SHIM6 WGNetwork Working Group E. NordmarkInternet-DraftRequest for Comments: 5533 Sun MicrosystemsIntended status:Category: Standards Track M. BagnuloExpires: August 10, 2009UC3MFebruary 6,May 2009 Shim6: Level 3 Multihoming Shim Protocol for IPv6draft-ietf-shim6-proto-12.txtStatus ofthisThis Memo ThisInternet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents ofdocument specifies an Internet standards track protocol for the InternetEngineering Task Force (IETF), its areas,community, andits working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents validrequests discussion and suggestions fora maximumimprovements. Please refer to the current edition ofsix monthsthe "Internet Official Protocol Standards" (STD 1) for the standardization state andmay be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The liststatus ofcurrent Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The listthis protocol. Distribution ofInternet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on August 10, 2009.this memo is unlimited. Copyright Notice Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents(http://trustee.ietf.org/license-info)in effect on the date of publication of thisdocument.document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Abstract This document defines the Shim6 protocol, a layer 3 shim for providing locator agility below the transport protocols, so that multihoming can be provided for IPv6 with failover andload sharingload-sharing properties, without assuming that a multihomed site will have aprovider independentprovider-independent IPv6 address prefixwhich isannounced in the global IPv6 routing table. The hosts in a sitewhichthat has multipleproviderprovider- allocated IPv6 addressprefixes,prefixes will use the Shim6 protocol specified in this document tosetupset up state with peerhosts,hosts so that the state can later be used to failover to a different locator pair, should the original one stop working. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5 1.1. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2. Non-Goals . . . . . . . . . . . . . . . . . . . . . . . . 6 1.3. Locators asUpper-layer IDentifiersUpper-Layer Identifiers (ULID) . . . . . . . 6 1.4. IP Multicast . . . . . . . . . . . . . . . . . . . . . . 7 1.5. Renumbering Implications . . . . . . . . . . . . . . . . 8 1.6. Placement of theshimShim . . . . . . . . . . . . . . . . . . 9 1.7. Traffic Engineering . . . . . . . . . . . . . . . . . . . 11 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . .1312 2.1. Definitions . . . . . . . . . . . . . . . . . . . . . . .1312 2.2. Notational Conventions . . . . . . . . . . . . . . . . .1615 2.3. Conceptual . . . . . . . . . . . . . . . . . . . . . . .1615 3. Assumptions . . . . . . . . . . . . . . . . . . . . . . . . .1715 4. Protocol Overview . . . . . . . . . . . . . . . . . . . . . .1917 4.1. Context Tags . . . . . . . . . . . . . . . . . . . . . .2119 4.2. Context Forking . . . . . . . . . . . . . . . . . . . . .2119 4.3. API Extensions . . . . . . . . . . . . . . . . . . . . .2220 4.4. Securing Shim6 . . . . . . . . . . . . . . . . . . . . .2220 4.5. Overview of Shim Control Messages . . . . . . . . . . . .2321 4.6. Extension Header Order . . . . . . . . . . . . . . . . .2422 5. Message Formats . . . . . . . . . . . . . . . . . . . . . . .2623 5.1. Common Shim6 Message Format . . . . . . . . . . . . . . .2623 5.2. Shim6 Payload Extension Header Format . . . . . . . . . .. . . 2724 5.3. Common Shim6 ControlheaderHeader . . . . . . . . . . . . . . .2724 5.4. I1 Message Format . . . . . . . . . . . . . . . . . . . .2926 5.5. R1 Message Format . . . . . . . . . . . . . . . . . . . .3027 5.6. I2 Message Format . . . . . . . . . . . . . . . . . . . .3229 5.7. R2 Message Format . . . . . . . . . . . . . . . . . . . .3431 5.8. R1bis Message Format . . . . . . . . . . . . . . . . . .3532 5.9. I2bis Message Format . . . . . . . . . . . . . . . . . .3734 5.10. Update Request Message Format . . . . . . . . . . . . . .3936 5.11. Update Acknowledgement Message Format . . . . . . . . . .4037 5.12. Keepalive Message Format . . . . . . . . . . . . . . . .4138 5.13. Probe Message Format . . . . . . . . . . . . . . . . . .4239 5.14. Error Message Format . . . . . . . . . . . . . . . . . .4239 5.15. Option Formats . . . . . . . . . . . . . . . . . . . . .4340 5.15.1. Responder Validator Option Format . . . . . . . . .4642 5.15.2. Locator List Option Format . . . . . . . . . . . . .4643 5.15.3. Locator Preferences Option Format . . . . . . . . .4845 5.15.4. CGA Parameter Data Structure Option Format . . . . .5047 5.15.5. CGA Signature Option Format . . . . . . . . . . . .5047 5.15.6. ULID Pair Option Format . . . . . . . . . . . . . .5148 5.15.7. Forked Instance Identifier Option Format . . . . . .5249 5.15.8. Keepalive Timeout Option Format . . . . . . . . . .5249 6. Conceptual Model of a Host . . . . . . . . . . . . . . . . .5350 6.1. Conceptual Data Structures . . . . . . . . . . . . . . .5350 6.2. Context STATES . . . . . . . . . . . . . . . . . . . . .5552 7. Establishing ULID-Pair Contexts . . . . . . . . . . . . . . .5753 7.1. Uniqueness of Context Tags . . . . . . . . . . . . . . .5753 7.2. Locator Verification . . . . . . . . . . . . . . . . . .5754 7.3. Normalcontext establishmentContext Establishment . . . . . . . . . . . . . .5855 7.4. Concurrentcontext establishmentContext Establishment . . . . . . . . . . . .5855 7.5. ContextrecoveryRecovery . . . . . . . . . . . . . . . . . . . .6057 7.6. ContextconfusionConfusion . . . . . . . . . . . . . . . . . . . .6259 7.7. Sending I1messagesMessages . . . . . . . . . . . . . . . . . . .6360 7.8. Retransmitting