One document matched: draft-chown-addr-select-considerations-02.txt
Differences from draft-chown-addr-select-considerations-01.txt
IPv6 Operations T. Chown, Ed.
Internet-Draft University of Southampton
Intended status: Informational March 9, 2009
Expires: September 10, 2009
Considerations for IPv6 Address Selection Policy Changes
draft-chown-addr-select-considerations-02
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. This document may contain material
from IETF Documents or IETF Contributions published or made publicly
available before November 10, 2008. The person(s) controlling the
copyright in some of this material may not have granted the IETF
Trust the right to allow modifications of such material outside the
IETF Standards Process. Without obtaining an adequate license from
the person(s) controlling the copyright in such materials, this
document may not be modified outside the IETF Standards Process, and
derivative works of it may not be created outside the IETF Standards
Process, except to format it for publication as an RFC or to
translate it into languages other than English.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on September 10, 2009.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Chown Expires September 10, 2009 [Page 1]
Internet-Draft Address Selection Considerations March 2009
Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
Abstract
RFC 3484 (IPv6 Default Address Selection) [RFC3484] defines
mechanisms for nodes to perform source and destination address
selection choices when faced with multiple addresses to choose
between when initiating a communication. While RFC3484 recognised
the need for implementations to be able to change the policy table, a
requirement has now also emerged for administrators to be able to
dynamically change the policy tables from a central control point,
and for nomadic hosts to be able to obtain the policy for the network
that they are currently attached to without manual user intervention.
This text discusses considerations for such policy changes, including
examples of cases where a change of policy is required, and the
likely frequency of such policy changes. This text also includes
some discussion on the need to also update RFC3484, where default
policies are currently defined.
Chown Expires September 10, 2009 [Page 2]
Internet-Draft Address Selection Considerations March 2009
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Issues to Consider . . . . . . . . . . . . . . . . . . . . . . 4
3. Other Related Work . . . . . . . . . . . . . . . . . . . . . . 5
4. Drivers for Policy Changes . . . . . . . . . . . . . . . . . . 5
4.1. Internal vs External Triggers . . . . . . . . . . . . . . 6
4.2. Administratively Triggered Changes . . . . . . . . . . . . 7
4.3. Start-up vs Running Changes . . . . . . . . . . . . . . . 7
4.4. Nomadic Nodes . . . . . . . . . . . . . . . . . . . . . . 8
4.5. Multiple Interface Nodes . . . . . . . . . . . . . . . . . 8
5. How Dynamic? . . . . . . . . . . . . . . . . . . . . . . . . . 9
6. Considerations when Obtaining Policy . . . . . . . . . . . . . 9
6.1. Changes in Available Address(es) . . . . . . . . . . . . . 10
6.2. Timeliness . . . . . . . . . . . . . . . . . . . . . . . . 10
6.3. Manual Configuration? . . . . . . . . . . . . . . . . . . 10
6.4. Policy Conflicts . . . . . . . . . . . . . . . . . . . . . 10
7. Solution Space . . . . . . . . . . . . . . . . . . . . . . . . 11
7.1. Is default policy used? . . . . . . . . . . . . . . . . . 11
7.2. Pull model . . . . . . . . . . . . . . . . . . . . . . . . 11
7.3. Push model . . . . . . . . . . . . . . . . . . . . . . . . 12
7.4. Routing Hints . . . . . . . . . . . . . . . . . . . . . . 12
7.5. Conflicts/Merging Policies . . . . . . . . . . . . . . . . 13
8. On RFC3484 Default Policies . . . . . . . . . . . . . . . . . 13
9. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 14
10. Security Considerations . . . . . . . . . . . . . . . . . . . 15
11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15
12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15
13. Informative References . . . . . . . . . . . . . . . . . . . . 15
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 16
Chown Expires September 10, 2009 [Page 3]
Internet-Draft Address Selection Considerations March 2009
1. Introduction
There have been various operational issues observed with Default
Address Selection for IPv6 (RFC3484) [RFC3484], as described in
RFC5220 [RFC5220]. As as a result, there has been some demand for
hosts to be able to have their policy tables, and potentially the
rules described in RFC3484, modified dynamically. Such changes may
apply to 'static' hosts in a network where policies or topologies
change, or nomadic hosts within a network for which policies may vary
depending on their location within the network.
