<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-vanmook-intarea-ipv6-resolved-gateway-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="IPv6-Resolved IPv4 GW">IPv6-Resolved IPv4 Gateway</title>
    <seriesInfo name="Internet-Draft" value="draft-vanmook-intarea-ipv6-resolved-gateway-00"/>
    <author initials="R. S." surname="van Mook" fullname="Remco van Mook">
      <organization>Asteroid International B.V.</organization>
      <address>
        <email>remco@asteroidhq.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="30"/>
    <workgroup>intarea</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 41?>

<t>This document requests the allocation of the IPv4 special-purpose
address <tt>192.0.0.11/32</tt> to enable IPv4 communication over IPv6-only
networks without subnets, ARP, tunneling, or translation. Hosts
configured with this address as their IPv4 default gateway resolve
the next-hop link-layer address from the IPv6 neighbor cache instead
of via ARP. IPv4 packets are carried natively, end-to-end.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-vanmook-intarea-ipv6-resolved-gateway/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/remcovanmook/draft-ipv6-resolved-gateway"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Networks migrating to IPv6-only infrastructure still need to carry
IPv4 traffic. Traditional mechanisms such as dual-stack, tunneling,
and translation all reintroduce IPv4 at the infrastructure level.
This document defines a special-purpose IPv4 address, <tt>192.0.0.11</tt>,
that signals to a host stack that link-layer resolution for the
IPv4 default gateway is derived from the link-layer address entry
for the IPv6 default router in the neighbor cache <xref target="RFC4861"/>,
rather than via ARP. The IPv4 routing table entry is unchanged;
only the ARP resolution path is modified. This eliminates the
need for IPv4 subnets and ARP on the local segment, removing
the requirement for tunneling or translation at the first hop.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>IPv4 next-hop resolution on a local link depends on ARP, which
requires an IPv4 subnet to be configured on the link. In an
IPv6-only network, no such subnet exists. Existing solutions
-- dual-stack, tunneling, and translation-based approaches
such as NAT64 -- generally require changes beyond the local
segment. This document closes the first-hop resolution gap
for IPv4 hosts on IPv6-only segments without requiring changes
to host software, packet formats, or DHCPv4 clients.</t>
    </section>
    <section anchor="host-behavior-and-next-hop-resolution">
      <name>Host Behavior and Next-Hop Resolution</name>
      <t>When a host is configured to use <tt>192.0.0.11</tt> as its IPv4 default
gateway, the host's operating system <bcp14>MUST</bcp14> implement the following
logic:</t>
      <ol spacing="normal" type="1"><li>
          <t>The host <bcp14>MUST</bcp14> maintain a functional IPv6 Neighbor Discovery
implementation per <xref target="RFC4861"/> on the same interface,
including default router discovery and neighbor cache
maintenance. No additional action specific to this mechanism
is required at interface configuration time.</t>
        </li>
        <li>
          <t>When the next hop for an IPv4 packet is <tt>192.0.0.11</tt>, the host
<bcp14>MUST NOT</bcp14> perform ARP. Instead, it consults the IPv6 default
router list and neighbor cache for the link-layer address,
scoped to the interface on which <tt>192.0.0.11</tt> is configured
as the IPv4 default gateway.</t>
        </li>
        <li>
          <t>If the IPv6 default router link-layer address is in a usable
NUD state (REACHABLE, STALE, DELAY, or PROBE per <xref target="RFC4861"/>),
the IPv4 packet is sent in a link-layer frame addressed to
that destination.</t>
        </li>
        <li>
          <t>If no reachable IPv6 default router is known after the
interface has completed initial configuration (i.e., at
least one RA has been processed), the packet <bcp14>MAY</bcp14> be queued
or dropped per implementation policy. If a last-known
router address is available, a Neighbor Solicitation
<bcp14>SHOULD</bcp14> be sent to that address. For behavior prior to
first RA reception, see the startup paragraph below.</t>
        </li>
      </ol>
      <t>Host stacks <bcp14>MUST</bcp14> treat <tt>192.0.0.11</tt> as a reserved address
requiring IPv6-based next-hop resolution, regardless of other
address configuration on the interface. This behavior is
unconditional and not dependent on any additional signaling.
When a DHCPv4 lease configuring <tt>192.0.0.11</tt> expires and
is not renewed, the host <bcp14>SHOULD</bcp14> remove <tt>192.0.0.11</tt> as the
IPv4 default gateway and cease IPv6-based resolution on that
interface. For statically configured deployments, removal
is governed by local administrative policy.</t>
      <t>Cross-interface resolution <bcp14>MUST NOT</bcp14> be performed. On multi-homed
hosts, each interface independently resolves <tt>192.0.0.11</tt> against
its own IPv6 neighbor cache state.</t>
      <t>The following pseudocode defines the resolution logic:</t>
      <artwork><![CDATA[
on interface I (where 192.0.0.11 is the configured IPv4 gateway):