I1messagesMessages . . . . . . . . . . . . . . .6460 7.9. Receiving I1messagesMessages . . . . . . . . . . . . . . . . . .6461 7.10. Sending R1messagesMessages . . . . . . . . . . . . . . . . . . .6562 7.10.1. Generating the R1 Validator . . . . . . . . . . . .6662 7.11. Receiving R1messagesMessages andsendingSending I2messagesMessages . . . . . .6663 7.12. Retransmitting I2messagesMessages . . . . . . . . . . . . . . .6764 7.13. Receiving I2messagesMessages . . . . . . . . . . . . . . . . . .6865 7.14. Sending R2messagesMessages . . . . . . . . . . . . . . . . . . .6966 7.15. Match for Context Confusion . . . . . . . . . . . . . . .7067 7.16. Receiving R2messagesMessages . . . . . . . . . . . . . . . . . .7067 7.17. Sending R1bismessagesMessages . . . . . . . . . . . . . . . . .7168 7.17.1. Generating the R1bis Validator . . . . . . . . . . .7269 7.18. Receiving R1bismessagesMessages andsendingSending I2bismessagesMessages . . .7269 7.19. Retransmitting I2bismessagesMessages . . . . . . . . . . . . . .7370 7.20. Receiving I2bismessagesMessages andsendingSending R2messagesMessages . . . .7471 8. Handling ICMP Error Messages . . . . . . . . . . . . . . . .7672 9. Teardown of the ULID-Pair Context . . . . . . . . . . . . . .7975 10. Updating the Peer . . . . . . . . . . . . . . . . . . . . . .8076 10.1. Sending Update RequestmessagesMessages . . . . . . . . . . . . .8076 10.2. Retransmitting Update RequestmessagesMessages . . . . . . . . .8077 10.3. Newer InformationWhilewhile Retransmitting . . . . . . . . .8177 10.4. Receiving Update RequestmessagesMessages . . . . . . . . . . . .8178 10.5. Receiving Update AcknowledgementmessagesMessages . . . . . . . .8380 11. Sending ULP Payloads . . . . . . . . . . . . . . . . . . . .8580 11.1. Sending ULP Payload after a Switch . . . . . . . . . . .8581 12. Receiving Packets . . . . . . . . . . . . . . . . . . . . . .8782 12.1. ReceivingpayloadPayload withoutextension headersExtension Headers . . . . . . .8782 12.2. Receiving Shim6 Payload Extension Headers . . . . . . . .. . . 8782 12.3. Receiving Shim ControlmessagesMessages . . . . . . . . . . . . .8883 12.4. Context Lookup . . . . . . . . . . . . . . . . . . . . .8883 13. Initial Contact . . . . . . . . . . . . . . . . . . . . . . .9185 14. ProtocolconstantsConstants . . . . . . . . . . . . . . . . . . . . .9285 15. Implications Elsewhere . . . . . . . . . . . . . . . . . . .9386 15.1. Congestion Control Considerations . . . . . . . . . . . .9386 15.2.Middle-boxes considerationsMiddle-Boxes Considerations . . . . . . . . . . . . . . .9387 15.3. Operation and Management Considerations . . . . . . . . .9488 15.4. OtherconsiderationsConsiderations . . . . . . . . . . . . . . . . . .9589 16. Security Considerations . . . . . . . . . . . . . . . . . . .9790 16.1. Interaction with IPSec . . . . . . . . . . . . . . . . .9891 16.2. Residual Threats . . . . . . . . . . . . . . . . . . . .9992 17. IANA Considerations . . . . . . . . . . . . . . . . . . . . .10193 18. Acknowledgements . . . . . . . . . . . . . . . . . . . . . .10395 19.Appendix: Possible Protocol Extensions . . . . . . . . . . . 104 20. Appendix: Simplified STATE Machine . . . . . . . . . . . . . 106 20.1. Simplified STATE Machine diagram . . . . . . . . .References . . .111 21. Appendix: Context Tag Reuse. . . . . . . . . . . . . . . . .113 21.1. Context Recovery. . . . . 95 19.1. Normative References . . . . . . . . . . . . . . .113 21.2. Context Confusion. . . 95 19.2. Informative References . . . . . . . . . . . . . . . . .113 21.3. Three Party Context Confusion96 Appendix A. Possible Protocol Extensions . . . . . . . . . . . . 97 Appendix B. Simplified STATE Machine . .114 21.4. Summary. . . . . . . . . . . . 99 B.1. Simplified STATE Machine Diagram . . . . . . . . . . . . 104 Appendix C. Context Tag Reuse .114 22. Appendix: Design Alternatives. . . . . . . . . . . . . . . .115 22.1.106 C.1. Contextgranularity . . . . . . . .Recovery . . . . . . . . . . .115 22.2. Demultiplexing of data packets in Shim6 communications.115 22.2.1. Flow-label. . . . . . . . 106 C.2. Context Confusion . . . . . . . . . . . . .116 22.2.2. Extension Header. . . . . . . 106 C.3. Three-Party Context Confusion . . . . . . . . . . .118 22.3. Context Loss Detection. . . 107 C.4. Summary . . . . . . . . . . . . . .119 22.4. Securing locator sets. . . . . . . . . . . 107 Appendix D. Design Alternatives . . . . . . .121 22.5. ULID-pair context establishment exchange. . . . . . . .124 22.6. Updating locator sets. 108 D.1. Context Granularity . . . . . . . . . . . . . . . . .125 22.7. State Cleanup. . 108 D.2. Demultiplexing of Data Packets in Shim6 Communications . 108 D.2.1. Flow Label . . . . . . . . . . . . . . . . . . .125 23. Appendix: Change Log. . 109 D.2.2. Extension Header . . . . . . . . . . . . . . . . . .128 24. References111 D.3. Context-Loss Detection . . . . . . . . . . . . . . . . . 112 D.4. Securing Locator Sets . . . . . . . .135 24.1. Normative References. . . . . . . . . . 114 D.5. ULID-Pair Context-Establishment Exchange . . . . . . . .135 24.2. Informative References117 D.6. Updating Locator Sets . . . . . . . . . . . . . . . . .135 Authors' Addresses. 