File: rfc7136.html

package info (click to toggle)
doc-rfc 20230121-1
  • links: PTS, VCS
  • area: non-free
  • in suites: bookworm, forky, sid, trixie
  • size: 1,609,944 kB
file content (557 lines) | stat: -rw-r--r-- 30,803 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
<pre>Internet Engineering Task Force (IETF)                      B. Carpenter
Request for Comments: 7136                             Univ. of Auckland
Updates: <a href="./rfc4291">4291</a>                                                   S. Jiang
Category: Standards Track                   Huawei Technologies Co., Ltd
ISSN: 2070-1721                                            February 2014


               <span class="h1">Significance of IPv6 Interface Identifiers</span>

Abstract

   The IPv6 addressing architecture includes a unicast interface
   identifier that is used in the creation of many IPv6 addresses.
   Interface identifiers are formed by a variety of methods.  This
   document clarifies that the bits in an interface identifier have no
   meaning and that the entire identifier should be treated as an opaque
   value.  In particular, <a href="./rfc4291">RFC 4291</a> defines a method by which the
   Universal and Group bits of an IEEE link-layer address are mapped
   into an IPv6 unicast interface identifier.  This document clarifies
   that those two bits are significant only in the process of deriving
   interface identifiers from an IEEE link-layer address, and it updates
   <a href="./rfc4291">RFC 4291</a> accordingly.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in <a href="./rfc5741#section-2">Section&nbsp;2 of RFC 5741</a>.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   <a href="http://www.rfc-editor.org/info/rfc7136">http://www.rfc-editor.org/info/rfc7136</a>.















<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   <a href="#section-1">1</a>.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   <a href="#page-2">2</a>
     <a href="#section-1.1">1.1</a>.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   <a href="#page-3">3</a>
   <a href="#section-2">2</a>.  Problem Statement . . . . . . . . . . . . . . . . . . . . . .   <a href="#page-3">3</a>
   <a href="#section-3">3</a>.  Usefulness of the U and G Bits  . . . . . . . . . . . . . . .   <a href="#page-5">5</a>
   <a href="#section-4">4</a>.  The Role of Duplicate Address Detection . . . . . . . . . . .   <a href="#page-6">6</a>
   <a href="#section-5">5</a>.  Clarification of Specifications . . . . . . . . . . . . . . .   <a href="#page-6">6</a>
   <a href="#section-6">6</a>.  Security Considerations . . . . . . . . . . . . . . . . . . .   <a href="#page-7">7</a>
   <a href="#section-7">7</a>.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   <a href="#page-7">7</a>
   <a href="#section-8">8</a>.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   <a href="#page-8">8</a>
   <a href="#section-9">9</a>.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   <a href="#page-8">8</a>
     <a href="#section-9.1">9.1</a>.  Normative References  . . . . . . . . . . . . . . . . . .   <a href="#page-8">8</a>
     <a href="#section-9.2">9.2</a>.  Informative References  . . . . . . . . . . . . . . . . .   <a href="#page-8">8</a>

<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>.  Introduction</span>

   IPv6 unicast addresses consist of a prefix followed by an Interface
   Identifier (IID).  The IID is supposed to be unique on the links
   reached by routing to that prefix, giving an IPv6 address that is
   unique within the applicable scope (link local or global).  According
   to the IPv6 addressing architecture [<a href="./rfc4291" title="&quot;IP Version 6 Addressing Architecture&quot;">RFC4291</a>], when a 64-bit IPv6
   unicast IID is formed on the basis of an IEEE EUI-64 address, usually
   itself expanded from a 48-bit MAC address, a particular format must
   be used:

      For all unicast addresses, except those that start with the binary
      value 000, Interface IDs are required to be 64 bits long and to be
      constructed in Modified EUI-64 format.

   Thus, the specification assumes that the normal case is to transform
   an Ethernet-style address into an IID, but, in practice, there are
   various methods of forming such an IID.



