........................................<a href="#page-27">27</a>
<a href="#appendix-A">Appendix A</a>. Embedded IP Addresses ................................<a href="#page-34">34</a>
<span class="grey">Carpenter, et al. Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
In early 1996, the IAB published a short RFC entitled "Renumbering
Needs Work" [<a href="./rfc1900" title=""Renumbering Needs Work"">RFC1900</a>], which the reader is urged to review before
continuing. Almost ten years later, the IETF published "Procedures
for Renumbering an IPv6 Network without a Flag Day" [<a href="./rfc4192" title=""Procedures for Renumbering an IPv6 Network without a Flag Day"">RFC4192</a>]. A few
other RFCs have touched on router or host renumbering: [<a href="./rfc1916" title=""Enterprise Renumbering: Experience and Information Solicitation"">RFC1916</a>],
[<a href="./rfc2071" title=""Network Renumbering Overview: Why would I want it and what is it anyway?"">RFC2071</a>], [<a href="./rfc2072" title=""Router Renumbering Guide"">RFC2072</a>], [<a href="./rfc2874" title=""DNS Extensions to Support IPv6 Address Aggregation and Renumbering"">RFC2874</a>], [<a href="./rfc2894" title=""Router Renumbering for IPv6"">RFC2894</a>], and [<a href="./rfc4076" title=""Renumbering Requirements for Stateless Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC4076</a>].
In fact, since 1996, a number of individual mechanisms have become
available to simplify some aspects of renumbering. The Dynamic Host
Configuration Protocol (DHCP) is available for IPv4 [<a href="./rfc2131" title=""Dynamic Host Configuration Protocol"">RFC2131</a>] and
IPv6 [<a href="./rfc3315" title=""Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC3315</a>]. IPv6 includes Stateless Address Autoconfiguration
(SLAAC) [<a href="./rfc4862" title=""IPv6 Stateless Address Autoconfiguration"">RFC4862</a>], and this includes Router Advertisements (RAs) that
include options listing the set of active prefixes on a link. The
Point-to-Point Protocol (PPP) [<a href="./rfc1661" title=""The Point-to-Point Protocol (PPP)"">RFC1661</a>] also allows for automated
address assignment for both versions of IP.
Despite these efforts, renumbering, especially for medium to large
sites and networks, is widely viewed as an expensive, painful, and
error-prone process, and is therefore avoided by network managers as
much as possible. Some would argue that the very design of IP
addressing and routing makes automatic renumbering intrinsically
impossible. In fact, managers have an economic incentive to avoid
having to renumber, and many have resorted to private addressing and
Network Address Translation (NAT) as a result. This has the highly
unfortunate consequence that any mechanisms for managing the scaling
problems of wide-area (BGP4) routing that require occasional or
frequent site renumbering have been consistently dismissed as
unacceptable. But none of this means that we can duck the problem,
because as explained below, renumbering is sometimes unavoidable.
This document aims to explore the issues behind this problem
statement, especially with a view to identifying the gaps and known
operational issues.
It is worth noting that for a very large class of users, renumbering
is not in fact a problem of any significance. A domestic or small
office user whose device operates purely as a client or peer-to-peer
node is in practice renumbered at every restart (even if the address
assigned is often the same). A user who roams widely with a laptop
or pocket device is also renumbered frequently. Such users are not
concerned with the survival of very long-term application sessions
and are in practice indifferent to renumbering. Thus, this document
is mainly concerned with issues affecting medium to large sites.
<span class="grey">Carpenter, et al. Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
There are numerous reasons why such sites might need to renumber in a
planned fashion, including:
o Change of service provider, or addition of a new service provider,
when provider-independent addressing is not an option.
o A service provider itself has to renumber.
o Change of site topology (i.e., subnet reorganisation).
o Merger of two site networks into one, or split of one network into
two or more parts.
o During IPv6 deployment, change of IPv6 access method (e.g., from
tunneled to native).
The most demanding case would be unplanned automatic renumbering,
presumably initiated by a site border router, for reasons connected
with wide-area routing. There is already a degree of automatic
renumbering for some hosts, e.g., IPv6 "privacy" addresses [<a href="./rfc4941" title=""Privacy Extensions for Stateless Address Autoconfiguration in IPv6"">RFC4941</a>].
It is certainly to be expected that as the pressure on IPv4 address
space intensifies in the next few years, there will be many attempts
to consolidate usage of addresses so as to avoid wastage, as part of
the "end game" for IPv4, which necessarily requires renumbering of
the sites involved. However, strategically, it is more important to
implement and deploy techniques for IPv6 renumbering, so that as IPv6
becomes universally deployed, renumbering becomes viewed as a
relatively routine event. In particular, some mechanisms being
considered to allow indefinite scaling of the wide-area routing
system might assume site renumbering to be a straightforward matter.
There is work in progress that, if successful, would eliminate some
of the motivations for renumbering. In particular, some types of
solutions to the problem of scalable routing for multihomed sites
would likely eliminate both multihoming and switching to another ISP
as reasons for site renumbering.
Several proposed identifier/locator split schemes provide good
examples, including at least Identifier Locator Network Protocol
[<a href="#ref-ILNP" title=""ILNP Concept of Operations"">ILNP</a>], Locator/ID Separation Protocol [<a href="#ref-LISP" title=""Locator/ID Separation Protocol (LISP)"">LISP</a>], and Six/One [<a href="#ref-SIX-ONE" title=""Six/One: A Solution for Routing and Addressing in IPv6"">SIX-ONE</a>]
(in alphabetical order). The recent discussion about IPv6 Network
Address Translation (IPv6 NAT) provides a separate example [<a href="#ref-NAT66" title=""IPv6-to-IPv6 Network Address Translation (NAT66)"">NAT66</a>].
While remaining highly contentious, this approach, coupled with
unique local addresses or a provider-independent address prefix,
would appear to eliminate some reasons for renumbering in IPv6.
However, even if successful, such solutions will not eliminate all of
the reasons for renumbering. This document does not take any
<span class="grey">Carpenter, et al. Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
position about development or deployment of protocols or technologies
that would make long-term renumbering unnecessary, but rather deals
with practical cases where partial or complete renumbering is
necessary in today's Internet.
IP addresses do not have a built-in lifetime. Even when an address
is leased for a finite time by DHCP or SLAAC, or when it is derived
from a DNS record with a finite time to live (TTL) value, this
information is unavailable to applications once the address has been
passed to an upper layer by the socket interface. Thus, a
renumbering event is almost certain to be an unpredictable surprise
from the point of view of any application software using the address.
Many of the issues listed below derive from this fact.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Existing Host-Related Mechanisms</span>
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a>. DHCP</span>
At a high level, DHCP [<a href="./rfc2131" title=""Dynamic Host Configuration Protocol"">RFC2131</a>] [<a href="./rfc3315" title=""Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC3315</a>] offers similar support for
renumbering for both versions of IP. A host requests an address when
it starts up, the request might be delivered to a local DHCP server
or via a relay to a central server, and if all local policy
requirements are met, the server will provide an address with an
associated lifetime, and various other network-layer parameters (in
particular, the subnet mask and the default router address).
From an operational viewpoint, the interesting aspect is the local
policy. Some sites require pre-registration of MAC (Media Access
Control) addresses as a security measure, while other sites permit
any MAC address to obtain an IP address. Similarly, some sites use
DHCP to provide the same IP address to a given MAC address each time
(this is sometimes called "Static DHCP"), while other sites do not
(this is sometimes called "Dynamic DHCP"), and yet other sites use a
combination of these two modes where some devices (e.g., servers,
Voice over IP (VoIP) handsets) have a relatively static IP address
that is provisioned via DHCP while other devices (e.g., portable
computers) have a different IP address each time they connect to the
network. As an example, many universities in the United States and
United Kingdom require MAC address registration of faculty, staff,
and student devices (including handheld computers with wireless
connections).
These policy choices interact strongly with whether the site has what
might be called "strong" or "weak" asset management. At the strong
extreme, a site has a complete database of all equipment allowed to
be connected, certainly containing the MAC address(es) for each host,
as well as other administrative information of various kinds. Such a
database can be used to generate configuration files for DHCP, DNS,
<span class="grey">Carpenter, et al. Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
and any access control mechanisms that might be in use. For example,
only certain MAC addresses might be allowed to get an IP address on
certain subnets. At the weak extreme, a site has no asset
management, any MAC address may get a first-come first-served IP
address on any subnet, and there is no network-layer access control.
The IEEE 802.1X standard [<a href="#ref-IEEE.802-1X" title=""Port-Based Network Access Control: IEEE Standard for Local and Metropolitan Area Networks 802.1X-2004"">IEEE.802-1X</a>] [<a href="#ref-IEEE.802-1X-REV">IEEE.802-1X-REV</a>] specifies a
connection mechanism for wired/wireless Ethernet that is often
combined with DHCP and other mechanisms to form, in effect, a network
login. Using such a network login, the user of a device newly
connecting to the network must provide both identity and
authentication before being granted access to the network. As part
of this process, the network control point will often configure the
point of network connection for that specific user with a range of
parameters -- such as Virtual LAN (VLAN), Access Control Lists
(ACLs), and Quality-of-Service (QoS) profiles. Other forms of
network login also exist, often using an initial web page for user
identification and authentication. The latter approach is commonly
used in hotels or cafes.
In principle, a site that uses DHCP can renumber its hosts by
reconfiguring DHCP for the new address range. The issues with this
are discussed below.
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a>. IPv6 Stateless Address Autoconfiguration</span>
SLAAC, although updated recently [<a href="./rfc4862" title=""IPv6 Stateless Address Autoconfiguration"">RFC4862</a>], was designed prior to
DHCPv6 and was intended for networks where unattended automatic
configuration was preferred. Ignoring the case of an isolated
network with no router, which will use link-local addresses
indefinitely, SLAAC follows a bootstrap process. Each host first
gives itself a link-local address, and then needs to receive a link-
local multicast Router Advertisement (RA) [<a href="./rfc4861" title=""Neighbor Discovery for IP version 6 (IPv6)"">RFC4861</a>] that tells it the
routeable subnet prefix and the address(es) of the default router(s).
A node may either wait for the next regular RA or solicit one by
sending a link-local multicast Router Solicitation. Knowing the link
prefix from the RA, the node may now configure its own address.
