Revision as of 18:14, 12 May 2007 editTJJFV (talk | contribs)Extended confirmed users718 editsm →Jumbograms: link MTU← Previous edit | Latest revision as of 00:45, 14 December 2024 edit undoAnomie (talk | contribs)Edit filter managers, Autopatrolled, Administrators33,890 editsm Revert bot edit caused by vandalism of a ref-producing template.Tag: Rollback | ||
Line 1: | Line 1: | ||
{{short description|Version 6 of the Internet Protocol}} | |||
{{pp-semi-vandalism|small=yes}} | |||
{{Update|part=RFC 8200 and RFC 8201|date=July 2017}} | |||
{{IPstack}} <!-- Edit the stack image at: Template:IPstack --> | |||
{{Use dmy dates|date=September 2020}} | |||
'''Internet Protocol version 6''' ('''IPv6''') is a ] protocol for ]-switched ]s. It is designated as the successor of ], the current version of the ], for general use on the Internet. | |||
{{Infobox networking protocol | |||
|title=Internet Protocol version 6 | |||
|logo= | |||
|logo alt= | |||
|image=] | |||
|image alt=Diagram of an IPv6 header | |||
|caption=IPv6 header | |||
|is stack=yes | |||
|abbreviation = IPv6 | |||
|purpose=] protocol | |||
|developer=] | |||
|date={{Start date and age|df=yes|1995|12|}}<!--Fill in: Year (4 digits), month and day (2 digits)--> | |||
|based on=] | |||
|influenced= | |||
|osilayer=] | |||
|ports= | |||
|rfcs={{IETF RFC|2460|8200|plainlink=yes}} | |||
|hardware= | |||
}} | |||
{{Internet protocol suite}} | |||
{{Internet history timeline}} | |||
'''Internet Protocol version 6''' ('''IPv6''') is the most recent version of the ] (IP), the ] that provides an identification and location system for computers on networks and routes traffic across the ]. IPv6 was developed by the ] (IETF) to deal with the long-anticipated problem of ], and was intended to replace ].<ref name="ipv6nz">{{cite web|url=https://www.ipv6.org.nz/ipv6-faqs/|title=FAQs|publisher=New Zealand IPv6 Task Force|access-date=26 October 2015|archive-date=29 January 2019|archive-url=https://web.archive.org/web/20190129005124/http://www.ipv6.org.nz/ipv6-faqs/|url-status=dead}}</ref> In December 1998, IPv6 became a Draft Standard for the IETF,<ref name="rfc2460"/> which subsequently ratified it as an ] on 14 July 2017.<ref name="rfc8200"/><ref>{{Cite web |last=Siddiqui |first=Aftab |date=17 July 2017 |title=RFC 8200 – IPv6 Has Been Standardized |url=https://www.internetsociety.org/blog/2017/07/rfc-8200-ipv6-has-been-standardized/ |url-status=live |archive-url=https://web.archive.org/web/20231023162212/https://www.internetsociety.org/blog/2017/07/rfc-8200-ipv6-has-been-standardized/ |archive-date=23 October 2023 |access-date=25 February 2018 |publisher=] }}</ref> | |||
The main improvement brought by IPv6 is the increase in the number of addresses available for networked devices, allowing, for example, each mobile phone and mobile electronic device to have its own address. IPv4 supports 2<sup>32</sup> (about 4.3 billion) addresses, which is inadequate for giving even one address to every living person, let alone supporting embedded and portable devices. IPv6, however, supports approximately 5×10<sup>28</sup> addresses for ''each'' of the roughly 6.5 billion people alive today. With such a large address space available, IPv6 nodes can have as many universally scoped addresses as they need, and ] is not required. | |||
Devices on the Internet are assigned a unique ] for identification and location definition. With the rapid growth of the Internet after commercialization in the 1990s, it became evident that far more addresses would be needed to connect devices than the IPv4 address space had available. By 1998, the IETF had formalized the successor protocol. IPv6 uses 128-] addresses, theoretically allowing 2<sup>128</sup>, or approximately {{val|3.4|e=38}} total addresses. The actual number is slightly smaller, as multiple ranges are reserved for special usage or completely excluded from general use. The two protocols are not designed to be ], and thus direct communication between them is impossible, complicating the move to IPv6. However, several ] have been devised to rectify this. | |||
==Introduction== | |||
By the early 1990s, it was clear that the change to a ] introduced a decade earlier was not enough to prevent the ] and that further changes to IPv4 were needed.<ref name="rfc1750"></ref> By the winter of 1992, several proposed systems were being circulated and by the fall of 1993, the IETF announced a call for white papers (RFC 1550) and the creation of the "IPng Area" of ].<ref name="rfc1750"/><ref></ref> | |||
IPv6 provides other technical benefits in addition to a larger addressing space. In particular, it permits hierarchical address allocation methods that facilitate ] across the Internet, and thus limit the expansion of ]s. The use of multicast addressing is expanded and simplified, and provides additional optimization for the delivery of services. Device mobility, security, and configuration aspects have been considered in the design of the protocol. | |||
IPng was adopted by the ] on ], ] with the formation of several "IP Next Generation" (IPng) ]s.<ref name="rfc1750"/> By 1996, a series of ] were released defining IPv6, starting with RFC 2460. (Incidentally, ] was not a successor to IPv4, but an experimental flow-oriented ] protocol intended to support video and audio.) | |||
IPv6 addresses are represented as eight groups of four ] digits each, separated by colons. The full representation may be shortened; for example, ''2001:0db8:0000:0000:0000:8a2e:0370:7334'' becomes ''2001:db8::8a2e:370:7334''. | |||
It is expected that IPv4 will be supported alongside IPv6 for the foreseeable future. However, IPv4-only clients/servers will not be able to communicate directly with IPv6 clients/servers, and will require service-specific intermediate servers or NAT-PT protocol-translation servers. | |||
{{Toc level|3}} | |||
==Features of IPv6== | |||
To a great extent, IPv6 is a conservative extension of IPv4. Most transport- and application-layer protocols need little or no change to work over IPv6; exceptions are applications protocols that embed network-layer addresses (such as ] or ]). | |||
==Main features== | |||
Applications, however, usually need small changes and a recompile in order to run over IPv6. | |||
] | |||
IPv6 is an ] protocol for ] ] and provides end-to-end ] transmission across multiple IP networks, closely adhering to the design principles developed in the previous version of the protocol, ] (IPv4). | |||
===Larger address space=== | |||
The main feature of IPv6 that is driving adoption today is the larger address space: addresses in IPv6 are 128 bits long versus 32 bits in IPv4. | |||
In addition to offering more addresses, IPv6 also implements features not present in IPv4. It simplifies aspects of address configuration, network renumbering, and router announcements when changing network connectivity providers. It simplifies packet processing in routers by placing the responsibility for packet fragmentation in the end points. The IPv6 ] size is standardized by fixing the size of the host identifier portion of an address to 64 bits. | |||
The larger address space avoids the potential exhaustion of the IPv4 address space without the need for NAT and other devices that break the ] nature of Internet traffic. It also makes administration of medium and large networks simpler, by avoiding the need for complex ] schemes. | |||
The addressing architecture of IPv6 is defined in {{IETF RFC|4291}} and allows three different types of transmission: ], ] and ].<ref name="Rosen kernel networking">{{Cite book|title=Linux Kernel Networking: Implementation and Theory|first=Rami|last=Rosen|publisher=Apress|date=2014|isbn=9781430261971|location=New York|oclc=869747983}}</ref>{{rp|210}} | |||
The drawback of the large address size is that IPv6 carries some bandwidth overhead over IPv4, which may hurt regions where bandwidth is limited (] can sometimes be used to alleviate this problem). | |||
==Motivation and origin== | |||
===Stateless autoconfiguration of hosts=== | |||
===IPv4 address exhaustion=== | |||
IPv6 hosts can be configured automatically when connected to a routed IPv6 network. When first connected to a network, a host sends a ] ] (]) request for its configuration parameters; if configured suitably, routers respond to such a request with a ''router advertisement'' packet that contains network-layer configuration parameters. | |||
{{Main|IPv4 address exhaustion}} | |||
] representation to its binary notation]] | |||
If IPv6 autoconfiguration is not suitable, a host can use stateful autoconfiguration (]) or be configured manually. | |||
] (IPv4) was the first publicly used version of the ]. IPv4 was developed as a research project by the ] (DARPA), a ] ], before becoming the foundation for the ] and the ]. IPv4 includes an addressing system that uses numerical identifiers consisting of 32 bits. These addresses are typically displayed in ] as decimal values of four octets, each in the range 0 to 255, or 8 bits per number. Thus, IPv4 provides an addressing capability of 2<sup>32</sup> or approximately 4.3 billion addresses. Address exhaustion was not initially a concern in IPv4 as this version was originally presumed to be a test of DARPA's networking concepts.<ref>{{cite video|title=Google IPv6 Conference 2008: What will the IPv6 Internet look like?|url=https://www.youtube.com/watch?v=mZo69JQoLb8|archive-url=https://ghostarchive.org/varchive/youtube/20211211/mZo69JQoLb8|archive-date=2021-12-11|url-status=live|time=13:35}}{{cbignore}}</ref> During the first decade of operation of the Internet, it became apparent that methods had to be developed to conserve address space. In the early 1990s, even after the redesign of the addressing system using a ] model, it became clear that this would not suffice to prevent ], and that further changes to the Internet infrastructure were needed.<ref name=rfc1752>{{cite IETF|title=The Recommendation for the IP Next Generation Protocol|rfc=1752|first=S.|last=Bradner|first2=A.|last2=Mankin|date=January 1995|publisher=]}}</ref> | |||
Stateless autoconfiguration is only suitable for hosts: routers must be configured manually or by other means. | |||
The last unassigned top-level address blocks of 16 million IPv4 addresses were allocated in February 2011 by the ] (IANA) to the five ] (RIRs).<ref>{{Cite web |date=3 February 2011 |title=Free Pool of IPv4 Address Space Depleted |url=https://www.nro.net/ipv4-free-pool-depleted |url-status=live |archive-url=https://web.archive.org/web/20240118044214/https://www.nro.net/ipv4-free-pool-depleted |archive-date=18 January 2024 |access-date=19 January 2022 |website=NRO.net |publisher=The Number Resource Organization |location=] }}</ref> However, each RIR still has available address pools and is expected to continue with standard address allocation policies until one {{IPaddr|/8}} ] (CIDR) block remains. After that, only blocks of 1,024 addresses (/22) will be provided from the RIRs to a ] (LIR). As of September 2015, all of ] (APNIC), the ] (RIPE NCC), ] (LACNIC), and ] (ARIN) have reached this stage.<ref>{{Cite web |last=Rashid |first=Fahmida |date=1 February 2011 |title=IPv4 Address Exhaustion Not Instant Cause for Concern with IPv6 in Wings |url=https://www.eweek.com/networking/ipv4-address-exhaustion-not-instant-cause-for-concern-with-ipv6-in-wings/ |url-status=live |archive-url=https://archive.today/20240120181901/https://www.eweek.com/networking/ipv4-address-exhaustion-not-instant-cause-for-concern-with-ipv6-in-wings/ |archive-date=20 January 2024 |access-date=23 June 2012 |publisher=eWeek }}</ref><ref>{{Cite news |last=Ward |first=Mark |date=14 September 2012 |title=Europe hits old internet address limits |url=https://www.bbc.co.uk/news/technology-19600718 |url-status=live |archive-url=https://web.archive.org/web/20231105171900/https://www.bbc.com/news/technology-19600718 |archive-date=5 November 2023 |access-date=15 September 2012 |work=] }}</ref><ref>{{Cite web |last=Huston |first=Geoff |title=IPV4 Address Report |url=https://www.potaroo.net/tools/ipv4/ |url-status=live |archive-url=https://web.archive.org/web/20240110052921/https://www.potaroo.net/tools/ipv4/ |archive-date=10 January 2024 }}</ref> This leaves ] (AFRINIC) as the sole regional internet registry that is still using the normal protocol for distributing IPv4 addresses. As of November 2018, AFRINIC's minimum allocation is {{IPaddr|/22}} or 1024 IPv4 addresses. A ] may receive additional allocation when about 80% of all the address space has been utilized.<ref>{{Cite web |title=FAQ |url=https://my.afrinic.net/help/policies/afpol-v4200407-000.htm |url-status=live |archive-url=https://web.archive.org/web/20231023065714/https://my.afrinic.net/help/policies/afpol-v4200407-000.htm |archive-date=23 October 2023 |access-date=28 November 2018 |website=my.afrinic.net |publisher=] }}</ref> | |||
===Multicast=== | |||
] is part of the base protocol suite in IPv6. This is in opposition to IPv4, where multicast is optional. | |||
RIPE NCC announced that it had fully run out of IPv4 addresses on 25 November 2019,<ref>{{Cite press release |date=25 November 2019 |title=The RIPE NCC has run out of IPv4 Addresses |url=https://www.ripe.net/publications/news/about-ripe-ncc-and-ripe/the-ripe-ncc-has-run-out-of-ipv4-addresses |url-status=live |archive-url=https://web.archive.org/web/20240119220002/https://www.ripe.net/publications/news/the-ripe-ncc-has-run-out-of-ipv4-addresses/ |archive-date=19 January 2024 |access-date=26 November 2019 |publisher=] }}</ref> and called for greater progress on the adoption of IPv6. | |||
Most environments do not currently have their network infrastructures configured to route multicast; that is — the link-scoped aspect of multicast will work but the site-scope, organization-scope and global-scope multicast will not be routed. | |||
==Comparison with IPv4== | |||
IPv6 does not have a link-local broadcast facility; the same effect can be achieved by multicasting to the all-hosts group (<tt>FF02::1</tt>). | |||
On the Internet, data is transmitted in the form of ]s. IPv6 specifies a new ], designed to minimize packet header processing by routers.<ref name="rfc2460">{{Citation |author=S. Deering |title=Internet Protocol, Version 6 (IPv6) Specification |date=December 1998 |publisher=] (IETF) |rfc=2460 |author2=R. Hinden |author-link=Steve Deering |author-link2=Bob Hinden}} Obsoletes RFC 1883.</ref><ref name=rfc1726>{{cite web|rfc=1726|title=Technical Criteria for Choosing IP The Next Generation (IPng)|last1=Partridge|first1=C.|last2=Kastenholz|first2=F.|date=December 1994|url=https://www.ietf.org/rfc/rfc1726.txt}}</ref> Because the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. However, most transport and application-layer protocols need little or no change to operate over IPv6; exceptions are application protocols that embed Internet-layer addresses, such as ] (FTP) and ] (NTP), where the new address format may cause conflicts with existing protocol syntax. | |||
===Larger address space=== | |||
The is catering for deployment of a global IPv6 Multicast network. | |||
The main advantage of IPv6 over IPv4 is its larger address space. The size of an IPv6 address is 128 bits, compared to 32 bits in IPv4.<ref name=rfc2460/> The address space therefore has 2<sup>128</sup>=340,282,366,920,938,463,463,374,607,431,768,211,456 addresses (340 ], approximately {{val|3.4|e=38}}). Some blocks of this space and some specific addresses are ]. | |||
While this address space is very large, it was not the intent of the designers of IPv6 to assure geographical saturation with usable addresses. Rather, the longer addresses simplify allocation of addresses, enable efficient ], and allow implementation of special addressing features. In IPv4, complex ] (CIDR) methods were developed to make the best use of the small address space. The standard size of a subnet in IPv6 is 2<sup>64</sup> addresses, about four billion times the size of the entire IPv4 address space. Thus, actual address space utilization will be small in IPv6, but network management and routing efficiency are improved by the large subnet space and hierarchical route aggregation. | |||
===Jumbograms=== | |||
===Multicasting=== | |||
In IPv4, packets are limited to 64 ] of payload. When used between capable communication partners and on communication links with a ] larger than 65,576 octets, IPv6 has optional support for packets over this limit, referred to as ]s which can be as large as 4 ]. The use of jumbograms may improve performance over high-MTU networks. | |||
] | |||