118 D.7. State Cleanup . . . . . . . . . . . . . . . . . . . . . .137119 1. Introduction This document describes a layer 3 shim approach and protocol for providing locator agility below the transport protocols, so that multihoming can be provided for IPv6 with failover andload sharingload-sharing properties[10],[11], without assuming that a multihomed site will have aprovider independentprovider-independent IPv6 addresswhich isannounced in the global IPv6 routing table. The hosts in a sitewhichthat has multipleproviderprovider- allocated IPv6 addressprefixes,prefixes will use the Shim6 protocol specified in this document tosetupset up state with peerhosts,hosts so that the state can later be used to failover to a different locator pair, should the original one stop working (the term locator is defined in Section 2). The Shim6 protocol is asite multihomingsite-multihoming solution in the sense that it allows existing communication to continue when a site that has multiple connections to theinternetInternet experiences an outage on a subset of these connections or further upstream. However, Shim6 processing is performed in individual hosts rather than through site- wide mechanisms. We assume that redirection attacks are prevented usingHash BasedHash-Based Addresses (HBA) as defined in [3]. The reachability andfailure detectionfailure-detection mechanisms, including how a new working locator pair is discovered after a failure, are specified ina separate documentRFC 5534 [4]. This document allocates message types and option types for that sub-protocol, and leaves the specification of the message and optionformatsformats, as well as the protocolbehaviorbehavior, tothat document.RFC 5534. 1.1. Goals The goals for this approach are to: o Preserve established communications in the presence of certain classes of failures, for example, TCP connections and UDP streams. o Have minimal impact onupper layerupper-layer protocols in general and on transport protocols and applications in particular. o Address the security threats in[14][15] throughthea combination of the HBA/CGA approach specified ina separate documentRFC 5535 [3] and the techniques described in this document. o Not require an extra roundtrip up front tosetup shim specificset up shim-specific state.InsteadInstead, allow theupper layerupper-layer traffic (e.g., TCP) to flow as normal and defer thesetupset up of the shim state until some number of packets have been exchanged. o Take advantage of multiple locators/addresses for load spreading so that different sets of communication to a host (e.g., different connections) might use different locators of the host. Note that this might cause load to be spreadunevenly, thusunevenly; thus, we use the term "load spreading" instead of "load balancing". This capability might enable some forms of traffic engineering, but the details for traffic engineering, including what requirements can be satisfied, are not specified in this document, and form part ofapotential extensions to this protocol. 1.2. Non-Goals Theassumption is that theproblem we are trying to solve is site multihoming, with the ability to have the set of site prefixes change over time due to site renumbering. Further, we assume that such changes to the set of locator prefixes can be relatively slow andmanaged;managed: slow enough to allow updates to the DNS to propagate (since the protocol defined in this document depends on the DNS to find the appropriate locator sets).Note, howeverHowever, note that it is an explicitnon- goalnon-goal to make communication survive a renumbering event (which causes all the locators of a host to change to a new set of locators). This proposal does not attempt to solve the related problem of host mobility. However, it might turn out that the Shim6 protocol can be a useful component for future host mobility solutions, e.g., for route optimization. Finally, this proposal also does not try to provide a newnetworknetwork- level ortransport leveltransport-level identifier name space distinct from the current IP address name space. Even though such a concept would be useful toUpper Layer Protocolsupper-layer protocols (ULPs) and applications, especially if the management burden for such a name space was negligible and there was an efficient yet secure mechanism to map from identifiers to locators, such a name space isn't necessary (and furthermore doesn't seem to help) to solve the multihoming problem. The Shim6 proposal doesn't fully separate the identifier and locator functions that have traditionally been overloaded in the IP address. However, throughout this document the term"identifier", or"identifier" or, more specifically,Upper Layer Identifier (ULID)upper-layer identifier (ULID), refers to the identifying function of an IPv6address, and "locator"address. "Locator" refers to thenetwork layernetwork-layer routing and forwarding properties of an IPv6 address. 1.3. Locators asUpper-layer IDentifiersUpper-Layer Identifiers (ULID) The approach described in this document does not introduce a new identifier name space but instead uses the locator that is selected in the initial contact with the remote peer as the preservedUpper- Layer Identifierupper- layer identifier (ULID). While there may be subsequent changes in the selectednetwork levelnetwork-level locators over timein(in response to failures in using the originallocator,locator), theupper levelupper-level protocol stack elements will continue to use thisupper levelupper-level identifier without change. This implies that the ULID selection is performed as today's default address selection as specified in RFC 3484 [7]. Some extensions are needed to RFC 3484 to try different source addresses, whether or not the Shim6 protocol is used, as outlined in[8].