IPv6Network Working GroupS.Varada (Editor) Internet-DraftS. Varada, Ed. Request for Comments: 5072 Transwitch Obsoletes:RFC2472(if approved) D.HaskinsD. Haskins Category: Standardstrack EdTrack E. AllenExpires: November 2007 MayJuly 2007 IP Version 6 over PPP<draft-ietf-ipv6-over-ppp-v2-03.txt>Status ofthisThis MemoBy submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents ofThis document specifies an Internet standards track protocol for the InternetEngineering Task Force (IETF), its areas,community, andits working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents validrequests discussion and suggestions fora maximumimprovements. Please refer to the current edition ofsix monthsthe "Internet Official Protocol Standards" (STD 1) for the standardization state andmay be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The liststatus ofcurrent Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The listthis protocol. Distribution ofInternet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007). Abstract The Point-to-Point Protocol (PPP) provides a standard method of encapsulating Network Layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, and proposes a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols. This document defines the method for sending IPv6 packets over PPP links, the NCP for establishing and configuring the IPv6 overPPPPPP, and the method for forming IPv6 link-local addresses on PPP links. It also specifies the conditions for performing Duplicate Address Detection on IPv6 global unicast addresses configured for PPP links either through stateful or stateless address autoconfiguration. This document obsoletes RFC 2472. Table of Contents 1.Introduction...................................................2 1.1Introduction ....................................................2 1.1. Specification ofRequirements..............................3Requirements ..............................3 2. Sending IPv6Datagrams.........................................3Datagrams ..........................................3 3. A PPP Network Control Protocol forIPv6........................3IPv6 .........................3 4. IPV6CP ConfigurationOptions...................................4 4.1 Interface-Identifier.......................................5Options ....................................4 4.1. Interface-Identifier .......................................4 5. Stateless Autoconfiguration and Link-LocalAddresses..........10Addresses ............9 6. SecurityConsiderations.......................................11Considerations ........................................11 7. IANAConsiderations...........................................12Considerations ............................................11 8.Acknowledgments...............................................12Acknowledgments ................................................11 9.References....................................................12 9.1References .....................................................12 9.1. NormativeReferences......................................12 9.2References ......................................12 9.2. Informativereferences....................................13references ....................................12 Appendix A: Global ScopeAddresses..............................13Addresses................................14 Appendix B: Changes fromRFC-2472...............................14 Authors' Addresses...............................................14 IPR Notice .....................................................14 Copyright Notice and Disclaimer..................................15RFC-2472.................................14 1. Introduction PPP has three main components: 1) A method for encapsulating datagrams over serial links. 2) A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection. 3) A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols. In order to establish communications over a point-to-point link, each end of the PPP link must first send LCP packets to configure and test the data link. After the link has been established and optional facilities have been negotiated as needed by the LCP, PPP must send NCP packets to choose and configure one or more network-layer protocols. Once each of the chosen network-layer protocols has been configured, datagrams from each network-layer protocol can be sent over the link. In this document, the NCP for establishing and configuring the IPv6 over PPP is referred to as the IPv6 Control Protocol (IPV6CP). The link will remain configured for communications until explicit LCP or NCP packets close the link down, or until some external event occurs (power failure at the other end, carrier drop, etc.). This document obsoletes the earlier specification from RFC 2472[8].