]ing, the transmission of a packet to multiple destinations in a single send operation, is part of the base specification in IPv6. In IPv4 this is an optional (although commonly implemented) feature.<ref name=rfc1112>{{IETF RFC|1112}}, ''Host extensions for IP multicasting'', S. Deering (August 1989)</ref> IPv6 multicast addressing has features and protocols in common with IPv4 multicast, but also provides changes and improvements by eliminating the need for certain protocols. IPv6 does not implement traditional ], i.e. the transmission of a packet to all hosts on the attached link using a special ''broadcast address'', and therefore does not define broadcast addresses. In IPv6, the same result is achieved by sending a packet to the link-local ''all nodes'' multicast group at address ff02::1, which is analogous to IPv4 multicasting to address 224.0.0.1. IPv6 also provides for new multicast implementations, including embedding rendezvous point addresses in an IPv6 multicast group address, which simplifies the deployment of inter-domain solutions.<ref name=rfc3956>{{IETF RFC|3956}}, ''Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address'', P. Savola, B. Haberman (November 2004)</ref> | |||
In IPv4 it is very difficult for an organization to get even one globally routable multicast group assignment, and the implementation of inter-domain solutions is arcane.<ref>{{IETF RFC|2908}}, ''The Internet Multicast Address Allocation Architecture'', D. Thaler, M. Handley, D. Estrin (September 2000)</ref> Unicast address assignments by a ] for IPv6 have at least a 64-bit routing prefix, yielding the smallest subnet size available in IPv6 (also 64 bits). With such an assignment it is possible to embed the unicast address prefix into the IPv6 multicast address format, while still providing a 32-bit block, the least significant bits of the address, or approximately 4.2 billion multicast group identifiers. Thus each user of an IPv6 subnet automatically has available a set of globally routable source-specific multicast groups for multicast applications.<ref>{{IETF RFC|3306}}, ''Unicast-Prefix-based IPv6 Multicast Addresses'', B. Haberman, D. Thaler (August 2002)</ref> | |||
===Network-layer security=== | |||
], the protocol for IP network-layer encryption and authentication, is an integral part of the base protocol suite in IPv6; this is unlike IPv4, where it is optional (but usually implemented). ], however, is not widely deployed except for securing traffic between IPv6 BGP routers. | |||
===Stateless address autoconfiguration (SLAAC)=== | |||
===Mobility=== | |||
{{See also|IPv6 address#Stateless address autoconfiguration (SLAAC)|l1=IPv6 address § Stateless address autoconfiguration}} | |||
IPv6 hosts configure themselves automatically. Every interface has a self-generated link-local address and, when connected to a network, conflict resolution is performed and routers provide network prefixes via router advertisements.{{Ref RFC|4862}} Stateless configuration of routers can be achieved with a special router renumbering protocol.{{Ref RFC|2894}} When necessary, hosts may configure additional stateful addresses via ] (DHCPv6) or static addresses manually. | |||
Unlike mobile IPv4, ] (MIPv6) avoids ] and is therefore as efficient as normal IPv6. This advantage is mostly hypothetical, as neither MIP nor MIPv6 are widely deployed today. | |||
Like IPv4, IPv6 supports globally unique ]es. The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet by rendering ] obsolete. Therefore, every device on the network is globally addressable directly from any other device. | |||
==Deployment status== | |||
A stable, unique, globally addressable IP address would facilitate tracking a device across networks. Therefore, such addresses are a particular privacy concern for mobile devices, such as laptops and cell phones.<ref>{{cite web|url=https://www.internetsociety.org/resources/deploy360/2014/privacy-extensions-for-ipv6-slaac/|title=Privacy Extensions for Stateless Address Autoconfiguration in IPv6|author=T. Narten|author2=R. Draves|author3=S. Krishnan|date=September 2007|website=www.ietf.org|access-date=13 March 2017}}</ref> | |||
], IPv6 accounts for a tiny percentage of the live addresses in the publicly-accessible Internet, which is still dominated by IPv4. The adoption of IPv6 has been slowed by the introduction of ] (CIDR) and ] (NAT), each of which has partially alleviated the impact of ] exhaustion. Estimates as to when the pool of available IPv4 addresses will be exhausted vary — in 2003, Paul Wilson (director of ]) stated that, based on then-current rates of deployment, the available space would last until 2023,<ref> By John Lui, CNETAsia </ref> while in September 2005 a report by ] that the pool of available addresses would be exhausted in as little as 4–5 years.<ref> by Tony Hain, Cisco Systems</ref> ], a regularly updated report projected that the ] pool of unallocated addresses would be exhausted in May 2011, with the various ] using up their allocations from IANA in August 2012.<ref></ref> This report also argues that, if assigned but unused addresses were reclaimed and used to meet continuing demand, allocation of IPv4 addresses could continue until 2024. The ] has specified that the network backbones of all federal agencies must deploy IPv6 by ].<ref></ref> Meanwhile ] is planning to get a head start implementing IPv6 with their ] for the ]. | |||
To address these privacy concerns, the SLAAC protocol includes what are typically called "privacy addresses" or, more correctly, "temporary addresses".{{Ref RFC|8981}} Temporary addresses are random and unstable. A typical consumer device generates a new temporary address daily and will ignore traffic addressed to an old address after one week. Temporary addresses are used by default by Windows since XP SP1,<ref>{{Cite web |title=Overview of the Advanced Networking Pack for Windows XP |url=http://support.microsoft.com/kb/817778 |url-status=dead |archive-url=https://web.archive.org/web/20170907013704/https://support.microsoft.com/en-us/help/817778/overview-of-the-advanced-networking-pack-for-windows-xp |archive-date=7 September 2017 |access-date=15 April 2019 |publisher=] }}</ref> macOS since (Mac OS X) 10.7, Android since 4.0, and iOS since version 4.3. Use of temporary addresses by Linux distributions varies.<ref>{{Cite web |date=8 August 2014 |title=Privacy Extensions for IPv6 SLAAC |url=https://www.internetsociety.org/resources/deploy360/2014/privacy-extensions-for-ipv6-slaac |url-status=live |archive-url=https://web.archive.org/web/20231023063407/https://www.internetsociety.org/resources/deploy360/2014/privacy-extensions-for-ipv6-slaac/ |archive-date=23 October 2023 |access-date=17 January 2020 |publisher=] }}</ref> | |||
Renumbering an existing network for a new connectivity provider with different routing prefixes is a major effort with IPv4.{{Ref RFC|2071}}<ref>{{Cite web |last1=Ferguson |first1=P. |last2=Berkowitz |first2=H. |date=January 1997 |title=Network Renumbering Overview: Why would I want it and what is it anyway? |url=https://datatracker.ietf.org/doc/html/rfc2071 |url-status=live |archive-url=https://web.archive.org/web/20240107145323/https://datatracker.ietf.org/doc/html/rfc2071 |archive-date=7 January 2024 |publisher=] |doi=10.17487/RFC2071 |rfc=2071 }}</ref><ref>{{Cite web |last=Berkowitz |first=H. |date=January 1997 |title=Router Renumbering Guide |url=https://datatracker.ietf.org/doc/html/rfc2072 |url-status=live |archive-url=https://web.archive.org/web/20230608094931/https://datatracker.ietf.org/doc/html/rfc2072 |archive-date=8 June 2023 |publisher=] |doi=10.17487/RFC2072 |rfc=2072 }}</ref> With IPv6, however, changing the prefix announced by a few routers can in principle renumber an entire network, since the host identifiers (the least-significant 64 bits of an address) can be independently self-configured by a host.{{Ref RFC|4862}} | |||
With the notable exceptions of stateless autoconfiguration, more flexible addressing and ] (SEND), many of the features of IPv6 have been ported to IPv4 in a more or less elegant manner. Thus IPv6 deployment is primarily driven by address space exhaustion. | |||
The SLAAC address generation method is implementation-dependent. IETF recommends that addresses be deterministic but semantically opaque.<ref>{{Cite IETF|rfc=8064|title=Recommendation on Stable IPv6 Interface Identifiers|first1=Alissa|last1=Cooper|first2=Fernando|last2=Gont|first3=Dave|last3=Thaler}}</ref> | |||
==Addressing== | |||
===128-bit length=== | |||
<!--IPv4 supports 4,294,967,296 address --> | |||
The primary change from IPv4 to IPv6 is the length of network addresses. IPv6 addresses are 128 bits long (as defined by RFC 4291), whereas IPv4 addresses are 32 bits; where the IPv4 address space contains roughly 4 billion addresses, IPv6 has enough room for 3.4×10<sup>38</sup> unique addresses. | |||
===IPsec=== | |||
IPv6 addresses are typically composed of two logical parts: a 64-bit (sub-)network prefix, and a 64-bit host part, which is either automatically generated from the interface's ] or assigned sequentially. Because the globally unique MAC addresses offer an opportunity to track user equipment, and so users, across time and IPv6 address changes, RFC 3041 was developed to reduce the prospect of user identity being permanently tied to an IPv6 address, thus restoring some of the possibilities of anonymity existing at IPv4. RFC 3041 specifies a mechanism by which variable over time random bit strings can be used as interface circuit identifiers, replacing unchanging and traceable MAC addresses. | |||
] (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory part of all IPv6 protocol implementations,<ref name=rfc2460/> and ] (IKE) was recommended, but with RFC 6434 the inclusion of IPsec in IPv6 implementations was downgraded to a recommendation because it was considered impractical to require full IPsec implementation for all types of devices that may use IPv6. However, as of RFC 4301 IPv6 protocol implementations that do implement IPsec need to implement IKEv2 and need to support a minimum set of ]. This requirement will help to make IPsec implementations more interoperable between devices from different vendors. The IPsec Authentication Header (AH) and the Encapsulating Security Payload header (ESP) are implemented as IPv6 extension headers.<ref>{{Cite book|title=IPv6 Essentials: Integrating IPv6 into Your IPv4 Network|author=Silvia Hagen|publisher=O'Reilly Media|year=2014|isbn=978-1-4493-3526-7|page=196|edition=3rd|location=Sebastopol, CA|oclc=881832733}}</ref> | |||
===Simplified processing by routers=== | |||
===Notation=== | |||
The packet header in IPv6 is simpler than the IPv4 header. Many rarely used fields have been moved to optional header extensions. The IPv6 packet header has simplified the process of packet forwarding by ]. Although IPv6 packet headers are at least twice the size of IPv4 packet headers, processing of packets that only contain the base IPv6 header by routers may, in some cases, be more efficient, because less processing is required in routers due to the headers being aligned to match common ].<ref name=rfc2460/><ref name=rfc1726/> However, many devices implement IPv6 support in software (as opposed to hardware), thus resulting in very bad packet processing performance.<ref>{{cite web|title=IPv6 Security Assessment and Benchmarking|first=E.|last=Zack|date=July 2013|url=http://www.ipv6hackers.org/meetings/ipv6-hackers-1}}</ref> Additionally, for many implementations, the use of Extension Headers causes packets to be processed by a router's CPU, leading to poor performance or even security issues.<ref name="draft-gont-v6ops-ipv6-ehs-packet-drops-03">{{Cite web |last=Gont |first=F. |date=March 2016 |title=Operational Implications of IPv6 Packets with Extension Headers |url=https://datatracker.ietf.org/doc/html/draft-gont-v6ops-ipv6-ehs-packet-drops-03 |url-status=live |archive-url=https://web.archive.org/web/20231027170015/https://datatracker.ietf.org/doc/html/draft-gont-v6ops-ipv6-ehs-packet-drops-03 |archive-date=27 October 2023 |publisher=] }}</ref> | |||
IPv6 addresses are normally written as eight groups of four ] digits. For example, 2001:0db8:85a3:08d3:1319:8a2e:0370:7334 is a valid IPv6 address. | |||
Moreover, an IPv6 header does not include a checksum. The ] is calculated for the IPv4 header, and has to be recalculated by routers every time the ] (called ] in the IPv6 protocol) is reduced by one. The absence of a checksum in the IPv6 header furthers the ] of Internet design, which envisioned that most processing in the network occurs in the leaf nodes. Integrity protection for the data that is encapsulated in the IPv6 packet is assumed to be assured by both the ] or error detection in higher-layer protocols, namely the ] (TCP) and the ] (UDP) on the ]. Thus, while IPv4 allowed UDP datagram headers to have no checksum (indicated by 0 in the header field), IPv6 requires a checksum in UDP headers. | |||
If a four-digit group is 0000, the zeros may be omitted and replaced with two colons(::). For example, 2001:0db8:0000:0000:0000:0000:1428:57ab can be shortened as 2001:0db8::1428:57ab. Following this rule, any number of consecutive 0000 groups may be reduced to two colons, as long as there is only one double colon used in an address. Leading zeros in a group can also be omitted. Thus, the addresses below are all valid and equivalent: | |||
2001:0db8:0000:0000:0000:0000:1428:57ab | |||
2001:0db8:0000:0000:0000::1428:57ab | |||
2001:0db8:0:0:0:0:1428:57ab | |||
2001:0db8:0:0::1428:57ab | |||
2001:0db8::1428:57ab | |||
2001:db8::1428:57ab | |||
IPv6 routers do not perform ]. IPv6 hosts are required to do one of the following: perform ], perform end-to-end fragmentation, or send packets no larger than the default ] (MTU), which is 1280 ]. | |||
Having more than one double-colon abbreviation in an address is invalid, as it would make the notation ambiguous. | |||
===Mobility=== | |||
A sequence of 4 bytes at the end of an IPv6 address can also be written in decimal, using dots as separators. This notation is often used with compatibility addresses (see below). Thus, <tt>::ffff:1.2.3.4</tt> is the same address as <tt>::ffff:0102:0304</tt>, and <tt>::ffff:15.16.18.31</tt> is the same address as <tt>::ffff:0f10:121f</tt>. | |||
Unlike mobile IPv4, ] avoids ] and is therefore as efficient as native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection point without renumbering.{{Ref RFC|3963}} | |||
===Extension headers=== | |||
Additional information can be found in RFC 4291 - IP Version 6 Addressing Architecture. | |||
] | |||
The IPv6 packet header has a minimum size of 40 octets (320 bits). Options are implemented as extensions. This provides the opportunity to extend the protocol in the future without affecting the core packet structure.<ref name="rfc2460"/> However, RFC 7872 notes that some network operators drop IPv6 packets with extension headers when they traverse transit ]. | |||
===Literal IPv6 Addresses in URLs=== | |||
====Jumbograms==== | |||
In a ] the IPv6-Address is enclosed in brackets. | |||
IPv4 limits packets to 65,535 (2<sup>16</sup>−1) octets of payload. An IPv6 node can optionally handle packets over this limit, referred to as ]s, which can be as large as 4,294,967,295 (2<sup>32</sup>−1) octets. The use of jumbograms may improve performance over high-] links. The use of jumbograms is indicated by the Jumbo Payload Option extension header.{{Ref RFC|2675}} | |||
Example: | |||
<nowiki>http:///</nowiki> | |||
==IPv6 packets== | |||
This notation allows ] a URL without confusing the IPv6 address and port number: | |||
{{Main|IPv6 packet}} | |||
<nowiki>http://:443/</nowiki> | |||
] | |||
An IPv6 packet has two parts: a ] and ]. | |||
Additional information can be found in "RFC 2732 - Format for Literal IPv6 Addresses in URL's" and "RFC 3986 - Uniform Resource Identifier (URI): Generic Syntax" | |||
The header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features. | |||
===Network notation=== | |||
The fixed header occupies the first 40 ] (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic class, hop count, and the type of the optional extension or payload which follows the header. This ''Next Header'' field tells the receiver how to interpret the data which follows the header. If the packet contains options, this field contains the option type of the next option. The "Next Header" field of the last option points to the upper-layer protocol that is carried in the packet's ]. | |||
IPv6 networks are written using ]. | |||
The current use of the IPv6 Traffic Class field divides this between a 6 bit ]{{Ref RFC|2474}} and a 2-bit ] field.{{Ref RFC|3168}} | |||
An IPv6 network (or subnet) is a contiguous group of IPv6 addresses the size of which must be a power of two; the initial bits of addresses, which are identical for all hosts in the network, are called the network's prefix. | |||
Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the ] framework. | |||