2. Issues to Consider
There are a number of aspects to consider in the context of such
address selection policy updates.
First is the frequency for which such updates are likely to be
required; this will be determined largely from identifying the
scenarios in which policy changes will be required. This may include
overriding default system policies on startup, as well as changes
while a system is running. We discuss this topic in Section 4.
Second, by understanding how dynamic the policy update mechanism
needs to be we should be better placed to determine what types of
update approaches best meet those needs. There may be other
considerations of course, e.g. whether the systems are in managed or
unmanaged environments, and whether the solution should be proactive
or automated, as discussed in [I-D.ietf-6man-addr-select-sol].
Section 5 covers these issues.
Third, if we assume some policy update mechanism is defined we should
consider how hosts and systems may become aware that a policy change
has happened, and how policy can be disseminated in a timely fashion.
Thus we need to understand what kind of technical/concrete event(s)
can be used for triggering the policy table update mechanism, e.g.
address re-obtainment, address lifetime expiration, or perhaps policy
lifetime expiration. We also need to consider what other factors may
come into play, e.g. potential policy conflicts. This is discussed
in Section 6.
After analysing these issues, we can make some initial comments
regarding the potential solution spaces, and what models may be well
suited, e.g. push vs pull models, and what other methods might assist
us, e.g. hints from local routing tables. This is covered in Section
7.
Finally, we should assess whether these update solutions require or
Chown Expires September 10, 2009 [Page 4]
Internet-Draft Address Selection Considerations March 2009
need 3484 to be updated. In some instances, we might envision
solutions that simply use RFC3484 as guidelines and provide
sufficient controls to address the current limitations in the RFC.
However, as noted in RFC5220 [RFC5220], not all the operational
issues observed to date can be remedied by updating RFC3484 alone.
There is already a good analysis of issues with RFC3484 and how the
text could be revised [I-D.arifumi-6man-rfc3484-revise]).
3. Other Related Work
We note that there is some existing work in defining Requirements for
Address Selection Mechanisms [RFC5221], and some initial work has
been done in the solution space (for DHCP)
[I-D.fujisaki-dhc-addr-select-opt], but these are not discussed here.
While RFC5221 does assume that a dynamic policy update mechanism of
some form is available, this draft is currently aimed at
understanding the scenarios and triggers for policy changes, to
better inform future solution discussions.
4. Drivers for Policy Changes
If we wish to determine how frequent address selection policy changes
are likely to be, we need to understand why such policies might need
to be changed, for particular sites or networks.
One reference text for potential drivers for policy change is
RFC5220, in which operational issues with the existing policies
described in RFC3484 are listed. Each subsection of this document
gives a reason why the existing rules or policy tables in RFC3484 may
not be sufficient in certain cases. There have been some significant
changes to IPv6 since RFC3484 was drafted which have impacted the
RFC, e.g. the introduction of Unique Local Addresses (ULAs), and
concerns about longest prefix matching affecting (DNS) round robin
load balancing.
In summary, the issues raised in RFC5220 were:
o Multiple Routers on a Single Interface
o Ingress Filtering
o Problem Half-Closed Network Problem (*)
o Combined Use of Global and ULA (*)
Chown Expires September 10, 2009 [Page 5]
Internet-Draft Address Selection Considerations March 2009
o Site Renumbering (*)
o Multicast Source Address Selection (*)
o Temporary Address Selection
o IPv4 or IPv6 Prioritization (*)
o ULA and IPv4 Dual-Stack Environment (*)
o ULA or Global Prioritization (*)
The authors of RFC5220 noted which of these issues can be solved by
changes to the RFC3484 policy table, marked (*) above, and which
cannot. It is interesting to note that issues largely related to
internal networking and (administrative) policy decisions can be
handled this way.