[7]. Changes from RFC 2472 are listed in Appendix B.1.11.1. Specification of Requirements In this document, several words are used to signify the requirements of the specification. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in[7].[6]. 2. Sending IPv6 Datagrams Before any IPv6 packets may be communicated, PPP MUST reach the Network-Layer Protocol phase, and the IPv6 Control Protocol MUST reach the Opened state. Exactly one IPv6 packet is encapsulated in the Information field of PPP Data Link Layer frames where the Protocol field indicates Type hex 0057 (Internet Protocol Version 6). The maximum length of an IPv6 packet transmitted over a PPP link is the same as the maximum length of the Information field of a PPP data link layer frame. PPP links supporting IPv6 MUST allow the information field to be at least as large as the minimum link MTU size required for IPv6 [2]. 3. A PPP Network Control Protocol for IPv6 The IPv6 Control Protocol (IPV6CP) is responsible for configuring, enabling, and disabling the IPv6 protocol modules on both ends of the point-to-point link. IPV6CP uses the same packet exchange mechanism as the LCP. IPV6CP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. IPV6CP packets that are received before this phase is reached should be silently discarded. The IPv6 Control Protocol is exactly the same as the LCP [1] with the following exceptions: Data Link Layer Protocol Field Exactly one IPV6CP packet is encapsulated in the Information field of PPP Data Link Layer frames where the Protocol field indicates type hex 8057 (IPv6 Control Protocol). Code field Only Codes 1 through 7 (Configure-Request, Configure-Ack, Configure-Nak, Configure-Reject, Terminate-Request,Terminate-AckTerminate- Ack and Code-Reject) are used. Other Codes should be treated as unrecognized and should result in Code-Rejects. Timeouts IPV6CP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. An implementation should be prepared to wait for Authentication and Link Quality Determination to finish before timing out waiting for a Configure-Ack or other response. It is suggested that an implementation give up only after user intervention or a configurable amount of time. Configuration Option Types IPV6CP has a distinct set of Configuration Options. 4. IPV6CP Configuration Options IPV6CP Configuration Options allow negotiation of desirable IPv6 parameters. IPV6CP uses the same Configuration Option format defined for LCP [1] but with a separate set of Options. If a Configuration Option is not included in a Configure-Request packet, the default value for that Configuration Option is assumed. Up-to-date values of the IPV6CP Option Type field are specified in theon-lineonline database of "Assigned Numbers" maintained at IANA[4]. Current[9]. The current value is assigned as follows: 1 Interface-Identifier The only IPV6CP option defined in this document is the Interface Identifier. Any other IPV6CP configuration options that can be defined over time are to be defined in separate documents.4.14.1. Interface-Identifier Description This Configuration Option provides a way to negotiatean unique 64-bita unique, 64- bit interface identifier to be used for the address autoconfiguration [3] at the local end of the link (seesectionSection 5). AConfigure-RequestConfigure- Request MUST contain exactly one instance of the Interface-Identifier option [1]. The interface identifier MUST be unique within the PPP link;i.e.i.e., upon completion of thenegotiationnegotiation, differentInterface-IdentifierInterface- Identifier values are to be selected for the ends of the PPP link. The interface identifier may also be unique over a broader scope. Before this Configuration Option is requested, an implementation chooses its tentative Interface-Identifier. The non-zero value of the tentative Interface-Identifier SHOULD be chosen such that the value is unique to the link and, preferably, consistently reproducible across initializations of the IPV6CP finite state machine (administrative Close and reOpen, reboots,etc).etc.). The rationale for preferring a consistently reproducible unique interface identifier to a completely random interface identifier is to provide stability to global scope addresses (see Appendix A) that can be formed from the interfaceidentifieridentifier. Assuming that interface identifier bits are numbered from 0 to 63 in canonical bitorderorder, where the most significant bit is the bit number 0, the bit number 6 is the "u" bit (universal/local bit in IEEE EUI-64[5] terminology)[4] terminology), which indicates whether or not the interface identifier is based on a globally unique IEEE identifier (EUI-48 orEUI-64[5])(see theEUI-64 [4])(see case 1 below). It is set to one (1) if a globally unique IEEE