A network is denoted by the first address in the network and the size in bits of the prefix (in decimal), separated with a slash. For example, <tt>2001:0db8:1234::/48</tt> stands for the network with addresses <tt>2001:0db8:1234:0000:0000:0000:0000:0000</tt> through <tt>2001:0db8:1234:FFFF:FFFF:FFFF:FFFF:FFFF</tt> | |||
Without special options, a payload must be less than {{gaps|64|kB}}. With a Jumbo Payload option (in a ''Hop-By-Hop Options'' extension header), the payload must be less than 4 GB. | |||
Because a single host can be seen as a network with a 128-bit prefix, you will sometimes see host addresses written followed with /128. | |||
Unlike with IPv4, routers never fragment a packet. Hosts are expected to use ] to make their packets small enough to reach the destination without needing to be fragmented. See ]. | |||
===Kinds of IPv6 addressses=== | |||
IPv6 addresses are divided into 3 categories <ref name=rfc2373></ref> : | |||
* Unicast Addresses | |||
* Multicast Addresses | |||
* Anycast Addresses | |||
==Addressing== | |||
A Unicast address defines a single interface. It identifies a single network interface A packet sent to a unicast address is delivered to that specific computer. | |||
{{Main|IPv6 address}} | |||
] | |||
] addresses are used to define a set of interfaces that typically belong to different nodes instead of just one. When a packet is sent to a multicast address, the protocol delivers the packet to all interfaces identified by that address. Multicast addresses begin with the prefix FF00::/8, and their second octet identifies the addresses ''scope'', i.e. the range over which the multicast address is propagated. Commonly used scopes include link-local (2), site-local (5) and global (E). | |||
]es have 128 bits. The design of the IPv6 address space implements a different design philosophy than in IPv4, in which subnetting was used to improve the efficiency of utilization of the small address space. In IPv6, the address space is deemed large enough for the foreseeable future, and a local area subnet always uses 64 bits for the host portion of the address, designated as the interface identifier, while the most-significant 64 bits are used as the routing prefix.{{Ref RFC|4291|rp=9}} While the myth has existed regarding IPv6 subnets being impossible to scan, RFC 7707 notes that patterns resulting from some IPv6 address configuration techniques and algorithms allow address scanning in many real-world scenarios. | |||
===Address representation=== | |||
] addresses, are also assigned to more than one interface, belonging to different nodes. However, a packet sent to an anycast address is delivered to just one of the member interfaces, typically the “nearest” according to the routing protocol’s idea of distance. Anycast addresses cannot be identified easily: they have the structure of normal unicast addresses, and differ only by being injected into the routing protocol at multiple points in the network. | |||
The 128 bits of an IPv6 address are represented in 8 groups of 16 bits each. Each group is written as four hexadecimal digits (sometimes called '']s''<ref name="Graziani2012">{{cite book|first=Rick|last=Graziani|title=IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6|date=2012|publisher=]|isbn=978-0-13-303347-2|page=55|url=https://books.google.com/books?id=FbYjJjZNA5gC&pg=PA55}}</ref><ref name="Coffeen2014">{{cite book|first=Tom|last=Coffeen|title=IPv6 Address Planning: Designing an Address Plan for the Future|date=2014|publisher=]|isbn=978-1-4919-0326-1|page=170|url=https://books.google.com/books?id=dZU8BQAAQBAJ&pg=PT170}}</ref> or more formally '']s''<ref name="Horley2013">{{cite book|first=Edward|last=Horley|title=Practical IPv6 for Windows Administrators|date=2013|publisher=]|isbn=978-1-4302-6371-5|page=17|url=https://books.google.com/books?id=u50QAwAAQBAJ&q=17&pg=PA17}}</ref> and informally a ''quibble'' or ''quad-nibble''<ref name="Horley2013"/>) and the groups are separated by colons (:). An example of this representation is {{IPaddr|2001:0db8:0000:0000:0000:ff00:0042:8329}}. | |||
For convenience and clarity, the representation of an IPv6 address may be shortened with the following rules: | |||
===Special addresses=== | |||
*One or more ]s from any group of hexadecimal digits are removed, which is usually done to all of the leading zeros. For example, the group {{IPaddr|0042}} is converted to {{IPaddr|42}}. The group {{IPaddr|0000}} is converted to {{IPaddr|0}}. | |||
There are a number of addresses with special meaning in IPv6: | |||
*Consecutive sections of zeros are replaced with two colons (::). This may only be used once in an address, as multiple use would render the address indeterminate. A double colon should not be used to denote an omitted single section of zeros.{{Ref RFC|5952|rsection=4.2.2}} | |||
* <tt>::/128</tt> — the address with all zeros is an unspecified address, and is to be used only in software. | |||
* <tt>::1/128</tt> — the ] address is a ] address. If an application in a host sends packets to this address, the IPv6 stack will loop these packets back to the same host (corresponding to ] in IPv4). | |||
* <tt>::/96</tt> — the zero prefix was used for ]es; it is now obsolete. | |||
* <tt>::ffff:0:0/96</tt> — this prefix is used for ]es (see ''Transition mechanisms'' below). | |||
* <tt>2001:db8::/32</tt> — this prefix is used in documentation (RFC 3849). Anywhere where an example IPv6 address is given, addresses from this prefix should be used. | |||
* <tt>fc00::/7</tt> — Unique local IPv6 unicast addresses are routable only within a set of cooperating sites. They were defined in RFC 4193 as a replacement for site-local addresses (see below). The addresses include a 40-bit ] number that minimizes the risk of conflicts if sites merge or packets somehow leak out. | |||
* <tt>fe80::/64</tt> — The link-local prefix specifies that the address only is valid in the local physical link. This is analogous to the Autoconfiguration IP address <tt>169.254.x.x</tt> in IPv4. | |||
* <tt>fec0::/10</tt> — The site-local prefix specifies that the address is valid only inside the local organisation. Its use has been deprecated in September 2004 by RFC 3879 and systems must not support this special type of address. | |||
* <tt>ff00::/8</tt> — The multicast prefix is used for ]es<ref name=ipv6multicast></ref> as defined by in "IP Version 6 Addressing Architecture" (RFC 4291). | |||
An example of application of these rules: | |||
There are no address ranges reserved for broadcast in IPv6 — applications use multicast to the ''all-hosts'' group instead. | |||
:Initial address: {{IPaddr|2001:0db8:0000:0000:0000:ff00:0042:8329}}. | |||
:After removing all leading zeros in each group: {{IPaddr|2001:db8:0:0:0:ff00:42:8329}}. | |||
:After omitting consecutive sections of zeros: {{IPaddr|2001:db8::ff00:42:8329}}. | |||
The loopback address is defined as {{IPaddr|0000:0000:0000:0000:0000:0000:0000:0001}}{{Ref RFC|5156}} and is abbreviated to {{IPaddr|::1}} by using both rules. | |||
==IPv6 packet== | |||
] | |||
The IPv6 packet is composed of two main parts: the header and the payload. | |||
As an IPv6 address may have more than one representation, the IETF has issued a ].{{Ref RFC|5952}} | |||
The header is in the first 40 ] of the packet and contains both source and destination addresses (128 bits each), as well as the version (4-bit IP version), traffic class (8 bits, Packet Priority), flow label (20 bits, ] management), payload length in bytes (16 bits), next header (8 bits), and hop limit (8 bits, ]). The payload can be up to 64] in size in standard mode, or larger with a "jumbo payload" option. | |||
Because IPv6 addresses contain colons, and URLs use colons to separate the host from the port number, an IPv6 address used as the host-part of a URL should be enclosed in square brackets,{{Ref RFC|3986}} e.g. <nowiki>http://</nowiki> or <nowiki>http://:8080/path/page.html</nowiki>. | |||
] is handled only in the sending host in IPv6: routers never fragment a packet, and hosts are expected to use ] discovery. | |||
===Link-local address=== | |||
The ''protocol'' field of IPv4 is replaced with a ''Next Header'' field. This field usually specifies the transport layer protocol used by a packet's payload. | |||
] | |||
All interfaces of IPv6 hosts require a ], which have the prefix {{IPaddr|fe80::|10}}. This prefix is followed by 54 bits that can be used for subnetting, although they are typically set to zeros, and a 64-bit interface identifier. The host can compute and assign the Interface identifier by itself without the presence or cooperation of an external network component like a DHCP server, in a process called ''link-local address autoconfiguration''.{{Citation needed|date=January 2022}} | |||
In the presence of options, however, the Next Header field specifies the presence of an extra ''options'' header, which then follows the IPv6 header; the payload's protocol itself is specified in a field of the options header. | |||
This insertion of an extra header to carry options is analogous to the handling of AH and ESP in ] for both IPv4 and IPv6. | |||
The lower 64 bits of the link-local address (the suffix) were originally derived from the MAC address of the underlying network interface card. As this method of assigning addresses would cause undesirable address changes when faulty network cards were replaced, and as it also suffered from a number of security and privacy issues, {{IETF RFC|8064}} has replaced the original MAC-based method with the hash-based method specified in {{IETF RFC|7217}}.{{Citation needed|date=January 2022}} | |||
==IPv6 and the Domain Name System== | |||
IPv6 addresses are represented in the ] by ''AAAA records'' (so-called quad-A records) for forward lookups; ]s take place under <tt>ip6]</tt> (previously <tt>ip6]</tt>), where address space is delegated on ] boundaries. This scheme, which is a straightforward adaptation of the familiar ] and ''in-addr.arpa'' schemes, is defined in RFC 3596. | |||
===Address uniqueness and router solicitation=== | |||
The AAAA scheme was one of two proposals at the time the IPv6 architecture was being designed. The other proposal, designed to facilitate network renumbering, would have had ''A6 records'' for the forward lookup and a number of other innovations such as ''bit-string labels'' and ''DNAME records''. It is defined in the experimental RFC 2874 and its references (with further discussion of the pros and cons of both schemes in RFC 3364). | |||
IPv6 uses a new mechanism for mapping IP addresses to link-layer addresses (e.g. ]es), because it does not support the ] addressing method, on which the functionality of the ] (ARP) in IPv4 is based. IPv6 implements the ] (NDP, ND) in the ], which relies on ] and ] transmission.<ref name="Rosen kernel networking"/>{{rp|210}} IPv6 hosts verify the uniqueness of their IPv6 addresses in a ] (LAN) by sending a neighbor solicitation message asking for the link-layer address of the IP address. If any other host in the LAN is using that address, it responds.<ref name="T. Narten pp. 54">{{cite journal|first=T.|last=Narten|title=Neighbor discovery and stateless autoconfiguration in IPv6|journal=IEEE Internet Computing|volume=3|issue=4|pages=54–62|date=August 1999|doi=10.1109/4236.780961}}</ref> | |||
A host bringing up a new IPv6 interface first generates a unique link-local address using one of several mechanisms designed to generate a unique address. Should a non-unique address be detected, the host can try again with a newly generated address. Once a unique link-local address is established, the IPv6 host determines whether the LAN is connected on this link to any ] interface that supports IPv6. It does so by sending out an ICMPv6 router solicitation message to the all-routers<ref name="rfc4861sec637">{{Cite web |last=Narten |first=T. |date=September 2007 |title=Neighbor Discovery for IP version 6 (IPv6) |url=https://datatracker.ietf.org/doc/html/rfc4861#section-6.3.7 |url-status=live |archive-url=https://web.archive.org/web/20240117035643/https://datatracker.ietf.org/doc/html/rfc4861#section-6.3.7 |archive-date=17 January 2024 |publisher=] |at=section 6.3.7 |doi=10.17487/RFC4861 |rfc=4861 |doi-access=free }}</ref> multicast group with its link-local address as source. If there is no answer after a predetermined number of attempts, the host concludes that no routers are connected. If it does get a response, known as a router advertisement, from a router, the response includes the network configuration information to allow establishment of a globally unique address with an appropriate unicast network prefix.<ref name="rfc4862sec551">{{Cite web |last=Thomson |first=S. |date=September 2007 |title=IPv6 Stateless Address Autoconfiguration - Section 5.5.1 |url=https://datatracker.ietf.org/doc/html/rfc4862#section-5.5.1 |url-status=live |archive-url=https://web.archive.org/web/20240111084216/https://datatracker.ietf.org/doc/html/rfc4862#section-5.5.1 |archive-date=11 January 2024 |publisher=] |doi=10.17487/RFC4862 |rfc=4862 }}</ref> There are also two flag bits that tell the host whether it should use DHCP to get further information and addresses: | |||
{| class="wikitable" style="margin: 1em auto 1em auto" | |||
*The Manage bit, which indicates whether or not the host should use DHCP to obtain additional addresses rather than rely on an auto-configured address from the router advertisement. | |||
|+ '''AAAA record fields''' | |||
*The Other bit, which indicates whether or not the host should obtain other information through DHCP. The other information consists of one or more prefix information options for the subnets that the host is attached to, a lifetime for the prefix, and two flags:<ref name="T. Narten pp. 54"/> | |||
|- | |||
**On-link: If this flag is set, the host will treat all addresses on the specific subnet as being on-link and send packets directly to them instead of sending them to a router for the duration of the given lifetime. | |||
|NAME||Domain name | |||
**Address: This flag tells the host to actually create a global address. | |||
|- | |||
|TYPE||AAAA (28) | |||
|- | |||
|CLASS||Internet (1) | |||
|- | |||
|]||Time to live in seconds | |||
|- | |||
|RDLENGTH||Length of RDATA field | |||
|- | |||
|RDATA||String form of the IPV6 address as described in RFC 3513 | |||
|} | |||
===Global addressing=== | |||
RFC 3484 specifies how applications should select an IPv6 or IPv4 address for use, including addresses retrieved from DNS. | |||
] | |||
The assignment procedure for global addresses is similar to local-address construction. The prefix is supplied from router advertisements on the network. Multiple prefix announcements cause multiple addresses to be configured.<ref name="T. Narten pp. 54"/> | |||
Stateless address autoconfiguration (SLAAC) requires a {{IPaddr||64}} address block.{{Ref RFC|4291}} ] are assigned at least {{IPaddr||32}} blocks, which they divide among subordinate networks.<ref>{{Cite web |date=8 February 2011 |title=IPv6 Address Allocation and Assignment Policy |url=https://www.ripe.net/publications/docs/ripe-512/ |url-status=live |archive-url=https://web.archive.org/web/20230603052402/https://www.ripe.net/publications/docs/ripe-512 |archive-date=3 June 2023 |access-date=27 March 2011 |publisher=] }}</ref> The initial recommendation of {{date|September 2001}} stated assignment of a {{IPaddr||48}} subnet to end-consumer sites.{{Ref RFC|3177}} In {{Date|March 2011}} this recommendation was refined:{{Ref RFC|6177}} The ] "recommends giving home sites significantly more than a single {{IPaddr||64}}, but does not recommend that every home site be given a {{IPaddr||48}} either". Blocks of {{IPaddr||56}}s are specifically considered. It remains to be seen whether ISPs will honor this recommendation. For example, during initial trials, ] customers were given a single {{IPaddr||64}} network.<ref>{{Cite press release |last=Brzozowski |first=John |date=31 January 2011 |title=Comcast Activates First Users With IPv6 Native Dual Stack Over DOCSIS |url=https://corporate.comcast.com/comcast-voices/comcast-activates-first-users-with-ipv6-native-dual-stack-over-docsis |url-status=live |archive-url=https://web.archive.org/web/20231023064638/https://corporate.comcast.com/comcast-voices/comcast-activates-first-users-with-ipv6-native-dual-stack-over-docsis |archive-date=23 October 2023 |access-date=15 April 2019 |publisher=] }}</ref> | |||
===IPv6 and DNS RFCs=== | |||
* DNS Extensions to support IP version 6 - RFC 1886 | |||
* DNS Extensions to Support IPv6 Address Aggregation and Renumbering - RFC 2874 | |||
* Tradeoffs in Domain Name System (DNS) Support for Internet Protocol version 6 (IPv6) - RFC 3364 | |||
* Default Address Selection for Internet Protocol version 6 (IPv6) - RFC 3484 | |||
* Internet Protocol Version 6 (IPv6) Addressing Architecture - RFC 3513 | |||
* DNS Extensions to Support IP Version 6 (Obsoletes 1886 and 3152) - RFC 3596 | |||