There are various methods for this, of which the basic one is to
construct a unique 64-bit identifier from the interface's MAC
address.
We will not describe here the IPv6 processes for Duplicate Address
Detection (DAD), Neighbour Discovery (ND), and Neighbour
Unreachability Discovery (NUD). Suffice it to say that they work,
once the initial address assignment based on the RA has taken place.
<span class="grey">Carpenter, et al. Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
The contents of the RA message are clearly critical to this process
and its use during renumbering. An RA can indicate more than one
prefix, and more than one router can send RAs on the same link. For
each prefix, the RA indicates two lifetimes: "preferred" and "valid".
Addresses derived from this prefix must inherit its lifetimes. When
the valid lifetime expires, the prefix is dead and the derived
address must not be used any more. When the preferred lifetime is
expired (or set to zero) the prefix is deprecated, and must not be
used for any new sessions. Thus, setting a preferred lifetime that
is zero or finite is SLAAC's warning that renumbering will occur.
SLAAC assumes that the new prefix will be advertised in parallel with
the deprecated one, so that new sessions will use addresses
configured under the new prefix.
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a>. IPv6 ND Router/Prefix Advertisements</span>
With IPv6, a Router Advertisement not only advertises the
availability of an upstream router, but also advertises routing
prefix(es) valid on that link (subnetwork). Also, the IPv6 RA
message contains a flag indicating whether or not the host should use
DHCPv6 to configure. If that flag indicates that the host should use
DHCPv6, then the host is not supposed to autoconfigure itself as
outlined in <a href="#section-2.2">Section 2.2</a>. However, there are some issues in this
area, described in <a href="#section-5.1.1">Section 5.1.1</a>.
In an environment where a site has more than one upstream link to the
outside world, the site might have more than one valid routing
prefix. In such cases, typically all valid routing prefixes within a
site will have the same prefix length. Also, in such cases, it might
be desirable for hosts that obtain their addresses using DHCPv6 to
learn about the availability of upstream links dynamically, by
deducing from periodic IPv6 RA messages which routing prefixes are
currently valid. This application seems possible within the IPv6
Neighbour Discovery architecture, but does not appear to be clearly
specified anywhere. So, at present, this approach for hosts to learn
about availability of new upstream links or loss of prior upstream
links is unlikely to work with currently shipping hosts or routers.
<span class="h3"><a class="selflink" id="section-2.4" href="#section-2.4">2.4</a>. PPP</span>
"The Point-to-Point Protocol (PPP)" [<a href="./rfc1661" title=""The Point-to-Point Protocol (PPP)"">RFC1661</a>] includes support for a
Network Control Protocol (NCP) for both IPv4 and IPv6.
For IPv4, the NCP is known as IPCP [<a href="./rfc1332" title=""The PPP Internet Protocol Control Protocol (IPCP)"">RFC1332</a>] and allows explicit
negotiation of an IP address for each end. PPP endpoints acquire
(during IPCP negotiation) both their own address and the address of
their peer, which may be assumed to be the default router if no
routing protocol is operating. Renumbering events arise when IPCP
<span class="grey">Carpenter, et al. Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
negotiation is restarted on an existing link, when the PPP connection
is terminated and restarted, or when the point-to-point medium is
reconnected. Peers may propose either the local or remote address or
require the other peer to do so. Negotiation is complete when both
peers are in agreement. In practice, if no routing protocol is used,
as in a subscriber/provider environment, then the provider proposes
both addresses and requires the subscriber either to accept the
connection or to abort. Effectively, the subscriber device is
renumbered each time it connects for a new session.
For IPv6, the NCP is IP6CP [<a href="./rfc5072" title=""IP Version 6 over PPP"">RFC5072</a>] and is used to configure an
interface identifier for each end, after which link-local addresses
may be created in the normal way. In practice, each side can propose
its own identifier and renegotiation is only necessary when there is
a collision, or when a provider wishes to force a subscriber to use a
specific interface identifier. Once link-local addresses are
assigned and IP6CP is complete, automatic assignment of global scope
addresses is performed by the same methods as with multipoint links,
i.e., either SLAAC or DHCPv6. Again, in a subscriber/provider
environment, this allows renumbering per PPP session.
<span class="h3"><a class="selflink" id="section-2.5" href="#section-2.5">2.5</a>. DNS Configuration</span>
A site must provide DNS records for some or all of its hosts, and of
course these DNS records must be updated when hosts are renumbered.
Most sites will achieve this by maintaining a DNS zone file (or a
database from which it can be generated) and loading this file into
the site's DNS server(s) whenever it is updated. As a renumbering
tool, this is clumsy but effective. Clearly perfect synchronisation
between the renumbering of the host and the updating of its A or AAAA
record is impossible. An alternative is to use Secure Dynamic DNS
Update [<a href="./rfc3007" title=""Secure Domain Name System (DNS) Dynamic Update"">RFC3007</a>], in which a host informs its own DNS server when it
receives a new address.
There are widespread reports that the freely available BIND DNS
software (which is what most UNIX hosts use), Microsoft Windows (XP
and later), and Mac OS X all include support for Secure Dynamic DNS
Update. So do many home gateways. Further, there are credible
reports that these implementations are interoperable when configured
properly ([<a href="#ref-DNSBOOK" title=""DNS and BIND"">DNSBOOK</a>] p. 228 and p. 506).
Commonly used commercial DNS and DHCP servers (e.g., Windows Server)
often are deployed with Secure Dynamic DNS Update also enabled. In
some cases, merely enabling both the DNS server and the DHCP server
might enable Secure Dynamic DNS Update as an automatic side effect
([<a href="#ref-DNSBOOK" title=""DNS and BIND"">DNSBOOK</a>] p. 506). So in some cases, sites might have deployed
<span class="grey">Carpenter, et al. Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
Secure Dynamic DNS Update already, without realising it. An
additional enhancement would be for DHCP clients to implement support
for the "Client FQDN" option (Option 81).
Since address changes are usually communicated to other sites via the
DNS, the latter's security is essential for secure renumbering. The
Internet security community believes that the current DNS Security
(DNSsec) and Secure Dynamic DNS Update specifications are
sufficiently secure and has been encouraging DNSsec deployment
([<a href="./rfc3007" title=""Secure Domain Name System (DNS) Dynamic Update"">RFC3007</a>] [<a href="./rfc4033" title=""DNS Security Introduction and Requirements"">RFC4033</a>] [<a href="./rfc4034" title=""Resource Records for the DNS Security Extensions"">RFC4034</a>] [<a href="./rfc4035" title=""Protocol Modifications for the DNS Security Extensions"">RFC4035</a>]).
As of this writing, there appears to be significantly more momentum
towards rapid deployment of DNS Security standards in the global
public Internet than previously. Several country-code Top-Level
Domains (ccTLDs) have already deployed signed TLD root zones (e.g.,
Sweden's .SE). Several other TLDs are working to deploy signed TLD
root zones by published near-term deadlines (e.g., .GOV, .MIL). In
fact, it is reported that .GOV has been signed operationally since
early February 2009. It appears likely that the DNS-wide root zone
will be signed in the very near future. See, for example,
<<a href="http://www.dnssec-deployment.org/">http://www.dnssec-deployment.org/</a>> and
<<a href="http://www.ntia.doc.gov/DNS/DNSSEC.html">http://www.ntia.doc.gov/DNS/DNSSEC.html</a>>.
<span class="h3"><a class="selflink" id="section-2.6" href="#section-2.6">2.6</a>. Dynamic Service Discovery</span>
The need for hosts to contain pre-configured addresses for servers
can be reduced by deploying the Service Location Protocol (SLP). For
some common services, such as network printing, SLP can therefore be
an important tool for facilitating site renumbering. See [<a href="./rfc2608" title=""Service Location Protocol, Version 2"">RFC2608</a>],
[<a href="./rfc2610" title=""DHCP Options for Service Location Protocol"">RFC2610</a>], [<a href="./rfc3059" title=""Attribute List Extension for the Service Location Protocol"">RFC3059</a>], [<a href="./rfc3224" title=""Vendor Extensions for Service Location Protocol, Version 2"">RFC3224</a>], [<a href="./rfc3421" title=""Select and Sort Extensions for the Service Location Protocol (SLP)"">RFC3421</a>], and [<a href="./rfc3832" title=""Remote Service Discovery in the Service Location Protocol (SLP) via DNS SRV"">RFC3832</a>].
Multicast DNS (mDNS) and DNS Service Discovery are already widely
deployed in BSD, Linux, Mac OS X, UNIX, and Windows systems, and are
also widely used for both link-local name resolution and for DNS-
based dynamic service discovery [<a href="#ref-MDNS" title=""Multicast DNS"">MDNS</a>] [<a href="#ref-DNSSD" title=""DNS-Based Service Discovery"">DNSSD</a>]. In many
environments, the combination of mDNS and DNS Service Discovery
(e.g., using SRV records [<a href="./rfc3958" title=""Domain-Based Application Service Location Using SRV RRs and the Dynamic Delegation Discovery Service (DDDS)"">RFC3958</a>]) can be important tools for
reducing dependency on configured addresses.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Existing Router-Related Mechanisms</span>
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>. Router Renumbering</span>
Although DHCP was originally conceived for host configuration, it can
also be used for some aspects of router configuration. The DHCPv6
Prefix Delegation options [<a href="./rfc3633" title=""IPv6 Prefix Options for Dynamic Host Configuration Protocol (DHCP) version 6"">RFC3633</a>] are intended for this. For
<span class="grey">Carpenter, et al. Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
example, DHCPv6 can be used by an ISP to delegate or withdraw a
prefix for a customer's router, and this can be cascaded throughout a
site to achieve router renumbering.
An ICMPv6 extension to allow router renumbering for IPv6 is specified
in [<a href="./rfc2894" title=""Router Renumbering for IPv6"">RFC2894</a>], but there appears to be little experience with it. It
is not mentioned as a useful mechanism by [<a href="./rfc4192" title=""Procedures for Renumbering an IPv6 Network without a Flag Day"">RFC4192</a>].
[<a id="ref-RFC4191">RFC4191</a>] extends IPv6 router advertisements to convey default router
preferences and more-specific routes from routers to hosts. This
could be used as an additional tool to convey information during
renumbering, but does not appear to be used in practice.