identifier is used to derive the interface-identifier, and it is set to zero (0) otherwise. The following are methods for choosing the tentative Interface Identifier in the preference order:1)If1) If an IEEE global identifier (EUI-48 or EUI-64) is available anywhere on the node, it should be used to construct the tentative Interface-Identifier due to its uniqueness properties. When extracting an IEEE global identifier from another device on the node, care should be taken that the extracted identifier is presented in canonical ordering [14]. The only transformation from an EUI-64 identifier is to invert the "u" bit (universal/local bit in IEEE EUI-64 terminology). For example, for a globally unique EUI-64 identifier of the form: most-significantleast significantleast-significant bit bit |0 1|1 3|3 4|4 6| |0 5|6 1|2 7|8 3| +----------------+----------------+----------------+----------------+ |cccccc0gcccccccc|cccccccceeeeeeee|eeeeeeeeeeeeeeee|eeeeeeeeeeeeeeee| +----------------+----------------+----------------+----------------+ where "c" are the bits of the assigned company_id, "0" is the value of the universal/local bit to indicate global scope, "g" is the group/individual bit, and "e" are the bits of the extension identifier, the IPv6 interface identifier would be of the form: most-significant least-significant bit bit |0 1|1 3|3 4|4 6| |0 5|6 1|2 7|8 3| +----------------+----------------+----------------+----------------+ |cccccc1gcccccccc|cccccccceeeeeeee|eeeeeeeeeeeeeeee|eeeeeeeeeeeeeeee| +----------------+----------------+----------------+----------------+ The only change is inverting the value of the universal/local bit. In the case of a EUI-48 identifier, it is first converted to the EUI-64 format by inserting two bytes, with hexa-decimal values of 0xFF and 0xFE, in the middle of the48 bit48-bit MAC (between the company_id and extension identifier portions of the EUI-48 value). For example, for a globally unique48 bit48-bit EUI-48 identifier of the form: most-significant least-significant bit bit |0 1|1 3|3 4| |0 5|6 1|2 7| +----------------+----------------+----------------+ |cccccc0gcccccccc|cccccccceeeeeeee|eeeeeeeeeeeeeeee| +----------------+----------------+----------------+ where "c" are the bits of the assigned company_id, "0" is the value of the universal/local bit to indicate global scope, "g" is the group/individual bit, and "e" are the bits of the extension identifier, the IPv6 interface identifier would be of the form: most-significant least-significant bit bit |0 1|1 3|3 4|4 6| |0 5|6 1|2 7|8 3| +----------------+----------------+----------------+----------------+ |cccccc1gcccccccc|cccccccc11111111|11111110eeeeeeee|eeeeeeeeeeeeeeee| +----------------+----------------+----------------+----------------+ 2) If an IEEE global identifier is not available, a different source of uniqueness should be used. Suggested sources of uniqueness include link-layer addresses, machine serial numbers, et cetera. In this case, the "u" bit of the interface-identifier MUST be set to zero (0). 3) If a good source of uniqueness cannot be found, it is recommended that a random number be generated. In this case, the "u" bit of the interface-identifier MUST be set to zero (0). Good sources [1] of uniqueness or randomness are required for the Interface-Identifier negotiation to succeed. If neitherana unique numberornor a random number can be generated, it is recommended that a zero value be used for the Interface Identifier transmitted in the Configure-Request. In thiscasecase, the PPP peer may provide a valid non-zero Interface-Identifier in its response as described below. Note that if at least one of the PPP peers is able to generate separate non-zero numbers for itself and its peer, the identifier negotiation will succeed. When a Configure-Request is received with the Interface Identifier Configuration Option and the receiving peer implements this option, the received Interface-Identifier is compared with theInterface-IdentifierInterface- Identifier of the last Configure-Request sent to the peer. Depending on the result of thecomparisoncomparison, an implementation MUST respond in one of the following ways: If the two Interface-Identifiers are different but the received Interface-Identifier is zero, a Configure-Nak is sent with a non-zero Interface-Identifier value suggested for use by the remote peer. Such a suggested Interface-Identifier MUST be different from the Interface-Identifier of the last Configure-Request sent to the peer. It is recommended that the value suggested be consistently reproducible across initializations of the IPV6CP finite state machine (administrative Close and reOpen, reboots, etc). The "u" (universal/local) bit of the suggested identifier MUST be set to zero (0) regardless