<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" docName="draft-ietf-6man-deprecate-router-alert-13" number="9805" consensus="true" ipr="trust200902" updates="2711" obsoletes="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="3" symRefs="true" sortRefs="true" prepTime="2025-06-26T14:12:17" indexInclude="true" scripts="Common,Latin">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-6man-deprecate-router-alert-13" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9805" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Deprecate IPv6 Router Alert for New Protocols">Deprecation of the IPv6 Router Alert Option for New Protocols</title>
    <seriesInfo name="RFC" value="9805" stream="IETF"/>
    <author fullname="Ron Bonica" initials="R." surname="Bonica">
      <organization showOnFrontPage="true">Juniper Networks</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>rbonica@juniper.net</email>
      </address>
    </author>
    <date month="06" year="2025"/>
    <area>INT</area>
    <workgroup>6man</workgroup>
    <keyword>IPv6</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document deprecates the IPv6 Router Alert option. 
    Protocols that use the IPv6 Router Alert option may continue to do so, 
    even in future versions. However, new protocols that are standardized 
    in the future must not use the IPv6 Router Alert option.</t>
      <t indent="0" pn="section-abstract-2">This document updates RFC 2711. </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9805" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2025 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-issues-associated-with-the-">Issues Associated with the IPv6 Router Alert Option</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-deprecation-of-the-ipv6-rou">Deprecation of the IPv6 Router Alert Option</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-future-work">Future Work</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-protocols-that-use-the-ipv6">Protocols That Use the IPv6 Router Alert Option</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-address">Author's Address</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">In IPv6 <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>, optional internet-layer 
    information is encoded in separate headers that may be placed 
    between the IPv6 header and the upper-layer header in a packet.  
    There is a small number of such extension headers, each one 
    identified by a distinct Next Header value.</t>
      <t indent="0" pn="section-1-2">One of these extension headers is called the Hop-by-Hop Options
    header. The Hop-by-Hop Options header is used to carry optional 
    information that may be examined and processed by every node along 
    a packet's delivery path.</t>
      <t indent="0" pn="section-1-3">The Hop-by-Hop Options header can carry one or more options.
      Among these is the IPv6 Router Alert option <xref target="RFC2711" format="default" sectionFormat="of" derivedContent="RFC2711"/>.
      </t>
      <t indent="0" pn="section-1-4">The IPv6 Router Alert option provides a mechanism whereby 
    routers can know when to intercept datagrams not addressed to 
    them without having to extensively examine every datagram.  
    The semantic of the IPv6 Router Alert option is that "routers should 
    examine this datagram more closely". Excluding this option 
    tells the router that there is no need to examine this datagram
    more closely.</t>
      <t indent="0" pn="section-1-5">As explained below, the IPv6 Router Alert option introduces many issues.</t>
      <t indent="0" pn="section-1-6">This document updates <xref target="RFC2711" format="default" sectionFormat="of" derivedContent="RFC2711"/>.
      Implementers of protocols that continue to use the IPv6 Router Alert
     option can continue to reference  <xref target="RFC2711" format="default" sectionFormat="of" derivedContent="RFC2711"/> for IPv6 Router 
     Alert option details. </t>
    </section>
    <section anchor="ReqLang" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-requirements-language">Requirements Language</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-issues-associated-with-the-">Issues Associated with the IPv6 Router Alert Option</name>
      <t indent="0" pn="section-3-1"><xref target="RFC6398" format="default" sectionFormat="of" derivedContent="RFC6398"/> identifies security considerations
    associated with the IPv6 Router Alert option. In a nutshell, 
    the IP Router Alert Option does not provide a  
    universal mechanism to accurately and reliably distinguish
    between IP Router Alert packets of interest and unwanted IP Router
    Alerts.  This creates a security concern because, short of 
    appropriate router-implementation-specific mechanisms, the router's 
    control plane is at risk of being flooded by unwanted traffic.</t>
      <aside pn="section-3-2">
        <t indent="0" pn="section-3-2.1">NOTE: Many routers maintain separation between forwarding 
    and control plane hardware. The forwarding plane is implemented 
    on high-performance Application-Specific Integrated Circuits (ASICs) 
    and Network Processors (NPs), while the control plane is implemented 
    on general-purpose processors. Given this difference, the control 
    plane is more susceptible to a Denial-of-Service (DoS) attack than the
    forwarding plane.</t>
      </aside>
      <t indent="0" pn="section-3-3"><xref target="RFC6192" format="default" sectionFormat="of" derivedContent="RFC6192"/> demonstrates how a network operator can
    deploy Access Control Lists (ACLs) that protect the control plane from
    DoS attacks. These ACLs are effective and efficient when they select
    packets based upon information that can be found in a fixed position. 