[<a id="ref-CPE">CPE</a>] requires that a customer premises router use DHCPv6 to obtain
an address prefix from its upstream ISP and use IPv6 RA messages to
establish a default IPv6 route (when IPv6 is in use).
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Existing Multi-Addressing Mechanism for IPv6</span>
IPv6 was designed to support multiple addresses per interface and
multiple prefixes per subnet. As described in [<a href="./rfc4192" title=""Procedures for Renumbering an IPv6 Network without a Flag Day"">RFC4192</a>], this allows
for a phased approach to renumbering (adding the new prefix and
addresses before removing the old ones).
As an additional result of the multi-addressing mechanism, a site
might choose to use Unique Local Addressing (ULA) [<a href="./rfc4193" title=""Unique Local IPv6 Unicast Addresses"">RFC4193</a>] for all
on-site communication, or at least for all communication with on-site
servers, while using globally routeable IPv6 addresses for all off-
site communications. It would also be possible to use ULAs for all
on-site network management purposes, by assigning ULAs to all
devices. This would make these on-site activities immune to
renumbering of the prefix(es) used for off-site communication.
Finally, ULAs can be safely shared with peer sites with which there
is a VPN connection, which cannot be done with ambiguous IPv4
addresses [<a href="./rfc1918" title=""Address Allocation for Private Internets"">RFC1918</a>]; such VPNs would not be affected by renumbering.
The IPv6 model also includes "privacy" addresses that are constructed
with pseudo-random interface identifiers to conceal actual MAC
addresses [<a href="./rfc4941" title=""Privacy Extensions for Stateless Address Autoconfiguration in IPv6"">RFC4941</a>]. This means that IPv6 stacks and client
applications already need to be agile enough to handle frequent IP
address changes (e.g., in the privacy address), since in a privacy-
sensitive environment the address lifetime likely will be rather
short.
<span class="grey">Carpenter, et al. Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Operational Issues with Renumbering Today</span>
For IPv6, a useful description of practical aspects was drafted in
[<a href="#ref-THINK" title=""Things to think about when Renumbering an IPv6 network"">THINK</a>], as a complement to [<a href="./rfc4192" title=""Procedures for Renumbering an IPv6 Network without a Flag Day"">RFC4192</a>]. As indicated there, a primary
requirement is to minimise the disruption caused by renumbering.
This applies at two levels: disruption to site operations in general
and disruption to individual application sessions in progress at the
moment of renumbering. In the IPv6 case, the intrinsic ability to
overlap use of the old and new prefixes greatly mitigates disruption
to ongoing sessions, as explained in [<a href="./rfc4192" title=""Procedures for Renumbering an IPv6 Network without a Flag Day"">RFC4192</a>]. This approach is in
practice excluded for IPv4, largely because IPv4 lacks a Stateless
Address Autoconfiguration (SLAAC) mechanism.
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. Host-Related Issues</span>
<span class="h4"><a class="selflink" id="section-5.1.1" href="#section-5.1.1">5.1.1</a>. Network-Layer Issues</span>
For IPv4, the vast majority of client systems (PCs, workstations, and
handheld computers) today use DHCP to obtain their addresses and
other network-layer parameters. DHCP provides for lifetimes after
which the address lease expires. So it should be possible to devise
an operational procedure in which lease expiry coincides with the
moment of renumbering (within some margin of error). In the simplest
case, the network administrator just lowers all DHCP address lease
lifetimes to a very short value (e.g., a few minutes). It does this
long enough before a site-wide change that each node will
automatically pick up its new IP address within a few minutes of the
renumbering event. In this case, it would be the DHCP server itself
that automatically accomplishes client renumbering, although this
would cause a peak of DHCP traffic and therefore would not be
instantaneous. DHCPv6 could accomplish a similar result.
The FORCERENEW extension is defined for DHCP for IPv4 [<a href="./rfc3203" title=""DHCP reconfigure extension"">RFC3203</a>].
This is specifically unicast-only; a DHCP client must discard a
multicast FORCERENEW. This could nevertheless be used to trigger the
renumbering process, with the DHCP server cycling through all its
clients issuing a FORCERENEW to each one. DHCPv6 has a similar
feature, i.e., a unicast RECONFIGURE message, that can be sent to
each host to inform it to check its DHCPv6 server for an update.
These two features do not appear to be widely used for bulk
renumbering purposes.
Procedures for using a DHCP approach to site renumbering will be very
different depending on whether the site uses strong or weak asset
management. With strong asset management, and careful operational
planning, the subnet addresses and masks will be updated in the
database, and a script will be run to regenerate the DHCP MAC-to-IP
address tables and the DNS zone file. DHCP and DNS timers will be
<span class="grey">Carpenter, et al. Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
set temporarily to small values. The DHCP and DNS servers will be
fed the new files, and as soon as the previous DHCP leases and DNS
TTLs expire, everything will follow automatically, as far as the host
IP layer is concerned. In contrast, with weak asset management, and
a casual operational approach, the DHCP table will be reconfigured by
hand, the DNS zone file will be edited by hand, and when these
configurations are installed, there will be a period of confusion
until the old leases and TTLs expire. The DHCP FORCERENEW or
RECONFIGURE messages could shorten this confusion to some extent.
DHCP, particularly for IPv4, has acquired a very large number of
additional capabilities, with approximately 170 options defined at
the time of this writing. Although most of these do not carry IP
address information, some do (for example, options 68 through 76 all
carry various IP addresses). Thus, renumbering mechanisms involving
DHCP have to take into account more than the basic DHCP job of
leasing an address to each host.
SLAAC is much less overloaded with options than DHCP; in fact, its
only extraneous capability is the ability to convey a DNS server
address. Using SLAAC to force all hosts on a site to renumber is
therefore less complex than DHCP, and the difference between strong
and weak asset management is less marked. The principle of
synchronising the SLAAC and DNS updates, and of reducing the SLAAC
lease time and DNS TTL, does not change.
We should note a currently unresolved ambiguity in the interaction
between DHCPv6 and SLAAC from the host's point of view. RA messages
include a 'Managed Configuration' flag known as the M bit, which is
supposed to indicate that DHCPv6 is in use. However, it is
unspecified whether hosts must interpret this flag rigidly (i.e., may
or must only start DHCPv6 if it is set, or if no RAs are received) or
whether hosts are allowed or are recommended to start DHCPv6 by
default. An added complexity is that DHCPv6 has a 'stateless' mode
[<a href="./rfc3736" title=""Stateless Dynamic Host Configuration Protocol (DHCP) Service for IPv6"">RFC3736</a>] in which SLAAC is used to obtain an address, but DHCPv6 is
used to obtain other parameters. Another flag in RA messages, the
'Other configuration' or O bit, indicates this.
Until this ambiguous behaviour is clearly resolved by the IETF,
operational problems are to be expected, since different host
operating systems have taken different approaches. This makes it
difficult for a site network manager to configure systems in such a
way that all hosts boot in a consistent way. Hosts will start SLAAC,
if so directed by appropriately configured RA messages. However, if
one operating system also starts a DHCPv6 client by default, and
another one starts it only when it receives the M bit, systematic
address management is impeded.
<span class="grey">Carpenter, et al. Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
Also, it should be noted that on an isolated LAN, neither RA nor
DHCPv6 responses will be received, and the host will remain with only
its self-assigned link-local address. One could also have a
situation where a multihomed network uses SLAAC for one address
prefix and DHCPv6 for another, which would clearly create a risk of
inconsistent host behaviour and operational confusion.
Neither the SLAAC approach nor DHCP without pre-registered MAC
addresses will work reliably in all cases of systems that are
assigned fixed IP addresses for practical reasons. Of course, even
systems with static addressing can be configured to use DHCP to
obtain their IP address(es). Such use of "Static DHCP" usually will
ease site renumbering when it does become necessary. However, in
other cases, manual or script-driven procedures, likely to be site-
specific and definitely prone to human error, are needed. If a site
has even one host with a fixed, manually configured address,
completely automatic host renumbering is very likely to be
impossible.
The above assumes the use of typical off-the-shelf hardware and
software. There are other environments, often referred to as
embedded systems, where DHCP or SLAAC might not be used and even
configuration scripts might not be an option; for example, fixed IP
addresses might be stored in read-only memory, or even set up using
Dual In-Line Package (DIP) switches. Such systems create special
problems that no general-purpose solution is likely to address.
<span class="h4"><a class="selflink" id="section-5.1.2" href="#section-5.1.2">5.1.2</a>. Transport-Layer Issues</span>
TCP connections and UDP flows are rigidly bound to a given pair of IP
addresses. These are included in the checksum calculation, and there
is no provision at present for the endpoint IP addresses to change.
It is therefore fundamentally impossible for the flows to survive a
renumbering event at either end. From an operational viewpoint, this
means that a site that plans to renumber itself is obliged either to
follow the overlapped procedure described in [<a href="./rfc4192" title=""Procedures for Renumbering an IPv6 Network without a Flag Day"">RFC4192</a>] or to announce
a site-wide outage for the renumbering process, during which all user
sessions will fail. In the case of IPv4, overlapping of the old and
new addresses is unlikely to be an option, and in any case is not
commonly supported by software. Therefore, absent enhancements to
TCP and UDP to enable dynamic endpoint address changes (for example,
[<a href="#ref-HANDLEY" title=""Multipath Transport, Resource Pooling, and implications for Routing"">HANDLEY</a>]), interruptions to TCP and UDP sessions seem inevitable if
renumbering occurs at either session endpoint. The same appears to
be true of Datagram Congestion Control Protocol (DCCP) [<a href="./rfc4340" title=""Datagram Congestion Control Protocol (DCCP)"">RFC4340</a>].
<span class="grey">Carpenter, et al. Informational [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
In contrast, Stream Control Transmission Protocol (SCTP) already
supports dynamic multihoming of session endpoints, so SCTP sessions
ought not be adversely impacted by renumbering the SCTP session
endpoints [<a href="./rfc4960" title=""Stream Control Transmission Protocol"">RFC4960</a>] [<a href="./rfc5061" title=""Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration"">RFC5061</a>].
<span class="h4"><a class="selflink" id="section-5.1.3" href="#section-5.1.3">5.1.3</a>. DNS Issues</span>
The main issue is whether the site in question has a systematic
procedure for updating its DNS configuration. If it does, updating
the DNS for a renumbering event is essentially a clerical issue that
must be coordinated as part of a complete plan, including both
forward and reverse mapping. As mentioned in [<a href="./rfc4192" title=""Procedures for Renumbering an IPv6 Network without a Flag Day"">RFC4192</a>], the DNS TTL
will be manipulated to ensure that stale addresses are not cached.