<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


   The Modified EUI-64 format preserves the information provided by two
   particular bits in the MAC address:

   o  The "u/l" bit in a MAC address [<a href="#ref-IEEE802" title="&quot;IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture&quot;">IEEE802</a>] is set to 0 to indicate
      universal scope (implying uniqueness) or to 1 to indicate local
      scope (without implying uniqueness).  In an IID formed from a MAC
      address, this bit is simply known as the "u" bit and its value is
      inverted, i.e., 1 for universal scope and 0 for local scope.
      According to [<a href="./rfc4291" title="&quot;IP Version 6 Addressing Architecture&quot;">RFC4291</a>] and [<a href="./rfc7042" title="&quot;IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters&quot;">RFC7042</a>], the reason for this was to
      make it easier for network operators to manually configure
      local-scope IIDs.

      In an IID, this bit is in position 6, i.e., position 70 in the
      complete IPv6 address (when counting from 0).

   o  The "i/g" bit in a MAC address is set to 1 to indicate group
      addressing (link-layer multicast).  The value of this bit is
      preserved in an IID, where it is known as the "g" bit.

      In an IID, this bit is in position 7, i.e., position 71 in the
      complete IPv6 address (when counting from 0).

   This document discusses problems observed with the "u" and "g" bits
   as a result of the above requirements and the fact that various other
   methods of forming an IID have been defined independently of the
   method described in <a href="./rfc4291#appendix-A">Appendix&nbsp;A of RFC 4291</a>.  It then discusses the
   usefulness of these two bits and the significance of the bits in an
   IID in general.  Finally, it updates <a href="./rfc4291">RFC 4291</a> accordingly.

<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a>.  Terminology</span>

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [<a href="./rfc2119" title="&quot;Key words for use in RFCs to Indicate Requirement Levels&quot;">RFC2119</a>].

<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>.  Problem Statement</span>

   In addition to IIDs formed from IEEE EUI-64 addresses, various new
   forms of IIDs have been defined, including temporary addresses
   [<a href="./rfc4941" title="&quot;Privacy Extensions for Stateless Address Autoconfiguration in IPv6&quot;">RFC4941</a>], Cryptographically Generated Addresses (CGAs) [<a href="./rfc3972" title="&quot;Cryptographically Generated Addresses (CGA)&quot;">RFC3972</a>]
   [<a href="./rfc4982" title="&quot;Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs)&quot;">RFC4982</a>], Hash-Based Addresses (HBAs) [<a href="./rfc5535" title="&quot;Hash-Based Addresses (HBA)&quot;">RFC5535</a>], and ISATAP
   addresses [<a href="./rfc5214" title="&quot;Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)&quot;">RFC5214</a>].  Other methods have been proposed, such as
   stable privacy addresses [<a href="#ref-IID-SLAAC">IID-SLAAC</a>] and mapped addresses for 4rd
   [<a href="#ref-SOFTWR-4RD">SOFTWR-4RD</a>].  In each case, the question of how to set the "u" and
   "g" bits has to be decided.  For example, <a href="./rfc3972">RFC 3972</a> specifies that
   they are both zero in CGAs, and <a href="./rfc4982">RFC 4982</a> describes them as if they
   were reserved bits.  The same applies to HBAs.  On the other hand,
   <a href="./rfc4941">RFC 4941</a> specifies that "u" must be zero but leaves "g" variable.



<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


   The NAT64 addressing format [<a href="./rfc6052" title="&quot;IPv6 Addressing of IPv4/IPv6 Translators&quot;">RFC6052</a>] sets the whole byte containing
   "u" and "g" to zero.

   Another case where the "u" and "g" bits are specified is in the
   Reserved IPv6 Subnet Anycast Address format [<a href="./rfc2526" title="&quot;Reserved IPv6 Subnet Anycast Addresses&quot;">RFC2526</a>], which states
   that "for interface identifiers in EUI-64 format, the universal/local
   bit in the interface identifier MUST be set to 0" (i.e., local) and
   the "g" bit is required to be set to 1.  However, the text neither
   states nor implies any semantics for these bits in anycast addresses.

   A common operational practice for well-known servers is to manually
   assign a small number as the IID, in which case "u" and "g" are both
   zero.

   These cases illustrate that the statement quoted above from <a href="./rfc4291">RFC 4291</a>
   requiring "Modified EUI-64 format" is inapplicable when applied to
   forms of IID that are not in fact based on an underlying EUI-64
   address.  In practice, the IETF has chosen to assign some 64-bit IIDs
   that have nothing to do with EUI-64.