of its source unless the globally unique EUI-48/EUI-64 derived identifier is provided for the exclusive use by the remote peer. If the two Interface-Identifiers are different and the received Interface-Identifier is not zero, the Interface-Identifier MUST be acknowledged,i.e.i.e., a Configure-Ack is sent with the requested Interface-Identifier, meaning that the responding peer agrees with the Interface-Identifier requested. If the two Interface-Identifiers are equal and are not zero, Configure-Nak MUST be sent specifying a different non-zero Interface-Identifier value suggested for use by the remote peer. It is recommended that the value suggested be consistently reproducible across initializations of the IPV6CP finite state machine (administrative Close and reOpen, reboots, etc). The "u" (universal/local) bit of the suggested identifier MUST be set to zero (0) regardless of its source unless the globally unique EUI-48/EUI-64 derived identifier is provided for the exclusive use by the remote peer. If the two Interface-Identifiers are equal to zero, the InterfaceIdentifiersIdentifier's negotiation MUST be terminated by transmitting the Configure-Reject with the Interface-Identifier value set to zero. In thiscasecase, a unique Interface-Identifiercan notcannot be negotiated. If a Configure-Request is received with the Interface-Identifier Configuration Option and the receiving peer does not implement this option,Configure-RejConfigure-Reject is sent. A new Configure-Request SHOULD NOT be sent to the peer until normal processing would cause it to be sent (that is, until a Configure-Nak is received or the Restart timer runs out [1]). A new Configure-Request MUST NOT contain the Interface-Identifier option if a valid Interface-Identifier Configure-Reject is received. Reception of a Configure-Nak with a suggested Interface-Identifier different from that of the last Configure-Nak sent to the peer indicatesana unique Interface-Identifier. In thiscasecase, a new Configure-Request MUST be sent with the identifier value suggested in the last Configure-Nak from the peer. But if the received Interface-Identifier is equal to the one sent in the lastConfigure-Nak,Configure- Nak, a new Interface-Identifier MUST be chosen. In this case, a new Configure-Request SHOULD be sent with the new tentativeInterface-Identifier.Interface- Identifier. This sequence (transmit Configure-Request, receive Configure-Request, transmit Configure-Nak, receive Configure-Nak) might occur a few times, but it is extremely unlikely to occur repeatedly. More likely, the Interface-Identifiers chosen at either end will quickly diverge, terminating the sequence. If negotiation of the Interface-Identifier is required, and the peer did not provide the option in its Configure-Request, the option SHOULD be appended to a Configure-Nak. The tentative value of the Interface-Identifier given must be acceptable as the remote Interface-Identifier;i.e.i.e., it should be different from the identifier value selected for the local end of the PPP link. The next Configure-Request from the peer may include this option. If the next Configure-Request does not include thisoptionoption, the peer MUST NOT send another Configure-Nak with this option included. It should assume that the peer's implementation does not support this option. By default, an implementation SHOULD attempt to negotiate the Interface-Identifier for its end of the PPP connection. A summary of the Interface-Identifier Configuration Option format is shown below. The fields are transmitted from left to right. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | Interface-Identifier (MS Bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Interface-Identifier (cont) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Interface-Identifier (LS Bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type 1 Length 10 Interface-Identifier The 64-bit Interface-Identifier, which is very likely to be unique on the link, or zero if a good source of uniquenesscan notcannot be found. Default If no valid interface identifier can be successfully negotiated, no default Interface-Identifier value should be assumed. The procedures for recovering from such a case are unspecified. One approach is to manually configure the interface identifier of the interface. 