However, if the site uses a weak asset management model in which DNS
updates are made manually on demand, there will be a substantial
period of confusion and errors will be made.
There are anecdotal reports that many small user sites do not even
maintain their own DNS configuration, despite running their own web
and email servers. They point to their ISP's resolver, request the
ISP to install DNS entries for their servers, but operate internally
mainly by IP address. Thus, renumbering for such sites will require
administrative coordination between the site and its ISP(s), unless
the DNS servers in use have Secure Dynamic DNS Update enabled. Some
commercial DNS service firms include Secure Dynamic DNS Update as
part of their DNS service offering.
It should be noted that DNS entries commonly have matching Reverse
DNS entries. When a site renumbers, these reverse entries will also
need to be updated. Depending on a site's operational arrangements
for DNS support, it might or might not be possible to combine forward
and reverse DNS updates in a single procedure.
<span class="h4"><a class="selflink" id="section-5.1.4" href="#section-5.1.4">5.1.4</a>. Application-Layer Issues</span>
Ideally, we would carry out a renumbering analysis for each
application protocol. To some extent, this has been done, in
[<a href="./rfc3795" title=""Survey of IPv4 Addresses in Currently Deployed IETF Application Area Standards Track and Experimental Documents"">RFC3795</a>]. This found that 34 out of 257 Standards-Track or
Experimental application-layer RFCs had explicit address
dependencies. Although this study was made in the context of IPv4 to
IPv6 transition, it is clear that all these protocols might be
sensitive to renumbering. However, the situation is worse, in that
there is no way to discover by analyzing specifications whether an
actual implementation is sensitive to renumbering. Indeed, such
analysis might be quite impossible in the case of proprietary
applications.
<span class="grey">Carpenter, et al. Informational [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
The sensitivity depends on whether the implementation stores IP
addresses in such a way that it might refer back to them later,
without allowing for the fact that they might no longer be valid. In
general, we can assert that any implementation is at risk from
renumbering if it does not check that an address is valid each time
it opens a new communications session. This could be done, for
example, by knowing and respecting the relevant DNS TTL, or by
resolving relevant Fully-Qualified Domain Names (FQDNs) again. A
common experience is that even when FQDNs are stored in configuration
files, they are resolved only once, when the application starts, and
they are cached indefinitely thereafter. This is insufficient. Of
course, this does not apply to all application software; for example,
several well-known web browsers have short default cache lifetimes.
There are even more egregious breaches of this principle, for
example, software license systems that depend on the licensed host
computer having a particular IP address. Other examples are the use
of literal IP addresses in URLs, HTTP cookies, or application proxy
configurations. (Also see <a href="#appendix-A">Appendix A</a>.)
In contrast, there are also many application suites that actively
deal with connectivity failures by retrying with alternative
addresses or by repeating DNS lookups. This places a considerable
burden of complexity on application developers.
It should be noted that applications are in effect encouraged to be
aware of and to store IP addresses by the very nature of the socket
API calls gethostbyname() and getaddrinfo(). It is highly
unfortunate that many applications use APIs that require the
application to see and use lower-layer objects, such as network-layer
addresses. However, the BSD Sockets API was designed and deployed
before the Domain Name System (DNS) was created, so there were few
good options at the time. This issue is made worse by the fact that
these functions do not return an address lifetime, so that
applications have no way to know when an address is no longer valid.
The extension of the same model to cover IPv6 has complicated this
problem somewhat. An application using the socket API is obliged to
contain explicit logic if it wishes to benefit from the availability
of multiple addresses for a given remote host. If a programming
model were adopted in which only FQDNs were exposed to applications,
and addresses were cached with appropriate lifetimes within the API,
most of these problems would disappear. It should be noted that at
least the first part of this is already available for some
programming environments. A common example is Java, where only FQDNs
need to be handled by application code in normal circumstances, and
no additional application logic is needed to deal with multiple
addresses, which are handled by the run-time system. This is highly
beneficial for programmers who are not networking experts, and
<span class="grey">Carpenter, et al. Informational [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
insulates applications software from many aspects of renumbering. It
would be helpful to have similarly abstract, DNS-oriented, Networking
APIs openly specified and widely available for C and C++.
Some web browsers intentionally violate the DNS TTL with a technique
called "DNS Pinning." DNS Pinning limits acceptance of server IP
address changes, due to a JavaScript issue where repeated address
changes can be used to induce a browser to scan the inside of a
firewalled network and report the results to an outside attacker.
Pinning can persist as long as the browser is running, in extreme
cases perhaps months at a time. Thus, we can see that security
considerations may directly damage the ability of applications to
deal with renumbering.
Server applications might need to be restarted when the host they
contain is renumbered, to ensure that they are listening on a port
and socket bound to the new address. In an IPv6 multi-addressed
host, server applications need to be able to listen on more than one
address simultaneously, in order to cover an overlap during
renumbering. Not all server applications are written to do this, and
a name-based API as just mentioned would have to provide for this
case invisibly to the server code.
As noted in <a href="#section-2.6">Section 2.6</a>, the Service Location Protocol (SLP), and
multicast DNS with SRV records for service discovery, have been
available for some years. For example, many printers deployed in
recent years automatically advertise themselves to potential clients
via SLP. Many modern client operating systems automatically
participate in SLP without requiring users to enable it. These tools
appear not to be widely known, although they can be used to reduce
the number of places that IP addresses need to be configured.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. Router-Related Issues</span>
[<a id="ref-RFC2072">RFC2072</a>] gives a detailed review of the operational realities in
1997. A number of the issues discussed in that document were the
result of the relatively recent adoption of classless addressing;
those issues can be assumed to have vanished by now. Also, DHCP was
a relative newcomer at that time, and can now be assumed to be
generally available. Above all, the document underlines that
systematic planning and administrative preparation are needed, and
that all forms of configuration file and script must be reviewed and
updated. Clearly this includes filtering and routing rules (e.g.,
when peering with BGP, but also with intradomain routing as well).
Two particular issues mentioned in [<a href="./rfc2072" title=""Router Renumbering Guide"">RFC2072</a>] are:
o Some routers cache IP addresses in some situations. So routers
might need to be restarted as a result of site renumbering.
<span class="grey">Carpenter, et al. Informational [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
o Addresses might be used by configured tunnels, including VPN
tunnels, although at least the Internet Key Exchange (IKE)
supports the use of Fully-Qualified Domain Names instead.
On the latter point, the capability to use FQDNs as endpoint names in
IPsec VPNs is not new and is standard (see <a href="./rfc2407#section-4.6.2.3">[RFC2407], Section 4.6.2.3</a>
and <a href="./rfc4306#section-3.5">[RFC4306], Section 3.5</a>). This capability is present in most
IPsec VPN implementations. There does seem to be an "educational" or
"awareness" issue that many system/network administrators do not
realise that it is there and works well as a way to avoid manual
modification during renumbering. (Of course, even in this case, a
VPN may need to be reconnected after a renumbering event, but most
products appear to handle this automatically.)
In IPv6, if a site wanted to be multihomed using multiple provider-
aggregated (PA) routing prefixes with one prefix per upstream
provider, then the interior routers would need a mechanism to learn
which upstream providers and prefixes were currently reachable (and
valid). In this case, their Router Advertisement messages could be
updated dynamically to only advertise currently valid routing
prefixes to hosts. This would be significantly more complicated if
the various provider prefixes were of different lengths or if the
site had non-uniform subnet prefix lengths.
<span class="h3"><a class="selflink" id="section-5.3" href="#section-5.3">5.3</a>. Other Issues</span>
<span class="h4"><a class="selflink" id="section-5.3.1" href="#section-5.3.1">5.3.1</a>. NAT State Issues</span>
When a renumbering event takes place, entries in the state table of
any Network Address Translator that happen to contain the affected
addresses will become invalid and will eventually time out. Since
TCP and UDP sessions are unlikely to survive renumbering anyway, the
hosts involved will not be additionally affected. The situation is
more complex for multihomed SCTP [<a href="#ref-SCTPNAT" title=""SCTP NAT Traversal Considerations"">SCTPNAT</a>], depending on whether a
single or multiple NATs are involved.
A NAT itself might be renumbered and might need a configuration
change during a renumbering event. One of the authors has a NAT-
enabled home gateway that obtains its exterior address from the
residential Internet service provider by acting as a DHCP client.
That deployment has not suffered operational problems when the ISP
uses DHCP to renumber the gateway's exterior IP address. A critical
part of that success has been configuring IKE on the home gateway to
use a "mailbox name" for the user's identity type (rather than using
the exterior IP address of the home gateway) when creating or
managing the IP Security Associations.
<span class="grey">Carpenter, et al. Informational [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
<span class="h4"><a class="selflink" id="section-5.3.2" href="#section-5.3.2">5.3.2</a>. Mobility Issues</span>
A mobile node using Mobile IP that is not currently in its home
network will be adversely affected if either its current care-of
address or its home address is renumbered. For IPv6, if the care-of
address changes, this will be exactly like moving from one foreign
network to another, and Mobile IP will re-bind with its home agent in
the normal way. If its home address changes unexpectedly, it can be
informed of the new global routing prefix used at the home site
through the Mobile Prefix Solicitation and Mobile Prefix
Advertisement ICMPv6 messages [<a href="./rfc3775" title=""Mobility Support in IPv6"">RFC3775</a>]. The situation is more
tricky if the mobile node is detached at the time of the renumbering
event, since it will no longer know a valid subnet anycast address
for its home agent, leaving it to deduce a valid address on the basis
of DNS information.
In contrast to Mobile IPv6, Mobile IPv4 does not support prefix
solicitation and prefix advertisement messages, limiting its
renumbering capability to well-scheduled renumbering events when the
mobile node is connected to its home agent and managed by the home
network administration. Unexpected home network renumbering events
when the mobile node is away from its home network and not connected
to the home agent are supported only if a relevant Authentication,
Authorisation, and Accounting (AAA) system is able to allocate
dynamically a home address and home agent for the mobile node.