4.1. Internal vs External Triggers
When considering drivers or triggers that may lead to a requirement
for the policy to change, we can divide the problem space into those
external to a site or network and those internal to it. In the case
of the first two examples above, a dynamic policy table update may be
required by externally driven routing changes, assuming the site uses
a dynamic routing protocol intra-site and the routing protocol is
configured to reflect changes of extra-site routing topology.
If a site is multihomed using BGP and advertising a single prefix
upstream, then no policy table manipulation is required for global
address preferences. However where a site is multihomed by receiving
a prefix from each upstream provider, each host will have multiple
addresses and many need policy table manipulation. In such a case,
the policy table of hosts may thus need to be updated according to
the routing policy.
It should be noted that we have other mechanisms for dynamic routing
topology change, for example deprecating one of the advertised
prefixes, perhaps when one of the upstream links has a problems.
Other examples of external factors include a new transition mechanism
being defined (e.g. as with the emergence of Teredo using 2001::/32
as assigned by IANA) and its inclusion being required in the policy
table, a new address block being defined, or a site renumbering event
that could be triggered by an upstream provider's actions.
Chown Expires September 10, 2009 [Page 6]
Internet-Draft Address Selection Considerations March 2009
4.2. Administratively Triggered Changes
The other examples above are, in the general case, where the site
administrator chooses to change a local policy and in doing so
triggers the need for policy table updates. Some of these changes
one might assume to be set once, and to change rarely, for example:
o Setting priority use of IPv6 over IPv4 (or vice versa).
o Setting priority use of ULAs over globals (or vice versa).
o Setting priority use of privacy addresses over DNS-published
globals (or vice versa).
o An internal network renumbering occurs, perhaps due to a site
expanding.
o The nature of the external connectivity through multiple ISPs
requires specific additional information (policy) to be delivered
to certain hosts (as discussed in 2.1.3 in RFC5220).
o Disabling longest-prefix match functions to facilitate round-robin
load balancing.
However it may be the case that different parts of a site have
different policies, or policies are changed in a rolling fashion
across a site over time as IPv6 or ULAs are introduced (for example).
This may happen where the administrator prefers a gradual
introduction of new policy in a phased operation across a site,
rather than changing policy across the whole site in one operation.
Other administrative changes may occur more frequently, e.g.:
o Routing tables and forwarding tables change dynamically.
o A different provider (link) is preferred for a given destination.
It's possible that provider links may vary on a daily basis, or by
time of day. The frequency of such policy changes will depend on the
frequency that the administrator wishes to change the traffic
engineering policies.
4.3. Start-up vs Running Changes
When a host starts up it may be configured with the default RFC3484
policies. At this stage a number of addresses may be configured on a
number of interfaces on the host. At this time it may be desirable
for the host to be able to receive the site-specific policy updates
Chown Expires September 10, 2009 [Page 7]
Internet-Draft Address Selection Considerations March 2009
as a start-up override from the RFC3484 defaults.
Other policy changes may later be required while the host is running.
Ideally the same protocol should be used for the start-up and running
state updates.
4.4. Nomadic Nodes
A host may be nomadic within a site and as a result it may see the
preferred policy change depending on the host's topological location
within that site. Such a host should be capable of receiving policy
updates in a timely fashion as it migrates within the network.
While this may be one case of 'running changes' described above, the
policy changes are required due to the host's new point of
attachment, not changes of policy to the current point of attachment.
4.5. Multiple Interface Nodes
In considering scenarios where hosts may be multi-addressed and
require policy to assist in address selection, the issue of hosts
with multiple interfaces arose.
A host may have a variety of reasons to have multiple interfaces. It
may for example have WiFi and 3G interfaces, and be capable of
sending or receiving data over either interface. In some cases these
interfaces may fall within the same administrative domain (ISP) and
in some cases they may not. Another example would be the case of a
host with a VPN connection established, where address selection may
be affected by the choice of whether the VPN connection is used or
not.
This is clearly an important problem today, but we note that RFC3484
is currently defined as a per-node, not per-interface, mechanism.