    However, they become less effective and less efficient when they 
    must parse a Hop-by-Hop Options header, searching for the 
    IPv6 Router Alert option.</t>
      <t indent="0" pn="section-3-4">Network operators can address the security considerations
    raised in <xref target="RFC6398" format="default" sectionFormat="of" derivedContent="RFC6398"/> by:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-3-5">
        <li pn="section-3-5.1">
          <t indent="0" pn="section-3-5.1.1">Deploying the operationally complex and computationally 
      expensive ACLs described in <xref target="RFC6192" format="default" sectionFormat="of" derivedContent="RFC6192"/>.</t>
        </li>
        <li pn="section-3-5.2">
          <t indent="0" pn="section-3-5.2.1">Configuring their routers to ignore the IPv6 Router
      Alert option.</t>
        </li>
        <li pn="section-3-5.3">
          <t indent="0" pn="section-3-5.3.1">Dropping or severely rate limiting packets that contain the 
      Hop-by-Hop Options header at the network edge.</t>
        </li>
      </ul>
      <t indent="0" pn="section-3-6">These options become less viable as protocol designers continue
    to design protocols that use the IPv6 Router Alert option.</t>
      <t indent="0" pn="section-3-7"><xref target="RFC9673" format="default" sectionFormat="of" derivedContent="RFC9673"/> seeks to eliminate hop-by-hop
    processing on the control plane. However, because of its unique
    function, the IPv6 Router Alert option is granted an exception to this rule. 
    One approach would be to deprecate the IPv6 Router Alert option, because 
    current usage beyond the local network appears to be limited
    and packets containing Hop-by-Hop options are frequently dropped. 
    Deprecation would allow current implementations to continue using it, 
    but its use could be phased out over time.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-deprecation-of-the-ipv6-rou">Deprecation of the IPv6 Router Alert Option</name>
      <t indent="0" pn="section-4-1">This document deprecates the IPv6 Router Alert option.
    Protocols that use the IPv6 Router Alert option <bcp14>MAY</bcp14> continue to do so, 
    even in future versions. However, new protocols that are standardized 
    in the future <bcp14>MUST NOT</bcp14> use the IPv6 Router Alert option.
    <xref target="Legacy" format="default" sectionFormat="of" derivedContent="Appendix A"/> contains an exhaustive list of protocols that <bcp14>MAY</bcp14> 
    continue to use the IPv6 Router Alert option. </t>
      <t indent="0" pn="section-4-2">This document updates <xref target="RFC2711" format="default" sectionFormat="of" derivedContent="RFC2711"/>.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-future-work">Future Work</name>
      <t indent="0" pn="section-5-1">
A number of protocols 
use the IPv6 Router Alert option; these are listed in <xref target="Legacy" format="default" sectionFormat="of" derivedContent="Appendix A"/>.    The only protocols in 
<xref target="Legacy" format="default" sectionFormat="of" derivedContent="Appendix A"/> that have widespread deployment  are 
Multicast Listener Discovery Version 2 (MLDv2) <xref target="RFC9777" format="default" sectionFormat="of" derivedContent="RFC9777"/>
 and 
 Multicast Router Discovery (MRD) <xref target="RFC4286" format="default" sectionFormat="of" derivedContent="RFC4286"/>. 
The other protocols either have limited deployment, are experimental, or have no known implementation.
</t>
      <t indent="0" pn="section-5-2">
It is left for future work to develop new versions of MLDv2 and MRD that do not 
rely on the IPv6 Router Alert option.   That task is out of scope for this document.