<span class="h4"><a class="selflink" id="section-5.3.3" href="#section-5.3.3">5.3.3</a>. Multicast Issues</span>
As discussed in [<a href="#ref-THINK" title=""Things to think about when Renumbering an IPv6 network"">THINK</a>], IPv6 multicast can be used to help rather
than hinder renumbering, for example, by using multicast as a
discovery protocol (as in IPv6 Neighbour Discovery). On the other
hand, the embedding of IPv6 unicast addresses into multicast
addresses specified in [<a href="./rfc3306" title=""Unicast-Prefix-based IPv6 Multicast Addresses"">RFC3306</a>] and the embedded-RP (Rendezvous
Point) in [<a href="./rfc3956" title=""Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address"">RFC3956</a>] will cause issues when renumbering.
For both IPv4 and IPv6, changing the unicast source address of a
multicast sender might also be an issue for receivers, especially for
Source-Specific Multicast (SSM). Applications need to learn the new
source addresses and new multicast trees need to be built
For IPv4 or IPv6 with Any-Source Multicast (ASM), renumbering can be
easy. If sources are renumbered, from the routing perspective,
things behave just as if there are new sources within the same
multicast group. There may be application issues though. Changing
the RP address is easy when using Bootstrap Router (BSR) [<a href="./rfc5059" title=""Bootstrap Router (BSR) Mechanism for Protocol Independent Multicast (PIM)"">RFC5059</a>]
for dynamic RP discovery. BSR is widely used, but it is also common
to use static config of RP addresses on routers. In that case,
router configurations must be updated too.
<span class="grey">Carpenter, et al. Informational [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
If any multicast ACLs are configured, they raise the same issue as
unicast ACLs mentioned elsewhere.
<span class="h4"><a class="selflink" id="section-5.3.4" href="#section-5.3.4">5.3.4</a>. Management Issues</span>
Today, static IP addresses are routinely embedded in numerous
configuration files and network management databases, including MIB
modules. Ideally, all of these would be generated from a single
central asset management database for a given site, but this is far
from being universal practice. It should be noted that for IPv6,
where multiple routing prefixes per interface and multiple addresses
per interface are standard practice, the database and the
configuration files will need to allow for this (rather than for a
single address per host, as is normal practice for IPv4).
Furthermore, because of routing policies and VPNs, a site or network
might well embed addresses from other sites or networks in its own
configuration data. (It is preferable to embed FQDNs instead, of
course, whenever possible.) Thus, renumbering will cause a ripple
effect of updates for a site and for its neighbours. To the extent
that these updates are manual, they will be costly and prone to
error. Synchronising updates between independent sites can cause
unpredictable delays. Note that <a href="#section-4">Section 4</a> suggests that IPv6 ULAs
can mitigate this problem, but of course only for VPNs and routes
that are suitable for ULAs rather than globally routeable addresses.
The majority of external addresses to be configured will not be ULAs.
See <a href="#appendix-A">Appendix A</a> for an extended list of possible static or embedded
addresses.
Some address configuration data are relatively easy to find (for
example, site firewall rules, ACLs in site border routers, and DNS).
Others might be widely dispersed and much harder to find (for
example, configurations for building routers, printer addresses
configured by individual users, and personal firewall
configurations). Some of these will inevitably be found only after
the renumbering event, when the users concerned encounter a problem.
The overlapped model for IPv6 renumbering, with old and new addresses
valid simultaneously, means that planned database and configuration
file updates will proceed in two stages -- add the new information
some time before the renumbering event, and remove the old
information some time after. All policy rules must be configured to
behave correctly during this process (e.g., preferring the new
address as soon as possible). Similarly, monitoring tools must be
set up to monitor both old and new during the overlap.
<span class="grey">Carpenter, et al. Informational [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
However, it should be noted that the notion of simultaneously
operating multiple prefixes for the same network, although natural
for IPv6, is generally not supported by operational tools such as
address management software. It also increases the size of IGP
routing tables in proportion to the number of prefixes in use. For
these reasons, and due to its unfamiliarity to operational staff, the
use of multiple prefixes remains rare. Accordingly, the use of ULAs
to provide stable on-site addresses even if the off-site prefix
changes is also rare.
If both IPv4 and IPv6 are renumbered simultaneously in a dual-stack
network, additional complications could result, especially with
configured IP-in-IP tunnels. This scenario should probably be
avoided.
Use of FQDNs rather than raw IP addresses wherever possible in
configuration files and databases will reduce/mitigate the potential
issues arising from such configuration files or management databases
when renumbering is required or otherwise occurs. This is advocated
in [<a href="./rfc1958" title=""Architectural Principles of the Internet"">RFC1958</a>] (point 4.1). Just as we noted in <a href="#section-5.1.4">Section 5.1.4</a> for
applications, this is insufficient in itself; some devices such as
routers are known to only resolve FQDNs once, at start-up, and to
continue using the resulting addresses indefinitely. This may
require routers to be rebooted, when they should instead be resolving
the FQDN again after a given timeout.
By definition, there is at least one place (i.e., the DNS zone file
or the database from which it is derived) where address information
is nevertheless inevitable.
It is also possible that some operators may choose to configure
addresses rather than names, precisely to avoid a possible circular
dependency and the resulting failure modes. This is arguably even
advocated in [<a href="./rfc1958" title=""Architectural Principles of the Internet"">RFC1958</a>] (point 3.11).
It should be noted that the management and administration issues
(i.e., tracking down, recording, and updating all instances where
addresses are stored rather than looked up dynamically) form the
dominant concern of managers considering the renumbering problem.
This has led many sites to continue the pre-CIDR (Classless Inter-
Domain Routing) approach of using a provider-independent (PI) prefix.
Some sites, including very large corporate networks, combine PI
addressing with NAT. Others have adopted private addressing and NAT
as a matter of choice rather than obligation. This range of
techniques allows for addressing plans that are independent of the
ISP(s) in use, and allows a straightforward approach to multihoming.
The direct cost of renumbering is perceived to exceed the indirect
costs of these alternatives. Additionally, there is a risk element
<span class="grey">Carpenter, et al. Informational [Page 20]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-21" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
stemming from the complex dependencies of renumbering: it is hard to
be fully certain that the renumbering will not cause unforeseen
service disruptions, leading to unknown additional costs.
A relevant example in a corporate context is VPN configuration data
held in every employee laptop, for use while on travel and connecting
securely from remote locations. Typically, such VPNs are statically
configured using numeric IP addresses for endpoints and even with
prefix lists for host routing tables. Use of VPN configurations with
FQDNs to name fixed endpoints, such as corporate VPN gateways, and
with non-address identity types would enable existing IP Security
with IKE to avoid address renumbering issues and work well for highly
mobile users. This is all possible today with standard IPsec and
standard IKE. It just requires VPN software to be configured with
names instead of addresses, and thoughtful network administration.
It should be noted that site and network operations managers are
often very conservative, and reluctant to change operational
procedures that are working reasonably well and are perceived as
reasonably secure. They quite logically argue that any change brings
with it an intrinsic risk of perturbation and insecurity. Thus, even
if procedural changes are recommended that will ultimately reduce the
risks and difficulties of renumbering (such as using FQDNs protected
by DNSsec where addresses are used today), these changes might be
resisted.
<span class="h4"><a class="selflink" id="section-5.3.5" href="#section-5.3.5">5.3.5</a>. Security Issues</span>
For IPv6, addresses are intended to be protected against forgery
during neighbour discovery by SEcure Neighbour Discovery (SEND)
[<a href="./rfc3971" title=""SEcure Neighbor Discovery (SEND)"">RFC3971</a>]. This appears to be a very useful precaution during
dynamic renumbering, to prevent hijacking of the process by an
attacker. Any automatic renumbering scheme has a potential exposure
to such hijacking at the moment that a new address is announced.
However, at present it is unclear whether or when SEND might be
widely implemented or widely deployed.
Firewall rules will certainly need to be updated, and any other cases
where addresses or address prefixes are embedded in security
components (access control lists, AAA systems, intrusion detection
systems, etc.). If this is not done in advance, legitimate access to
resources might be blocked after the renumbering event. If the old
rules are not removed promptly, illegitimate access might be possible
after the renumbering event. Thus, the security updates will need to
be made in two stages (immediately before and immediately after the
event).
<span class="grey">Carpenter, et al. Informational [Page 21]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-22" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
There will be operational and security issues if an X.509v3 Public
Key Infrastructure (PKI) Certificate includes a subjectAltName
extension that contains an iPAddress [<a href="./rfc5280" title=""Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"">RFC5280</a>], and if the
corresponding node then undergoes an IP address change without a
concurrent update to the node's PKI Certificate. For these reasons,
use of the dNSName rather than the iPAddress is recommended for the
subjectAltName extension. Any other use of IP addresses in
cryptographic material is likely to be similarly troublesome.
If a site is, for some reason, listed by IP address in a white list
(such as a spam white list), this will need to be updated.
Conversely, a site that is listed in a black list can escape that
list by renumbering itself.
The use of IP addresses instead of FQDNs in configurations is
sometimes driven by a perceived security need. Since the name
resolution process has historically lacked authentication,
administrators prefer to use raw IP addresses when the application is
security sensitive (firewalls and VPN are two typical examples). It
might be possible to solve this issue in the next few years with
DNSsec (see <a href="#section-2.5">Section 2.5</a>), now that there is strong DNS Security
deployment momentum.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Proposed Mechanisms</span>
<span class="h3"><a class="selflink" id="section-6.1" href="#section-6.1">6.1</a>. SHIM6</span>
SHIM6, proposed as a host-based multihoming mechanism for IPv6, has
the property of dynamically switching the addresses used for
forwarding the actual packet stream while presenting a constant
address as the upper-layer identifier for the transport layer
[<a href="./rfc5533" title=""Shim6: Level 3 Multihoming Shim Protocol for IPv6"">RFC5533</a>]. At least in principle, this property could be used during
renumbering to alleviate the problem described in <a href="#section-5.1.2">Section 5.1.2</a>.
SHIM6 is an example of a class of solutions with this or a similar
property; others are Host Identity Protocol (HIP), IKEv2 Mobility and
Multihoming (MOBIKE), Mobile IPv6, SCTP, and proposals for multi-path
TCP.
<span class="h3"><a class="selflink" id="section-6.2" href="#section-6.2">6.2</a>. MANET Proposals</span>
The IETF working groups dealing with mobile ad hoc networks have been
working on a number of mechanisms for mobile routers to discover
available border routers dynamically, and for those mobile routers to
be able to communicate that information to hosts connected to those
mobile routers.
