Internet Research Task Force (IRTF) Request for Comments: 6747 Category: Experimental. November 2012



Similar documents
Internet Research Task Force (IRTF) Request for Comments: 6742 Category: Experimental. S. Rose US NIST November 2012

Internet Engineering Task Force (IETF) Juniper Networks January 2014

Internet Engineering Task Force (IETF) Category: Standards Track. T. Reddy Cisco March 2015

Internet Engineering Task Force (IETF) Category: Informational June 2010 ISSN:

Network Working Group Request for Comments: 4174 Category: Standards Track Riverbed Technology K. Gibbons McDATA Corporation September 2005

IPv6 Associated Protocols

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

ICS 351: Today's plan

IP address format: Dotted decimal notation:

REDUCING PACKET OVERHEAD IN MOBILE IPV6

Internet Engineering Task Force (IETF) Category: Best Current Practice ISSN: Facebook, Inc. S. Sheppard ATT Labs June 2011

Introduction to IP v6

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

ITL BULLETIN FOR JANUARY 2011

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: March 2011

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

P. van der Stok. Intended status: Informational February 14, 2014 Expires: August 18, 2014

Ethernet. Ethernet. Network Devices

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track February 2013 ISSN:

Charter Text Network Design and Configuration

Cisco Systems August 2009

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

Transport and Network Layer

MOBILE VIDEO WITH MOBILE IPv6

Internet Engineering Task Force (IETF) Request for Comments: 6422 Updates: 3315 Category: Standards Track ISSN: December 2011

Neighbour Discovery in IPv6

8.2 The Internet Protocol

SITE-CONTROLLED SECURE MULTI-HOMING AND TRAFFIC ENGINEERING FOR IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Mobility Through Naming: Impact on DNS

RARP: Reverse Address Resolution Protocol

Network Working Group Request for Comments: G. Tsirtsis Flarion Technologies E. Klovning Birdstep Technology ASA December 2005

Chapter 9. IP Secure

INFORMATION ASSURANCE AND THE TRANSITION TO IP VERSION 6 (IPV6)

Security of IPv6 and DNSSEC for penetration testers

Protocol Security Where?

An Overview of IPv6 CHAPTER

Category: Standards Track Cisco Systems, Inc. March 1999

Mobility on IPv6 Networks

An identifier-locator approach to host multihoming

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Internet Engineering Task Force. Intended status: Experimental Expires: September 6, 2012 March 5, 2012

Internet Architecture and Philosophy

SEcure Neighbour Discovery: A Report

Implementation IPV6 in Mikrotik RouterOS. by Teddy Yuliswar

Boosting mobility performance with Multi-Path TCP

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Types of IPv4 addresses in Internet

EDSA-300. ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements

Network Security TCP/IP Refresher

Category: Informational Consulintel October 2004

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager

IETF IPv6 Request for Comments (RFCs) Updated

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Internet Packets. Forwarding Datagrams

Telematics. 9th Tutorial - IP Model, IPv6, Routing

IPv6 First Hop Security Protecting Your IPv6 Access Network

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

ProCurve Networking IPv6 The Next Generation of Networking

Network Working Group. Category: Standards Track October 2006

Site Local Addresses - Advantages and Disadvantages

IPv6 Fundamentals: A Straightforward Approach

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Internet Engineering Task Force (IETF) Category: Informational. H. Tschofenig Nokia Siemens Networks B. Stark AT&T A. Kuett Skype January 2012

Internet Protocol Address

Request for Comments: 5207 Category: Informational L. Eggert Nokia April 2008

IP - The Internet Protocol

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Securing IP Networks with Implementation of IPv6

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

CSE 127: Computer Security. Network Security. Kirill Levchenko

NAT and Firewall Traversal with STUN / TURN / ICE

Chapter 2 TCP/IP Networking Basics

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Network Working Group. Category: Standards Track Novell November 1997

6LoWPAN Technical Overview

IPV6 vs. SSL comparing Apples with Oranges

IPv6 associated protocols. Piers O Hanlon

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

MetroNet6 - Homeland Security IPv6 R&D over Wireless

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Internet Engineering Task Force (IETF) Request for Comments: C. Aoun Consultant E. Davies Folly Consulting October 2010

Locator/ID Separation Protocol: do we really need such a thing?