</t>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-6-1">This document mitigates all security considerations associated with the IPv6 Router Alert
    option. These security considerations can be found in <xref target="RFC2711" format="default" sectionFormat="of" derivedContent="RFC2711"/>,
    <xref target="RFC6192" format="default" sectionFormat="of" derivedContent="RFC6192"/>, and <xref target="RFC6398" format="default" sectionFormat="of" derivedContent="RFC6398"/>.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-7-1">IANA has marked the IPv6 Router Alert option as "DEPRECATED for New Protocols" in the <eref brackets="angle" target="https://www.iana.org/assignments/ipv6-parameters">"Destination 
    Options and Hop-by-Hop Options" registry</eref>
    and added this document as a reference.</t>
      <t indent="0" pn="section-7-2">
    IANA has also made a note in the
    <eref brackets="angle" target="https://www.iana.org/assignments/ipv6-routeralert-values">"IPv6 Router Alert Option Values" registry</eref> stating that the registry
    is closed for allocations and added a reference to this document. 
    The experimental codepoints in this registry have been changed to "Reserved" (i.e., they are no longer 
    available for experimentation).
      </t>
    </section>
  </middle>
  <back>
    <references pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2711" target="https://www.rfc-editor.org/info/rfc2711" quoteTitle="true" derivedAnchor="RFC2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <author fullname="A. Jackson" initials="A." surname="Jackson"/>
            <date month="October" year="1999"/>
            <abstract>
              <t indent="0">This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC6398" target="https://www.rfc-editor.org/info/rfc6398" quoteTitle="true" derivedAnchor="RFC6398">
          <front>
            <title>IP Router Alert Considerations and Usage</title>
            <author fullname="F. Le Faucheur" initials="F." role="editor" surname="Le Faucheur"/>
            <date month="October" year="2011"/>
            <abstract>
              <t indent="0">The IP Router Alert Option is an IP option that alerts transit routers to more closely examine the contents of an IP packet. The Resource reSerVation Protocol (RSVP), Pragmatic General Multicast (PGM), the Internet Group Management Protocol (IGMP), Multicast Listener Discovery (MLD), Multicast Router Discovery (MRD), and General Internet Signaling Transport (GIST) are some of the protocols that make use of the IP Router Alert Option. This document discusses security aspects and usage guidelines around the use of the current IP Router Alert Option, thereby updating RFC 2113 and RFC 2711. Specifically, it provides recommendations against using the Router Alert in the end-to-end open Internet and identifies controlled environments where protocols depending on Router Alert can be used safely. It also provides recommendations about protection approaches for service providers. Finally, it provides brief guidelines for Router Alert implementation on routers. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="168"/>
          <seriesInfo name="RFC" value="6398"/>
          <seriesInfo name="DOI" value="10.17487/RFC6398"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" quoteTitle="true" derivedAnchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t indent="0">This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC9673" target="https://www.rfc-editor.org/info/rfc9673" quoteTitle="true" derivedAnchor="RFC9673">
          <front>
            <title>IPv6 Hop-by-Hop Options Processing Procedures</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <date month="October" year="2024"/>
            <abstract>
              <t indent="0">This document specifies procedures for processing IPv6 Hop-by-Hop options in IPv6 routers and hosts. It modifies the procedures specified in the IPv6 Protocol Specification (RFC 8200) to make processing of the IPv6 Hop-by-Hop Options header practical with the goal of making IPv6 Hop-by-Hop options useful to deploy and use at IPv6 routers and hosts. This document updates RFC 8200.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9673"/>
          <seriesInfo name="DOI" value="10.17487/RFC9673"/>
        </reference>
      </references>
      <references pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC1633" target="https://www.rfc-editor.org/info/rfc1633" quoteTitle="true" derivedAnchor="RFC1633">
          <front>
            <title>Integrated Services in the Internet Architecture: an Overview</title>
            <author fullname="R. Braden" initials="R." surname="Braden"/>
            <author fullname="D. Clark" initials="D." surname="Clark"/>
            <author fullname="S. Shenker" initials="S." surname="Shenker"/>
            <date month="June" year="1994"/>
            <abstract>
              <t indent="0">This memo discusses a proposed extension to the Internet architecture and protocols to provide integrated services, i.e., to support real-time as well as the current non-real-time service of IP. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1633"/>