While the multiple interface problem is interesting, we feel it is
out of scope of this draft. This draft is only focused on handling
multiple policies into one interface and conveying them into the
hosts' RFC3484 policy table.
We note that there are some new, initial drafts published recently on
the multiple interface problem [I-D.blanchet-mif-problem-statement],
and on a number of possible DHCPv6 extensions to inform hosts about
routing information to assist the selection process
[I-D.dec-dhcpv6-route-option], [I-D.sun-mif-address-policy-dhcp6],
[I-D.sarikaya-mif-dhcpv6solution]. Another new draft proposes a
DHCPv6 option to convey policy directly to a host
[I-D.sun-mif-route-config-dhcp6]. At this stage we can simply note
that the latter mechanisms (DHCPv6 extensions) may be of interest
Chown Expires September 10, 2009 [Page 8]
Internet-Draft Address Selection Considerations March 2009
when considering our solution space.
5. How Dynamic?
The discussion above suggests that many of the potential triggers for
policy table changes are 'one-off' in nature, i.e. a site makes a
one-time policy change. It is thus unlikely that such administrative
changes will be frequent.
There are some cases where updates may be required to be more
frequent. In the example of a site which is implementing the gradual
introduction of new policy across its network, while the frequency of
changes may be relatively high, there is still probably only one or a
small number of changes per host.
There may be a higher rate of policy changes within a site if there
are nomadic hosts within the site, and these are roaming frequently
to parts of the network where differing policies are in effect. In
such cases it may be useful for a host to know whether or not the
default RFC3484 (or soon to be 3484bis) policies are in effect or
not, and for there to be a 'cheap' way for the host to discover this.
Perhaps the biggest cause of policy change lies where the preferred
links or paths for certain destinations change frequently over time
as traffic engineering requirements change. In some networks this
may be a daily change, or change between states at different times of
day. It is not clear how common these cases are, and thus further
input is welcomed here.
In terms of the impact of frequency of policy changes on solutions,
we first need to ensure there is some consensus on the drivers for
policy change and thus the frequency of changes. At this stage we
note that the analysis is simplified if we assume that only
administrative changes are considered, and that it would be highly
preferable if the start-up and running state solutions used the same
protocol.
6. Considerations when Obtaining Policy
When a policy change is made, or a host migrates to a part of the
network with different policies, that change of policy needs to be
conveyed to the host. It needs to be made available and applied
without restarting every affected host.
Chown Expires September 10, 2009 [Page 9]
Internet-Draft Address Selection Considerations March 2009
6.1. Changes in Available Address(es)
One might assume at first that when a host observes a change in its
addresses, it should re-obtain the selection policy, but this may not
always be the case. It should be noted that not all policy changes
are tied to a host changing one or more addresses, though it may be
acceptable to query regardless for new policy (if a pull model is
used) when address information changes.
As described above, it may be sufficient for a host to know when a
policy is changed, or that perhaps the default policy is - or is not
- in effect in its current locale.
6.2. Timeliness
In many, but not all, cases a policy change will need to be
synchronised across a network. Thus there is a general issue of
timely and synchronised dissemination of new policy. If the policy
is distributed via the same mechanism that informs a host of a change
of address(es), the application of the policy should be synchronised
sufficiently with the address change. However, not all hosts may
receive the update information at the same time, e.g. where new
address assignments may be dependent on DHCP lease timers.
Where hosts use DHCPv6 for address information, in the absence of
some form of Reconfigure message, a host may see a delay in policy
changes being notified. One possible tool to help here is the DHCPv6
Lifetime Option (RFC4242) [RFC4242], which was originally introduced
to assist with network renumbering events.
6.3. Manual Configuration?
There are scenarios where a host may wish to ignore conveyed policy.
For example, the manager of a mobile node may not want to have its
preferences changed by a visited network. In such a case one might
argue that the mobile node should use MIPv6 with whatever its home
network policies are.
The implication again is that we need a flag of some kind to inform a
host whether network it is in uses the default RFC3484 policy, which
would then allow each end system to decide if it should get an
(overriding) local policy or not.