==IPv6 |
==IPv6 in the Domain Name System== | ||
In the ] (DNS), ]s are mapped to IPv6 addresses by ] ("quad-A") resource records. For ], the IETF reserved the domain ], where the name space is hierarchically divided by the 1-digit ] representation of ] units (4 bits) of the IPv6 address. This scheme is defined in {{IETF RFC|3596}}. | |||
When a dual-stack host queries a DNS server to resolve a ] (FQDN), the DNS client of the host sends two DNS requests, one querying A records and the other querying AAAA records. The host operating system may be configured with a preference for address selection rules {{IETF RFC|6724}}.<ref>{{Cite book|title=IPv6 Essentials: Integrating IPv6 into Your IPv4 Network|author=Silvia Hagen|publisher=O'Reilly Media, Inc.|year=2014|isbn=9781449335267|pages=176}}</ref> | |||
IPv6 defines 3 unicast address scopes: global, site, and link.. | |||
Site-local addresses are non-link-local addresses that are valid within the scope of an administratively-defined site and cannot be exported beyond it. | |||
<!--] redirects to this section.--> | |||
Site-local addresses are deprecated by RFC 3879. Note that this does not deprecate other site-scoped address types (e.g. site-scoped multicast). | |||
An alternative record type was used in early DNS implementations for IPv6, designed to facilitate network renumbering, the ''A6'' records for the forward lookup and a number of other innovations such as ''bit-string labels'' and '']'' records. It is defined in {{IETF RFC|2874}} and its references (with further discussion of the pros and cons of both schemes in {{IETF RFC|3364}}), but has been deprecated to experimental status ({{IETF RFC|3363}}). | |||
==Transition mechanisms== | |||
Companion IPv6 specifications further define that only link-local addresses can be used when generating ICMP Redirect Messages and as next-hop addresses in most routing protocols. | |||
{{Main|IPv6 transition mechanism}} | |||
IPv6 is not foreseen to supplant IPv4 instantaneously. Both protocols will continue to operate simultaneously for some time. Therefore, ]s are needed to enable IPv6 hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach each other over IPv4 infrastructure.<ref name="sixxs">{{Cite web |title=IPv6 Transition Mechanism/Tunneling Comparison |url=https://www.sixxs.net/faq/connectivity/?faq=comparison |url-status=live |archive-url=https://web.archive.org/web/20231023064851/https://www.sixxs.net/faq/connectivity/?faq=comparison |archive-date=23 October 2023 |access-date=20 January 2012 |publisher=Sixxs.net }}</ref> | |||
These restrictions do imply that an IPv6 router must have a link-local next-hop address for all directly connected routes (routes for which the given router and the next-hop router share a common subnet prefix). | |||
According to ], a dual-stack implementation of the IPv4 and IPv6 on devices is the easiest way to migrate to IPv6.<ref>{{Cite book|title=IPv6 Essentials: Integrating IPv6 into Your IPv4 Network|author=Silvia Hagen|publisher=O'Reilly Media, Inc.|year=2014|isbn=9781449335267|pages=222–223}}</ref> Many other transition mechanisms use tunneling to encapsulate IPv6 traffic within IPv4 networks and vice versa. This is an imperfect solution, which reduces the ] (MTU) of a link and therefore complicates ], and may increase ].<ref>{{Cite web |last1=Carpenter |first1=B. |date=August 2011 |title=Advisory Guidelines for 6to4 Deployment |url=https://datatracker.ietf.org/doc/html/rfc6343 |url-status=live |archive-url=https://web.archive.org/web/20230128112750/https://datatracker.ietf.org/doc/html/rfc6343 |archive-date=28 January 2023 |access-date=20 August 2012 |publisher=] |doi=10.17487/RFC6343 |rfc=6343 |doi-access=free }}</ref><ref>{{Cite web |date=5 September 2007 |title=IPv6: Dual stack where you can; tunnel where you must |url=https://www.networkworld.com/article/813230/ipv6-dual-stack-where-you-can-tunnel-where-you-must.html |url-status=live |archive-url=https://web.archive.org/web/20240120184843/https://www.networkworld.com/article/813230/ipv6-dual-stack-where-you-can-tunnel-where-you-must.html |archive-date=20 January 2024 |access-date=27 November 2012 |publisher=networkworld.com }}</ref> | |||
==IPv6 deployment== | |||
In February 1999, The IPv6 Forum was founded by the IETF Deployment WG to drive deployment worldwide creating by now over 30 IPv6 Country Fora and IPv6 Task Forces <ref name=ipv6forum></ref>. | |||
On ] ] ] announced<ref name=icann1></ref> that the root ] servers for the Internet had been modified to support both IPv6 and IPv4. | |||
===Dual-stack IP implementation=== | |||
A global view into the IPv6 routing tables, which displays also which ISPs are already deploying IPv6, can be found by looking at the pages: these pages display a list of all allocated IPv6 prefixes and give colors to the ones that are actually being announced in ]. When a prefix is announced, that means that the ISP at least can receive IPv6 packets for their prefix. They might then actually also offer IPv6 services, maybe even to end users/sites directly. | |||
Dual-stack IP implementations provide complete IPv4 and IPv6 protocol stacks in the operating system of a ] or ] on top of the common ] implementation, such as ]. This permits dual-stack hosts to participate in IPv6 and IPv4 networks simultaneously.{{Ref RFC|4213}} | |||
A device with dual-stack implementation in the operating system has an IPv4 and IPv6 address, and can communicate with other nodes in the LAN or the Internet using either IPv4 or IPv6. The DNS protocol is used by both IP protocols to resolve fully qualified domain names and IP addresses, but dual stack requires that the resolving DNS server can resolve both types of addresses. Such a dual-stack DNS server holds IPv4 addresses in the A records and IPv6 addresses in the AAAA records. Depending on the destination that is to be resolved, a DNS name server may return an IPv4 or IPv6 IP address, or both. A default address selection mechanism, or preferred protocol, needs to be configured either on hosts or the DNS server. The ] has published ] to assist dual-stack applications, so that they can connect using both IPv4 and IPv6, but prefer an IPv6 connection if it is available. However, dual-stack also needs to be implemented on all routers between the host and the service for which the DNS server has returned an IPv6 address. Dual-stack clients should be configured to prefer IPv6 only if the network is able to forward IPv6 packets using the IPv6 versions of ]. When dual-stack network protocols are in place the ] can be migrated to IPv6.<ref>{{Cite book|title=IPv6 Essentials: Integrating IPv6 into Your IPv4 Network|author=Silvia Hagen|publisher=O'Reilly Media, Inc.|year=2014|isbn=9781449335267|pages=222}}</ref> | |||
ISPs that provide IPv6 connectivity to their customers can be found in the . | |||
While dual-stack is supported by major ] and network device vendors, legacy networking hardware and servers do not support IPv6. | |||
The mandate by the United States Government to move to an IPv6 platform for all civilian and defense vendors by summer 2008 will greatly boost deployment. The awarding of over $150 billion in contracts in spring of 2007 by the General Services Administration will in itself come close to the total amount spent on the ] upgrade of the previous decade, and total cost will swell far beyond that, to as much as $500 billion.<ref>{{cite news |url= http://www.businessweek.com/magazine/content/06_45/b4008080.htm?chan=search |date=2006-11-06 |title=More Elbow Room On The Net|accessdate=2006-12-27|publisher=]}}</ref> | |||
===ISP customers with public-facing IPv6=== | |||
==Transition mechanisms== | |||
] | |||
Until IPv6 completely supplants IPv4, which is not likely to happen in the foreseeable future, a number of so-called ''transition mechanisms'' are needed to enable IPv6-only hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach the IPv6 Internet over the IPv4 infrastructure. <ref name=sixxs></ref> contains an overview of the below mentioned transition mechanisms. | |||
] (ISPs) are increasingly providing their business and private customers with public-facing IPv6 global unicast addresses. If IPv4 is still used in the local area network (LAN), however, and the ISP can only provide one public-facing IPv6 address, the IPv4 LAN addresses are translated into the public facing IPv6 address using ], a ] (NAT) mechanism. Some ISPs cannot provide their customers with public-facing IPv4 and IPv6 addresses, thus supporting dual-stack networking, because some ISPs have exhausted their globally routable IPv4 address pool. Meanwhile, ISP customers are still trying to reach IPv4 ] and other destinations.<ref>{{cite web|url=https://www.juniper.net/documentation/en_US/junos/topics/concept/ipv6-dual-stack-understanding.html|title=Understanding Dual Stacking of IPv4 and IPv6 Unicast Addresses|website=Juniper.net|publisher=Juniper Networks|date=31 August 2017|access-date=19 January 2022}}</ref> | |||
===Dual stack=== | |||
A significant percentage of ISPs in all ] (RIR) zones have obtained IPv6 address space. This includes many of the world's major ISPs and ] operators, such as ], ], ], ], ], ], ] and ].<ref>{{cite web|url=https://www.nro.net/ipv6/|title=IPv6|website=NRO.net|access-date=13 March 2017|archive-date=12 January 2017|archive-url=https://web.archive.org/web/20170112052541/https://www.nro.net/ipv6|url-status=dead}}</ref> | |||
Since IPv6 is a conservative extension of IPv4, it is relatively easy to write a network stack that supports both IPv4 and IPv6 while sharing most of the code. Such an implementation is called a ''dual stack'', and a host implementing a dual stack is called a ''dual-stack host''. This approach is described in RFC 4213. | |||
While some ISPs still allocate customers only IPv4 addresses, many ISPs allocate their customers only an IPv6 or dual-stack IPv4 and IPv6. ISPs report the share of IPv6 traffic from customers over their network to be anything between 20% and 40%, but by mid-2017 IPv6 traffic still only accounted for a fraction of total traffic at several large ]s (IXPs). ] reported it to be 2% and ] reported 7%. A 2017 survey found that many DSL customers that were served by a dual stack ISP did not request DNS servers to resolve fully qualified domain names into IPv6 addresses. The survey also found that the majority of traffic from IPv6-ready web-server resources were still requested and served over IPv4, mostly due to ISP customers that did not use the dual stack facility provided by their ISP and to a lesser extent due to customers of IPv4-only ISPs.<ref>{{Cite web |last=Pujol |first=Enric |date=12 June 2017 |title=What Stops IPv6 Traffic in a Dual-Stack ISP? |url=https://blog.apnic.net/2017/06/13/stops-ipv6-traffic-dual-stack-isp/ |url-status=live |archive-url=https://web.archive.org/web/20230327133355/https://blog.apnic.net/2017/06/13/stops-ipv6-traffic-dual-stack-isp/ |archive-date=27 March 2023 |access-date=13 June 2017 |website=APNIC.net |publisher=] }}</ref> | |||
Most current implementations of IPv6 use a dual-stack. Some early experimental implementations used independent IPv4 and IPv6 stacks. There are no known implementations that implement IPv6 only. | |||
===Tunneling=== | ===Tunneling=== | ||
The technical basis for tunneling, or encapsulating IPv6 packets in IPv4 packets, is outlined in RFC 4213. When the Internet backbone was IPv4-only, one of the frequently used tunneling protocols was ].<ref name="Steven J. Vaughan-Nichols">{{Cite news |last=Vaughan-Nichols |first=Steven J. |date=14 October 2010 |title=Five ways for IPv6 and IPv4 to peacefully co-exist |url=https://www.zdnet.com/home-and-office/networking/five-ways-for-ipv6-and-ipv4-to-peacefully-co-exist/ |url-status=live |archive-url=https://web.archive.org/web/20231205094000/https://www.zdnet.com/home-and-office/networking/five-ways-for-ipv6-and-ipv4-to-peacefully-co-exist/ |archive-date=5 December 2023 |access-date=13 March 2017 |work=] }}</ref> ] was also frequently used for integrating IPv6 LANs with the IPv4 Internet backbone. Teredo is outlined in RFC 4380 and allows IPv6 ] to tunnel over IPv4 networks, by encapsulating IPv6 packets within UDP. The Teredo relay is an IPv6 router that mediates between a Teredo server and the native IPv6 network. It was expected that 6to4 and Teredo would be widely deployed until ISP networks would switch to native IPv6, but by 2014 Google Statistics showed that the use of both mechanisms had dropped to almost 0.<ref>{{Cite book|title=IPv6 Essentials: Integrating IPv6 into Your IPv4 Network|author=Silvia Hagen|publisher=O'Reilly Media, Inc.|year=2014|isbn=9781449335267|pages=33}}</ref> | |||
===IPv4-mapped IPv6 addresses=== | |||
In order to reach the IPv6 Internet, an isolated host or network must be able to use the existing IPv4 infrastructure to carry IPv6 packets. This is done using a technique somewhat misleadingly known as '']'' which consists in encapsulating IPv6 packets within IPv4, in effect using IPv4 as a link layer for IPv6. | |||
] | |||
] | |||
Hybrid dual-stack IPv6/IPv4 implementations recognize a special class of addresses, the IPv4-mapped IPv6 addresses.{{Ref RFC|6890|rsection=2.2.3}}{{Ref RFC|4291}} These addresses are typically written with a 96-bit prefix in the standard IPv6 format, and the remaining 32 bits are written in the customary ] of IPv4. | |||
IPv6 packets can be directly encapsulated within IPv4 packets using protocol number 41. They can also be encapsulated within UDP packets e.g. in order to cross a router or NAT device that blocks protocol 41 traffic. They can of course also use generic encapsulation schemes, such as ] or ]. | |||
Addresses in this group consist of an 80-bit prefix of zeros, the next 16 bits are ones, and the remaining, least-significant 32 bits contain the IPv4 address. For example, {{IPaddr|::ffff:192.0.2.128}} represents the IPv4 address {{IPaddr|192.0.2.128}}. A previous format, called "IPv4-compatible IPv6 address", was {{IPaddr|::192.0.2.128}}; however, this method is deprecated.<ref name="rfc4291"/> | |||
====Automatic tunneling==== | |||
Because of the significant internal differences between IPv4 and IPv6 protocol stacks, some of the lower-level functionality available to programmers in the IPv6 stack does not work the same when used with IPv4-mapped addresses. Some common IPv6 stacks do not implement the IPv4-mapped address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g., ] 2000, XP, and Server 2003), or because of security concerns (]).<ref name="openbsd-mapped-addr">{{man|4|inet6|OpenBSD}}</ref> On these operating systems, a program must open a separate socket for each IP protocol it uses. On some systems, e.g., the ], ], and ], this feature is controlled by the socket option IPV6_V6ONLY.<ref name="rfc3493">{{cite IETF|rfc=3493|title=Basic Socket Interface Extensions for IPv6|author1=R. Gilligan|author2=S. Thomson|author3=J. Bound|author4=J. McCann|author5=W. Stevens|publisher=Network Working Group|date=February 2003}}</ref>{{rp|page=22}} | |||
''Automatic tunneling'' refers to a technique where the tunnel endpoints are automatically determined by the routing infrastructure. The recommended technique for automatic tunneling is ]<ref name=rfc3056></ref> tunneling, which uses protocol 41 encapsulation. Tunnel endpoints are determined by using a well-known IPv4 anycast address on the remote side, and embedding IPv4 address information within IPv6 addresses on the local side. 6to4 is widely deployed today. | |||
The address prefix {{IPaddr|64:ff9b::/96}} is a class of IPv4-embedded IPv6 addresses for use in ] transition methods.{{Ref RFC|6052}} For example, {{IPaddr|64:ff9b::192.0.2.128}} represents the IPv4 address {{IPaddr|192.0.2.128}}.<!--This needs a lot better explanation--> | |||
'']'' <ref name=rfc4380></ref> is an automatic tunneling technique that uses UDP encapsulation and is claimed to be able to cross multiple NAT boxes. Teredo is not widely deployed today, but an experimental version of Teredo is installed with the Windows XP SP2 IPv6 stack. IPv6, 6to4 and Teredo are enabled by default in ] <ref name=vista></ref>. | |||
==Security== | |||
====Configured tunneling==== | |||
A number of security implications may arise from the use of IPv6. Some of them may be related with the IPv6 protocols themselves, while others may be related with implementation flaws.<ref>{{citation|title=IPv6 Security for IPv4 Engineers|url=https://www.internetsociety.org/wp-content/uploads/2019/03/deploy360-ipv6-security-v1.0.pdf|last=Gont|first=Fernando|date=10 March 2019|access-date=30 August 2019}}</ref><ref>{{citation|title=IPv6 Security Frequently Asked Questions (FAQ)|url=https://www.internetsociety.org/wp-content/uploads/2019/02/Deploy360-IPv6-Security-FAQ.pdf|last=Gont|first=Fernando|date=10 January 2019|access-date=30 August 2019}}</ref> | |||