          <seriesInfo name="DOI" value="10.17487/RFC1633"/>
        </reference>
        <reference anchor="RFC3031" target="https://www.rfc-editor.org/info/rfc3031" quoteTitle="true" derivedAnchor="RFC3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="January" year="2001"/>
            <abstract>
              <t indent="0">This document specifies the architecture for Multiprotocol Label Switching (MPLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="RFC3175" target="https://www.rfc-editor.org/info/rfc3175" quoteTitle="true" derivedAnchor="RFC3175">
          <front>
            <title>Aggregation of RSVP for IPv4 and IPv6 Reservations</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Iturralde" initials="C." surname="Iturralde"/>
            <author fullname="F. Le Faucheur" initials="F." surname="Le Faucheur"/>
            <author fullname="B. Davie" initials="B." surname="Davie"/>
            <date month="September" year="2001"/>
            <abstract>
              <t indent="0">This document describes the use of a single RSVP (Resource ReSerVation Protocol) reservation to aggregate other RSVP reservations across a transit routing region, in a manner conceptually similar to the use of Virtual Paths in an ATM (Asynchronous Transfer Mode) network. It proposes a way to dynamically create the aggregate reservation, classify the traffic for which the aggregate reservation applies, determine how much bandwidth is needed to achieve the requirement, and recover the bandwidth when the sub-reservations are no longer required. It also contains recommendations concerning algorithms and policies for predictive reservations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3175"/>
          <seriesInfo name="DOI" value="10.17487/RFC3175"/>
        </reference>
        <reference anchor="RFC3208" target="https://www.rfc-editor.org/info/rfc3208" quoteTitle="true" derivedAnchor="RFC3208">
          <front>
            <title>PGM Reliable Transport Protocol Specification</title>
            <author fullname="T. Speakman" initials="T." surname="Speakman"/>
            <author fullname="J. Crowcroft" initials="J." surname="Crowcroft"/>
            <author fullname="J. Gemmell" initials="J." surname="Gemmell"/>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="S. Lin" initials="S." surname="Lin"/>
            <author fullname="D. Leshchiner" initials="D." surname="Leshchiner"/>
            <author fullname="M. Luby" initials="M." surname="Luby"/>
            <author fullname="T. Montgomery" initials="T." surname="Montgomery"/>
            <author fullname="L. Rizzo" initials="L." surname="Rizzo"/>
            <author fullname="A. Tweedly" initials="A." surname="Tweedly"/>
            <author fullname="N. Bhaskar" initials="N." surname="Bhaskar"/>
            <author fullname="R. Edmonstone" initials="R." surname="Edmonstone"/>
            <author fullname="R. Sumanasekera" initials="R." surname="Sumanasekera"/>
            <author fullname="L. Vicisano" initials="L." surname="Vicisano"/>
            <date month="December" year="2001"/>
            <abstract>
              <t indent="0">Pragmatic General Multicast (PGM) is a reliable multicast transport protocol for applications that require ordered or unordered, duplicate- free, multicast data delivery from multiple sources to multiple receivers. PGM guarantees that a receiver in the group either receives all data packets from transmissions and repairs, or is able to detect unrecoverable data packet loss. PGM is specifically intended as a workable solution for multicast applications with basic reliability requirements. Its central design goal is simplicity of operation with due regard for scalability and network efficiency. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3208"/>
          <seriesInfo name="DOI" value="10.17487/RFC3208"/>
        </reference>
        <reference anchor="RFC4080" target="https://www.rfc-editor.org/info/rfc4080" quoteTitle="true" derivedAnchor="RFC4080">
          <front>
            <title>Next Steps in Signaling (NSIS): Framework</title>
            <author fullname="R. Hancock" initials="R." surname="Hancock"/>
            <author fullname="G. Karagiannis" initials="G." surname="Karagiannis"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <author fullname="S. Van den Bosch" initials="S." surname="Van den Bosch"/>
            <date month="June" year="2005"/>
            <abstract>
              <t indent="0">The Next Steps in Signaling (NSIS) working group is considering protocols for signaling information about a data flow along its path in the network. The NSIS suite of protocols is envisioned to support various signaling applications that need to install and/or manipulate such state in the network. Based on existing work on signaling requirements, this document proposes an architectural framework for these signaling protocols.</t>