<span class="grey">Carpenter, et al. Informational [Page 22]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-23" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
Recently, some MANET work has appeared on a "Border Router Discovery
Protocol (BRDP)" that might be useful work towards a more dynamic
mechanism for site interior router renumbering [<a href="#ref-BRDP" title=""Border Router Discovery Protocol (BRDP) based Address Autoconfiguration"">BRDP</a>].
At present, the IETF AUTOCONF WG
(<a href="http://www.ietf.org/html.charters/autoconf-charter.html">http://www.ietf.org/html.charters/autoconf-charter.html</a>) is working
on address autoconfiguration mechanisms for MANET networks that also
seem useful for ordinary non-mobile non-MANET networks [<a href="#ref-AUTOC" title=""Mobile Ad hoc Network Architecture"">AUTOC</a>]. This
work is extensively surveyed in [<a href="#ref-AUTOC2" title=""Survey of IP address autoconfiguration mechanisms for MANETs"">AUTOC2</a>] and [<a href="#ref-AUTOC3" title=""Ad-Hoc IP Autoconfiguration Solution Space Analysis"">AUTOC3</a>]. Other work in
the same area, e.g., [<a href="./rfc5558" title=""Virtual Enterprise Traversal (VET)"">RFC5558</a>], might also be relevant.
MANETs are, of course, unusual in that they must be able to
reconfigure themselves at all times and without notice. Hence, the
type of hidden static configurations discussed above in <a href="#section-5.3.4">Section 5.3.4</a>
are simply intolerable in MANETs. Thus, it is possible that when a
consensus is reached on autoconfiguration for MANETs, the selected
solution(s) might not be suitable for the more general renumbering
problem. However, it is certainly worthwhile to explore applying
techniques that work for MANETs to conventional networks also.
<span class="h3"><a class="selflink" id="section-6.3" href="#section-6.3">6.3</a>. Other IETF Work</span>
A DHCPv6 extension has been proposed that could convey alternative
routes, in addition to the default router address, to IPv6 hosts
[<a href="#ref-DHRTOPT" title=""DHCPv6 Route Option"">DHRTOPT</a>]. Other DHCP options are also on the table that may offer
information about address prefixes and routing to DHCP or DHCPv6
clients, such as [<a href="#ref-DHSUBNET" title=""Subnet Allocation Option"">DHSUBNET</a>] and [<a href="#ref-DHMIFRT" title=""Route Configuration by DHCPv6 Option for Hosts with Multiple Interfaces"">DHMIFRT</a>]. It is conceivable that
these might be extended as a way of informing hosts dynamically of
prefix changes.
In the area of management tools, Network Configuration (NETCONF)
Protocol [<a href="./rfc4741" title=""NETCONF Configuration Protocol"">RFC4741</a>] is suitable for the configuration of any network
element or server, so could in principle be used to support secure
remote address renumbering.
The DNSOP WG has considered a Name Server Control Protocol (NSCP)
based on NETCONF that provides means for consistent DNS management
including potential host renumbering events [<a href="#ref-DNSCONT" title=""Design for a Nameserver Control Protocol"">DNSCONT</a>].
<span class="h3"><a class="selflink" id="section-6.4" href="#section-6.4">6.4</a>. Other Proposals</span>
A proposal has been made to include an address lifetime as an
embedded field in IPv6 addresses, with the idea that all prefixes
would automatically expire after a certain period and become
unrouteable [<a href="#ref-CROCKER" title=""Renumbering Considered Normal"">CROCKER</a>]. While this might be viewed as provocative, it
would force the issue by making renumbering compulsory.
<span class="grey">Carpenter, et al. Informational [Page 23]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-24" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Gaps</span>
This section seeks to identify technology gaps between what is
available from existing open specifications and what appears to be
needed for site renumbering to be tolerable.
<span class="h3"><a class="selflink" id="section-7.1" href="#section-7.1">7.1</a>. Host-Related Gaps</span>
It would be beneficial to expose address lifetimes in the socket API,
or any low-level networking API. This would allow applications to
avoid using stale addresses.
The various current discussions of a name-based transport layer or a
name-based network API also have potential to alleviate the
application-layer issues noted in this document. Application
development would be enhanced by the addition of a more abstract
network API that supports the C and C++ programming languages. For
example, it could use FQDNs and Service Names, rather than SockAddr,
IP Address, protocol, and port number. This would be equivalent to
similar interfaces already extant for Java programmers.
Moving to a FQDN-based transport layer might enhance the ability to
migrate the IP addresses of endpoints for TCP/UDP without having to
interrupt a session, or at least in a way that allows a session to
restart gracefully.
Having a single registry per host for all address-based configuration
(/etc/hosts, anyone?), with secure access for site network
management, might be helpful. Ideally, this would be remotely
configurable, for example, leveraging the IETF's current work on
networked-device configuration protocols (NetConf). While there are
proprietary versions of this approach, sometimes based on Lightweight
Directory Access Protocol (LDAP), a fully standardised approach seems
desirable.
Do we really need more than DHCP or SLAAC for regular hosts? Do we
need an IPv4 equivalent of SLAAC? How can the use of DHCP FORCERENEW
and DHCPv6 RECONFIGURE for bulk renumbering be deployed? FORCERENEW
in particular requires DHCP authentication [<a href="./rfc3118" title=""Authentication for DHCP Messages"">RFC3118</a>] to be deployed.
The IETF should resolve the 'IPv6 ND M/O flag debate' once and for
all, with default, mandatory and optional behaviours of hosts being
fully specified.
The host behaviour for upstream link learning suggested in
<a href="#section-2.3">Section 2.3</a> should be documented.
<span class="grey">Carpenter, et al. Informational [Page 24]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-25" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
It would be helpful to have multi-path, survivable, extensions for
both UDP and TCP (or institutionalise some aspects of SHIM6).
<span class="h3"><a class="selflink" id="section-7.2" href="#section-7.2">7.2</a>. Router-Related Gaps</span>
A non-proprietary secure mechanism to allow all address-based
configuration to be driven by a central repository for site
configuration data. NETCONF might be a good starting point.
A MANET solution that's solid enough to apply to fully operational
small to medium fixed sites for voluntary or involuntary renumbering.
A MANET-style solution that can be applied convincingly to large or
very large sites for voluntary renumbering.
A useful short-term measure would be to ensure that [<a href="./rfc2894" title=""Router Renumbering for IPv6"">RFC2894</a>] and
[<a href="./rfc3633" title=""IPv6 Prefix Options for Dynamic Host Configuration Protocol (DHCP) version 6"">RFC3633</a>] can be used in practice.
<span class="h3"><a class="selflink" id="section-7.3" href="#section-7.3">7.3</a>. Operational Gaps</span>
Since address changes are usually communicated via the DNS, the
latter's security is essential for secure renumbering. Thus, we
should continue existing efforts to deploy DNSsec globally, including
not only signing the DNS root, DNS TLDs, and subsidiary DNS zones,
but also widely deploying the already available DNSsec-capable DNS
resolvers.
Similarly, we should document and encourage widespread deployment of
Secure Dynamic DNS Update both in DNS servers and also in both client
and server operating systems. This capability is already widely
implemented and widely available, but it is not widely deployed at
present.
Deploy multi-prefix usage of IPv6, including Unique Local Addresses
(ULAs) to provide stable internal addresses. In particular, address
management tools need to support the multi-prefix model and ULAs.
Ensure that network monitoring systems will function during
renumbering, in particular to confirm that renumbering has completed
successfully or that some traffic is still using the old prefixes.
Document and encourage systematic site databases and secure
configuration protocols for network elements and servers (e.g.,
NETCONF). The database should store all the information about the
network; scripts and tools should derive all configurations from the
database. An example of this approach to simplify renumbering is
given at [<a href="#ref-LEROY" title=""Preparing network configurations for IPv6 renumbering"">LEROY</a>].
<span class="grey">Carpenter, et al. Informational [Page 25]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-26" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
Document functional requirements for site renumbering tools or
toolkits.
Document operational procedures useful for site renumbering.
In general, document renumbering instructions as part of every
product manual.
Recommend strongly that all IPv6 deployment plans, for all sizes of
site or network, should include provision for future renumbering.
Renumbering should be planned from day one when the first lines of
the configuration of a network or network service are written. Every
IPv6 operator should expect to have to renumber the network one day
and should plan for this event.
<span class="h3"><a class="selflink" id="section-7.4" href="#section-7.4">7.4</a>. Other Gaps</span>
Define a secure mechanism for announcing changes of site prefix to
other sites (for example, those that configure routers or VPNs to
point to the site in question).
For Mobile IP, define a better mechanism to handle change of home
agent address while mobile is disconnected.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Security Considerations</span>
Known current issues are discussed in <a href="#section-5.3.5">Section 5.3.5</a>. Security issues
related to SLAAC are discussed in [<a href="./rfc3756" title=""IPv6 Neighbor Discovery (ND) Trust Models and Threats"">RFC3756</a>]. DHCP authentication is
defined in [<a href="./rfc3118" title=""Authentication for DHCP Messages"">RFC3118</a>].
For future mechanisms to assist and simplify renumbering, care must
be taken to ensure that prefix or address changes (especially changes
coming from another site or via public sources such as the DNS) are
adequately authenticated at all points. Otherwise, misuse of
renumbering mechanisms would become an attractive target for those
wishing to divert traffic or to cause major disruption. As noted in
<a href="#section-5.1.4">Section 5.1.4</a>, this may result in defensive techniques such as "DNS
pinning", which create difficulty when renumbering.
Whatever authentication method(s) are adopted, key distribution will
be an important aspect. Most likely, public key cryptography will be
needed to authenticate renumbering announcements passing from one
site to another, since one cannot assume a preexisting trust
relationship between such sites.
<span class="grey">Carpenter, et al. Informational [Page 26]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-27" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. Acknowledgements</span>
Significant amounts of text have been adapted from [<a href="#ref-THINK" title=""Things to think about when Renumbering an IPv6 network"">THINK</a>], which
reflects work carried out during the 6NET project funded by the
Information Society Technologies Programme of the European
Commission. The authors of that document have agreed to their text
being submitted under the IETF's current copyright provisions.