   A particular case is that of /127 prefixes for point-to-point links
   between routers, as standardised by [<a href="./rfc6164" title="&quot;Using 127-Bit IPv6 Prefixes on Inter- Router Links&quot;">RFC6164</a>].  The addresses on
   these links are undoubtedly global unicast addresses, but they do not
   have a 64-bit IID.  The bits in the positions named "u" and "g" in
   such an IID have no special significance and their values are not
   specified.

   Each time a new IID format is proposed, the question arises whether
   these bits have any meaning.  <a href="./rfc7042#section-2.2.1">Section&nbsp;2.2.1 of [RFC7042]</a> discusses
   the mechanics of the bit allocations but does not explain the purpose
   or usefulness of these bits in an IID.  There is an IANA registry for
   reserved IID values [<a href="./rfc5453" title="&quot;Reserved IPv6 Interface Identifiers&quot;">RFC5453</a>], but again there is no explanation of
   the purpose of the "u" and "g" bits.

   There was a presumption when IPv6 was designed and the IID format was
   first specified that a universally unique IID might prove to be very
   useful, for example to contribute to solving the multihoming problem.
   Indeed, the addressing architecture [<a href="./rfc4291" title="&quot;IP Version 6 Addressing Architecture&quot;">RFC4291</a>] states this explicitly:

      The use of the universal/local bit in the Modified EUI-64 format
      identifier is to allow development of future technology that can
      take advantage of interface identifiers with universal scope.

   However, so far, this has not proved to be the case.  Also, there is
   evidence from the field that MAC addresses with universal scope are
   sometimes assigned to multiple MAC interfaces.  There are recurrent
   reports of manufacturers assigning the same MAC address to multiple
   devices, and significant reuse of the same virtual MAC address is



<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


   reported in virtual machine environments.  Once transformed into IID
   format (with "u" = 1), these identifiers would purport to be
   universally unique but would in fact be ambiguous.  This has no known
   harmful effect as long as the replicated MAC addresses and IIDs are
   used on different layer 2 links.  If they are used on the same link,
   of course there will be a problem, very likely interfering with
   link-layer transmission.  If not, the problem will be detected by
   duplicate address detection [<a href="./rfc4862" title="&quot;IPv6 Stateless Address Autoconfiguration&quot;">RFC4862</a>] [<a href="./rfc6775" title="&quot;Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)&quot;">RFC6775</a>], but such an error
   can usually only be resolved by human intervention.

   The conclusion from this is that the "u" bit is not a reliable
   indicator of universal uniqueness.

   We note that Identifier-Locator Network Protocol (ILNP), a
   multihoming solution that might be expected to benefit from
   universally unique IIDs in modified EUI-64 format, does not in fact
   rely on them.  ILNP uses its own format defined as a Node Identifier
   [<a href="./rfc6741" title="&quot;Identifier-Locator Network Protocol (ILNP) Engineering Considerations&quot;">RFC6741</a>].  ILNP has the constraint that a given Node Identifier must
   be unique within the context of a given Locator (i.e., within a
   single given IPv6 subnetwork).  As we have just shown, the state of
   the "u" bit does not in any way guarantee such uniqueness, but
   duplicate address detection is available.

   Thus, we can conclude that the value of the "u" bit in IIDs has no
   particular meaning.  In the case of an IID created from a MAC address
   according to <a href="./rfc4291">RFC 4291</a>, its value is determined by the MAC address,
   but that is all.

   An IPv6 IID should not be created from a MAC group address, so the
   "g" bit will normally be zero.  But, this value also has no
   particular meaning.  Additionally, the "u" and the "g" bits are both
   meaningless in the format of an IPv6 multicast group ID [<a href="./rfc3306" title="&quot;Unicast-Prefix-based IPv6 Multicast Addresses&quot;">RFC3306</a>]
   [<a href="./rfc3307" title="&quot;Allocation Guidelines for IPv6 Multicast Addresses&quot;">RFC3307</a>].

   None of the above implies that there is a problem with using the "u"
   and "g" bits in MAC addresses as part of the process of generating
   IIDs from MAC addresses, or with specifying their values in other
   methods of generating IIDs.  What it does imply is that after an IID
   is generated by any method, no reliable deductions can be made from
   the state of the "u" and "g" bits; in other words, these bits have no
   useful semantics in an IID.