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

About the Technical Reviewers

Lecture Computer Networks

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Internet Engineering Task Force (IETF) France Telecom R&D S. Madanapalli iram Technologies November 2010

- IPv4 Addressing and Subnetting -

Content Page No. Unit I Lesson 1. Introduction to Digital Communication Lesson 2. WAN Technology Lesson 3. History about TCP/IP

Moonv6 Test Suite DRAFT

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Request for Comments: 1788 Category: Experimental April 1995

Transcription:

Internet Research Task Force (IRTF) Request for Comments: 6747 Category: Experimental ISSN: 2070-1721 RJ Atkinson Consultant SN Bhatti U. St Andrews November 2012 Abstract Address Resolution Protocol (ARP) for the Identifier-Locator Network Protocol for IPv4 (ILNPv4) This document defines an Address Resolution Protocol (ARP) extension to support the Identifier-Locator Network Protocol for IPv4 (ILNPv4). ILNP is an experimental, evolutionary enhancement to IP. This document is a product of the IRTF Routing Research Group. Status of This Memo This document is not an Internet Standards Track specification; it is published for examination, experimental implementation, and evaluation. This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Research Task Force (IRTF). The IRTF publishes the results of Internet-related research and development activities. These results might not be suitable for deployment. This RFC represents the individual opinion(s) of one or more members of the Routing Research Group of the Internet Research Task Force (IRTF). Documents approved for publication by the IRSG are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6747. Atkinson & Bhatti Experimental [Page 1]

Copyright Notice Copyright (c) 2012 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. This document may not be modified, and derivative works of it may not be created, except to format it for publication as an RFC or to translate it into languages other than English. Table of Contents 1. Introduction...3 1.1. ILNP Document Roadmap...3 1.2. Terminology...5 2. ARP Extensions for ILNPv4...5 2.1. ILNPv4 ARP Request Packet Format...5 2.2. ILNPv4 ARP Reply Packet Format...7 2.3. Operation and Implementation of ARP for ILNPv4...8 3. Security Considerations...9 4. IANA Considerations...9 5. References...10 5.1. Normative References...10 5.2. Informative References...11 6. Acknowledgements...11 Atkinson & Bhatti Experimental [Page 2]

1. Introduction This document is part of the ILNP document set, which has had extensive review within the IRTF Routing RG. ILNP is one of the recommendations made by the RG Chairs. Separately, various refereed research papers on ILNP have also been published during this decade. So, the ideas contained herein have had much broader review than the IRTF Routing RG. The views in this document were considered controversial by the Routing RG, but the RG reached a consensus that the document still should be published. The Routing RG has had remarkably little consensus on anything, so virtually all Routing RG outputs are considered controversial. At present, the Internet research and development community are exploring various approaches to evolving the Internet Architecture to solve a variety of issues including, but not limited to, scalability of inter-domain routing [RFC4984]. A wide range of other issues (e.g., site multihoming, node multihoming, site/subnet mobility, node mobility) are also active concerns at present. Several different classes of evolution are being considered by the Internet research and development community. One class is often called "Map and Encapsulate", where traffic would be mapped and then tunnelled through the inter-domain core of the Internet. Another class being considered is sometimes known as "Identifier/Locator Split". This document relates to a proposal that is in the latter class of evolutionary approaches. The Identifier Locator Network Protocol (ILNP) is a proposal for evolving the Internet Architecture. It differs from the current Internet Architecture primarily by deprecating the concept of an IP Address, and instead defining two new objects, each having crisp syntax and semantics. The first new object is the Locator, a topology-dependent name for a subnetwork. The other new object is the Identifier, which provides a topology-independent name for a node. 1.1. ILNP Document Roadmap This document describes extensions to ARP for use with ILNPv4. The ILNP architecture can have more than one engineering instantiation. For example, one can imagine a "clean-slate" engineering design based on the ILNP architecture. In separate documents, we describe two specific engineering instances of ILNP. The term ILNPv6 refers precisely to an instance of ILNP that Atkinson & Bhatti Experimental [Page 3]