[9]. Underneath, and transparently, the multihoming shim selects working locator pairs with the initial locator pair being the ULID pair. If communication subsequentlyfailsfails, the shim can test and select alternate locators. A subsequent section discusses the issues that arise when the selected ULID is not initiallyworking hence there is aworking, which creates the need to switch locators up front. Using one of the locators as the ULID has certain benefits for applicationswhichthat have long-lived session state orperformsthat perform callbacks or referrals, because both theFQDNFully Qualified Domain Name (FQDN) and the 128-bit ULID work as handles for the applications. However, using a single128- bit128-bit ULID doesn't provide seamless communication when that locator is unreachable. See[17][18] for further discussion of the application implications. There has been some discussion of using non-routable addresses, such as Unique-Local Addresses (ULAs)[13],[14], as ULIDs in a multihoming solution. While this document doesn't specify all aspects of this, it is believed that the approach can be extended to handle the non- routable address case. For example, the protocol already needs to handle ULIDs that are not initially reachable.ThusThus, the same mechanism can handle ULIDs that are permanently unreachable from outside their site. The issue becomes how to make the protocol perform well when the ULID is known a priori to benot reachable (e.g.unreachable (e.g., the ULID is a ULA), for instance, avoiding any timeout and retries in this case. Inadditionaddition, one would need to understand how the ULAs would be entered in the DNS to avoid a performance impact on existing,non-Shim6 aware,non-Shim6-aware IPv6 hosts potentially trying to communicate to the (unreachable) ULA. 1.4. IP Multicast IPMulticastmulticast requires that the IPsource addressSource Address field contain a topologically correct locator for the interface that is used to send the packet, since IP multicast routing uses both the source address and the destination group to determine where to forward the packet. In particular,it needIP multicast routing needs to be able to do theRPFReverse Path Forwarding (RPF) check. (This isn't much different than the situation with widely implemented ingress filtering [6] for unicast.) While in theory it would be possible to apply the shim re-mapping of the IP address fields between ULIDs and locators, the fact that all the multicast receivers would need to know the mapping toperform,perform makes such an approach difficult in practice.ThusThus, it makes sense to have multicast ULPs operate directly on locators and not use the shim. This is quite a natural fit for protocolswhichthat use RTP[9],[10], since RTP already has an explicit identifier in the form of theSSRCsynchronization source (SSRC) field in the RTP headers.ThusThus, the actual IP address fields are not important to the application. In summary, IP multicast will not need the shim to remap the IP addresses. This doesn't prevent the receiver of multicast to change its locators, since the receiver is not explicitly identified; the destination address is a multicast address and not the unicast locator of the receiver. 1.5. Renumbering Implications As stated above, this approach does not try to make communication survive renumbering in the general case. When a host is renumbered, the effect is that one or more locators become invalid, and zero or more locators are added to the host's network interface. This means that the set of locators that is used in the shim will change, which the shim can handle as long as not all the original locators become invalid at the sametime and dependingtime; the shim's ability to handle this also depends on the time that is required to update the DNS and for those updates to propagate. But IP addresses are also used as ULIDs, and making the communication survive locators becoming invalid can potentially cause some confusion at the upper layers. The fact that a ULID might be used with a different locator over timeopenopens up the possibility that communication between two ULIDs might continue to work after one or both of those ULIDs are no longer reachable as locators, forexampleexample, due to a renumbering event. This opens up the possibility that the ULID (or at least the prefix on which it is based)ismay be reassigned to another site while it is still being used (with another locator) for existing communication. In the worstcasecase, we could end up with two separate hosts using the same ULID while both of them are communicating with the same host. This potential source for confusion is avoided by requiring that any communication using a ULID MUST be terminated when the ULID becomes invalid (due to the underlying prefix becoming invalid). This behavior can be accomplished by explicitly discarding the shim state when the ULID becomes invalid. Thecontext recoverycontext-recovery mechanism will then make the peer aware that the context isgone,gone and that the ULID is no longer present at the same locator(s). 1.6. Placement of theshimShim ----------------------- | Transport Protocols | ----------------------- -------------- ------------- IP endpoint | Frag/reass | | Dest opts | sub-layer -------------- ------------- --------------------- | Shim6 shim layer | --------------------- ------ IP routing | IP | sub-layer ------ Figure 1: ProtocolstackStack The proposal uses a multihoming shim layer within the IP layer, i.e., below the ULPs, as shown in Figure 1, in order to provide ULP independence. The multihoming shim layer behaves as if it is associated with an extension header, which would be placed after any routing-related headers in the packet (such as any hop-by-hopoptions, or routing header).options). However, when the locator pair is the ULIDpairpair, there is no data that needs to be carried in an extensionheader, thusheader; thus, none is needed in that case. Layering thefragmentationFragmentation header above the multihoming shim makes reassembly robust in the case that there