              <t indent="0">This document provides a model for the network entities that take part in such signaling, and for the relationship between signaling and the rest of network operation. We decompose the overall signaling protocol suite into a generic (lower) layer, with separate upper layers for each specific signaling application. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4080"/>
          <seriesInfo name="DOI" value="10.17487/RFC4080"/>
        </reference>
        <reference anchor="RFC4286" target="https://www.rfc-editor.org/info/rfc4286" quoteTitle="true" derivedAnchor="RFC4286">
          <front>
            <title>Multicast Router Discovery</title>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <author fullname="J. Martin" initials="J." surname="Martin"/>
            <date month="December" year="2005"/>
            <abstract>
              <t indent="0">The concept of Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) snooping requires the ability to identify the location of multicast routers. Since snooping is not standardized, there are many mechanisms in use to identify the multicast routers. However, this can lead to interoperability issues between multicast routers and snooping switches from different vendors.</t>
              <t indent="0">This document introduces a general mechanism that allows for the discovery of multicast routers. This new mechanism, Multicast Router Discovery (MRD), introduces a standardized means of identifying multicast routers without a dependency on particular multicast routing protocols. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4286"/>
          <seriesInfo name="DOI" value="10.17487/RFC4286"/>
        </reference>
        <reference anchor="RFC5946" target="https://www.rfc-editor.org/info/rfc5946" quoteTitle="true" derivedAnchor="RFC5946">
          <front>
            <title>Resource Reservation Protocol (RSVP) Extensions for Path-Triggered RSVP Receiver Proxy</title>
            <author fullname="F. Le Faucheur" initials="F." surname="Le Faucheur"/>
            <author fullname="J. Manner" initials="J." surname="Manner"/>
            <author fullname="A. Narayanan" initials="A." surname="Narayanan"/>
            <author fullname="A. Guillou" initials="A." surname="Guillou"/>
            <author fullname="H. Malik" initials="H." surname="Malik"/>
            <date month="October" year="2010"/>
            <abstract>
              <t indent="0">Resource Reservation Protocol (RSVP) signaling can be used to make end-to-end resource reservations in an IP network in order to guarantee the Quality of Service (QoS) required by certain flows. With conventional RSVP, both the data sender and receiver of a given flow take part in RSVP signaling. Yet, there are many use cases where resource reservation is required, but the receiver, the sender, or both, is not RSVP-capable. Where the receiver is not RSVP- capable, an RSVP router may behave as an RSVP Receiver Proxy, thereby performing RSVP signaling on behalf of the receiver. This allows resource reservations to be established on the segment of the end-to- end path from the sender to the RSVP Receiver Proxy. However, as discussed in the companion document "RSVP Proxy Approaches", RSVP extensions are needed to facilitate operations with an RSVP Receiver Proxy whose signaling is triggered by receipt of RSVP Path messages from the sender. This document specifies these extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5946"/>
          <seriesInfo name="DOI" value="10.17487/RFC5946"/>
        </reference>
        <reference anchor="RFC5971" target="https://www.rfc-editor.org/info/rfc5971" quoteTitle="true" derivedAnchor="RFC5971">
          <front>
            <title>GIST: General Internet Signalling Transport</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="R. Hancock" initials="R." surname="Hancock"/>
            <date month="October" year="2010"/>
            <abstract>
              <t indent="0">This document specifies protocol stacks for the routing and transport of per-flow signalling messages along the path taken by that flow through the network. The design uses existing transport and security protocols under a common messaging layer, the General Internet Signalling Transport (GIST), which provides a common service for diverse signalling applications. GIST does not handle signalling application state itself, but manages its own internal state and the configuration of the underlying transport and security protocols to enable the transfer of messages in both directions along the flow path. The combination of GIST and the lower layer transport and security protocols provides a solution for the base protocol component of the "Next Steps in Signalling" (NSIS) framework. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5971"/>
          <seriesInfo name="DOI" value="10.17487/RFC5971"/>
        </reference>
        <reference anchor="RFC5979" target="https://www.rfc-editor.org/info/rfc5979" quoteTitle="true" derivedAnchor="RFC5979">
          <front>
            <title>NSIS Operation over IP Tunnels</title>
            <author fullname="C. Shen" initials="C." surname="Shen"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="S. Lee" initials="S." surname="Lee"/>