is based upon, and backwards compatible with, IPv6. The term ILNPv4 refers precisely to an instance of ILNP that is based upon, and backwards compatible with, IPv4. Many engineering aspects common to both ILNPv4 and ILNPv6 are described in [RFC6741]. A full engineering specification for either ILNPv6 or ILNPv4 is beyond the scope of this document. Readers are referred to other related ILNP documents for details not described here: a) [RFC6740] is the main architectural description of ILNP, including the concept of operations. b) [RFC6741] describes engineering and implementation considerations that are common to both ILNPv4 and ILNPv6. c) [RFC6742] defines additional DNS resource records that support ILNP. d) [RFC6743] defines a new ICMPv6 Locator Update message used by an ILNP node to inform its correspondent nodes of any changes to its set of valid Locators. e) [RFC6744] defines a new IPv6 Nonce Destination Option used by ILNPv6 nodes (1) to indicate to ILNP correspondent nodes (by inclusion within the initial packets of an ILNP session) that the node is operating in the ILNP mode and (2) to prevent off-path attacks against ILNP ICMP messages. This Nonce is used, for example, with all ILNP ICMPv6 Locator Update messages that are exchanged among ILNP correspondent nodes. f) [RFC6745] defines a new ICMPv4 Locator Update message used by an ILNP node to inform its correspondent nodes of any changes to its set of valid Locators. g) [RFC6746] defines a new IPv4 Nonce Option used by ILNPv4 nodes to carry a security nonce to prevent off-path attacks against ILNP ICMP messages and also defines a new IPv4 Identifier Option used by ILNPv4 nodes. h) [RFC6748] describes optional engineering and deployment functions for ILNP. These are not required for the operation or use of ILNP and are provided as additional options. Atkinson & Bhatti Experimental [Page 4]

1.2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 2. ARP Extensions for ILNPv4 ILNP for IPv4 (ILNPv4) is merely a different instantiation of the ILNP architecture, so it retains the crisp distinction between the Locator and the Identifier. As with ILNPv6, only the Locator values are used for routing and forwarding ILNPv4 packets [RFC6740]. As with ILNP for IPv6 (ILNPv6), when ILNPv4 is used for a network-layer session, the upper-layer protocols (e.g., TCP/UDP pseudo-header checksum, IPsec Security Association) bind only to the Identifiers, never to the Locators [RFC6741]. However, just as the packet format for IPv4 is different to IPv6, so the engineering details for ILNPv4 are different also. While ILNPv6 is carefully engineered to be fully backwards-compatible with IPv6 Neighbor Discovery, ILNPv4 relies upon an extended version of the Address Resolution Protocol (ARP) [RFC826], which is defined here. While ILNPv4 could have been engineered to avoid changes in ARP, that would have required that the ILNPv4 Locator (i.e., L32) have slightly different semantics, which was architecturally undesirable. The packet formats used are direct extensions of the existing widely deployed ARP Request (OP code 1) and ARP Reply (OP code 2) packet formats. This design was chosen for practical engineering reasons (i.e., to maximise code reuse), rather than for maximum protocol design purity. We anticipate that ILNPv6 is much more likely to be widely implemented and deployed than ILNPv4. However, having a clear definition of ILNPv4 helps demonstrate the difference between architecture and engineering, and also demonstrates that the common ILNP architecture can be instantiated in different ways with different existing network-layer protocols. 2.1. ILNPv4 ARP Request Packet Format The ILNPv4 ARP Request is an extended version of the widely deployed ARP Request (OP code 1). For experimentation purposes, the ILNPv4 ARP Request OP code uses decimal value 24. It is important to note that decimal value 24 is a pre-defined, shared-use experimental OP code for ARP [RFC5494], and is not Atkinson & Bhatti Experimental [Page 5]

uniquely assigned to ILNPv4 ARP Requests. The ILNPv4 ARP Request extension permits the Node Identifier (NID) values to be carried in the ARP message, in addition to the node s 32-bit Locator (L32) values [RFC6742]. 0 7 15 23 31 HT PT HAL PAL OP S_HA (bytes 0-3) S_HA (bytes 4-5) S_L32 (bytes 0-1) S_L32 (bytes 2-3) S_NID (bytes 0-1) S_NID (bytes 2-5) S_NID (bytes 6-7) T_HA (bytes 0-1) T_HA (bytes 3-5) T_L32 (bytes 0-3) T_NID (bytes 0-3) T_NID (bytes 4-7) Figure 2.1: ILNPv4 ARP Request packet format In Figure 2.1, the fields are as follows: HT Hardware Type (*) PT Protocol Type (*) HAL Hardware Address Length (*) PAL Protocol Address Length (uses new value 12) OP Operation Code (uses experimental value OP_EXP1=24) S_HA Sender Hardware Address (*) S_L32 Sender L32 (* same as Sender IPv4 address for ARP) S_NID Sender Node Identifier (8 bytes) T_HA Target Hardware Address (*) T_L32 Target L32 (* same as Target IPv4 address for ARP) T_NID Target Node Identifier (8 bytes) Atkinson & Bhatti Experimental [Page 6]