   Once this is recognised, we can avoid the problematic confusion
   caused by these bits each time that a new form of IID is proposed.







<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>.  Usefulness of the U and G Bits</span>

   Given that the "u" and "g" bits do not have a reliable meaning in an
   IID, it is relevant to consider what usefulness they do have.

   If an IID is known or guessed to have been created according to
   [<a href="./rfc4291" title="&quot;IP Version 6 Addressing Architecture&quot;">RFC4291</a>], it could be transformed back into a MAC address.  This can
   be very helpful during operational fault diagnosis.  For that reason,
   mapping the IEEE "u" and "g" bits into the IID has operational
   usefulness.  However, it should be stressed that an IID with "u" = 1
   and "g" = 0 might not be formed from a MAC address; on the contrary,
   it might equally result from another method.  With other methods,
   there is no reverse transformation available.

   Given that the values of the "u" and "g" bits in an IID have no
   particular meaning, new methods of IID formation are at liberty to
   use them as they wish, for example, as additional pseudo-random bits
   to reduce the chances of duplicate IIDs.

<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>.  The Role of Duplicate Address Detection</span>

   As mentioned above, Duplicate Address Detection (DAD) [<a href="./rfc4862" title="&quot;IPv6 Stateless Address Autoconfiguration&quot;">RFC4862</a>] is
   able to detect any case where a collision of two IIDs on the same
   link leads to a duplicated IPv6 address.  The scope of DAD may be
   extended to a set of links by a DAD proxy [<a href="./rfc6957" title="&quot;Duplicate Address Detection Proxy&quot;">RFC6957</a>] or by Neighbor
   Discovery Optimization [<a href="./rfc6775" title="&quot;Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)&quot;">RFC6775</a>].  Since DAD is mandatory for all
   nodes, there will be almost no case in which an IID collision,
   however unlikely it may be, is not detected.  It is out of scope of
   most existing specifications to define the recovery action after a
   DAD failure, which is an implementation issue.  If a manually created
   IID, or an IID derived from a MAC address according to <a href="./rfc4291">RFC 4291</a>,
   leads to a DAD failure, human intervention will most likely be
   required.  However, as mentioned above, some methods of IID formation
   might produce IID values with "u" = 1 and "g" = 0 that are not based
   on a MAC address.  With very low probability, such a value might
   collide with an IID based on a MAC address.

   As stated in <a href="./rfc4862">RFC 4862</a>:

      On the other hand, if the duplicate link-local address is not
      formed from an interface identifier based on the hardware address,
      which is supposed to be uniquely assigned, IP operation on the
      interface MAY be continued.

   Continued operation is only possible if a new IID is created.  The
   best procedure to follow for this will depend on the IID formation
   method in use.  For example, if an IID is formed by a pseudo-random
   process, that process could simply be repeated.



<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>.  Clarification of Specifications</span>

   This section describes clarifications to the IPv6 specifications that
   result from the above discussion.

   The EUI-64 to IID transformation defined in the IPv6 addressing
   architecture [<a href="./rfc4291" title="&quot;IP Version 6 Addressing Architecture&quot;">RFC4291</a>] MUST be used for all cases where an IPv6 IID
   is derived from an IEEE MAC or EUI-64 address.  With any other form
   of link-layer address, an equivalent transformation SHOULD be used.

   Specifications of other forms of 64-bit IIDs MUST specify how all 64
   bits are set, but a generic semantic meaning for the "u" and "g" bits
   MUST NOT be defined.  However, the method of generating IIDs for
   specific link types MAY define some local significance for certain
   bits.

   In all cases, the bits in an IID have no generic semantics; in other
   words, they have opaque values.  In fact, the whole IID value MUST be
   viewed as an opaque bit string by third parties, except possibly in
   the local context.

   The following statement in <a href="#section-2.5.1">Section 2.5.1</a> of the IPv6 addressing
   architecture [<a href="./rfc4291" title="&quot;IP Version 6 Addressing Architecture&quot;">RFC4291</a>]:

      For all unicast addresses, except those that start with the binary
      value 000, Interface IDs are required to be 64 bits long and to be
      constructed in Modified EUI-64 format.

   is replaced by:

      For all unicast addresses, except those that start with the binary
      value 000, Interface IDs are required to be 64 bits long.  If
      derived from an IEEE MAC-layer address, they must be constructed
      in Modified EUI-64 format.