            <author fullname="J. Bang" initials="J." surname="Bang"/>
            <date month="March" year="2011"/>
            <abstract>
              <t indent="0">NSIS Quality of Service (QoS) signaling enables applications to perform QoS reservation along a data flow path. When the data flow path contains IP tunnel segments, NSIS QoS signaling has no effect within those tunnel segments. Therefore, the resulting tunnel segments could become the weakest QoS link and invalidate the QoS efforts in the rest of the end-to-end path. The problem with NSIS signaling within the tunnel is caused by the tunnel encapsulation that masks packets' original IP header fields. Those original IP header fields are needed to intercept NSIS signaling messages and classify QoS data packets. This document defines a solution to this problem by mapping end-to-end QoS session requests to corresponding QoS sessions in the tunnel, thus extending the end-to-end QoS signaling into the IP tunnel segments. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5979"/>
          <seriesInfo name="DOI" value="10.17487/RFC5979"/>
        </reference>
        <reference anchor="RFC6016" target="https://www.rfc-editor.org/info/rfc6016" quoteTitle="true" derivedAnchor="RFC6016">
          <front>
            <title>Support for the Resource Reservation Protocol (RSVP) in Layer 3 VPNs</title>
            <author fullname="B. Davie" initials="B." surname="Davie"/>
            <author fullname="F. Le Faucheur" initials="F." surname="Le Faucheur"/>
            <author fullname="A. Narayanan" initials="A." surname="Narayanan"/>
            <date month="October" year="2010"/>
            <abstract>
              <t indent="0">RFC 4364 and RFC 4659 define an approach to building provider-provisioned Layer 3 VPNs (L3VPNs) for IPv4 and IPv6. It may be desirable to use Resource Reservation Protocol (RSVP) to perform admission control on the links between Customer Edge (CE) routers and Provider Edge (PE) routers. This document specifies procedures by which RSVP messages traveling from CE to CE across an L3VPN may be appropriately handled by PE routers so that admission control can be performed on PE-CE links. Optionally, admission control across the provider's backbone may also be supported. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6016"/>
          <seriesInfo name="DOI" value="10.17487/RFC6016"/>
        </reference>
        <reference anchor="RFC6192" target="https://www.rfc-editor.org/info/rfc6192" quoteTitle="true" derivedAnchor="RFC6192">
          <front>
            <title>Protecting the Router Control Plane</title>
            <author fullname="D. Dugal" initials="D." surname="Dugal"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <author fullname="R. Dunn" initials="R." surname="Dunn"/>
            <date month="March" year="2011"/>
            <abstract>
              <t indent="0">This memo provides a method for protecting a router's control plane from undesired or malicious traffic. In this approach, all legitimate router control plane traffic is identified. Once legitimate traffic has been identified, a filter is deployed in the router's forwarding plane. That filter prevents traffic not specifically identified as legitimate from reaching the router's control plane, or rate-limits such traffic to an acceptable level.</t>
              <t indent="0">Note that the filters described in this memo are applied only to traffic that is destined for the router, and not to all traffic that is passing through the router. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6192"/>
          <seriesInfo name="DOI" value="10.17487/RFC6192"/>
        </reference>
        <reference anchor="RFC6401" target="https://www.rfc-editor.org/info/rfc6401" quoteTitle="true" derivedAnchor="RFC6401">
          <front>
            <title>RSVP Extensions for Admission Priority</title>
            <author fullname="F. Le Faucheur" initials="F." surname="Le Faucheur"/>
            <author fullname="J. Polk" initials="J." surname="Polk"/>
            <author fullname="K. Carlberg" initials="K." surname="Carlberg"/>
            <date month="October" year="2011"/>
            <abstract>
              <t indent="0">Some applications require the ability to provide an elevated probability of session establishment to specific sessions in times of network congestion. When supported over the Internet Protocol suite, this may be facilitated through a network-layer admission control solution that supports prioritized access to resources (e.g., bandwidth). These resources may be explicitly set aside for prioritized sessions, or may be shared with other sessions. This document specifies extensions to the Resource reSerVation Protocol (RSVP) that can be used to support such an admission priority capability at the network layer.</t>
              <t indent="0">Based on current security concerns, these extensions are intended for use in a single administrative domain. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6401"/>