is broken multi-path routingwhichthat results in using different paths, hence potentially different source locators, for different fragments. Thus, the multihoming shim layer is placed between the IP endpointsublayer, whichsublayer (which handlesfragmentation, reassembly,fragmentation and reassembly) and the IP routingsublayer, whichsublayer (which selectswhichthe next hop and interface to use for sending outpackets.packets). Applications andupper layerupper-layer protocols use ULIDswhichthat the Shim6 layermapmaps to/from different locators. The Shim6 layer maintains state, called ULID-pair context, per ULID pair (that is, such state applies to all ULP connections between the ULID pair) in order to perform this mapping. The mapping is performed consistently at the sender and the receiver so that ULPs see packets that appear to be sent using ULIDs from end to end. This property is maintained even though the packets travel through the network containing locators in the IP address fields, and even though those locators may be changed by the transmitting Shim6 layer. The context state is maintained per remoteULID i.e.ULID, i.e., approximately per peer host, and not at any finer granularity. In particular,itthe context state is independent of the ULPs and any ULP connections. However, the forking capability enablesshim-awareShim6-aware ULPs to use more than one locator pair at a time forana single ULID pair. ---------------------------- ---------------------------- | Sender A | | Receiver B | | | | | | ULP | | ULP | | | src ULID(A)=L1(A) | | ^ | | | dst ULID(B)=L1(B) | | | src ULID(A)=L1(A) | | v | | | dst ULID(B)=L1(B) | | multihoming shim | | multihoming shim | | | src L2(A) | | ^ | | | dst L3(B) | | | src L2(A) | | v | | | dst L3(B) | | IP | | IP | ---------------------------- ---------------------------- | ^ ------- cloud with some routers ------- Figure 2: Mapping withchanged locatorsChanged Locators The result of this consistent mapping is that there is no impact on the ULPs. In particular, there is no impact on pseudo-header checksums and connection identification. Conceptually, one could view this approach as if both ULIDs and locators arebeingpresent in every packet, andwithas if aheader compressionheader-compression mechanism is applied that removes the need for the ULIDs to be carried in the packets once the compression state has been established. In order for the receiver torecreatere-create a packet with the correctULIDsULIDs, there is a need to include some "compression tag" in the data packets. This serves to indicate the correct context to use for decompression when the locator pair in the packet is insufficient to uniquely identify the context. There are different types of interactions between the Shim6 layer and other protocols. Those intereactions are influenced by the usage of the addresses that these other protocols do and the impact of the Shim6 mapping on these usages. A detailed analysis of the interactions of differentportocols,protocols, includingSCTP, MIPthe Stream Control Transmission Protocol (SCTP), mobile IP (MIP), andHIPHost Identity Protocol (HIP), can be found in[18].[19]. Moreover, some applications may need to have a richer interaction with the Shim6sub-layer.sublayer. In order to enable that,aan API[22][23] has been defined to enable greater control and information exchange for those applications that need it. 1.7. Traffic Engineering At the time of thiswritingwriting, it is not clear what requirements for traffic engineering make sense for the Shim6 protocol, since the requirements must both result in some useful behavior as well as be implementable using a host-to-host locator agility mechanism like Shim6. Inherent in a scalable multihoming mechanism that separates the locator function of the IP address from identifying function of the IP address is that each host ends up with multiple locators. This meansthatthat, at least for initial contact, it is the remote peer application (or layer working on its behalf) that needs to select an initial ULID, which automatically becomes the initial locator. In the case ofShim6Shim6, this is performed by applying RFC 3484 address selection. This is quite different than the common case of IPv4 multihoming where the site has a single IP address prefix, since in that case the peer performs no destination address selection.ThusThus, in "single prefixmultihoming"multihoming", thesite, andsite (and in many cases its upstreamISPs,ISPs) can use BGP to exert some control of the ingress path used to reach the site. This capability does not by itself exist in "multiple prefix multihoming" approaches such as Shim6. It is conceivable that extensions allowing site or provider guidance of host-based mechanisms could be developed. Buttit should be noted that traffic engineering via BGP,MPLSMPLS, or other similar techniques can still be applied for traffic on each individual prefix; Shim6 does not remove the capability for this. It does provide some additional capabilities for hosts to choose between prefixes. These capabilities also carry some risk for non-optimal behaviour when more than one mechanism attempts to correct problems at the same time. However, it should be noted that this is not necessarily a situation brought about by Shim6. A more constrained form of this capability already exists inIPv6 itselfIPv6, itself, via its support of multiple prefixes andaddress selectionaddress-selection rules for starting new communications. Even IPv4 hosts with multiple interfaces may have limited capabilities to choose interfaces on which they communicate. Similarly, upper layers may choose different addresses. In general, it is