5. Stateless Autoconfiguration and Link-Local Addresses The Interface-Identifier of IPv6 unicast addresses[6][5] of a PPPinterface,interface SHOULD be negotiated in the IPV6CP phase of the PPP connection setup (seesectionSection 4.1). If no valid Interface Identifier has been successfully negotiated, procedures for recovering from such a case are unspecified. One approach is to manually configure the Interface-Identifier of the interface. The negotiated Interface-Identifier is used by the local end of the PPP link to autoconfigure an IPv6 link-local unicast address for the PPP interface. However, it SHOULD NOT be assumed that the same Interface-Identifier is used in configuring global unicast addresses for the PPP interface using IPv6 stateless address autoconfiguration [3]. The PPP peer MAY generate one or more Interface Identifiers, for instance, using a method described in[9],[8], to autoconfigure one or more global unicast addresses. As long as the Interface-Identifier is negotiated in the IPV6CP phase of the PPP connection setup, it is redundant to perform duplicate address detection (DAD) as a part of the IPv6 Stateless Address Autoconfiguration protocol [3] on the IPv6 link-local address generated by the PPP peer. It may also be redundant to perform DAD on any global unicast addresses configured (using anInterface-IdentifierInterface- Identifier that is either negotiated during IPV6CP or generated, for instance, as per[9])[8]) for the interface as part of the IPv6 Stateless Address Autoconfiguration protocol [3] provided that the following two conditions are met: 1) The prefixesadvertised,advertised through the Router Advertisementmessages,messages by the access router terminating the PPP link are exclusive to the PPP link. 2) The access router terminating the PPP link does not autoconfigure any IPv6 global unicast addresses from the prefixes that it advertises. Therefore, it is RECOMMENDED that for PPP links with the IPV6CP Interface-Identifier option enabled and satisfying the aforementioned two conditions, the default value of the DupAddrDetectTransmits autoconfiguration variable [3] is set to zero by the system management. 3GPP2 networks are an example of a technology that uses PPP to enable a host to obtain an IPv6 global unicast address and satisfies the aforementioned two conditions [10]. 3GPP networks are another example[11] & [13].([11] [13]). Link-local addresses Link-local addresses of PPP interfaces have the following format: | 10 bits | 54 bits | 64 bits | +----------+------------------------+-----------------------------+ |1111111010| 0 | Interface-Identifier | +----------+------------------------+-----------------------------+ The most significant 10 bits of the address is the Link-Local prefix FE80::. 54 zero bits pad out the address between the Link-Local prefix and the Interface-Identifier fields. 6. Security Considerations Lack of link security, such as authentication, trigger the security concerns raised in [3] when the stateless addressauto- configurationautoconfiguration method is employed for the generation of global unicast IPv6 addresses out of interface identifiers that are either negotiated through the IPV6CP or generated, for instance, using a method described in[9].[8]. Thus, the mechanisms that are appropriate for ensuring PPP link security are addressedbelowbelow, together with the reference to a generic threat model. The mechanisms that are appropriate for ensuring PPP link Security are: 1) Access Control Lists that apply filters on traffic received over the link for enforcing admission policy, 2) an Authentication protocol that facilitates negotiations between peers [15] to select an authentication method (e.g., MD5 [16]) for validation of the peer, and 3) an Encryption protocol that facilitates negotiations between peers to select encryption algorithms(or,(or crypto-suites) to ensure data confidentiality[17]).[17]. There are certain threats associated with peer interactions on a PPP link even with one or more of the above security measures in place. For instance, using the MD5 authentication method [16] exposes one to replay attack, wherein which,an attacker could intercept and replay a station's identity and password hash to get access to a network. The user of this specification is advised to refer to [15], which presents a generic threat model, for an understanding of the threats posed to the security of a link. The reference [15] also gives a framework to specify requirements for the selection of an authentication method for a given application. 7. IANA Considerations Theeditor has no specific recommendations for theIANAon the assignment of ahas assigned value 1 for the Type field of the IPv6 datagram Interface-Identifier option specified in thisspecification.document. The current assignment is up-to-date at[4]. However, the reference to the RFC number needs to be updated.[9]. 