          <seriesInfo name="DOI" value="10.17487/RFC6401"/>
        </reference>
        <reference anchor="RFC7506" target="https://www.rfc-editor.org/info/rfc7506" quoteTitle="true" derivedAnchor="RFC7506">
          <front>
            <title>IPv6 Router Alert Option for MPLS Operations, Administration, and Maintenance (OAM)</title>
            <author fullname="K. Raza" initials="K." surname="Raza"/>
            <author fullname="N. Akiya" initials="N." surname="Akiya"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="April" year="2015"/>
            <abstract>
              <t indent="0">RFC 4379 defines the MPLS Label Switched Path (LSP) Ping/Traceroute mechanism in which the Router Alert Option (RAO) MUST be set in the IP header of the MPLS Echo Request messages and may conditionally be set in the IP header of the MPLS Echo Reply messages depending on the Reply Mode used. While a generic "Router shall examine packet" Option Value is used for the IPv4 RAO, there is no generic RAO value defined for IPv6 that can be used. This document allocates a new, generic IPv6 RAO value that can be used by MPLS Operations, Administration, and Maintenance (OAM) tools, including the MPLS Echo Request and MPLS Echo Reply messages for MPLS in IPv6 environments. Consequently, it updates RFC 4379.</t>
              <t indent="0">The initial motivation to request an IPv6 RAO value for MPLS OAM comes from the MPLS LSP Ping/Traceroute. However, this value is applicable to all MPLS OAM and not limited to MPLS LSP Ping/ Traceroute.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7506"/>
          <seriesInfo name="DOI" value="10.17487/RFC7506"/>
        </reference>
        <reference anchor="RFC8029" target="https://www.rfc-editor.org/info/rfc8029" quoteTitle="true" derivedAnchor="RFC8029">
          <front>
            <title>Detecting Multiprotocol Label Switched (MPLS) Data-Plane Failures</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <author fullname="N. Kumar" initials="N." surname="Kumar"/>
            <author fullname="S. Aldrin" initials="S." surname="Aldrin"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <date month="March" year="2017"/>
            <abstract>
              <t indent="0">This document describes a simple and efficient mechanism to detect data-plane failures in Multiprotocol Label Switching (MPLS) Label Switched Paths (LSPs). It defines a probe message called an "MPLS echo request" and a response message called an "MPLS echo reply" for returning the result of the probe. The MPLS echo request is intended to contain sufficient information to check correct operation of the data plane and to verify the data plane against the control plane, thereby localizing faults.</t>
              <t indent="0">This document obsoletes RFCs 4379, 6424, 6829, and 7537, and updates RFC 1122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8029"/>
          <seriesInfo name="DOI" value="10.17487/RFC8029"/>
        </reference>
        <reference anchor="RFC9570" target="https://www.rfc-editor.org/info/rfc9570" quoteTitle="true" derivedAnchor="RFC9570">
          <front>
            <title>Deprecating the Use of Router Alert in LSP Ping</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="G. Mirsky" initials="G." role="editor" surname="Mirsky"/>
            <date month="May" year="2024"/>
            <abstract>
              <t indent="0">The MPLS echo request and MPLS echo response messages, defined in RFC 8029, "Detecting Multiprotocol Label Switched (MPLS) Data-Plane Failures" (usually referred to as LSP ping), are encapsulated in IP packets with headers that include a Router Alert Option (RAO). In actual deployments, the RAO was neither required nor used. Furthermore, RFC 6398 identifies security vulnerabilities associated with the RAO in non-controlled environments, e.g., the case of using the MPLS echo request/reply as inter-area Operations, Administration, and Maintenance (OAM), and recommends against its use outside of controlled environments.</t>
              <t indent="0">Therefore, this document retires the RAO for MPLS OAM and updates RFC 8029 to remove the RAO from LSP ping message encapsulations. Furthermore, this document explains why RFC 7506 has been reclassified as Historic.</t>
              <t indent="0">Also, this document recommends the use of an IPv6 loopback address (::1/128) as the IPv6 destination address for an MPLS echo request message.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9570"/>
          <seriesInfo name="DOI" value="10.17487/RFC9570"/>
        </reference>
        <reference anchor="RFC9777" target="https://www.rfc-editor.org/info/rfc9777" quoteTitle="true" derivedAnchor="RFC9777">
          <front>
            <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
            <author fullname="B. Haberman" initials="B." role="editor" surname="Haberman"/>
            <date month="March" year="2025"/>
            <abstract>
              <t indent="0">This document specifies the Multicast Listener Discovery version 2 (MLDv2) protocol. MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses.</t>