  if next-hop(pkt) == 192.0.0.11:

    routers = default_router_list(I)

    if routers is empty:
      if not first_ra_received(I):  /* startup: MUST queue */
        queue pkt
      else:                         /* mid-operation: MAY drop */
        queue or drop pkt
      send Router Solicitation on I  /* ff02::2; subject to
                                        RFC 4861 rate limiting */
      return

    selected = select from routers by:
      1. highest Default Router Preference (RFC 4191)
      2. NUD state == REACHABLE   /* if preference equal */
      3. implementation-defined   /* if reachability equal */

    lladdr = neighbor_cache(I, selected).lladdr

    if lladdr is valid and NUD state != INCOMPLETE:
      /* STALE, DELAY, and PROBE are usable; see RFC 4861 s7.3.3 */
      send pkt in link-layer frame with dst = lladdr
    else:
      queue or drop pkt           /* per implementation policy */
      send Neighbor Solicitation for selected router on I
]]></artwork>
      <t>Router selection uses Default Router Preference as defined in
<xref target="RFC4191"/>. When multiple routers have equal preference and
reachability, the tiebreaker is implementation-defined; use
of most-recently-heard RA is one reasonable approach.</t>
      <t>If the selected IPv6 default router becomes unreachable during
an active session, the host <bcp14>SHOULD</bcp14> re-evaluate the default
router list and select an alternative. Existing transport
sessions will be disrupted if the link-layer next-hop changes;
this is consistent with IPv6 router failure behavior and is not
specific to this mechanism. Packets queued for a router that
has become unreachable <bcp14>SHOULD</bcp14> be flushed and re-evaluated
against the updated router selection.</t>
      <t>Each time an interface transitions to an operational state
and begins RA solicitation, a host may receive DHCPv4
configuration before any RA has been processed. Until a
reachable IPv6 default router is known, IPv4 packets <bcp14>MUST</bcp14>
be queued rather than silently dropped, pending RA reception.
Implementations <bcp14>SHOULD</bcp14> bound this queue duration to avoid
indefinite resource consumption. On queue timeout, packets
<bcp14>SHOULD</bcp14> be dropped and an ICMPv4 Host Unreachable message
<bcp14>MAY</bcp14> be generated toward the sending application.</t>
    </section>
    <section anchor="router-behavior">
      <name>Router Behavior</name>
      <section anchor="end-to-end-packet-flow">
        <name>End-to-End Packet Flow</name>
        <t>In this model, end hosts are assigned IPv4 addresses with a /32
prefix length. No IPv4 prefix is configured on the link; a
sending host directs all IPv4 traffic to the first-hop router
using the link-layer address derived from the IPv6 neighbor cache.
A host cannot resolve another host's IPv4 address on the
local link without router assistance; direct host-to-host
IPv4 communication on the segment may occur via ICMPv4 redirect
(<xref target="RFC1122"/>, Section 3.2.2.2) from the gateway, but cannot be
initiated by the host alone.</t>
        <t>For return traffic to reach end hosts, operators <bcp14>MUST</bcp14> ensure
that host /32 routes with an IPv6 next-hop per <xref target="RFC8950"/>
are present in the routing infrastructure, allowing routers
to forward IPv4 traffic toward the correct first-hop without
requiring IPv4 addresses on any router interface. The mechanism
by which the routing infrastructure learns these host routes is
outside the scope of this document.</t>
        <t>The following diagram illustrates the end-to-end packet flow.
Router-to-router forwarding uses <xref target="RFC8950"/>; no IPv4 address
is configured on any router interface. IPv4 addresses used in
the diagram are from the documentation ranges defined in
<xref target="RFC5737"/> and are not globally routable.</t>
        <artwork><![CDATA[
Host A                      Router R1
IPv4: 198.51.100.1/32       (no IPv4 address configured)
IPv6: 2001:db8:1::1         IPv6 link-local: fe80::R1