The changed OP code indicates that this is ILNPv4 and not IPv4. The semantics and usage of the ILNPv4 ARP Request are identical to the existing ARP Request (OP code 2), except that the ILNPv4 ARP Request is sent only by nodes that support ILNPv4. The field descriptions marked with "*" should have the same values as for ARP as used for IPv4. 2.2. ILNPv4 ARP Reply Packet Format The ILNPv4 ARP Reply is an extended version of the widely deployed ARP Reply (OP code 2). For experimentation purposes, the ILNPv4 ARP Request OP code uses decimal value 25. It is important to note that decimal value 25 is a pre-defined, shared-use experimental OP code for ARP [RFC5494], and is not uniquely assigned to ILNPv4 ARP Requests. The ILNPv4 ARP Reply extension permits the Node Identifier (NID) values to be carried in the ARP message, in addition to the node s 32-bit Locator (L32) values [RFC6742]. 0 7 15 23 31 HT PT HAL PAL OP S_HA (bytes 0-3) S_HA (bytes 4-5) S_L32 (bytes 0-1) S_L32 (bytes 2-3) S_NID (bytes 0-1) S_NID (bytes 2-5) S_NID (bytes 6-7) T_HA (bytes 0-1) T_HA (bytes 3-5) T_L32 (bytes 0-3) T_NID (bytes 0-3) T_NID (bytes 4-7) Figure 2.2: ILNPv4 ARP Reply packet format Atkinson & Bhatti Experimental [Page 7]

In Figure 2.2, the fields are as follows: HT Hardware Type (*) PT Protocol Type (*) HAL Hardware Address Length (*) PAL Protocol Address Length (uses new value 12) OP Operation Code (uses experimental value OP_EXP2=25) S_HA Sender Hardware Address (*) S_L32 Sender L32 (* same as Sender IPv4 address for ARP) S_NID Sender Node Identifier (8 bytes) T_HA Target Hardware Address (*) T_L32 Target L32 (* same as Target IPv4 address for ARP) T_NID Target Node Identifier (8 bytes) The changed OP code indicates that this is ILNPv4 and not IPv4. The semantics and usage of the ILNPv4 ARP Reply are identical to the existing ARP Reply (OP code 2), except that the ILNPv4 ARP Reply is sent only by nodes that support ILNPv4. The field descriptions marked with "*" should have the same values as for ARP as used for IPv4. 2.3. Operation and Implementation of ARP for ILNPv4 The operation of ARP for ILNPv4 is almost identical to that for IPv4. Essentially, the key differences are: a) where an IPv4 ARP Request would use IPv4 addresses, an ILNPv4 ARP Request MUST use: 1. a 32-bit L32 value (_L32 suffixes in Figures 2.1 and 2.2) 2. a 64-bit NID value (_NID suffixes in Figures 2.1 and 2.2) b) where an IPv4 ARP Reply would use IPv4 addresses, an ILNPv4 ARP Reply MUST use: 1. a 32-bit L32 value (_L32 suffixes in Figures 2.1 and 2.2) 2. a 64-bit NID value (_NID suffixes in Figures 2.1 and 2.2) As the OP codes 24 and 25 are distinct from ARP for IPv4, but the packet formats in Figures 2.1 and 2.2 are, effectively, extended versions of the corresponding ARP packets. It should be possible to implement this extension of ARP by extending existing ARP implementations rather than having to write an entirely new implementation for ILNPv4. It should be emphasised, however, that OP codes 24 and 25 are for experimental use as defined in [RFC5494], and so it is possible that other experimental protocols could be using these OP codes concurrently. Atkinson & Bhatti Experimental [Page 8]