   The following statement in <a href="#section-2.5.1">Section 2.5.1</a> of the IPv6 addressing
   architecture [<a href="./rfc4291" title="&quot;IP Version 6 Addressing Architecture&quot;">RFC4291</a>] is obsoleted:

      The use of the universal/local bit in the Modified EUI-64 format
      identifier is to allow development of future technology that can
      take advantage of interface identifiers with universal scope.

   As far as is known, no existing implementation will be affected by
   these changes.  The benefit is that future design discussions are
   simplified.






<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>.  Security Considerations</span>

   No new security exposures or issues are raised by this document.

   In some contexts, unpredictable IID values are considered beneficial
   to enhance privacy and defeat scanning attacks.  The recognition that
   the IID value should be regarded as an opaque bit string is
   consistent with methods of IID formation that result in
   unpredictable, pseudo-random values.

<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>.  IANA Considerations</span>

   This document requests no immediate action by IANA.  However, the
   following should be noted when considering any future proposed
   addition to the registry of reserved IID values, which requires
   Standards Action [<a href="./rfc5226" title="">RFC5226</a>] according to [<a href="./rfc5453" title="&quot;Reserved IPv6 Interface Identifiers&quot;">RFC5453</a>].

   Full deployment of a new reserved IID value would require updates to
   IID generation code in every deployed IPv6 stack, so the technical
   justification for such a Standards Action would need to be extremely
   strong.

   The preceding sentence and a reference to this document have been
   added to the "Reserved IPv6 Interface Identifiers" registry.

<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>.  Acknowledgements</span>

   Valuable comments were received from Ran Atkinson, Remi Despres,
   Ralph Droms, Fernando Gont, Eric Gray, Brian Haberman, Joel Halpern,
   Bob Hinden, Christian Huitema, Ray Hunter, Tatuya Jinmei, Roger
   Jorgensen, Mark Smith, Bernie Volz, and other participants in the
   6MAN working group.

   Brian Carpenter was a visitor at the Computer Laboratory, Cambridge
   University during part of this work.

<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>.  References</span>

<span class="h3"><a class="selflink" id="section-9.1" href="#section-9.1">9.1</a>.  Normative References</span>

   [<a id="ref-RFC2119">RFC2119</a>]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.

   [<a id="ref-RFC4291">RFC4291</a>]  Hinden, R. and S. Deering, "IP Version 6 Addressing
              Architecture", <a href="./rfc4291">RFC 4291</a>, February 2006.

   [<a id="ref-RFC4862">RFC4862</a>]  Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
              Address Autoconfiguration", <a href="./rfc4862">RFC 4862</a>, September 2007.



<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


   [<a id="ref-RFC5453">RFC5453</a>]  Krishnan, S., "Reserved IPv6 Interface Identifiers", <a href="./rfc5453">RFC</a>
              <a href="./rfc5453">5453</a>, February 2009.

   [<a id="ref-RFC7042">RFC7042</a>]  Eastlake, D. and J. Abley, "IANA Considerations and IETF
              Protocol and Documentation Usage for IEEE 802 Parameters",
              <a href="https://www.rfc-editor.org/bcp/bcp141">BCP 141</a>, <a href="./rfc7042">RFC 7042</a>, October 2013.

<span class="h3"><a class="selflink" id="section-9.2" href="#section-9.2">9.2</a>.  Informative References</span>

   [<a id="ref-IEEE802">IEEE802</a>]  "IEEE Standard for Local and Metropolitan Area Networks:
              Overview and Architecture", IEEE Std 802-2001 (R2007),
              2007.

   [<a id="ref-IID-SLAAC">IID-SLAAC</a>]
              Gont, F., "A method for Generating Stable Privacy-Enhanced
              Addresses with IPv6 Stateless Address Autoconfiguration
              (SLAAC)", Work in Progress, March 2012.

   [<a id="ref-RFC2526">RFC2526</a>]  Johnson, D. and S. Deering, "Reserved IPv6 Subnet Anycast
              Addresses", <a href="./rfc2526">RFC 2526</a>, March 1999.