  [1] IPv4 pkt (src: 198.51.100.1, dst: 203.0.113.5)
      L2 dst: MAC(R1) -- resolved from ND cache, no ARP
  ---------------------------------------------------->

Router R1                   Router R2
(no IPv4 address)           (no IPv4 address configured)
IPv6 link-local: fe80::R1   IPv6 link-local: fe80::R2

  [2] FIB lookup: 203.0.113.5/32 via fe80::R2 (RFC 8950)
      L2 dst: MAC(R2) -- resolved from ND cache, no ARP
  ---------------------------------------------------->

Router R2                   Host B
(no IPv4 address)           IPv4: 203.0.113.5/32
IPv6 link-local: fe80::R2   IPv6: 2001:db8:2::2

  [3] FIB lookup: 203.0.113.5/32 via fe80::HostB (ND)
      L2 dst: MAC(HostB) -- resolved from ND cache, no ARP
  ---------------------------------------------------->
  [4] IPv4 packet delivered to Host B
]]></artwork>
        <t>No ARP is exchanged at any point.</t>
      </section>
      <section anchor="router-ingress-behavior">
        <name>Router Ingress Behavior</name>
        <t>Routers <bcp14>MUST</bcp14> treat <tt>192.0.0.11</tt> as an interface-scoped
address -- valid only on the interface on which it is
configured, and only for locally-terminated traffic.
Specifically:</t>
        <ul spacing="normal">
          <li>
            <t>It <bcp14>MUST NOT</bcp14> be injected into any routing protocol.</t>
          </li>
          <li>
            <t>It <bcp14>MUST NOT</bcp14> trigger overlapping-subnet checks.</t>
          </li>
          <li>
            <t>It <bcp14>MUST NOT</bcp14> appear as source or destination in any
forwarded packet.</t>
          </li>
        </ul>
        <t>A router <bcp14>MAY</bcp14> respond to ICMPv4 echo requests addressed to
<tt>192.0.0.11</tt> and <bcp14>MAY</bcp14> generate ICMPv4 Time Exceeded messages using
<tt>192.0.0.11</tt> as the source address. All such messages are
interface-local.</t>
        <t>ICMPv4 error generation on IPv6-only transit routers is out of
scope; see <xref target="RFC7600"/>.</t>
      </section>
      <section anchor="backward-compatibility-router-arp-response">
        <name>Backward Compatibility: Router ARP Response</name>
        <t>The use of <tt>192.0.0.11</tt> as the DHCPv4 Router Option (Option 3)
value is fully conformant with <xref target="RFC2132"/>, which imposes no
requirement that the router address be reachable via ARP on
the same subnet.</t>
        <t>Unmodified hosts receiving <tt>192.0.0.11</tt> as their IPv4 default
gateway will issue an ARP request for it. A router <bcp14>SHOULD</bcp14> respond
to such ARP requests with its own MAC address. This is not proxy
ARP: no subnet exists, no remote host is being proxied.</t>
        <t>This enables a two-tier deployment model on the same L2 segment:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Unmodified hosts:</strong> router answers ARP; IPv4 forwarding works
with zero host-side changes.</t>
          </li>
          <li>
            <t><strong>Updated hosts:</strong> link-layer address resolved from IPv6 neighbor
cache; ARP eliminated entirely.</t>
          </li>
        </ul>
        <t>Both tiers interoperate, allowing incremental deployment.
The router requires no per-host state to support both
tiers simultaneously: updated hosts will not send ARP
requests for <tt>192.0.0.11</tt>, so the router's ARP response
behavior is triggered only by unmodified hosts.</t>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>This mechanism complements <xref target="RFC8925"/> (IPv6-Only Preferred
Option). RFC 8925 allows hosts to signal a preference for
IPv6-only operation, but operators must still provide IPv4
for hosts or applications that require it. This document
provides exactly that fallback: IPv4 connectivity on an
IPv6-only segment, without requiring a dual-stack
infrastructure or an IPv4 subnet on the local link. A host
that receives Option 108 and transitions to IPv6-only
operation retains functional IPv4 connectivity via
<tt>192.0.0.11</tt> without any additional configuration.</t>
      <t>Hosts without an IPv6 stack are outside the scope of this
document.</t>
      <t>On segments with multiple routers advertising equal Default
Router Preference -- common in datacenter ECMP fabrics -- hosts
may make inconsistent router selections based on RA timing.
Operators <bcp14>SHOULD</bcp14> configure explicit Default Router Preference
values per <xref target="RFC4191"/> to ensure deterministic behavior.</t>
      <t>Implementations in which IPv4 and IPv6 stacks are managed by
separate processes -- as is common on mobile operating systems --
will require inter-process communication to expose the IPv6
neighbor cache to the IPv4 forwarding path. This is an
implementation consideration and does not affect the on-wire
behavior defined in this document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>In the updated-host deployment model, ARP is eliminated from the
network entirely. In the unmodified-host model, ARP is constrained
to a single well-known address, reducing the ARP attack surface