8. Acknowledgments This document borrows from the Magic-Number LCP option and as such is partially based on previous work done by the PPP working group. The editor is grateful for the input provided by members of the IPv6 community in the spirit of updatingtheRFC 2472. Thanks, in particular, go to Pete Barany and KarimEl-malkiEl Malki for their technical contributions. Also, thanks to AlexConta,Conta for a thoroughreviewing,review, StephenKent,Kent for helping with security aspects, and Spencer Dawkins and Pekka Savola for the nits. Finally, the author is grateful to JariArkko,Arkko for his initiation to bring closure to this specification. 9. References9.19.1. Normative References [1] Simpson, W., Ed., "The Point-to-PointProtocol,"Protocol (PPP)", STD 51, RFC 1661, July 1994. [2] Deering,S.,S. and R. Hinden,Editors,"Internet Protocol, Version 6 (IPv6)Specification,"Specification", RFC 2460, December 1998. [3] Thomson,S.,S. and T. Narten, "IPv6 Stateless AddressAutoconfiguration,"Autoconfiguration", RFC 2462, December 1998. [4]IANA, "Assigned Numbers," http://www.iana.org/numbers.html [5]IEEE, "GuidelinesforFor 64-bit Global Identifier(EUI-64) Registration Authority", April 2004. [6](EUI-64)", http://standards.ieee.org/regauth/oui/tutorials/EUI64.html [5] Hinden,R.,R. and S. Deering, "IP Version 6 Addressing Architecture", RFC 4291, February 2006.[7][6] Bradner, S., "Key words for use in RFCs to Indicate RequirementLevels,"Levels", BCP 14, RFC 2119, March 1997.[8] Haskin D.,[7] Haskin, D. and E. Allen, "IP Version 6 overPPP,"PPP", RFC 2472, December 1998.[9][8] Narten T.,et. al., " PrivacyDraves, R., and S. Krishnan, "Privacy Extensions for Stateless Address Autoconfiguration inIPv6," draft-ietf-ipv6-privacy-addrs-v2- 05, August 2006. 9.2IPv6", RFC 4941, July 2007. 9.2. Informative references [9] IANA, "Assigned Numbers," http://www.iana.org/numbers.html [10] 3GPP2 X.S0011-002-C v1.0, "cdma2000 Wireless IP Network Standard: Simple IP and Mobile IP Access Services," September 2003. [11] 3GPP TS 29.061 V6.4.0, "Interworking between the Public Land Mobile Network (PLMN) Supporting packet based services and Packet Data Networks (PDN) (Release 6)," April 2005. [12] Droms,E., et al.,R., Ed., Bound, J., Volz, B., Lemon, T., Perkins, C., and M. Carney, "Dynamic Host Configuration Protocol for IPv6(DHCPv6),"(DHCPv6)", RFC 3315, July 2003. [13] 3GPP TS 23.060 v6.8.0, "General Packet Radio Service (GPRS); Service description; Stage 2 (Release 6)," March 2005. [14]Narten T.,Narten, T. and C. Burton, "A Caution On The Canonical Ordering Of Link-LayerAddresses,"Addresses", RFC 2469, December 1998. [15] Aboba,R., et. al.,B., Blunk, L., Vollbrecht, J., Carlson, J., and H. Levkowetz, Ed., "Extensible AuthenticationProtocol,"Protocol (EAP)", RFC 3748, June 2004. [16] Rivest, R., "The MD5 Message-DigestAlgorithm,"Algorithm", RFC 1321, April 1992. [17] Meyer, G., "The PPP Encryption Control Protocol(ECP),"(ECP)", RFC 1968, June 1996. Appendix A: Global Scope Addresses A node on the PPP link MUST create global unicast addresses either through stateless or stateful addressauto-configurationautoconfiguration mechanisms. In the stateless addressauto-configurationautoconfiguration [3], the node relies on sub-net prefixes advertised by the router via the Router Advertisement messages to obtain global unicast addresses from an interface identifier. In the stateful addressauto- configuration,autoconfiguration, the host relies on a Stateful Server,like,like DHCPv6 [12], to obtain global unicast addresses. Appendix B: Changes fromRFC-2472RFC 2472 The following changes were made fromRFC-2472RFC 2472 "IPv6 over PPP": - Minor updates tosectionsSections 3 and 4 - Updated the text insectionSection 4.1 to include the reference to Appendix A and minor text clarifications. - Removedthe sectionSection 4.2 onIPv6-Compression-Protocol,IPv6-Compression-Protocol based ontheIESG recommendation, and created a newstandards track draftstandards-track document to coverthenegotiation of the IPv6 datagram compression protocol using IPV6CP. - Updated the text in Section 5 to: (a) allow the use of one or more Interface-Identifiers generated by a peer, in addition to the use of Interface-identifier negotiated between peers of the link, in the creation of global unicast addresses for the local PPP interface, and (b) identify cases against the DAD of creatednon-link-localnon- link-local addresses. - Added new and updated references. - AddedtheAppendix A Authors' Addresses Dimitry Haskin Ed Allen Srihari Varada (Editor) TranSwitch Corporation 3 Enterprise Dr. Shelton, CT 06484. US. Phone: +1 203 929 8810 EMail: varada@txc.comIPR NoticeFull Copyright Statement Copyright (C) The IETF Trust (2007). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.Copyright Notice and Disclaimer Copyright (C) The IETF Trust (2007). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document andAcknowledgement Funding for theinformation contained herein areRFC Editor function is currently providedon an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.by the Internet Society.