Helpful material about work following on from 6NET was also provided
by Olivier Festor of INRIA.
Useful comments and contributions were made (in alphabetical order)
by Jari Arkko, Fred Baker, Olivier Bonaventure, Teco Boot, Stephane
Bortzmeyer, Dale Carder, Gert Doering, Ralph Droms, Pasi Eronen,
Vijay Gurbani, William Herrin, Cullen Jennings, Eliot Lear, Darrel
Lewis, Masataka Ohta, Dan Romascanu, Dave Thaler, Iljitsch van
Beijnum, Stig Venaas, Nathan Ward, James Woodyatt, and others.
<span class="h2"><a class="selflink" id="section-10" href="#section-10">10</a>. Informative References</span>
[<a id="ref-AUTOC">AUTOC</a>] Chakeres, I., Macker, J., and T. Clausen, "Mobile Ad
hoc Network Architecture", Work in Progress,
November 2007.
[<a id="ref-AUTOC2">AUTOC2</a>] Bernardos, C., Calderon, M., and H. Moustafa, "Survey
of IP address autoconfiguration mechanisms for MANETs",
Work in Progress, November 2008.
[<a id="ref-AUTOC3">AUTOC3</a>] Bernardos, C., Calderon, M., and H. Moustafa, "Ad-Hoc
IP Autoconfiguration Solution Space Analysis", Work
in Progress, November 2008.
[<a id="ref-BRDP">BRDP</a>] Boot, T. and A. Holtzer, "Border Router Discovery
Protocol (BRDP) based Address Autoconfiguration", Work
in Progress, July 2009.
[<a id="ref-CPE">CPE</a>] Singh, H., Beebee, W., Donley, C., Stark, B., and O.
Troan, Ed., "Basic Requirements for IPv6 Customer Edge
Routers", Work in Progress, May 2010.
[<a id="ref-CROCKER">CROCKER</a>] Crocker, S., "Renumbering Considered Normal", 2006,
<<a href="http://www.arin.net/meetings/minutes/ARIN_XVIII/PDF/wednesday/Renumbering_Crocker.pdf">http://www.arin.net/meetings/minutes/ARIN_XVIII/PDF</a>
<a href="http://www.arin.net/meetings/minutes/ARIN_XVIII/PDF/wednesday/Renumbering_Crocker.pdf">/wednesday/Renumbering_Crocker.pdf</a>>.
[<a id="ref-DHMIFRT">DHMIFRT</a>] Sun, T. and H. Deng, "Route Configuration by DHCPv6
Option for Hosts with Multiple Interfaces", Work
in Progress, March 2009.
<span class="grey">Carpenter, et al. Informational [Page 27]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-28" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
[<a id="ref-DHRTOPT">DHRTOPT</a>] Dec, W. and R. Johnson, <a style="text-decoration: none" href='https://www.google.com/search?sitesearch=datatracker.ietf.org%2Fdoc%2Fhtml%2F&q=inurl:draft-+%22DHCPv6+Route+Option%22'>"DHCPv6 Route Option"</a>, Work
in Progress, March 2010.
[<a id="ref-DHSUBNET">DHSUBNET</a>] Johnson, R., Kumarasamy, J., Kinnear, K., and M. Stapp,
"Subnet Allocation Option", Work in Progress, May 2010.
[<a id="ref-DNSBOOK">DNSBOOK</a>] Albitz, P. and C. Liu, "DNS and BIND", 5th Edition,
O'Reilly, 2006.
[<a id="ref-DNSCONT">DNSCONT</a>] Dickinson, J., Morris, S., and R. Arends, "Design for a
Nameserver Control Protocol", Work in Protocol,
October 2008.
[<a id="ref-DNSSD">DNSSD</a>] Cheshire, S. and M. Krochmal, "DNS-Based Service
Discovery", Work in Progress, March 2010.
[<a id="ref-HANDLEY">HANDLEY</a>] Handley, M., Wischik, D., and M. Bagnulo, "Multipath
Transport, Resource Pooling, and implications for
Routing", 2008,
<<a href="http://www.ietf.org/proceedings/08jul/slides/RRG-2.pdf">http://www.ietf.org/proceedings/08jul/</a>
<a href="http://www.ietf.org/proceedings/08jul/slides/RRG-2.pdf">slides/RRG-2.pdf</a>>.
[<a id="ref-IEEE.802-1X">IEEE.802-1X</a>] Institute of Electrical and Electronics Engineers,
"Port-Based Network Access Control: IEEE Standard for
Local and Metropolitan Area Networks 802.1X-2004",
December 2009.
[<a id="ref-IEEE.802-1X-REV">IEEE.802-1X-REV</a>]
Institute of Electrical and Electronics Engineers,
"802.1X-REV - Revision of 802.1X-2004 - Port Based
Network Access Control: IEEE Standard for Local and
Metropolitan Area Networks", 2009.
[<a id="ref-ILNP">ILNP</a>] Atkinson, R., <a style="text-decoration: none" href='https://www.google.com/search?sitesearch=datatracker.ietf.org%2Fdoc%2Fhtml%2F&q=inurl:draft-+%22ILNP+Concept+of+Operations%22'>"ILNP Concept of Operations"</a>, Work
in Progress, February 2010.
[<a id="ref-LEROY">LEROY</a>] Leroy, D. and O. Bonaventure, "Preparing network
configurations for IPv6 renumbering", International
Journal of Network Management, 2009, <<a href="http://inl.info.ucl.ac.be/system/files/dleroy-nem-2009.pdf">http://</a>
<a href="http://inl.info.ucl.ac.be/system/files/dleroy-nem-2009.pdf">inl.info.ucl.ac.be/system/files/dleroy-nem-2009.pdf</a>>.
[<a id="ref-LISP">LISP</a>] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis,
"Locator/ID Separation Protocol (LISP)", Work
in Progress, April 2010.
[<a id="ref-MDNS">MDNS</a>] Cheshire, S. and M. Krochmal, <a style="text-decoration: none" href='https://www.google.com/search?sitesearch=datatracker.ietf.org%2Fdoc%2Fhtml%2F&q=inurl:draft-+%22Multicast+DNS%22'>"Multicast DNS"</a>, Work
in Progress, March 2010.
<span class="grey">Carpenter, et al. Informational [Page 28]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-29" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
[<a id="ref-NAT66">NAT66</a>] Wasserman, M. and F. Baker, "IPv6-to-IPv6 Network
Address Translation (NAT66)", Work in Progress,
March 2009.
[<a id="ref-RFC1332">RFC1332</a>] McGregor, G., "The PPP Internet Protocol Control
Protocol (IPCP)", <a href="./rfc1332">RFC 1332</a>, May 1992.
[<a id="ref-RFC1661">RFC1661</a>] Simpson, W., "The Point-to-Point Protocol (PPP)",
STD 51, <a href="./rfc1661">RFC 1661</a>, July 1994.
[<a id="ref-RFC1900">RFC1900</a>] Carpenter, B. and Y. Rekhter, "Renumbering Needs Work",
<a href="./rfc1900">RFC 1900</a>, February 1996.
[<a id="ref-RFC1916">RFC1916</a>] Berkowitz, H., Ferguson, P., Leland, W., and P. Nesser,
"Enterprise Renumbering: Experience and Information
Solicitation", <a href="./rfc1916">RFC 1916</a>, February 1996.
[<a id="ref-RFC1918">RFC1918</a>] Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G.,
and E. Lear, "Address Allocation for Private
Internets", <a href="https://www.rfc-editor.org/bcp/bcp5">BCP 5</a>, <a href="./rfc1918">RFC 1918</a>, February 1996.
[<a id="ref-RFC1958">RFC1958</a>] Carpenter, B., "Architectural Principles of the
Internet", <a href="./rfc1958">RFC 1958</a>, June 1996.
[<a id="ref-RFC2071">RFC2071</a>] Ferguson, P. and H. Berkowitz, "Network Renumbering
Overview: Why would I want it and what is it anyway?",
<a href="./rfc2071">RFC 2071</a>, January 1997.
[<a id="ref-RFC2072">RFC2072</a>] Berkowitz, H., "Router Renumbering Guide", <a href="./rfc2072">RFC 2072</a>,
January 1997.
[<a id="ref-RFC2131">RFC2131</a>] Droms, R., "Dynamic Host Configuration Protocol",
<a href="./rfc2131">RFC 2131</a>, March 1997.
[<a id="ref-RFC2407">RFC2407</a>] Piper, D., "The Internet IP Security Domain of
Interpretation for ISAKMP", <a href="./rfc2407">RFC 2407</a>, November 1998.
[<a id="ref-RFC2608">RFC2608</a>] Guttman, E., Perkins, C., Veizades, J., and M. Day,
"Service Location Protocol, Version 2", <a href="./rfc2608">RFC 2608</a>,
June 1999.
[<a id="ref-RFC2610">RFC2610</a>] Perkins, C. and E. Guttman, "DHCP Options for Service
Location Protocol", <a href="./rfc2610">RFC 2610</a>, June 1999.
[<a id="ref-RFC2874">RFC2874</a>] Crawford, M. and C. Huitema, "DNS Extensions to Support
IPv6 Address Aggregation and Renumbering", <a href="./rfc2874">RFC 2874</a>,
July 2000.
<span class="grey">Carpenter, et al. Informational [Page 29]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-30" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
[<a id="ref-RFC2894">RFC2894</a>] Crawford, M., "Router Renumbering for IPv6", <a href="./rfc2894">RFC 2894</a>,
August 2000.
[<a id="ref-RFC3007">RFC3007</a>] Wellington, B., "Secure Domain Name System (DNS)
Dynamic Update", <a href="./rfc3007">RFC 3007</a>, November 2000.
[<a id="ref-RFC3059">RFC3059</a>] Guttman, E., "Attribute List Extension for the Service
Location Protocol", <a href="./rfc3059">RFC 3059</a>, February 2001.
[<a id="ref-RFC3118">RFC3118</a>] Droms, R. and W. Arbaugh, "Authentication for DHCP
Messages", <a href="./rfc3118">RFC 3118</a>, June 2001.
[<a id="ref-RFC3203">RFC3203</a>] T'Joens, Y., Hublet, C., and P. De Schrijver, "DHCP
reconfigure extension", <a href="./rfc3203">RFC 3203</a>, December 2001.