3. Security Considerations Security considerations for the overall ILNP architecture are described in [RFC6740]. Additional common security considerations applicable to ILNP are described in [RFC6741]. This section describes security considerations specific to the specific ILNPv4 topics discussed in this document. The existing widely deployed Address Resolution Protocol (ARP) for IPv4 is a link-layer protocol, so it is not vulnerable to off-link attackers. In this way, it is a bit different than IPv6 Neighbor Discovery (ND); IPv6 ND is a subset of the Internet Control Message Protocol (ICMP), which runs over IPv6. However, ARP does not include any form of authentication, so current ARP deployments are vulnerable to a range of attacks from on-link nodes. For example, it is possible for one node on a link to forge an ARP packet claiming to be from another node, thereby "stealing" the other node s IPv4 address. [RFC5227] describes several of these risks and some measures that an ARP implementation can use to reduce the chance of accidental IPv4 address misconfiguration and also to detect such misconfiguration if it should occur. This extension does not change the security risks that are inherent in using ARP. In situations where additional protection against on-link attackers is needed (for example, within high-risk operational environments), the IEEE standards for link-layer security [IEEE-802.1-AE] SHOULD be implemented and deployed. Implementers of this specification need to understand that the two OP code values used for these 2 extensions are not uniquely assigned to ILNPv4. Other experimenters might be using the same two OP code values at the same time for different ARP-related experiments. Absent prior coordination among all users of a particular IP subnetwork, different experiments might be occurring on the same IP subnetwork. So, implementations of these two ARP extensions ought to be especially defensively coded. 4. IANA Considerations This document makes no request of IANA. If in the future the IETF decided to standardise ILNPv4, then allocation of unique ARP OP codes for the two extensions above would be sensible as part of the IETF standardisation process. Atkinson & Bhatti Experimental [Page 9]

5. References 5.1. Normative References [IEEE-802.1-AE] IEEE, "Media Access Control (MAC) Security", IEEE Standard 802.1 AE, 18 August 2006, IEEE, New York, NY, 10016, USA. [RFC826] [RFC2119] [RFC5227] [RFC5494] [RFC6740] [RFC6741] [RFC6742] [RFC6745] [RFC6746] Plummer, D., "Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware", STD 37, RFC 826, November 1982. Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. Cheshire, S., "IPv4 Address Conflict Detection", RFC 5227, July 2008. Arkko, J. and C. Pignataro, "IANA Allocation Guidelines for the Address Resolution Protocol (ARP)", RFC 5494, April 2009. Atkinson, R. and S. Bhatti, "Identifier Locator Network Protocol (ILNP) Architectural Description", RFC 6740, November 2012. Atkinson, R. and S. Bhatti, "Identifier-Locator Network Protocol (ILNP) Engineering and Implementation Considerations", RFC 6741, November 2012. Atkinson, R., Bhatti, S., and S. Rose, "DNS Resource Records for the Identifier-Locator Network Protocol (ILNP)", RFC 6742, November 2012. Atkinson, R. and S. Bhatti, "ICMP Locator Update Message for the Identifier-Locator Network Protocol for IPv4 (ILNPv4)", RFC 6745, November 2012. Atkinson, R. and S.Bhatti, "IPv4 Options for the Identifier-Locator Network Protocol (ILNP)", RFC 6746, November 2012. Atkinson & Bhatti Experimental [Page 10]

5.2. Informative References [RFC4984] [RFC6743] [RFC6744] [RFC6748] Meyer, D., Ed., Zhang, L., Ed., and K. Fall, Ed., "Report from the IAB Workshop on Routing and Addressing", RFC 4984, September 2007. Atkinson, R. and S. Bhatti, "ICMPv6 Locator Update Message", RFC 6743, November 2012. Atkinson, R. and S. Bhatti, "IPv6 Nonce Destination Option for the Identifier-Locator Network Protocol for IPv6 (ILNPv6)", RFC 6744, November 2012. Atkinson, R. and S. Bhatti, "Optional Advanced Deployment Scenarios for the Identifier-Locator Network Protocol (ILNP)", RFC 6748, November 2012. 6. Acknowledgements Steve Blake, Stephane Bortzmeyer, Mohamed Boucadair, Noel Chiappa, Wes George, Steve Hailes, Joel Halpern, Mark Handley, Volker Hilt, Paul Jakma, Dae-Young Kim, Tony Li, Yakov Rehkter, Bruce Simpson, Robin Whittle, and John Wroclawski (in alphabetical order) provided review and feedback on earlier versions of this document. Steve Blake provided an especially thorough review of an early version of the entire ILNP document set, which was extremely helpful. We also wish to thank the anonymous reviewers of the various ILNP papers for their feedback. Roy Arends provided expert guidance on technical and procedural aspects of DNS issues. Atkinson & Bhatti Experimental [Page 11]

Authors Addresses RJ Atkinson Consultant San Jose, CA, 95125 USA EMail: rja.lists@gmail.com SN Bhatti School of Computer Science University of St Andrews North Haugh, St Andrews, Fife KY16 9SX Scotland, UK EMail: saleem@cs.st-andrews.ac.uk Atkinson & Bhatti Experimental [Page 12]