expected that Shim6 is applicable in relatively small sites and individual hosts where BGP-style traffic engineering operations are unavailable,unlikely or,unlikely, or if run withproviderprovider- independent addressing,mightpossibly evenbe harmfulharmful, considering the growth rates in the global routing table. The protocol provides a placeholder, in the form of the Locator Preferences option,whichthat can be used by hosts to express priority and weight values for each locator. This option is merely aplace holderplaceholder when it comes to providing traffic engineering; in order to use this in a largesitesite, there would have to be a mechanism by which the host can find out what preference values to use, either statically (e.g., some new DHCPv6 option) or dynamically.ThusThus, traffic engineering is listed as a possible extension inSection 19.Appendix A. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [1]. 2.1. Definitions This document introduces the following terms:upper layerupper-layer protocol (ULP) A protocol layer immediately above IP. Examples are transport protocols such as TCP andUDP,UDP; control protocols such asICMP,ICMP; routing protocols such asOSPF,OSPF; andinternetInternet or lower-layer protocols being "tunneled" over (i.e., encapsulated in)IPIP, such asIPX,the Internet Packet Exchange (IPX), AppleTalk, or IP itself. interface A node's attachment to a link. address AnIP layerIP-layer name thatcontainsboth contains topological significance and acts as a unique identifier for an interface. 128 bits. This document only uses the "address" term in the case where it isn't specific whether it is a locator or an identifier. locator AnIP layerIP-layer topological name for an interface or a set of interfaces. 128 bits. The locators are carried in the IP address fields as the packets traverse the network. identifier AnIP layerIP-layer name for anIP layerIP-layer endpoint. The transport endpoint name is a function of the transport protocol and would typically include the IP identifier plus a port number. NOTE: This proposal does not specify any new form ofIP layerIP-layer identifier, but still separates the identifying and locating properties of the IP addresses. upper-layer identifier (ULID) An IP addresswhichthat has been selected for communication with a peer to be used by theupper layerupper-layer protocol. 128 bits. This is used for pseudo-header checksum computation and connection identification in the ULP. Different sets of communication to a host (e.g., different connections) might use different ULIDs in order to enable load spreading. Since the ULID is just one of the IP locators/ addresses of the node, there is no need for a separate name space and allocation mechanisms. address field ThesourceSource anddestination addressDestination Address fields in the IPv6 header. As IPv6 is currentlyspecified thisspecified, these fields carry "addresses". If identifiers and locators areseparatedseparated, these fields will contain locators for packets on the wire. FQDN Fully Qualified Domain Name ULID-pair context The state that the multihoming shim maintains between a pair ofUpper-layerupper-layer identifiers. The context is identified by acontext tagContext Tag for each direction of thecommunication,communication and alsoidentifiedbythe pair of ULIDa ULID-pair and a Forked Instance Identifier (see below). ContexttagTag Each end of the context allocates acontext tagContext Tag for the context. This is used to uniquely associate both received control packets andpayload extensionShim6 Payload Extension headers as belonging to the context.Currentcurrent locator pair Each end of the context has a current locator pairwhichthat is used to send packets to the peer.TheHowever, the two ends might use different current locatorpairs though. Defaultpairs. default context At the sending end, the shim uses the ULID pair (passed down from the ULP) to find the context for that pair. Thus, normally, a host can have at most one context for a ULID pair. We call this the "default context".Contextcontext forking A mechanismwhichthat allows ULPs that are aware of multiple locators to use separate contexts for the same ULID pair, in order to be able use different locator pairs for different communication to the same ULID. Context forking causes more than just the default context to be created for a ULID pair. Forked Instance Identifier (FII) In order to handle context forking, a context is identified by aULID-pairULID pair and aforked context identifier.Forked Context Identifier. The default context hasaan FII of zero.Initialinitial contact We use this term to refer to the pre-shim communication whensomea ULP decides to start communicating with a peer by sending and receiving ULP packets.TypicallyTypically, this would not invoke any operations in the shim, since the shim can defer the context establishment until somearbitraryarbitrary, later point in time.Hash BasedHash-Based Addresses (HBA) A form of IPv6 address where the interface ID is derived from a cryptographic hash of all the prefixes assigned to the host. See [3]. Cryptographically Generated Addresses (CGA) A form of IPv6 address where the interface ID is derived from a cryptographic hash of the public key. See [2]. CGA Parameter Data Structure (PDS) The information that CGA and HBAexchangesexchange in order to inform the peer of how the interface ID was computed. See[2],[2] and [3]. 