===Shadow networks=== | |||
''Configured tunneling'' is a technique where the tunnel endpoints are configured explicitly, either by a human operator or by an automatic service known as a ]<ref name=rfc3053></ref>. Configured tunneling is usually more deterministic and easier to debug than automatic tunneling, and is therefore recommended for large, well-administered networks. | |||
The addition of nodes having IPv6 enabled by default by the software manufacturer may result in the inadvertent creation of ''shadow networks'', causing IPv6 traffic flowing into networks having only IPv4 security management in place. This may also occur with operating system upgrades, when the newer operating system enables IPv6 by default, while the older one did not. Failing to update the security infrastructure to accommodate IPv6 can lead to IPv6 traffic bypassing it.<ref>{{citation|title=Shadow Networks: an Unintended IPv6 Side Effect|archive-url=https://web.archive.org/web/20130411113334/http://www.networkcomputing.com/ipv6-tech-center/shadow-networks-an-unintended-ipv6-side/232800326|archive-date=11 April 2013|url=http://www.networkcomputing.com/ipv6-tech-center/shadow-networks-an-unintended-ipv6-side/232800326|last=Mullins|first=Robert|date=5 April 2012|access-date=2 March 2013}}</ref> Shadow networks have occurred on business networks in which enterprises are replacing ] systems that do not have an IPv6 stack enabled by default, with ] systems, that do.<ref>{{cite book|title=IPv6 For All: A Guide for IPv6 Usage and Application in Different Environments|url=https://www.ipv6forum.com/dl/books/ipv6forall.pdf|first1=Guillermo|last1=Cicileo|first2=Roque|last2=Gagliano|first3=Christian|last3=O’Flaherty|first4=Mariela|last4=Rocha|first5=César Olvera|last5=Morales|first6=Jordi Palet|last6=Martínez|first7=Álvaro Vives|last7=Martínez|display-authors=3|page=5|date=October 2009|access-date=2 March 2013}}</ref> Some IPv6 stack implementors have therefore recommended disabling IPv4 mapped addresses and instead using a dual-stack network where supporting both IPv4 and IPv6 is necessary.<ref>{{cite web|url=https://tools.ietf.org/html/draft-itojun-v6ops-v4mapped-harmful-02|title=IPv4-Mapped Addresses on the Wire Considered Harmful|author=Jun-ichiro itojun Hagino|date=October 2003}}</ref> | |||
===IPv6 packet fragmentation=== | |||
Configured tunneling typically uses either protocol 41 (recommended) or raw UDP encapsulation. | |||
Research has shown that the use of fragmentation can be leveraged to evade network security controls, similar to IPv4. As a result, {{IETF RFC|7112}} requires that the first fragment of an IPv6 packet contains the entire IPv6 header chain, such that some very pathological fragmentation cases are forbidden. Additionally, as a result of research on the evasion of RA-Guard in {{IETF RFC|7113}}, {{IETF RFC|6980}} has deprecated the use of fragmentation with Neighbor Discovery, and discouraged the use of fragmentation with Secure Neighbor Discovery (SEND). | |||
==Standardization through RFCs== | |||
=== Proxying and translation === | |||
===Working-group proposals=== | |||
] | |||
Due to the anticipated global growth of the ], the ] (IETF) in the early 1990s started an effort to develop a next generation IP protocol.<ref name="Rosen kernel networking"/>{{rp|209}} By the beginning of 1992, several proposals appeared for an expanded Internet addressing system and by the end of 1992 the IETF announced a call for white papers.<ref>{{cite web|rfc=1550|title=IP: Next Generation (IPng) White Paper Solicitation|first1=S.|last1=Bradner|first2=A.|last2=Mankin|date=December 1993|url=https://tools.ietf.org/html/rfc1550}}</ref> In September 1993, the IETF created a temporary, ad hoc ''IP Next Generation'' (IPng) area to deal specifically with such issues. The new area was led by ] and ], and had a directorate with 15 engineers from diverse backgrounds for direction-setting and preliminary document review:<ref name=rfc1752/><ref>{{cite web|url=http://grnlight.net/index.php/programming-articles/103-history-of-the-ipng-effort|archive-url=https://web.archive.org/web/20140523072903/http://grnlight.net/index.php/programming-articles/103-history-of-the-ipng-effort|archive-date=23 May 2014|work=The Sun|title=History of the IPng Effort}}</ref> The working-group members were ] (Microsoft), ] (AT&T), Jim Bound (Digital Equipment Corporation), Ross Callon (Wellfleet), ] (CERN), ] (MIT), ] (NEARNET), ] (Xerox), Dino Farinacci (Cisco), Paul Francis (NTT), Eric Fleischmann (Boeing), Mark Knopper (Ameritech), Greg Minshall (Novell), Rob Ullmann (Lotus), and ] (Xerox).<ref>{{cite web|rfc=1752|title=The Recommendation for the IP Next Generation Protocol – Appendix B|date=January 1995 |url=https://tools.ietf.org/html/rfc1752#appendix-B |last1=Bradner |first1=Scott O. |last2=Mankin |first2=Allison J. }}</ref> | |||
The Internet Engineering Task Force adopted the IPng model on 25 July 1994, with the formation of several IPng working groups.<ref name=rfc1752/> By 1996, a series of ] was released defining Internet Protocol version 6 (IPv6), starting with {{IETF RFC|1883}}. (Version 5 was used by the experimental ].) | |||
When an IPv6-only host needs to access an IPv4-only service (for example a web server), some form of translation is necessary. The one form of translation that actually works is the use of a dual-stack ], for example a web proxy. | |||
===RFC standardization=== | |||
Techniques for application-agnostic translation at the lower layers have also been proposed, but they have been found to be too unreliable in practice due to the wide range of functionality required by common application-layer protocols, and are commonly considered to be obsolete. See for example ]<ref name=rfc2765></ref>, | |||
The first RFC to standardize IPv6 was the {{IETF RFC|1883}} in 1995,<ref>{{Cite journal |last1=Wang |first1=Tao |last2=Gao |first2=Jiaqiong |date=2019-01-01 |title=The Shortcomings of Ipv6 and Upgrade of Ipv4 |journal=International Journal of Advanced Network, Monitoring and Controls |language=en |volume=4 |issue=1 |pages=1–9 |doi=10.21307/ijanmc-2019-029|doi-access=free }}</ref> which became obsoleted by {{IETF RFC|2460}} in 1998.<ref name="Rosen kernel networking"/>{{Rp|209}} In July 2017 this RFC was superseded by {{IETF RFC|8200}}, which elevated IPv6 to "Internet Standard" (the highest maturity level for IETF protocols).<ref name="rfc8200">{{Citation |author=S. Deering |title=Internet Protocol, Version 6 (IPv6) Specification |date=July 2017 |journal=IETF Request for Comments (RFC) Pages – Test |publisher=] (IETF) |issn=2070-1721 |rfc=8200 |author2=R. Hinden |author-link=Steve Deering |author-link2=Bob Hinden}} Obsoletes RFC 2460.</ref> | |||
]<ref name=rfc2766></ref>, | |||
]<ref name=rfc3142></ref>, | |||
Socks-based Gateway<ref name=rfc3089></ref>, | |||
] or ]<ref name=rfc2767></ref>. | |||
==Deployment== | |||
==Major IPv6 announcements and availability== | |||
{{Main|IPv6 deployment}} | |||
*] announced on ] ] that the IPv6 AAAA records for the Japan (.jp) and Korea (.kr) country code Top Level Domain (ccTLD) nameservers became visible in the ] zone files with serial number 2004072000. The IPv6 records for France (.fr) were added a little later. This made IPv6 operational in a public fashion. | |||
] (RIR)]] | |||
*] ] (2003) has IPv6 supported and enabled by default.<ref name=macos></ref> | |||
*]<ref name=microsoftIPv6></ref> first released an experimental IPv6 stack in 1998. This support is not intended for use in a production environment. | |||
*] ] and ] SP1 had limited IPv6 support for research and testing since at least 2002. | |||
*Microsoft ] (2001) had IPv6 support for developmental purposes. In ] SP1 (2002) and ], IPv6 is included as a core networking technology, suitable for commercial deployment.<ref name="microsoft1"></ref> | |||
*Microsoft ] (2006) has IPv6 supported and enabled by default.<ref name="microsoft1"/> | |||
*Production-quality BSD support for IPv6 has been generally available since early to mid-2000 in ], ], and ] via the ]<ref></ref>. | |||
*] support has been available since version 2.1.8, released in 1996. As of ] 2.6.10, the Linux IPv6 stack was approved by the IPv6 Forum in the IPv6 Ready Logo Phase-1 Program. Development still continues on improving the stack.<ref name=linuxIPv6></ref> | |||
* In the end of ] ]'s ] 4.3 was the first commercial platform that supported IPv6 <ref name=AIXipV6></ref><ref name=AIXipV62></ref> | |||
* Apple's ] 802.11n base station is an IPv6 gateway in its default configuration. It uses 6to4 tunneling and can optionally route through a manually configured IPv4 tunnel.<ref name=AppleAirPortExtreme></ref> | |||
The 1993 introduction of ] (CIDR) in the routing and IP address allocation for the Internet, and the extensive use of ] (NAT), delayed ] to allow for IPv6 deployment, which began in the mid-2000s. | |||
==See also== | |||
* ] | |||
* ] | |||
Universities were among the early adopters of IPv6. ] deployed IPv6 at a trial location in 2004 and later expanded IPv6 deployment across the ]. By 2016, 82% of the traffic on their network used IPv6. ] began experimental IPv6 deployment in 2003 and by 2016 the IPv6 traffic on their networks averaged between 20% and 40%. A significant portion of this IPv6 traffic was generated through their ] collaboration with ], which relies entirely on IPv6.<ref>{{Citation|title=State of IPv6 Deployment 2018|url=https://www.internetsociety.org/resources/2018/state-of-ipv6-deployment-2018/|page=3|year=2018|publisher=]}}</ref> | |||
==Notes and references== | |||
<references/> | |||
The ] (DNS) has supported IPv6 since 2008. In the same year, IPv6 was first used in a major world event during the Beijing ].<ref name="beijing2008-pressrelease">{{cite press release|title=Beijing2008.cn leaps to next-generation Net|publisher=The Beijing Organizing Committee for the Games of the XXIX Olympiad|date=30 May 2008|url=http://en.beijing2008.cn/news/official/preparation/n214384681.shtml|url-status=dead|archive-url=https://web.archive.org/web/20090204051327/http://en.beijing2008.cn/news/official/preparation/n214384681.shtml|archive-date=4 February 2009}}</ref><ref>{{cite web|url=http://ipv6.com/articles/general/IPv6-Olympics-2008.htm|title=IPv6 and the 2008 Beijing Olympics|last=Das|first=Kaushik|year=2008|work=IPv6.com|access-date=15 August 2008|archive-date=1 August 2008|archive-url=https://web.archive.org/web/20080801051918/http://www.ipv6.com/articles/general/IPv6-Olympics-2008.htm|url-status=dead}}</ref> | |||
==Further reading== | |||
=== Core specifications === | |||
* RFC 2460: Internet Protocol, Version 6 (IPv6) Specification (obsoletes RFC 1883) | |||
* RFC 2461/RFC 4311: Neighbor Discovery for IP Version 6 (IPv6) (4311 updates) | |||
* RFC 2462: IPv6 Stateless Address Autoconfiguration | |||
* RFC 4443: Internet Control Message Protocol (ICMPv6) for the IPv6 Specification (obsoletes RFC 2463) | |||
* RFC 2464: Transmission of IPv6 Packets over Ethernet Networks | |||
* RFC 4291: Internet Protocol Version 6 (IPv6) Addressing Architecture (obsoletes RFC 3513) | |||
* RFC 3041: MAC address use replacement option | |||
* RFC 3587: An IPv6 Aggregatable Global Unicast Address Format | |||
By 2011, all major operating systems in use on personal computers and server systems had production-quality IPv6 implementations. Cellular telephone systems presented a large deployment field for Internet Protocol devices as mobile telephone service made the transition from ] to ] technologies, in which voice is provisioned as a ] (VoIP) service that would leverage IPv6 enhancements. In 2009, the US cellular operator ] released technical specifications for devices to operate on its "next-generation" networks.<ref name="verizon">{{cite web|first=Derek|last=Morr|title=Verizon Mandates IPv6 Support for Next-Gen Cell Phones|url=http://www.circleid.com/posts/20090609_verizon_mandates_ipv6_support_for_next_gen_cell_phones/|publisher=CircleID|date=2009-06-09}}</ref> The specification mandated IPv6 operation according to the ''3GPP Release 8 Specifications (March 2009)'', and deprecated IPv4 as an optional capability.<ref name="verizon"/> | |||
=== Stateless autoconfiguration === | |||
* RFC 2461: Neighbor Discovery for IP Version 6 (IPv6) | |||
* RFC 2462: IPv6 Stateless Address Autoconfiguration | |||
=== Programming === | |||
* RFC 3493: Basic Socket Interface Extensions for IPv6 (obsoletes RFC 2553) | |||
* RFC 3542: Advanced Sockets Application Program Interface (API) for IPv6 (obsoletes RFC 2292) | |||
* RFC 4038: Application Aspects of IPv6 Transition | |||
* RFC 3484: Default Address Selection for Internet Protocol version 6 (IPv6) | |||
The deployment of IPv6 in the ] continued. In 2018 only 25.3% of the about 54,000 autonomous systems advertised both IPv4 and IPv6 prefixes in the global ] (BGP) routing database. A further 243 networks advertised only an IPv6 prefix. Internet backbone transit networks offering IPv6 support existed in every country globally, except in parts of ], the ] and China.<ref name="IS 2018">{{cite web|title=State of IPv6 Deployment 2018|url=https://www.internetsociety.org/wp-content/uploads/2018/06/2018-ISOC-Report-IPv6-Deployment.pdf|website=InternetSociety.org|publisher=]|access-date=19 January 2022}}</ref>{{Rp|6}} By mid-2018 some major European ] ISPs had deployed IPv6 for the majority of their customers. ] provided over 86% of its customers with IPv6, ] had 56% deployment of IPv6, ] in the Netherlands had 73% deployment and in Belgium the broadband ISPs ] and ] had 73% and 63% IPv6 deployment respectively.<ref name="IS 2018"/>{{Rp|7}} In the United States the broadband ISP ] had an IPv6 deployment of about 66%. In 2018 Xfinity reported an estimated 36.1 million IPv6 users, while ] reported 22.3 million IPv6 users.<ref name="IS 2018"/>{{Rp|7–8}} | |||
=== Books === | |||
There are a number of IPv6 books: | |||
==Peering issues== | |||
* ISBN 0-12-370479-0 IPv6 Advanced Protocols Implementation (April 2007) | |||
There is a peering dispute going on between ] and ] on IPv6, with the two network providers refusing to peer.<ref>{{cite web |title=The case of Hurricane Electric And Cogent |url=https://bgp.tools/kb/partitions |website=BGP.tools |access-date=10 September 2024}}</ref> | |||
* ISBN 0-12-447751-8 IPv6 Core Protocols Implementation (October 2006) | |||
* ISBN 0-471-49892-0 Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks (2006) | |||
==See also== | |||
* ISBN 1-59059-527-0 Running IPv6 (2006) | |||
{{Portal|Internet}} | |||
* ISBN 0-596-00934-8 IPv6 Network Administration (2005) | |||
*] | |||
* ISBN 3-9522942-0-9 IPv6 - Grundlagen, Funktionalität, Integration by Silvia Hagen (German Edition, 2004) | |||
*] | |||
* ISBN 0-596-10058-2 IPv6 Essentials, 2nd Edition by Silvia Hagen (English, 2006) | |||
*] | |||
* ISBN 0-13-241936-X IPv6: The New Internet Protocol by Christian Huitema (1998) (The original IPv6 bible) | |||
*] | |||
*] | |||
*] | |||
==References== | |||
{{Reflist}} | |||
==External links== | ==External links== | ||
{{Wikidata property | P3793 }} | |||
* {{dmoz|Computers/Internet/Protocols/IP/IPv6/}} | |||
{{Wikiversity|IPv6}} | |||
* from Ars Technica | |||
{{Wiktionary|IPv6}} | |||
* | |||
* by Rami Rosen | |||
* by Google | |||
* – RFC 8200 document ratifying IPv6 as an Internet Standard | |||
{{IPv6}} | |||
===Related IETF working groups=== | |||
{{Authority control}} | |||
* IPv6 Backbone (concluded) | |||
* IP Next Generation (concluded) | |||
* IP Version 6 | |||
* IPv6 MIB (concluded) | |||
* Site Multihoming in IPv6 | |||
* Site Multihoming by IPv6 Intermediation | |||
* IPv6 Operations | |||
] | |||
] | |||
{{Link FA|de}} | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] |
Latest revision as of 00:45, 14 December 2024
Version 6 of the Internet ProtocolParts of this article (those related to RFC 8200 and RFC 8201) need to be updated. Please help update this article to reflect recent events or newly available information. (July 2017) |
Protocol stack | |
IPv6 header | |
Abbreviation | IPv6 |
---|---|
Purpose | Internetworking protocol |
Developer(s) | Internet Engineering Task Force |
Introduction | December 1995; 29 years ago (1995-12) |
Based on | IPv4 |
OSI layer | Network layer |
RFC(s) | 2460, 8200 |
Internet protocol suite |
---|
Application layer |
Transport layer |
Internet layer |
Link layer |
Internet history timeline |
Early research and development:
Merging the networks and creating the Internet:
Commercialization, privatization, broader access leads to the modern Internet:
Examples of Internet services:
|
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion, and was intended to replace IPv4. In December 1998, IPv6 became a Draft Standard for the IETF, which subsequently ratified it as an Internet Standard on 14 July 2017.