6.4. Policy Conflicts
As the above suggests, it is possible that conflicting policies may
be available to a host, regardless of whether a push or pull model is
used to distribute policy. For example, where a host is on a subnet
Chown Expires September 10, 2009 [Page 10]
Internet-Draft Address Selection Considerations March 2009
with two or more routers under different administrative control, the
policies may differ. The question then is how such conflicts can be
resolved. If there are mergers of policies, the rules for such
mergers need careful consideration. Otherwise the host may have to
simply choose one policy by some method. Ideally we would limit the
scope of this problem to scenarios where hosts are operating under a
single administrative entity, which should ensure policies are
consistent.
7. Solution Space
In this section we make some initial observations on the possible
solution space.
7.1. Is default policy used?
There should be some mechanism to indicate to a host that the local
network does not use the default RFC3484 policy, and that a revised
policy table is available (and should be used). However it should
also be possible for a host to detect that policy has changed
(whether 'around' the host, or due to the host being nomadic).
It is assumed by 'default' policy here we refer to the revised/
updated RFC3484 specification, when that is produced. The question
as to how a non-default policy is indicated may be steered by which
we believe to be the common case in the longer term - hosts that need
local policy changes, or hosts that do not. If an RA bit is used to
indicate whether a local policy is available, we avoid hosts
requesting potentially non-existent policy tables (or copies of
default tables they already have) forever.
7.2. Pull model
One approach would be to define appropriate extensions to DHCPv6 to
allow policy table updates to be applied to a host. There are some
recent initial proposals in this area, in particular
[I-D.sun-mif-route-config-dhcp6]. There are also proposals to convey
routing information via DHCPv6 to a host, to facilitate better
selection decisions, e.g. [I-D.dec-dhcpv6-route-option],
[I-D.sun-mif-address-policy-dhcp6],
[I-D.sarikaya-mif-dhcpv6solution]. Whether these may be applicable
in the context of this discussion remains to be determined.
The DHCP model allows individual nodes to potentially have differing
policy, even when on the same subnet.
Chown Expires September 10, 2009 [Page 11]
Internet-Draft Address Selection Considerations March 2009
7.3. Push model
A push model could also be possible. There may be some options to
piggyback clues to the host into a Router Advertisement message,
though initial consensus seems to be that this is a less attractive
approach. However, we may find that RAs may be a good place to
indicate whether a default policy is in place or not, to avoid hosts
requesting non-existent updates via DHCPv6.
7.4. Routing Hints
If a host has routing hints available, it may be able to make more
informed selections. It may be that the most appropriate way to pass
routing state is with a routing protocol from an active router. For
example, a RIP listener could help to resolve the routing policy part
of this problem space, but that would take us back to the issue of
address selection in the cases where multiple default routes were
advertised.
At this stage we can simply note that address selection is simplified
when routing state is provided to the end system. How routing state
is passed is for future discussion; it may for example be via the
DHCPv6 extensions described above.
It is noted in [I-D.carpenter-renum-needs-work] that:
"In an environment where a site has more than one upstream link to
the outside world, the site might have more than one valid routing
prefix. In such cases, typically all valid routing prefixes within a
site will have the same prefix length. Also in such cases, it might
be desirable for hosts that obtain their addresses using DHCPv6 to
learn about the availability of upstream links dynamically, by
deducing from periodic IPv6 RA messages which routing prefixes are
currently valid. This application seems possible within the IPv6
Neighbour Discovery architecture, but does not appear to be clearly
specified anywhere."
The same thought seems relevant to address selection. There's no
point selecting a source address whose prefix is not being advertised
in RAs.
While routing and prefix hints may help a host make selection
decisions, we should consider to what extent we wish to 'burden' a
host with holding such information.
Chown Expires September 10, 2009 [Page 12]
Internet-Draft Address Selection Considerations March 2009
7.5. Conflicts/Merging Policies
It is not yet clear whether entire policy tables will be made
available, or simply differences to the 'default', and thus whether
policies may need to be merged, or overridden. Some policy conflicts
will be unresolvable, e.g. one prefers IPv4 over IPv6, the other
vice-versa. It may be simpler, though arguably less efficient, for
whole policy tables to be distributed, to avoid the merger problem.