2.2. Notational Conventions A, B, and C are hosts. X is a potentially malicious host. FQDN(A) is the FullyqualifiedQualified Domain Name for A. Ls(A) is the locator set for A, which consists of the locators L1(A), L2(A), ... Ln(A). The locator setinis not ordered in any particular way other than maybe what is returned by the DNS. A host might form differentlocatorslocator sets containing different subnets of thehostshost's IP addresses. This is necessary in some cases for security reasons. See Section 16.1. ULID(A) is an upper-layerIDidentifier for A. In this proposal, ULID(A) is always one member of A's locator set. CT(A) is acontext tagContext Tag assigned by A. STATE (in uppercase) refers to thethespecific state of the state machine described in Section 6.2 2.3. Conceptual This document also makes use of internal conceptual variables to describe protocol behavior and external variables that an implementation must allow system administrators to change. The specific variable names, how their values change, and how their settings influence protocol behavior are provided to demonstrate protocol behavior. An implementation is not required to have them in the exact form described here, so long as its external behavior is consistent with that described in this document. See Section 6 for a description of the conceptual data structures. 3. Assumptions The design intent is to ensure that the Shim6 protocol is capable of handling path failures independently of the number of IP addresses (locators) available to the two communicating hosts, and independently of which host detects the failure condition. Consider, for example, the case in which both A and B have active Shim6 state and where A has only one locator while B has multiple locators. In this case, it might be that B is trying to send a packet to A, and has detected a failure condition with the current locator pair. Since B has multiplelocatorslocators, it presumably has multiple ISPs, andconsequently(consequently) likely has alternate egress paths toward A. B cannot vary the destination address (i.e., A's locator), since A has only one locator. However, B may need to vary the source address in order to ensure packet delivery. In manycasescases, normal operation of IP routing may cause the packets to follow a path towards the correct (currently operational) egress. In somecasescases, it is possible that a path may be selected based on the source address, implying that B will need to select a source address corresponding to the currently operating egress. The details of how routing can be accomplished is beyond the scope of thisdocumentdocument. Also, when the site's ISPs perform ingress filtering based on packet source addresses, Shim6 assumes that packets sent with different source and destination combinations have a reasonable chance of making it through the relevant ISP's ingress filters. This can be accomplished in several ways (all outside the scope of this document), such as having the ISPs relax their ingressfilters,filters or selecting the egress such that it matches the IP source address prefix. In the case that one egress path has failed but another is operating correctly, it may be necessary for the packet's source (node B in the previous paragraph) to select a source address that corresponds to the operational egress, in order to pass the ISP's ingress filters. The Shim6 approach assumes that there are no IPv6-to-IPv6 NATs on the paths, i.e., that the two ends can exchange their own notion of their IPv6 addresses and that those addresses will also make sense to their peer. The security of the Shim6 protocol relies on the usage ofHash BasedHash-Based Addresses (HBA) [3] and/or Cryptographically Generated Addresses (CGA) [2]. In the case that HBAs are used, all the addresses assigned to the host that are included in the Shim6 protocol (either as a locator or as a ULID) must be part of the same HBA set. In the case that CGAs are used, the address used as ULID must be aCGACGA, but the other addresses that are used as locators do not need to beneithereither CGAsnoror HBAs. It should be noted that it is perfectly acceptable to run the Shim6 protocol between a host that has multiple locators and another host that has a single IP address. In this case, the address of the host with a single address does not need to be an HBAnoror a CGA. 4. Protocol Overview The Shim6 protocol operates in several phases over time. The following sequence illustrates the concepts: o An application on host A decides to contact an application on host B using some upper-layer protocol. This results in the ULP on host A sending packets to host B. We call this the initial contact. Assuming the IP addresses selected byDefault Address Selectiondefault address selection [7] and its extensions[8][9] work, then there is no action by the shim at this point in time. Any shim context establishment can be deferred until later. o Some heuristic on A or B (or both) determine that it is appropriate to pay the Shim6 overhead to make this host-to-host communication robust against locator failures. For instance, this heuristic might be that more than 50 packets have been sent or received, or that there was a timer expiration while active packet exchangeiswas in place. This makes the shim initiate the4-way context establishment4-way, context-establishment exchange. The purpose of this heuristic is to avoid setting up a shim context when only a small number of packets is exchanged between two hosts. As a result of this exchange, both A and B will know a list of locators for each other. If thecontext establishmentcontext-establishment exchange fails, the initiator will then know that the other end does not support Shim6, and will continue with standard (non-Shim6) behavior for the session. o Communication continues without any change for the ULP packets. In particular, there are noshim extensionShim6 Extension headers added to the