Devices on the Internet are assigned a unique IP address for identification and location definition. With the rapid growth of the Internet after commercialization in the 1990s, it became evident that far more addresses would be needed to connect devices than the IPv4 address space had available. By 1998, the IETF had formalized the successor protocol. IPv6 uses 128-bit addresses, theoretically allowing 2, or approximately 3.4×10 total addresses. The actual number is slightly smaller, as multiple ranges are reserved for special usage or completely excluded from general use. The two protocols are not designed to be interoperable, and thus direct communication between them is impossible, complicating the move to IPv6. However, several transition mechanisms have been devised to rectify this.
IPv6 provides other technical benefits in addition to a larger addressing space. In particular, it permits hierarchical address allocation methods that facilitate route aggregation across the Internet, and thus limit the expansion of routing tables. The use of multicast addressing is expanded and simplified, and provides additional optimization for the delivery of services. Device mobility, security, and configuration aspects have been considered in the design of the protocol.
IPv6 addresses are represented as eight groups of four hexadecimal digits each, separated by colons. The full representation may be shortened; for example, 2001:0db8:0000:0000:0000:8a2e:0370:7334 becomes 2001:db8::8a2e:370:7334.
Main features
IPv6 is an Internet Layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks, closely adhering to the design principles developed in the previous version of the protocol, Internet Protocol Version 4 (IPv4).
In addition to offering more addresses, IPv6 also implements features not present in IPv4. It simplifies aspects of address configuration, network renumbering, and router announcements when changing network connectivity providers. It simplifies packet processing in routers by placing the responsibility for packet fragmentation in the end points. The IPv6 subnet size is standardized by fixing the size of the host identifier portion of an address to 64 bits.
The addressing architecture of IPv6 is defined in RFC 4291 and allows three different types of transmission: unicast, anycast and multicast.
Motivation and origin
IPv4 address exhaustion
Main article: IPv4 address exhaustionInternet Protocol Version 4 (IPv4) was the first publicly used version of the Internet Protocol. IPv4 was developed as a research project by the Defense Advanced Research Projects Agency (DARPA), a United States Department of Defense agency, before becoming the foundation for the Internet and the World Wide Web. IPv4 includes an addressing system that uses numerical identifiers consisting of 32 bits. These addresses are typically displayed in dot-decimal notation as decimal values of four octets, each in the range 0 to 255, or 8 bits per number. Thus, IPv4 provides an addressing capability of 2 or approximately 4.3 billion addresses. Address exhaustion was not initially a concern in IPv4 as this version was originally presumed to be a test of DARPA's networking concepts. During the first decade of operation of the Internet, it became apparent that methods had to be developed to conserve address space. In the early 1990s, even after the redesign of the addressing system using a classless network model, it became clear that this would not suffice to prevent IPv4 address exhaustion, and that further changes to the Internet infrastructure were needed.
The last unassigned top-level address blocks of 16 million IPv4 addresses were allocated in February 2011 by the Internet Assigned Numbers Authority (IANA) to the five regional Internet registries (RIRs). However, each RIR still has available address pools and is expected to continue with standard address allocation policies until one /8 Classless Inter-Domain Routing (CIDR) block remains. After that, only blocks of 1,024 addresses (/22) will be provided from the RIRs to a local Internet registry (LIR). As of September 2015, all of Asia-Pacific Network Information Centre (APNIC), the Réseaux IP Européens Network Coordination Centre (RIPE NCC), Latin America and Caribbean Network Information Centre (LACNIC), and American Registry for Internet Numbers (ARIN) have reached this stage. This leaves African Network Information Center (AFRINIC) as the sole regional internet registry that is still using the normal protocol for distributing IPv4 addresses. As of November 2018, AFRINIC's minimum allocation is /22 or 1024 IPv4 addresses. A LIR may receive additional allocation when about 80% of all the address space has been utilized.
RIPE NCC announced that it had fully run out of IPv4 addresses on 25 November 2019, and called for greater progress on the adoption of IPv6.
Comparison with IPv4
On the Internet, data is transmitted in the form of network packets. IPv6 specifies a new packet format, designed to minimize packet header processing by routers. Because the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. However, most transport and application-layer protocols need little or no change to operate over IPv6; exceptions are application protocols that embed Internet-layer addresses, such as File Transfer Protocol (FTP) and Network Time Protocol (NTP), where the new address format may cause conflicts with existing protocol syntax.
Larger address space
The main advantage of IPv6 over IPv4 is its larger address space. The size of an IPv6 address is 128 bits, compared to 32 bits in IPv4. The address space therefore has 2=340,282,366,920,938,463,463,374,607,431,768,211,456 addresses (340 undecillion, approximately 3.4×10). Some blocks of this space and some specific addresses are reserved for special uses.
While this address space is very large, it was not the intent of the designers of IPv6 to assure geographical saturation with usable addresses. Rather, the longer addresses simplify allocation of addresses, enable efficient route aggregation, and allow implementation of special addressing features. In IPv4, complex Classless Inter-Domain Routing (CIDR) methods were developed to make the best use of the small address space. The standard size of a subnet in IPv6 is 2 addresses, about four billion times the size of the entire IPv4 address space. Thus, actual address space utilization will be small in IPv6, but network management and routing efficiency are improved by the large subnet space and hierarchical route aggregation.
Multicasting
Multicasting, the transmission of a packet to multiple destinations in a single send operation, is part of the base specification in IPv6. In IPv4 this is an optional (although commonly implemented) feature. IPv6 multicast addressing has features and protocols in common with IPv4 multicast, but also provides changes and improvements by eliminating the need for certain protocols. IPv6 does not implement traditional IP broadcast, i.e. the transmission of a packet to all hosts on the attached link using a special broadcast address, and therefore does not define broadcast addresses. In IPv6, the same result is achieved by sending a packet to the link-local all nodes multicast group at address ff02::1, which is analogous to IPv4 multicasting to address 224.0.0.1. IPv6 also provides for new multicast implementations, including embedding rendezvous point addresses in an IPv6 multicast group address, which simplifies the deployment of inter-domain solutions.
In IPv4 it is very difficult for an organization to get even one globally routable multicast group assignment, and the implementation of inter-domain solutions is arcane. Unicast address assignments by a local Internet registry for IPv6 have at least a 64-bit routing prefix, yielding the smallest subnet size available in IPv6 (also 64 bits). With such an assignment it is possible to embed the unicast address prefix into the IPv6 multicast address format, while still providing a 32-bit block, the least significant bits of the address, or approximately 4.2 billion multicast group identifiers. Thus each user of an IPv6 subnet automatically has available a set of globally routable source-specific multicast groups for multicast applications.
Stateless address autoconfiguration (SLAAC)
See also: IPv6 address § Stateless address autoconfigurationIPv6 hosts configure themselves automatically. Every interface has a self-generated link-local address and, when connected to a network, conflict resolution is performed and routers provide network prefixes via router advertisements. Stateless configuration of routers can be achieved with a special router renumbering protocol. When necessary, hosts may configure additional stateful addresses via Dynamic Host Configuration Protocol version 6 (DHCPv6) or static addresses manually.
Like IPv4, IPv6 supports globally unique IP addresses. The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet by rendering network address translation obsolete. Therefore, every device on the network is globally addressable directly from any other device.
A stable, unique, globally addressable IP address would facilitate tracking a device across networks. Therefore, such addresses are a particular privacy concern for mobile devices, such as laptops and cell phones. To address these privacy concerns, the SLAAC protocol includes what are typically called "privacy addresses" or, more correctly, "temporary addresses". Temporary addresses are random and unstable. A typical consumer device generates a new temporary address daily and will ignore traffic addressed to an old address after one week. Temporary addresses are used by default by Windows since XP SP1, macOS since (Mac OS X) 10.7, Android since 4.0, and iOS since version 4.3. Use of temporary addresses by Linux distributions varies.
Renumbering an existing network for a new connectivity provider with different routing prefixes is a major effort with IPv4. With IPv6, however, changing the prefix announced by a few routers can in principle renumber an entire network, since the host identifiers (the least-significant 64 bits of an address) can be independently self-configured by a host.
The SLAAC address generation method is implementation-dependent. IETF recommends that addresses be deterministic but semantically opaque.
IPsec
Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory part of all IPv6 protocol implementations, and Internet Key Exchange (IKE) was recommended, but with RFC 6434 the inclusion of IPsec in IPv6 implementations was downgraded to a recommendation because it was considered impractical to require full IPsec implementation for all types of devices that may use IPv6. However, as of RFC 4301 IPv6 protocol implementations that do implement IPsec need to implement IKEv2 and need to support a minimum set of cryptographic algorithms. This requirement will help to make IPsec implementations more interoperable between devices from different vendors. The IPsec Authentication Header (AH) and the Encapsulating Security Payload header (ESP) are implemented as IPv6 extension headers.
Simplified processing by routers
The packet header in IPv6 is simpler than the IPv4 header. Many rarely used fields have been moved to optional header extensions. The IPv6 packet header has simplified the process of packet forwarding by routers. Although IPv6 packet headers are at least twice the size of IPv4 packet headers, processing of packets that only contain the base IPv6 header by routers may, in some cases, be more efficient, because less processing is required in routers due to the headers being aligned to match common word sizes. However, many devices implement IPv6 support in software (as opposed to hardware), thus resulting in very bad packet processing performance. Additionally, for many implementations, the use of Extension Headers causes packets to be processed by a router's CPU, leading to poor performance or even security issues.
Moreover, an IPv6 header does not include a checksum. The IPv4 header checksum is calculated for the IPv4 header, and has to be recalculated by routers every time the time to live (called hop limit in the IPv6 protocol) is reduced by one. The absence of a checksum in the IPv6 header furthers the end-to-end principle of Internet design, which envisioned that most processing in the network occurs in the leaf nodes. Integrity protection for the data that is encapsulated in the IPv6 packet is assumed to be assured by both the link layer or error detection in higher-layer protocols, namely the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) on the transport layer. Thus, while IPv4 allowed UDP datagram headers to have no checksum (indicated by 0 in the header field), IPv6 requires a checksum in UDP headers.
IPv6 routers do not perform IP fragmentation. IPv6 hosts are required to do one of the following: perform Path MTU Discovery, perform end-to-end fragmentation, or send packets no larger than the default maximum transmission unit (MTU), which is 1280 octets.
Mobility
Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection point without renumbering.
Extension headers
The IPv6 packet header has a minimum size of 40 octets (320 bits). Options are implemented as extensions. This provides the opportunity to extend the protocol in the future without affecting the core packet structure. However, RFC 7872 notes that some network operators drop IPv6 packets with extension headers when they traverse transit autonomous systems.
Jumbograms
IPv4 limits packets to 65,535 (2−1) octets of payload. An IPv6 node can optionally handle packets over this limit, referred to as jumbograms, which can be as large as 4,294,967,295 (2−1) octets. The use of jumbograms may improve performance over high-MTU links. The use of jumbograms is indicated by the Jumbo Payload Option extension header.
IPv6 packets
Main article: IPv6 packetAn IPv6 packet has two parts: a header and payload.
The header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features.
The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic class, hop count, and the type of the optional extension or payload which follows the header. This Next Header field tells the receiver how to interpret the data which follows the header. If the packet contains options, this field contains the option type of the next option. The "Next Header" field of the last option points to the upper-layer protocol that is carried in the packet's payload.
The current use of the IPv6 Traffic Class field divides this between a 6 bit Differentiated Services Code Point and a 2-bit Explicit Congestion Notification field.
Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the IPsec framework.
Without special options, a payload must be less than 64kB. With a Jumbo Payload option (in a Hop-By-Hop Options extension header), the payload must be less than 4 GB.
Unlike with IPv4, routers never fragment a packet. Hosts are expected to use Path MTU Discovery to make their packets small enough to reach the destination without needing to be fragmented. See IPv6 packet fragmentation.
Addressing
Main article: IPv6 addressIPv6 addresses have 128 bits. The design of the IPv6 address space implements a different design philosophy than in IPv4, in which subnetting was used to improve the efficiency of utilization of the small address space. In IPv6, the address space is deemed large enough for the foreseeable future, and a local area subnet always uses 64 bits for the host portion of the address, designated as the interface identifier, while the most-significant 64 bits are used as the routing prefix. While the myth has existed regarding IPv6 subnets being impossible to scan, RFC 7707 notes that patterns resulting from some IPv6 address configuration techniques and algorithms allow address scanning in many real-world scenarios.
Address representation
The 128 bits of an IPv6 address are represented in 8 groups of 16 bits each. Each group is written as four hexadecimal digits (sometimes called hextets or more formally hexadectets and informally a quibble or quad-nibble) and the groups are separated by colons (:). An example of this representation is 2001:0db8:0000:0000:0000:ff00:0042:8329.