[<a id="ref-RFC3224">RFC3224</a>] Guttman, E., "Vendor Extensions for Service Location
Protocol, Version 2", <a href="./rfc3224">RFC 3224</a>, January 2002.
[<a id="ref-RFC3306">RFC3306</a>] Haberman, B. and D. Thaler, "Unicast-Prefix-based IPv6
Multicast Addresses", <a href="./rfc3306">RFC 3306</a>, August 2002.
[<a id="ref-RFC3315">RFC3315</a>] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
and M. Carney, "Dynamic Host Configuration Protocol for
IPv6 (DHCPv6)", <a href="./rfc3315">RFC 3315</a>, July 2003.
[<a id="ref-RFC3421">RFC3421</a>] Zhao, W., Schulzrinne, H., Guttman, E., Bisdikian, C.,
and W. Jerome, "Select and Sort Extensions for the
Service Location Protocol (SLP)", <a href="./rfc3421">RFC 3421</a>,
November 2002.
[<a id="ref-RFC3633">RFC3633</a>] Troan, O. and R. Droms, "IPv6 Prefix Options for
Dynamic Host Configuration Protocol (DHCP) version 6",
<a href="./rfc3633">RFC 3633</a>, December 2003.
[<a id="ref-RFC3736">RFC3736</a>] Droms, R., "Stateless Dynamic Host Configuration
Protocol (DHCP) Service for IPv6", <a href="./rfc3736">RFC 3736</a>,
April 2004.
[<a id="ref-RFC3756">RFC3756</a>] Nikander, P., Kempf, J., and E. Nordmark, "IPv6
Neighbor Discovery (ND) Trust Models and Threats",
<a href="./rfc3756">RFC 3756</a>, May 2004.
[<a id="ref-RFC3775">RFC3775</a>] Johnson, D., Perkins, C., and J. Arkko, "Mobility
Support in IPv6", <a href="./rfc3775">RFC 3775</a>, June 2004.
[<a id="ref-RFC3795">RFC3795</a>] Sofia, R. and P. Nesser, "Survey of IPv4 Addresses in
Currently Deployed IETF Application Area Standards
Track and Experimental Documents", <a href="./rfc3795">RFC 3795</a>, June 2004.
<span class="grey">Carpenter, et al. Informational [Page 30]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-31" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
[<a id="ref-RFC3832">RFC3832</a>] Zhao, W., Schulzrinne, H., Guttman, E., Bisdikian, C.,
and W. Jerome, "Remote Service Discovery in the Service
Location Protocol (SLP) via DNS SRV", <a href="./rfc3832">RFC 3832</a>,
July 2004.
[<a id="ref-RFC3956">RFC3956</a>] Savola, P. and B. Haberman, "Embedding the Rendezvous
Point (RP) Address in an IPv6 Multicast Address",
<a href="./rfc3956">RFC 3956</a>, November 2004.
[<a id="ref-RFC3958">RFC3958</a>] Daigle, L. and A. Newton, "Domain-Based Application
Service Location Using SRV RRs and the Dynamic
Delegation Discovery Service (DDDS)", <a href="./rfc3958">RFC 3958</a>,
January 2005.
[<a id="ref-RFC3971">RFC3971</a>] Arkko, J., Kempf, J., Zill, B., and P. Nikander,
"SEcure Neighbor Discovery (SEND)", <a href="./rfc3971">RFC 3971</a>,
March 2005.
[<a id="ref-RFC4033">RFC4033</a>] Arends, R., Austein, R., Larson, M., Massey, D., and S.
Rose, "DNS Security Introduction and Requirements",
<a href="./rfc4033">RFC 4033</a>, March 2005.
[<a id="ref-RFC4034">RFC4034</a>] Arends, R., Austein, R., Larson, M., Massey, D., and S.
Rose, "Resource Records for the DNS Security
Extensions", <a href="./rfc4034">RFC 4034</a>, March 2005.
[<a id="ref-RFC4035">RFC4035</a>] Arends, R., Austein, R., Larson, M., Massey, D., and S.
Rose, "Protocol Modifications for the DNS Security
Extensions", <a href="./rfc4035">RFC 4035</a>, March 2005.
[<a id="ref-RFC4076">RFC4076</a>] Chown, T., Venaas, S., and A. Vijayabhaskar,
"Renumbering Requirements for Stateless Dynamic Host
Configuration Protocol for IPv6 (DHCPv6)", <a href="./rfc4076">RFC 4076</a>,
May 2005.
[<a id="ref-RFC4191">RFC4191</a>] Draves, R. and D. Thaler, "Default Router Preferences
and More-Specific Routes", <a href="./rfc4191">RFC 4191</a>, November 2005.
[<a id="ref-RFC4192">RFC4192</a>] Baker, F., Lear, E., and R. Droms, "Procedures for
Renumbering an IPv6 Network without a Flag Day",
<a href="./rfc4192">RFC 4192</a>, September 2005.
[<a id="ref-RFC4193">RFC4193</a>] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast
Addresses", <a href="./rfc4193">RFC 4193</a>, October 2005.
[<a id="ref-RFC4306">RFC4306</a>] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
<a href="./rfc4306">RFC 4306</a>, December 2005.
<span class="grey">Carpenter, et al. Informational [Page 31]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-32" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
[<a id="ref-RFC4340">RFC4340</a>] Kohler, E., Handley, M., and S. Floyd, "Datagram
Congestion Control Protocol (DCCP)", <a href="./rfc4340">RFC 4340</a>,
March 2006.
[<a id="ref-RFC4741">RFC4741</a>] Enns, R., "NETCONF Configuration Protocol", <a href="./rfc4741">RFC 4741</a>,
December 2006.
[<a id="ref-RFC4861">RFC4861</a>] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
"Neighbor Discovery for IP version 6 (IPv6)", <a href="./rfc4861">RFC 4861</a>,
September 2007.
[<a id="ref-RFC4862">RFC4862</a>] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
Address Autoconfiguration", <a href="./rfc4862">RFC 4862</a>, September 2007.
[<a id="ref-RFC4941">RFC4941</a>] Narten, T., Draves, R., and S. Krishnan, "Privacy
Extensions for Stateless Address Autoconfiguration in
IPv6", <a href="./rfc4941">RFC 4941</a>, September 2007.
[<a id="ref-RFC4960">RFC4960</a>] Stewart, R., "Stream Control Transmission Protocol",
<a href="./rfc4960">RFC 4960</a>, September 2007.
[<a id="ref-RFC5059">RFC5059</a>] Bhaskar, N., Gall, A., Lingard, J., and S. Venaas,
"Bootstrap Router (BSR) Mechanism for Protocol
Independent Multicast (PIM)", <a href="./rfc5059">RFC 5059</a>, January 2008.
[<a id="ref-RFC5061">RFC5061</a>] Stewart, R., Xie, Q., Tuexen, M., Maruyama, S., and M.
Kozuka, "Stream Control Transmission Protocol (SCTP)
Dynamic Address Reconfiguration", <a href="./rfc5061">RFC 5061</a>,
September 2007.
[<a id="ref-RFC5072">RFC5072</a>] S.Varada, Haskins, D., and E. Allen, "IP Version 6 over
PPP", <a href="./rfc5072">RFC 5072</a>, September 2007.
[<a id="ref-RFC5280">RFC5280</a>] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation
List (CRL) Profile", <a href="./rfc5280">RFC 5280</a>, May 2008.
[<a id="ref-RFC5533">RFC5533</a>] Nordmark, E. and M. Bagnulo, "Shim6: Level 3
Multihoming Shim Protocol for IPv6", <a href="./rfc5533">RFC 5533</a>,
June 2009.
[<a id="ref-RFC5558">RFC5558</a>] Templin, F., "Virtual Enterprise Traversal (VET)",
<a href="./rfc5558">RFC 5558</a>, February 2010.
[<a id="ref-SCTPNAT">SCTPNAT</a>] Xie, Q., Stewart, R., Holdrege, M., and M. Tuexen,
"SCTP NAT Traversal Considerations", Work in Progress,
November 2007.
<span class="grey">Carpenter, et al. Informational [Page 32]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-33" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
[<a id="ref-SIX-ONE">SIX-ONE</a>] Vogt, C., "Six/One: A Solution for Routing and
Addressing in IPv6", Work in Progress, October 2009.
[<a id="ref-THINK">THINK</a>] Chown, T., "Things to think about when Renumbering an
IPv6 network", Work in Progress, September 2006.
<span class="grey">Carpenter, et al. Informational [Page 33]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-34" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
<span class="h2"><a class="selflink" id="appendix-A" href="#appendix-A">Appendix A</a>. Embedded IP Addresses</span>
This Appendix lists common places where IP addresses might be
embedded. The list was adapted from [<a href="#ref-THINK" title=""Things to think about when Renumbering an IPv6 network"">THINK</a>].
Provider based prefix(es)
Names resolved to IP addresses in firewall at startup time
IP addresses in remote firewalls allowing access to remote
services
IP-based authentication in remote systems allowing access to
online bibliographic resources
IP address of both tunnel end points for IPv6 in IPv4 tunnel
Hard-coded IP subnet configuration information
IP addresses for static route targets
Blocked SMTP server IP list (spam sources)
Web .htaccess and remote access controls
Apache .Listen. directive on given IP address
Configured multicast rendezvous point
TCP wrapper files
Samba configuration files
DNS resolv.conf on Unix
Any network traffic monitoring tool
NIS/ypbind via the hosts file
Some interface configurations
Unix portmap security masks
NIS security masks
PIM-SM Rendezvous Point address on multicast routers
<span class="grey">Carpenter, et al. Informational [Page 34]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-35" ></span>
<span class="grey"><a href="./rfc5887">RFC 5887</a> Renumbering Still Needs Work May 2010</span>
Authors' Addresses
Brian Carpenter
Department of Computer Science
University of Auckland
PB 92019
Auckland 1142
New Zealand
EMail: brian.e.carpenter@gmail.com
Randall Atkinson
Extreme Networks
PO Box 14129
Suite 100, 3306 East NC Highway 54
Research Triangle Park, NC 27709
USA
EMail: rja@extremenetworks.com
Hannu Flinck
Nokia Siemens Networks
Linnoitustie 6
Espoo 02600
Finland
EMail: hannu.flinck@nsn.com
Carpenter, et al. Informational [Page 35]
</pre>
|