   [<a id="ref-RFC3306">RFC3306</a>]  Haberman, B. and D. Thaler, "Unicast-Prefix-based IPv6
              Multicast Addresses", <a href="./rfc3306">RFC 3306</a>, August 2002.

   [<a id="ref-RFC3307">RFC3307</a>]  Haberman, B., "Allocation Guidelines for IPv6 Multicast
              Addresses", <a href="./rfc3307">RFC 3307</a>, August 2002.

   [<a id="ref-RFC3972">RFC3972</a>]  Aura, T., "Cryptographically Generated Addresses (CGA)",
              <a href="./rfc3972">RFC 3972</a>, March 2005.

   [<a id="ref-RFC4941">RFC4941</a>]  Narten, T., Draves, R., and S. Krishnan, "Privacy
              Extensions for Stateless Address Autoconfiguration in
              IPv6", <a href="./rfc4941">RFC 4941</a>, September 2007.

   [<a id="ref-RFC4982">RFC4982</a>]  Bagnulo, M. and J. Arkko, "Support for Multiple Hash
              Algorithms in Cryptographically Generated Addresses
              (CGAs)", <a href="./rfc4982">RFC 4982</a>, July 2007.

   [<a id="ref-RFC5214">RFC5214</a>]  Templin, F., Gleeson, T., and D. Thaler, "Intra-Site
              Automatic Tunnel Addressing Protocol (ISATAP)", <a href="./rfc5214">RFC 5214</a>,
              March 2008.

   [<a id="ref-RFC5226">RFC5226</a>]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", <a href="https://www.rfc-editor.org/bcp/bcp26">BCP 26</a>, <a href="./rfc5226">RFC 5226</a>,
              May 2008.

   [<a id="ref-RFC5535">RFC5535</a>]  Bagnulo, M., "Hash-Based Addresses (HBA)", <a href="./rfc5535">RFC 5535</a>, June
              2009.



<span class="grey">Carpenter &amp; Jiang            Standards Track                    [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc7136">RFC 7136</a>                  IPv6 IID Significance            February 2014</span>


   [<a id="ref-RFC6052">RFC6052</a>]  Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X.
              Li, "IPv6 Addressing of IPv4/IPv6 Translators", <a href="./rfc6052">RFC 6052</a>,
              October 2010.

   [<a id="ref-RFC6164">RFC6164</a>]  Kohno, M., Nitzan, B., Bush, R., Matsuzaki, Y., Colitti,
              L., and T. Narten, "Using 127-Bit IPv6 Prefixes on Inter-
              Router Links", <a href="./rfc6164">RFC 6164</a>, April 2011.

   [<a id="ref-RFC6741">RFC6741</a>]  Atkinson,, RJ., "Identifier-Locator Network Protocol
              (ILNP) Engineering Considerations", <a href="./rfc6741">RFC 6741</a>, November
              2012.

   [<a id="ref-RFC6775">RFC6775</a>]  Shelby, Z., Chakrabarti, S., Nordmark, E., and C. Bormann,
              "Neighbor Discovery Optimization for IPv6 over Low-Power
              Wireless Personal Area Networks (6LoWPANs)", <a href="./rfc6775">RFC 6775</a>,
              November 2012.

   [<a id="ref-RFC6957">RFC6957</a>]  Costa, F., Combes, J-M., Pougnard, X., and H. Li,
              "Duplicate Address Detection Proxy", <a href="./rfc6957">RFC 6957</a>, June 2013.

   [<a id="ref-SOFTWR-4RD">SOFTWR-4RD</a>]
              Despres, R., Jiang, S., Penno, R., Lee, Y., Chen, G., and
              M. Chen, "IPv4 Residual Deployment via IPv6 - a Stateless
              Solution (4rd)", Work in Progress, October 2013.

Authors' Addresses

   Brian Carpenter
   Department of Computer Science
   University of Auckland
   PB 92019
   Auckland  1142
   New Zealand

   EMail: brian.e.carpenter@gmail.com


   Sheng Jiang
   Huawei Technologies Co., Ltd
   Q14, Huawei Campus
   No.156 Beiqing Road
   Hai-Dian District, Beijing  100095
   P.R. China

   EMail: jiangsheng@huawei.com






Carpenter &amp; Jiang            Standards Track                   [Page 10]
</pre>