For convenience and clarity, the representation of an IPv6 address may be shortened with the following rules:
- One or more leading zeros from any group of hexadecimal digits are removed, which is usually done to all of the leading zeros. For example, the group 0042 is converted to 42. The group 0000 is converted to 0.
- Consecutive sections of zeros are replaced with two colons (::). This may only be used once in an address, as multiple use would render the address indeterminate. A double colon should not be used to denote an omitted single section of zeros.
An example of application of these rules:
- Initial address: 2001:0db8:0000:0000:0000:ff00:0042:8329.
- After removing all leading zeros in each group: 2001:db8:0:0:0:ff00:42:8329.
- After omitting consecutive sections of zeros: 2001:db8::ff00:42:8329.
The loopback address is defined as 0000:0000:0000:0000:0000:0000:0000:0001 and is abbreviated to ::1 by using both rules.
As an IPv6 address may have more than one representation, the IETF has issued a proposed standard for representing them in text.
Because IPv6 addresses contain colons, and URLs use colons to separate the host from the port number, an IPv6 address used as the host-part of a URL should be enclosed in square brackets, e.g. http:// or http://:8080/path/page.html.
Link-local address
All interfaces of IPv6 hosts require a link-local address, which have the prefix fe80::/10. This prefix is followed by 54 bits that can be used for subnetting, although they are typically set to zeros, and a 64-bit interface identifier. The host can compute and assign the Interface identifier by itself without the presence or cooperation of an external network component like a DHCP server, in a process called link-local address autoconfiguration.
The lower 64 bits of the link-local address (the suffix) were originally derived from the MAC address of the underlying network interface card. As this method of assigning addresses would cause undesirable address changes when faulty network cards were replaced, and as it also suffered from a number of security and privacy issues, RFC 8064 has replaced the original MAC-based method with the hash-based method specified in RFC 7217.
Address uniqueness and router solicitation
IPv6 uses a new mechanism for mapping IP addresses to link-layer addresses (e.g. MAC addresses), because it does not support the broadcast addressing method, on which the functionality of the Address Resolution Protocol (ARP) in IPv4 is based. IPv6 implements the Neighbor Discovery Protocol (NDP, ND) in the link layer, which relies on ICMPv6 and multicast transmission. IPv6 hosts verify the uniqueness of their IPv6 addresses in a local area network (LAN) by sending a neighbor solicitation message asking for the link-layer address of the IP address. If any other host in the LAN is using that address, it responds.
A host bringing up a new IPv6 interface first generates a unique link-local address using one of several mechanisms designed to generate a unique address. Should a non-unique address be detected, the host can try again with a newly generated address. Once a unique link-local address is established, the IPv6 host determines whether the LAN is connected on this link to any router interface that supports IPv6. It does so by sending out an ICMPv6 router solicitation message to the all-routers multicast group with its link-local address as source. If there is no answer after a predetermined number of attempts, the host concludes that no routers are connected. If it does get a response, known as a router advertisement, from a router, the response includes the network configuration information to allow establishment of a globally unique address with an appropriate unicast network prefix. There are also two flag bits that tell the host whether it should use DHCP to get further information and addresses:
- The Manage bit, which indicates whether or not the host should use DHCP to obtain additional addresses rather than rely on an auto-configured address from the router advertisement.
- The Other bit, which indicates whether or not the host should obtain other information through DHCP. The other information consists of one or more prefix information options for the subnets that the host is attached to, a lifetime for the prefix, and two flags:
- On-link: If this flag is set, the host will treat all addresses on the specific subnet as being on-link and send packets directly to them instead of sending them to a router for the duration of the given lifetime.
- Address: This flag tells the host to actually create a global address.
Global addressing
The assignment procedure for global addresses is similar to local-address construction. The prefix is supplied from router advertisements on the network. Multiple prefix announcements cause multiple addresses to be configured.
Stateless address autoconfiguration (SLAAC) requires a /64 address block. Local Internet registries are assigned at least /32 blocks, which they divide among subordinate networks. The initial recommendation of September 2001 stated assignment of a /48 subnet to end-consumer sites. In March 2011 this recommendation was refined: The IETF "recommends giving home sites significantly more than a single /64, but does not recommend that every home site be given a /48 either". Blocks of /56s are specifically considered. It remains to be seen whether ISPs will honor this recommendation. For example, during initial trials, Comcast customers were given a single /64 network.
IPv6 in the Domain Name System
In the Domain Name System (DNS), hostnames are mapped to IPv6 addresses by AAAA ("quad-A") resource records. For reverse resolution, the IETF reserved the domain ip6.arpa, where the name space is hierarchically divided by the 1-digit hexadecimal representation of nibble units (4 bits) of the IPv6 address. This scheme is defined in RFC 3596.
When a dual-stack host queries a DNS server to resolve a fully qualified domain name (FQDN), the DNS client of the host sends two DNS requests, one querying A records and the other querying AAAA records. The host operating system may be configured with a preference for address selection rules RFC 6724.
An alternative record type was used in early DNS implementations for IPv6, designed to facilitate network renumbering, the A6 records for the forward lookup and a number of other innovations such as bit-string labels and DNAME records. It is defined in RFC 2874 and its references (with further discussion of the pros and cons of both schemes in RFC 3364), but has been deprecated to experimental status (RFC 3363).
Transition mechanisms
Main article: IPv6 transition mechanismIPv6 is not foreseen to supplant IPv4 instantaneously. Both protocols will continue to operate simultaneously for some time. Therefore, IPv6 transition mechanisms are needed to enable IPv6 hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach each other over IPv4 infrastructure.
According to Silvia Hagen, a dual-stack implementation of the IPv4 and IPv6 on devices is the easiest way to migrate to IPv6. Many other transition mechanisms use tunneling to encapsulate IPv6 traffic within IPv4 networks and vice versa. This is an imperfect solution, which reduces the maximum transmission unit (MTU) of a link and therefore complicates Path MTU Discovery, and may increase latency.
Dual-stack IP implementation
Dual-stack IP implementations provide complete IPv4 and IPv6 protocol stacks in the operating system of a computer or network device on top of the common physical layer implementation, such as Ethernet. This permits dual-stack hosts to participate in IPv6 and IPv4 networks simultaneously.
A device with dual-stack implementation in the operating system has an IPv4 and IPv6 address, and can communicate with other nodes in the LAN or the Internet using either IPv4 or IPv6. The DNS protocol is used by both IP protocols to resolve fully qualified domain names and IP addresses, but dual stack requires that the resolving DNS server can resolve both types of addresses. Such a dual-stack DNS server holds IPv4 addresses in the A records and IPv6 addresses in the AAAA records. Depending on the destination that is to be resolved, a DNS name server may return an IPv4 or IPv6 IP address, or both. A default address selection mechanism, or preferred protocol, needs to be configured either on hosts or the DNS server. The IETF has published Happy Eyeballs to assist dual-stack applications, so that they can connect using both IPv4 and IPv6, but prefer an IPv6 connection if it is available. However, dual-stack also needs to be implemented on all routers between the host and the service for which the DNS server has returned an IPv6 address. Dual-stack clients should be configured to prefer IPv6 only if the network is able to forward IPv6 packets using the IPv6 versions of routing protocols. When dual-stack network protocols are in place the application layer can be migrated to IPv6.
While dual-stack is supported by major operating system and network device vendors, legacy networking hardware and servers do not support IPv6.
ISP customers with public-facing IPv6
Internet service providers (ISPs) are increasingly providing their business and private customers with public-facing IPv6 global unicast addresses. If IPv4 is still used in the local area network (LAN), however, and the ISP can only provide one public-facing IPv6 address, the IPv4 LAN addresses are translated into the public facing IPv6 address using NAT64, a network address translation (NAT) mechanism. Some ISPs cannot provide their customers with public-facing IPv4 and IPv6 addresses, thus supporting dual-stack networking, because some ISPs have exhausted their globally routable IPv4 address pool. Meanwhile, ISP customers are still trying to reach IPv4 web servers and other destinations.
A significant percentage of ISPs in all regional Internet registry (RIR) zones have obtained IPv6 address space. This includes many of the world's major ISPs and mobile network operators, such as Verizon Wireless, StarHub Cable, Chubu Telecommunications, Kabel Deutschland, Swisscom, T-Mobile, Internode and Telefónica.
While some ISPs still allocate customers only IPv4 addresses, many ISPs allocate their customers only an IPv6 or dual-stack IPv4 and IPv6. ISPs report the share of IPv6 traffic from customers over their network to be anything between 20% and 40%, but by mid-2017 IPv6 traffic still only accounted for a fraction of total traffic at several large Internet exchange points (IXPs). AMS-IX reported it to be 2% and SeattleIX reported 7%. A 2017 survey found that many DSL customers that were served by a dual stack ISP did not request DNS servers to resolve fully qualified domain names into IPv6 addresses. The survey also found that the majority of traffic from IPv6-ready web-server resources were still requested and served over IPv4, mostly due to ISP customers that did not use the dual stack facility provided by their ISP and to a lesser extent due to customers of IPv4-only ISPs.
Tunneling
The technical basis for tunneling, or encapsulating IPv6 packets in IPv4 packets, is outlined in RFC 4213. When the Internet backbone was IPv4-only, one of the frequently used tunneling protocols was 6to4. Teredo tunneling was also frequently used for integrating IPv6 LANs with the IPv4 Internet backbone. Teredo is outlined in RFC 4380 and allows IPv6 local area networks to tunnel over IPv4 networks, by encapsulating IPv6 packets within UDP. The Teredo relay is an IPv6 router that mediates between a Teredo server and the native IPv6 network. It was expected that 6to4 and Teredo would be widely deployed until ISP networks would switch to native IPv6, but by 2014 Google Statistics showed that the use of both mechanisms had dropped to almost 0.
IPv4-mapped IPv6 addresses
Hybrid dual-stack IPv6/IPv4 implementations recognize a special class of addresses, the IPv4-mapped IPv6 addresses. These addresses are typically written with a 96-bit prefix in the standard IPv6 format, and the remaining 32 bits are written in the customary dot-decimal notation of IPv4.
Addresses in this group consist of an 80-bit prefix of zeros, the next 16 bits are ones, and the remaining, least-significant 32 bits contain the IPv4 address. For example, ::ffff:192.0.2.128 represents the IPv4 address 192.0.2.128. A previous format, called "IPv4-compatible IPv6 address", was ::192.0.2.128; however, this method is deprecated.
Because of the significant internal differences between IPv4 and IPv6 protocol stacks, some of the lower-level functionality available to programmers in the IPv6 stack does not work the same when used with IPv4-mapped addresses. Some common IPv6 stacks do not implement the IPv4-mapped address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g., Microsoft Windows 2000, XP, and Server 2003), or because of security concerns (OpenBSD). On these operating systems, a program must open a separate socket for each IP protocol it uses. On some systems, e.g., the Linux kernel, NetBSD, and FreeBSD, this feature is controlled by the socket option IPV6_V6ONLY.
The address prefix 64:ff9b::/96 is a class of IPv4-embedded IPv6 addresses for use in NAT64 transition methods. For example, 64:ff9b::192.0.2.128 represents the IPv4 address 192.0.2.128.
Security
A number of security implications may arise from the use of IPv6. Some of them may be related with the IPv6 protocols themselves, while others may be related with implementation flaws.
Shadow networks
The addition of nodes having IPv6 enabled by default by the software manufacturer may result in the inadvertent creation of shadow networks, causing IPv6 traffic flowing into networks having only IPv4 security management in place. This may also occur with operating system upgrades, when the newer operating system enables IPv6 by default, while the older one did not. Failing to update the security infrastructure to accommodate IPv6 can lead to IPv6 traffic bypassing it. Shadow networks have occurred on business networks in which enterprises are replacing Windows XP systems that do not have an IPv6 stack enabled by default, with Windows 7 systems, that do. Some IPv6 stack implementors have therefore recommended disabling IPv4 mapped addresses and instead using a dual-stack network where supporting both IPv4 and IPv6 is necessary.
IPv6 packet fragmentation
Research has shown that the use of fragmentation can be leveraged to evade network security controls, similar to IPv4. As a result, RFC 7112 requires that the first fragment of an IPv6 packet contains the entire IPv6 header chain, such that some very pathological fragmentation cases are forbidden. Additionally, as a result of research on the evasion of RA-Guard in RFC 7113, RFC 6980 has deprecated the use of fragmentation with Neighbor Discovery, and discouraged the use of fragmentation with Secure Neighbor Discovery (SEND).
Standardization through RFCs
Working-group proposals
Due to the anticipated global growth of the Internet, the Internet Engineering Task Force (IETF) in the early 1990s started an effort to develop a next generation IP protocol. By the beginning of 1992, several proposals appeared for an expanded Internet addressing system and by the end of 1992 the IETF announced a call for white papers. In September 1993, the IETF created a temporary, ad hoc IP Next Generation (IPng) area to deal specifically with such issues. The new area was led by Allison Mankin and Scott Bradner, and had a directorate with 15 engineers from diverse backgrounds for direction-setting and preliminary document review: The working-group members were J. Allard (Microsoft), Steve Bellovin (AT&T), Jim Bound (Digital Equipment Corporation), Ross Callon (Wellfleet), Brian Carpenter (CERN), Dave Clark (MIT), John Curran (NEARNET), Steve Deering (Xerox), Dino Farinacci (Cisco), Paul Francis (NTT), Eric Fleischmann (Boeing), Mark Knopper (Ameritech), Greg Minshall (Novell), Rob Ullmann (Lotus), and Lixia Zhang (Xerox).
The Internet Engineering Task Force adopted the IPng model on 25 July 1994, with the formation of several IPng working groups. By 1996, a series of RFCs was released defining Internet Protocol version 6 (IPv6), starting with RFC 1883. (Version 5 was used by the experimental Internet Stream Protocol.)
RFC standardization
The first RFC to standardize IPv6 was the RFC 1883 in 1995, which became obsoleted by RFC 2460 in 1998. In July 2017 this RFC was superseded by RFC 8200, which elevated IPv6 to "Internet Standard" (the highest maturity level for IETF protocols).
Deployment
Main article: IPv6 deploymentThe 1993 introduction of Classless Inter-Domain Routing (CIDR) in the routing and IP address allocation for the Internet, and the extensive use of network address translation (NAT), delayed IPv4 address exhaustion to allow for IPv6 deployment, which began in the mid-2000s.
Universities were among the early adopters of IPv6. Virginia Tech deployed IPv6 at a trial location in 2004 and later expanded IPv6 deployment across the campus network. By 2016, 82% of the traffic on their network used IPv6. Imperial College London began experimental IPv6 deployment in 2003 and by 2016 the IPv6 traffic on their networks averaged between 20% and 40%. A significant portion of this IPv6 traffic was generated through their high energy physics collaboration with CERN, which relies entirely on IPv6.
The Domain Name System (DNS) has supported IPv6 since 2008. In the same year, IPv6 was first used in a major world event during the Beijing 2008 Summer Olympics.
By 2011, all major operating systems in use on personal computers and server systems had production-quality IPv6 implementations. Cellular telephone systems presented a large deployment field for Internet Protocol devices as mobile telephone service made the transition from 3G to 4G technologies, in which voice is provisioned as a voice over IP (VoIP) service that would leverage IPv6 enhancements. In 2009, the US cellular operator Verizon released technical specifications for devices to operate on its "next-generation" networks. The specification mandated IPv6 operation according to the 3GPP Release 8 Specifications (March 2009), and deprecated IPv4 as an optional capability.