One option may be to split the policy table into destination address
selection and source address selection tables, with the policy
distribution only updating the source address selection. Whether
this might make merging policies simpler or in fact more complex
would require further study.
It may also be possible to indicate some priority value for a policy,
e.g. the priority of the interface it is received on. Or if there
are multiple policies in conflict, a host could simply choose to fall
back to use the default RFC3484 policy.
A host also needs to know how to decide when to accept a policy. We
could simplify the discussion by assuming a host is located in and
only nomadic within a single site with one administrative controlling
entity.
8. On RFC3484 Default Policies
RFC3484 includes text about mechanisms for changing policy, having
'policy hooks' and having a configurable policy table. The
implication is that defaults can be changed, and the text gives
examples of this in Section 10. However, issues with RFC3484 are
broader that just policy table updates - it remains the case that
some operational issues with RFC3484 are not just related to the
table, but on rules themselves, e.g. longest prefix match (affecting
DNS round robin as described in [RFC5220]).
While discussing default policy, we noted that the word 'default' has
to be defined here, i.e. what is the scope of this 'default'. It
seems it is 'system wide' but first it just moves the issue to the
'system' definition and second larger or smaller granularities make
sense (for instance 'link wide' and 'user wide'). Whether and how
this can be considered in an open question. Currently we assume
RFC3484 and changes to it will remain node-specific.
It certainly seems the case that the issues raised in RFC5220, and
discussed in [I-D.arifumi-6man-rfc3484-revise] mean that an update of
RFC3484 is required, if only because some of the issues (as
Chown Expires September 10, 2009 [Page 13]
Internet-Draft Address Selection Considerations March 2009
highlighted earlier) cannot be addressed by updating the policy table
alone.
We do not note any specific comments here on how RFC3484 should be
updated. Other drafts have made suggestions. There are some
discussions on ideas however, e.g. on the semantics of labels, and in
adding ULAs explicitly to the default policy table.
9. Conclusions
We believe the scope of this text should apply to site and enterprise
networks, where an administrator may need to change policies over
time, but that it includes nomadic nodes within the site, which may
migrate to different parts of the site where different policies are
required. This is the focus of our analysis. We note there is
potentially complementary work within the multiple interface (mif)
community on handling address selection issues for mobile nodes with
multiple interfaces, and that outputs from that community may be
applicable to our problem space.
There is clearly a need to revise RFC3484, to create a new default
policy for address selection. This should be expedited. We also
note that RFC3484 is currently defined on a per-node, not per-
interface basis, which we believe should remain the status quo for
the scope of this work. It is not clear how or if the mif work will
affect this assumption.
The scope of this text includes issues affecting the design of a
protocol to allow a host's RFC3484 policy table to be updated. It
has been suggested that hosts may receive conflicting policy table
updates in some scenarios. However, heuristics for policy table
mergers may prove problematic to devise, so the problem space for
policy distribution and updates could be simplified if we can assume
hosts are operating in a network under one administrative entity. It
is simplified further if we only consider policy changes triggered
for administrative reasons.
In terms of push or pull-based methods for policy distribution, early
analysis suggests that a push-based hint to hosts as to whether they
are in a network where the default policy applies or not would be
useful. This might be indicated via an RA flag, perhaps. In terms
of obtaining policy, a pull-based solution, such as DHCPv6, may be
preferable if inidividual hosts on a subnet require differing
policies. Also, the same protocol for policy updates should probably
be used whether a host is starting up, or if updates are required
while the node is running.
Chown Expires September 10, 2009 [Page 14]
Internet-Draft Address Selection Considerations March 2009
Further comments on this draft are welcomed.
10. Security Considerations
There are no extra Security consideration for this document.
11. IANA Considerations
There are no extra IANA consideration for this document.