relative to conventional dual-stack networks.</t>
      <t>The mechanism relies on the integrity of IPv6 Neighbor Discovery.
Rogue RA risks apply as in any IPv6 deployment and can be
mitigated with RA Guard <xref target="RFC6105"/>. Subnet scanning is
mitigated since hosts carry /32 addresses only.</t>
      <t>A host receiving <tt>192.0.0.11</tt> as its IPv4 default gateway
on a network that does not implement this mechanism will issue
an ARP request that receives no response, causing IPv4
connectivity to fail silently. Operators <bcp14>SHOULD</bcp14> ensure
<tt>192.0.0.11</tt> is only offered via DHCPv4 on segments where
the mechanism is deployed. DHCPv4 snooping and dynamic ARP
inspection, where used, <bcp14>MUST</bcp14> be configured to permit ARP
responses for <tt>192.0.0.11</tt> from the first-hop router.</t>
      <t>This mechanism does not interact with IPv4 link-local address
configuration per <xref target="RFC3927"/>. A host configured with
<tt>192.0.0.11</tt> as its gateway and a link-local IPv4 source
address will follow the same resolution logic defined in
Section 4 (Host Behavior and Next-Hop Resolution).</t>
    </section>
    <section anchor="implementation-requirements">
      <name>Implementation Requirements</name>
      <t>[PLACEHOLDER: This section will document conformance
requirements and reference known implementations prior
to IETF Last Call. An implementation is conformant if
it satisfies all <bcp14>MUST</bcp14> and <bcp14>MUST NOT</bcp14> requirements in
Sections 4 and 5. A reference implementation is
available at https://github.com/remcovanmook/v4-with-v6-nh.]</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests that IANA assign <tt>192.0.0.11/32</tt> in the
"IANA IPv4 Special-Purpose Address Registry" <xref target="RFC6890"/> as follows:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Field</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Address Block</td>
            <td align="left">192.0.0.11/32</td>
          </tr>
          <tr>
            <td align="left">Name</td>
            <td align="left">IPv4 Gateway via IPv6 Resolution</td>
          </tr>
          <tr>
            <td align="left">RFC</td>
            <td align="left">This document</td>
          </tr>
          <tr>
            <td align="left">Allocation Date</td>
            <td align="left">(date of publication)</td>
          </tr>
          <tr>
            <td align="left">Termination Date</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Source</td>
            <td align="left">True</td>
          </tr>
          <tr>
            <td align="left">Destination</td>
            <td align="left">True</td>
          </tr>
          <tr>
            <td align="left">Forwardable</td>
            <td align="left">False</td>
          </tr>
          <tr>
            <td align="left">Globally Reachable</td>
            <td align="left">False</td>
          </tr>
          <tr>
            <td align="left">Reserved-by-Protocol</td>
            <td align="left">False</td>
          </tr>
        </tbody>
      </table>
      <t>The Destination=True designation reflects that <tt>192.0.0.11</tt>
may appear as a destination in ICMPv4 messages received by
the router on a local interface (see Section 5.2). It does
not imply global reachability; Forwardable=False and
Globally Reachable=False together preclude any use of this
address beyond the local link.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4191">
          <front>
            <title>Default Router Preferences and More-Specific Routes</title>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>This document describes an optional extension to Router Advertisement messages for communicating default router preferences and more-specific routes from routers to hosts. This improves the ability of hosts to pick an appropriate router, especially when the host is multi-homed and the routers are on different links. The preference values and specific routes advertised to hosts require administrative configuration; they are not automatically derived from routing tables. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4191"/>
          <seriesInfo name="DOI" value="10.17487/RFC4191"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC6890">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="RFC8950">
          <front>
            <title>Advertising IPv4 Network Layer Reachability Information (NLRI) with an IPv6 Next Hop</title>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="S. Agrawal" initials="S." surname="Agrawal"/>
            <author fullname="K. Ananthamurthy" initials="K." surname="Ananthamurthy"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>Multiprotocol BGP (MP-BGP) specifies that the set of usable next-hop address families is determined by the Address Family Identifier (AFI) and the Subsequent Address Family Identifier (SAFI). The AFI/SAFI definitions for the IPv4 address family only have provisions for advertising a next-hop address that belongs to the IPv4 protocol when advertising IPv4 Network Layer Reachability Information (NLRI) or VPN-IPv4 NLRI.</t>