The deployment of IPv6 in the Internet backbone continued. In 2018 only 25.3% of the about 54,000 autonomous systems advertised both IPv4 and IPv6 prefixes in the global Border Gateway Protocol (BGP) routing database. A further 243 networks advertised only an IPv6 prefix. Internet backbone transit networks offering IPv6 support existed in every country globally, except in parts of Africa, the Middle East and China. By mid-2018 some major European broadband ISPs had deployed IPv6 for the majority of their customers. Sky UK provided over 86% of its customers with IPv6, Deutsche Telekom had 56% deployment of IPv6, XS4ALL in the Netherlands had 73% deployment and in Belgium the broadband ISPs VOO and Telenet had 73% and 63% IPv6 deployment respectively. In the United States the broadband ISP Xfinity had an IPv6 deployment of about 66%. In 2018 Xfinity reported an estimated 36.1 million IPv6 users, while AT&T reported 22.3 million IPv6 users.
Peering issues
There is a peering dispute going on between Hurricane Electric and Cogent Communications on IPv6, with the two network providers refusing to peer.
See also
- China Next Generation Internet
- Comparison of IPv6 support in operating systems
- Comparison of IPv6 support in common applications
- DoD IPv6 product certification
- OCCAID
- University of New Hampshire InterOperability Laboratory
References
- "FAQs". New Zealand IPv6 Task Force. Archived from the original on 29 January 2019. Retrieved 26 October 2015.
- ^ S. Deering; R. Hinden (December 1998), Internet Protocol, Version 6 (IPv6) Specification, Internet Engineering Task Force (IETF), RFC 2460 Obsoletes RFC 1883.
- ^ S. Deering; R. Hinden (July 2017), "Internet Protocol, Version 6 (IPv6) Specification", IETF Request for Comments (RFC) Pages – Test, Internet Engineering Task Force (IETF), ISSN 2070-1721, RFC 8200 Obsoletes RFC 2460.
- Siddiqui, Aftab (17 July 2017). "RFC 8200 – IPv6 Has Been Standardized". Internet Society. Archived from the original on 23 October 2023. Retrieved 25 February 2018.
- ^ Rosen, Rami (2014). Linux Kernel Networking: Implementation and Theory. New York: Apress. ISBN 9781430261971. OCLC 869747983.
- Google IPv6 Conference 2008: What will the IPv6 Internet look like?. Event occurs at 13:35. Archived from the original on 11 December 2021.
- ^ Bradner, S.; Mankin, A. (January 1995). The Recommendation for the IP Next Generation Protocol. IETF. doi:10.17487/RFC1752. RFC 1752.
- "Free Pool of IPv4 Address Space Depleted". NRO.net. Montevideo: The Number Resource Organization. 3 February 2011. Archived from the original on 18 January 2024. Retrieved 19 January 2022.
- Rashid, Fahmida (1 February 2011). "IPv4 Address Exhaustion Not Instant Cause for Concern with IPv6 in Wings". eWeek. Archived from the original on 20 January 2024. Retrieved 23 June 2012.
- Ward, Mark (14 September 2012). "Europe hits old internet address limits". BBC News. Archived from the original on 5 November 2023. Retrieved 15 September 2012.
- Huston, Geoff. "IPV4 Address Report". Archived from the original on 10 January 2024.
- "FAQ". my.afrinic.net. AFRINIC. Archived from the original on 23 October 2023. Retrieved 28 November 2018.
- "The RIPE NCC has run out of IPv4 Addresses" (Press release). RIPE NCC. 25 November 2019. Archived from the original on 19 January 2024. Retrieved 26 November 2019.
- ^ Partridge, C.; Kastenholz, F. (December 1994). "Technical Criteria for Choosing IP The Next Generation (IPng)". RFC 1726.
- RFC 1112, Host extensions for IP multicasting, S. Deering (August 1989)
- RFC 3956, Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address, P. Savola, B. Haberman (November 2004)
- RFC 2908, The Internet Multicast Address Allocation Architecture, D. Thaler, M. Handley, D. Estrin (September 2000)
- RFC 3306, Unicast-Prefix-based IPv6 Multicast Addresses, B. Haberman, D. Thaler (August 2002)
- ^ S. Thomson; T. Narten; T. Jinmei (September 2007). IPv6 Stateless Address Autoconfiguration. Network Working Group. doi:10.17487/RFC4862. RFC 4862. Draft Standard. Obsoletes RFC 2462. Updated by RFC 7527.
- M. Crawford (August 2000). Router Renumbering for IPv6. Network Working Group. doi:10.17487/RFC2894. RFC 2894. Proposed Standard.
- T. Narten; R. Draves; S. Krishnan (September 2007). "Privacy Extensions for Stateless Address Autoconfiguration in IPv6". www.ietf.org. Retrieved 13 March 2017.
- F. Gont; S. Krishnan; T. Narten; R. Draves (February 2021). Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6. Internet Engineering Task Force. doi:10.17487/RFC8981. ISSN 2070-1721. RFC 8981. Proposed Standard. Obsoletes RFC 4941.
- "Overview of the Advanced Networking Pack for Windows XP". Microsoft. Archived from the original on 7 September 2017. Retrieved 15 April 2019.
- "Privacy Extensions for IPv6 SLAAC". Internet Society. 8 August 2014. Archived from the original on 23 October 2023. Retrieved 17 January 2020.
- P. Ferguson; H. Berkowitz (January 1997). Network Renumbering Overview: Why would I want it and what is it anyway?. Network Working Group. doi:10.17487/RFC2071. RFC 2071. Informational.
- Ferguson, P.; Berkowitz, H. (January 1997). "Network Renumbering Overview: Why would I want it and what is it anyway?". IETF. doi:10.17487/RFC2071. RFC 2071. Archived from the original on 7 January 2024.
- Berkowitz, H. (January 1997). "Router Renumbering Guide". IETF. doi:10.17487/RFC2072. RFC 2072. Archived from the original on 8 June 2023.
- Cooper, Alissa; Gont, Fernando; Thaler, Dave. Recommendation on Stable IPv6 Interface Identifiers. doi:10.17487/RFC8064. RFC 8064.
- Silvia Hagen (2014). IPv6 Essentials: Integrating IPv6 into Your IPv4 Network (3rd ed.). Sebastopol, CA: O'Reilly Media. p. 196. ISBN 978-1-4493-3526-7. OCLC 881832733.
- Zack, E. (July 2013). "IPv6 Security Assessment and Benchmarking".
- Gont, F. (March 2016). "Operational Implications of IPv6 Packets with Extension Headers". IETF. Archived from the original on 27 October 2023.
- V. Devarapalli; R. Wakikawa; A. Petrescu; P. Thubert (January 2005). Network Mobility (NEMO) Basic Support Protocol. Network Working Group. doi:10.17487/RFC3963. RFC 3963. Proposed Standard.
- D. Borman; S. Deering; R. Hinden (August 1999). IPv6 Jumbograms. Network Working Group. doi:10.17487/RFC2675. RFC 2675. Proposed Standard. Obsoletes RFC 2147.
- K. Nichols; S. Blake; F. Baker; D. Black (December 1998). Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. Network Working Group. doi:10.17487/RFC2474. RFC 2474. Proposed Standard. Obsoletes RFC 1455 and 1349. Updated by RFC 3168, 3260 and 8436.
- K. Ramakrishnan; S. Floyd; D. Black (September 2001). The Addition of Explicit Congestion Notification (ECN) to IP. Network Working Group. doi:10.17487/RFC3168. RFC 3168. Proposed Standard. Obsoletes RFC 2481. Updates RFC 2474, 2401 and 793. Updated by RFC 4301, 6040 and 8311.
- ^ R. Hinden; S. Deering (February 2006). IP Version 6 Addressing Architecture. Network Working Group. doi:10.17487/RFC4291. RFC 4291. Draft Standard. Obsoletes RFC 3513. Updated by RFC 5952, 6052, 7136, 7346, 7371 and 8064.
- Graziani, Rick (2012). IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6. Cisco Press. p. 55. ISBN 978-0-13-303347-2.
- Coffeen, Tom (2014). IPv6 Address Planning: Designing an Address Plan for the Future. O'Reilly Media. p. 170. ISBN 978-1-4919-0326-1.
- ^ Horley, Edward (2013). Practical IPv6 for Windows Administrators. Apress. p. 17. ISBN 978-1-4302-6371-5.
- ^ S. Kawamura; M. Kawashima (August 2010). A Recommendation for IPv6 Address Text Representation. Internet Engineering Task Force. doi:10.17487/RFC5952. ISSN 2070-1721. RFC 5952. Proposed Standard. Updates RFC 4291.
- M. Blanchet (April 2008). Special-Use IPv6 Addresses. Network Working Group. doi:10.17487/RFC5156. RFC 5156. Proposed Standard. Obsoleted by RFC 6890.
- T. Berners-Lee; R. Fielding; L. Masinter (January 2005). Uniform Resource Identifier (URI): Generic Syntax. Network Working Group. doi:10.17487/RFC3986. STD 66. RFC 3986. Internet Standard 66. Obsoletes RFC 2732, 2396 and 1808. Updated by RFC 6874, 7320 and 8820. Updates RFC 1738.
- ^ Narten, T. (August 1999). "Neighbor discovery and stateless autoconfiguration in IPv6". IEEE Internet Computing. 3 (4): 54–62. doi:10.1109/4236.780961.
- Narten, T. (September 2007). "Neighbor Discovery for IP version 6 (IPv6)". IETF. section 6.3.7. doi:10.17487/RFC4861. RFC 4861. Archived from the original on 17 January 2024.
- Thomson, S. (September 2007). "IPv6 Stateless Address Autoconfiguration - Section 5.5.1". IETF. doi:10.17487/RFC4862. RFC 4862. Archived from the original on 11 January 2024.
- "IPv6 Address Allocation and Assignment Policy". RIPE NCC. 8 February 2011. Archived from the original on 3 June 2023. Retrieved 27 March 2011.
- IAB; IESG (September 2001). IAB/IESG Recommendations on IPv6 Address Allocations to Sites. Network Working Group. doi:10.17487/RFC3177. RFC 3177. Obsolete. Obsoleted by RFC 6177.
- T. Narten; G. Huston; L. Roberts (March 2011). IPv6 Address Assignment to End Sites. Internet Engineering Task Force (IETF). doi:10.17487/RFC6177. ISSN 2070-1721. BCP 157. RFC 6177. Best Common Practice. Obsoletes RFC 3177.
- Brzozowski, John (31 January 2011). "Comcast Activates First Users With IPv6 Native Dual Stack Over DOCSIS" (Press release). Comcast. Archived from the original on 23 October 2023. Retrieved 15 April 2019.
- Silvia Hagen (2014). IPv6 Essentials: Integrating IPv6 into Your IPv4 Network. O'Reilly Media, Inc. p. 176. ISBN 9781449335267.
- "IPv6 Transition Mechanism/Tunneling Comparison". Sixxs.net. Archived from the original on 23 October 2023. Retrieved 20 January 2012.
- Silvia Hagen (2014). IPv6 Essentials: Integrating IPv6 into Your IPv4 Network. O'Reilly Media, Inc. pp. 222–223. ISBN 9781449335267.
- Carpenter, B. (August 2011). "Advisory Guidelines for 6to4 Deployment". IETF. doi:10.17487/RFC6343. RFC 6343. Archived from the original on 28 January 2023. Retrieved 20 August 2012.
- "IPv6: Dual stack where you can; tunnel where you must". networkworld.com. 5 September 2007. Archived from the original on 20 January 2024. Retrieved 27 November 2012.
- E. Nordmark; R. Gilligan (October 2005). Basic Transition Mechanisms for IPv6 Hosts and Routers. Network Working Group. doi:10.17487/RFC4213. RFC 4213. Proposed Standard. Obsoletes RFC 2893.
- Silvia Hagen (2014). IPv6 Essentials: Integrating IPv6 into Your IPv4 Network. O'Reilly Media, Inc. p. 222. ISBN 9781449335267.
- "Understanding Dual Stacking of IPv4 and IPv6 Unicast Addresses". Juniper.net. Juniper Networks. 31 August 2017. Retrieved 19 January 2022.
- "IPv6". NRO.net. Archived from the original on 12 January 2017. Retrieved 13 March 2017.
- Pujol, Enric (12 June 2017). "What Stops IPv6 Traffic in a Dual-Stack ISP?". APNIC.net. APNIC. Archived from the original on 27 March 2023. Retrieved 13 June 2017.
- Vaughan-Nichols, Steven J. (14 October 2010). "Five ways for IPv6 and IPv4 to peacefully co-exist". ZDNET. Archived from the original on 5 December 2023. Retrieved 13 March 2017.
- Silvia Hagen (2014). IPv6 Essentials: Integrating IPv6 into Your IPv4 Network. O'Reilly Media, Inc. p. 33. ISBN 9781449335267.
- M. Cotton; L. Vegoda; B. Haberman (April 2013). R. Bonica (ed.). Special-Purpose IP Address Registries. IETF. doi:10.17487/RFC6890. ISSN 2070-1721. BCP 153. RFC 6890. Best Current Practice 153. Obsoletes RFC 4773, 5156, 5735 and 5736. Updated by RFC 8190.
-
inet6(4)
– OpenBSD Kernel Interfaces Manual - R. Gilligan; S. Thomson; J. Bound; J. McCann; W. Stevens (February 2003). Basic Socket Interface Extensions for IPv6. Network Working Group. doi:10.17487/RFC3493. RFC 3493.
- C. Bao; C. Huitema; M. Bagnulo; M. Boucadair; X. Li (October 2010). IPv6 Addressing of IPv4/IPv6 Translators. Internet Engineering Task Force (IETF). doi:10.17487/RFC6052. ISSN 2070-1721. RFC 6052. Proposed Standard. Updates RFC 4291.
- Gont, Fernando (10 March 2019), IPv6 Security for IPv4 Engineers (PDF), retrieved 30 August 2019
- Gont, Fernando (10 January 2019), IPv6 Security Frequently Asked Questions (FAQ) (PDF), retrieved 30 August 2019
- Mullins, Robert (5 April 2012), Shadow Networks: an Unintended IPv6 Side Effect, archived from the original on 11 April 2013, retrieved 2 March 2013
- Cicileo, Guillermo; Gagliano, Roque; O’Flaherty, Christian; et al. (October 2009). IPv6 For All: A Guide for IPv6 Usage and Application in Different Environments (PDF). p. 5. Retrieved 2 March 2013.
- Jun-ichiro itojun Hagino (October 2003). "IPv4-Mapped Addresses on the Wire Considered Harmful".
- Bradner, S.; Mankin, A. (December 1993). "IP: Next Generation (IPng) White Paper Solicitation". RFC 1550.
- "History of the IPng Effort". The Sun. Archived from the original on 23 May 2014.
- Bradner, Scott O.; Mankin, Allison J. (January 1995). "The Recommendation for the IP Next Generation Protocol – Appendix B". RFC 1752.
- Wang, Tao; Gao, Jiaqiong (1 January 2019). "The Shortcomings of Ipv6 and Upgrade of Ipv4". International Journal of Advanced Network, Monitoring and Controls. 4 (1): 1–9. doi:10.21307/ijanmc-2019-029.
- State of IPv6 Deployment 2018, Internet Society, 2018, p. 3
- "Beijing2008.cn leaps to next-generation Net" (Press release). The Beijing Organizing Committee for the Games of the XXIX Olympiad. 30 May 2008. Archived from the original on 4 February 2009.
- Das, Kaushik (2008). "IPv6 and the 2008 Beijing Olympics". IPv6.com. Archived from the original on 1 August 2008. Retrieved 15 August 2008.
- ^ Morr, Derek (9 June 2009). "Verizon Mandates IPv6 Support for Next-Gen Cell Phones". CircleID.
- ^ "State of IPv6 Deployment 2018" (PDF). InternetSociety.org. Internet Society. Retrieved 19 January 2022.
- "The case of Hurricane Electric And Cogent". BGP.tools. Retrieved 10 September 2024.
External links
- IPv6 in the Linux Kernel by Rami Rosen
- An Introduction and Statistics about IPv6 by Google
- The standard document ratifying IPv6 – RFC 8200 document ratifying IPv6 as an Internet Standard
Internet Protocol version 6 | |
---|---|
General | |
Deployment | |
IPv4 to IPv6 topics | |
Related protocols |