              <t indent="0">This document updates RFC 2710 and obsoletes RFC 3810.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="101"/>
          <seriesInfo name="RFC" value="9777"/>
          <seriesInfo name="DOI" value="10.17487/RFC9777"/>
        </reference>
      </references>
    </references>
    <section anchor="Legacy" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-protocols-that-use-the-ipv6">Protocols That Use the IPv6 Router Alert Option</name>
      <t indent="0" pn="section-appendix.a-1"><xref target="Depend" format="default" sectionFormat="of" derivedContent="Table 1"/> contains an exhaustive list of protocols that use the
      IPv6 Router Alert option. There are no known IPv6 implementations of
      MPLS Ping. Neither Integrated Services (Intserv) nor Next Steps in Signaling (NSIS) are widely deployed. All NSIS
      protocols are experimental. Pragmatic Generic Multicast (PGM) is
      experimental, and there are no known IPv6 implementations.</t>
      <table anchor="Depend" align="center" pn="table-1">
        <name slugifiedName="name-protocols-that-use-the-ipv6-">Protocols That Use the IPv6 Router Alert Option</name>
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Protocol</th>
            <th align="left" colspan="1" rowspan="1">References</th>
            <th align="left" colspan="1" rowspan="1">Application</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">Multicast Listener Discovery Version 2 (MLDv2)</td>
            <td align="left" colspan="1" rowspan="1">
              <xref target="RFC9777" format="default" sectionFormat="of" derivedContent="RFC9777"/></td>
            <td align="left" colspan="1" rowspan="1">IPv6 Multicast</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">Multicast Router Discovery (MRD)</td>
            <td align="left" colspan="1" rowspan="1">
              <xref target="RFC4286" format="default" sectionFormat="of" derivedContent="RFC4286"/></td>
            <td align="left" colspan="1" rowspan="1">IPv6 Multicast</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">Pragmatic General Multicast (PGM)</td>
            <td align="left" colspan="1" rowspan="1">
              <xref target="RFC3208" format="default" sectionFormat="of" derivedContent="RFC3208"/></td>
            <td align="left" colspan="1" rowspan="1">IPv6 Multicast</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">MPLS Ping (Use of the IPv6 Router Alert option is deprecated)</td>
            <td align="left" colspan="1" rowspan="1">
              <xref target="RFC7506" format="default" sectionFormat="of" derivedContent="RFC7506"/><xref target="RFC8029" format="default" sectionFormat="of" derivedContent="RFC8029"/><xref target="RFC9570" format="default" sectionFormat="of" derivedContent="RFC9570"/></td>
            <td align="left" colspan="1" rowspan="1">MPLS Operations, Administration, and Maintenance (OAM)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">Resource Reservation Protocol (RSVP): Both IPv4 and IPv6 implementations</td>
            <td align="left" colspan="1" rowspan="1">
              <xref target="RFC3175" format="default" sectionFormat="of" derivedContent="RFC3175"/> <xref target="RFC5946" format="default" sectionFormat="of" derivedContent="RFC5946"/> <xref target="RFC6016" format="default" sectionFormat="of" derivedContent="RFC6016"/> <xref target="RFC6401" format="default" sectionFormat="of" derivedContent="RFC6401"/></td>
            <td align="left" colspan="1" rowspan="1">Integrated Services (Intserv) <xref target="RFC1633" format="default" sectionFormat="of" derivedContent="RFC1633"/> and Multiprotocol Label Switching
            (MPLS) <xref target="RFC3031" format="default" sectionFormat="of" derivedContent="RFC3031"/></td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">Next Steps in Signaling (NSIS)</td>
            <td align="left" colspan="1" rowspan="1">
              <xref target="RFC5979" format="default" sectionFormat="of" derivedContent="RFC5979"/> <xref target="RFC5971" format="default" sectionFormat="of" derivedContent="RFC5971"/></td>
            <td align="left" colspan="1" rowspan="1">NSIS <xref target="RFC4080" format="default" sectionFormat="of" derivedContent="RFC4080"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.b-1">Thanks to <contact fullname="Zafar Ali"/>, <contact fullname="Brian       Carpenter"/>, <contact fullname="Toerless Eckert"/>, <contact fullname="David Farmer"/>, <contact fullname="Adrian Farrel"/>, <contact fullname="Bob Hinden"/>, and <contact fullname="Jen Linkova"/> for their
      reviews of this document.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-address">Author's Address</name>
      <author fullname="Ron Bonica" initials="R." surname="Bonica">
        <organization showOnFrontPage="true">Juniper Networks</organization>
        <address>
          <postal>
            <country>United States of America</country>
          </postal>
          <email>rbonica@juniper.net</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