              <t>This document specifies the extensions necessary to allow the advertising of IPv4 NLRI or VPN-IPv4 NLRI with a next-hop address that belongs to the IPv6 protocol. This comprises an extension of the AFI/SAFI definitions to allow the address of the next hop for IPv4 NLRI or VPN-IPv4 NLRI to also belong to the IPv6 protocol, the encoding of the next hop to determine which of the protocols the address actually belongs to, and a BGP Capability allowing MP-BGP peers to dynamically discover whether they can exchange IPv4 NLRI and VPN-IPv4 NLRI with an IPv6 next hop. This document obsoletes RFC 5549.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8950"/>
          <seriesInfo name="DOI" value="10.17487/RFC8950"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC5737">
          <front>
            <title>IPv4 Address Blocks Reserved for Documentation</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>Three IPv4 unicast address blocks are reserved for use in examples in specifications and other documents. This document describes the use of these blocks. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5737"/>
          <seriesInfo name="DOI" value="10.17487/RFC5737"/>
        </reference>
        <reference anchor="RFC2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <author fullname="S. Alexander" initials="S." surname="Alexander"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2132"/>
          <seriesInfo name="DOI" value="10.17487/RFC2132"/>
        </reference>
        <reference anchor="RFC3927">
          <front>
            <title>Dynamic Configuration of IPv4 Link-Local Addresses</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="E. Guttman" initials="E." surname="Guttman"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>To participate in wide-area IP networking, a host needs to be configured with IP addresses for its interfaces, either manually by the user or automatically from a source on the network such as a Dynamic Host Configuration Protocol (DHCP) server. Unfortunately, such address configuration information may not always be available. It is therefore beneficial for a host to be able to depend on a useful subset of IP networking functions even when no address configuration is available. This document describes how a host may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link.</t>
              <t>IPv4 Link-Local addresses are not suitable for communication with devices not directly connected to the same physical (or logical) link, and are only used where stable, routable addresses are not available (such as on ad hoc or isolated networks). This document does not recommend that IPv4 Link-Local addresses and routable addresses be configured simultaneously on the same interface. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3927"/>
          <seriesInfo name="DOI" value="10.17487/RFC3927"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC7600">
          <front>
            <title>IPv4 Residual Deployment via IPv6 - A Stateless Solution (4rd)</title>
            <author fullname="R. Despres" initials="R." surname="Despres"/>
            <author fullname="S. Jiang" initials="S." role="editor" surname="Jiang"/>
            <author fullname="R. Penno" initials="R." surname="Penno"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="G. Chen" initials="G." surname="Chen"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This document specifies a stateless solution for service providers to progressively deploy IPv6-only network domains while still offering IPv4 service to customers. The solution's distinctive properties are that TCP/UDP IPv4 packets are valid TCP/UDP IPv6 packets during domain traversal and that IPv4 fragmentation rules are fully preserved end to end. Each customer can be assigned one public IPv4 address, several public IPv4 addresses, or a shared address with a restricted port set.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7600"/>
          <seriesInfo name="DOI" value="10.17487/RFC7600"/>
        </reference>
        <reference anchor="RFC8925">
          <front>
            <title>IPv6-Only Preferred Option for DHCPv4</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document specifies a DHCPv4 option to indicate that a host supports an IPv6-only mode and is willing to forgo obtaining an IPv4 address if the network provides IPv6 connectivity. It also updates RFC 2563 to specify DHCPv4 server behavior when the server receives a DHCPDISCOVER not containing the Auto-Configure option but containing the new option defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8925"/>
          <seriesInfo name="DOI" value="10.17487/RFC8925"/>
        </reference>
      </references>
    </references>
    <?line 390?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author thanks Tobias Fiebig, Warren Kumari, and Jen Linkova.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