12. Acknowledgements
The design team working on this draft is: Marcelo Bagnulo Braun, Marc
Blanchet, Tim Chown, Francis Dupont, Tim Enos, TJ Evans, Brian
Haberman, Tony Hain, Ruri Hiromi, Suresh Krishnan, Arifumi Matsumoto,
Janos Mohacsi, Sebastien Roy, Teemu Savolainen, Fujisaki Tomohiro,
and John Zhao.
We also acknowledge comments received from IETF WG mail lists,
including those by Brian Carpenter and Dave Thaler.
13. Informative References
[RFC3484] Draves, R., "Default Address Selection for Internet
Protocol version 6 (IPv6)", RFC 3484, February 2003.
[RFC4242] Venaas, S., Chown, T., and B. Volz, "Information Refresh
Time Option for Dynamic Host Configuration Protocol for
IPv6 (DHCPv6)", RFC 4242, November 2005.
[RFC5220] Matsumoto, A., Fujisaki, T., Hiromi, R., and K. Kanayama,
"Problem Statement for Default Address Selection in Multi-
Prefix Environments: Operational Issues of RFC 3484
Default Rules", RFC 5220, July 2008.
[RFC5221] Matsumoto, A., Fujisaki, T., Hiromi, R., and K. Kanayama,
"Requirements for Address Selection Mechanisms", RFC 5221,
July 2008.
[I-D.ietf-6man-addr-select-sol]
Matsumoto, A., Fujisaki, T., Hiromi, R., and K. Kanayama,
"Solution approaches for address-selection problems",
draft-ietf-6man-addr-select-sol-01 (work in progress),
June 2008.
Chown Expires September 10, 2009 [Page 15]
Internet-Draft Address Selection Considerations March 2009
[I-D.arifumi-6man-rfc3484-revise]
Matsumoto, A., Fujisaki, T., Hiromi, R., and K. Kanayama,
"Things To Be Considered for RFC 3484 Revision",
draft-arifumi-6man-rfc3484-revise-00 (work in progress),
June 2008.
[I-D.fujisaki-dhc-addr-select-opt]
Fujisaki, T., Matsumoto, A., Niinobe, S., Hiromi, R., and
K. Kanayama, "Distributing Address Selection Policy using
DHCPv6", draft-fujisaki-dhc-addr-select-opt-06 (work in
progress), June 2008.
[I-D.blanchet-mif-problem-statement]
Blanchet, M., "Multiple Interfaces Problem Statement",
draft-blanchet-mif-problem-statement-00 (work in
progress), December 2008.
[I-D.dec-dhcpv6-route-option]
Dec, W. and R. Johnson, "DHCPv6 Route Option",
draft-dec-dhcpv6-route-option-01 (work in progress),
March 2009.
[I-D.sun-mif-address-policy-dhcp6]
Sun, T., Deng, H., and X. Duan, "Address Selection Policy
Configuration by DHCPv6 Option",
draft-sun-mif-address-policy-dhcp6-00 (work in progress),
March 2009.
[I-D.sarikaya-mif-dhcpv6solution]
Sarikaya, B., Xia, F., and P. Seite, "DHCPv6 Extension for
Configuring Hosts with multiple Interfaces",
draft-sarikaya-mif-dhcpv6solution-01 (work in progress),
March 2009.
[I-D.sun-mif-route-config-dhcp6]
Sun, T. and H. Deng, "Route Configuration by DHCPv6 Option
for Hosts with Multiple Interfaces",
draft-sun-mif-route-config-dhcp6-00 (work in progress),
March 2009.
[I-D.carpenter-renum-needs-work]
Carpenter, B., Atkinson, R., and H. Flinck, "Renumbering
still needs work", draft-carpenter-renum-needs-work-02
(work in progress), February 2009.
Chown Expires September 10, 2009 [Page 16]
Internet-Draft Address Selection Considerations March 2009
Author's Address
Tim Chown (editor)
University of Southampton
Southampton, Hampshire SO17 1BJ
United Kingdom
Email: tjc@ecs.soton.ac.uk
Chown Expires September 10, 2009 [Page 17]
| PAFTECH AB 2003-2026 | 2026-04-24 05:29:13 |