ULP packets, since the ULID pair is the same as the locator pair. In addition, there might be some messages exchanged between the shimsub-layerssublayers for (un)reachability detection. o At some point intimetime, something fails. Depending on the approach to reachability detection, there might be some advice from the ULP, or the shim (un)reachability detection might discover that there is a problem. At this point intimetime, one or both ends of the communication need to probe the different alternate locator pairs until a working pair is found, and then switch to using that locator pair. o Once a working alternative locator pair has been found, the shim will rewrite the packets ontransmit,transmit and tag the packets with the Shim6 PayloadextensionExtension header, which contains the receiver'scontext tag.Context Tag. The receiver will use thecontext tagContext Tag to find the contextstatestate, which will indicate which addresses to place in the IPv6 header before passing the packet up to the ULP. The result isthatthat, from the perspective of theULPULP, the packet passes unmodified end-to-end, even though the IP routing infrastructure sends the packet to a different locator. o The shim (un)reachability detection will monitor the new locator pair as it monitored the original locator pair, so that subsequent failures can be detected. o In addition to failures detected based on end-to-end observations, one endpoint might know for certain that one or more of its locators is not working. For instance, the network interface might have failed or gone down (at layer 2), or an IPv6 address might have become deprecated or invalid. In suchcasescases, the host can signal its peer that trying this address is no longerrecommended to try.recommended. This triggers something similar to a failurehandlinghandling, and a new working locator pair must be found. The protocol also has the ability to express other forms of locator preferences. A change in anypreferencespreference can be signaled to the peer, which will have made the peer record the new preferences. A change in the preferences might optionally make the peer want to use a different locator pair. In this case, the peer follows the same locator switching procedure as after a failure (by verifying that its peer is indeed present at the alternate locator, etc). o When the shim thinks that the context state is no longer used, it can garbage collect the state; there is no coordination necessary with the peer host before the state is removed. There is a recovery message defined to be able to signal when there is no context state, which can be used to detect and recover from both premature garbagecollection,collection as well as from complete state loss (crash and reboot) of a peer. The exact mechanism to determine when the context state is no longer used is implementation dependent. For example, an implementation might use the existence of ULP state (where known to the implementation) as an indication that the state is still used, combined with a timer (to handle ULP state that might not be known to the shimsub-layer)sublayer) to determine when the state is likely to no longer be used. NOTE 1: The ULP packets in Shim6 can be carried completely unmodified as long as the ULID pair is used as the locator pair. After a switch to a different locatorpairpair, the packets are "tagged" with a Shim6extension header,Extension header so that the receiver can always determine the context to which they belong. This is accomplished by including an 8-octet Shim6 Payload Extension header before the (extension) headers that are processed by the IP endpoint sublayer and ULPs.If subsequentlyIf, subsequently, the original ULIDs are selected as the active locatorpairpair, then the tagging of packets with the Shim6extensionExtension header is no longer necessary. 4.1. Context Tags A context between two hosts is actually a context between two ULIDs. The context is identified by a pair ofcontext tags.Context Tags. Each end gets to allocate acontext tag,Context Tag, and once the context is established, most Shim6 control messages contain thecontext tagContext Tag that the receiver of the message allocated.ThusThus, at aminimumminimum, the combination of <peer ULID, local ULID, localcontext tag>Context Tag> have to uniquely identify one context.ButBut, since the Shim6 PayloadextensionExtension headers are demultiplexed without looking at the locators in the packet, the receiver will need to allocatecontext tagsContext Tags that are unique for all its contexts. Thecontext tagContext Tag is a 47-bit number (the largestwhichthat can fit in an 8-octet extension header), while preserving one bit to differentiate the Shim6signallingsignaling messages from the Shim6 header included in data packets, allowing both to use the same protocol number. The mechanism for detecting a loss of context state at the peer assumes that the receiver can tell the packets that need locator rewriting, even after it has lost all state (e.g., due to a crash followed by a reboot). This is achievedbecausebecause, after a rehomingeventevent, the packets that need receive-siderewriting,rewriting carry the Shim6 PayloadextensionExtension header. 4.2. Context Forking It has been asserted that it will be important for futureULPs,ULPs -- in particular, future transportprotocols,protocols -- to be able to control which locator pairs are used for different communication. For instance, host A and host B might communicate using bothVoIPVoice over IP (VoIP) traffic and ftp traffic, and those communications might benefit from using different locator pairs. However, the basic Shim6 mechanism uses a single current locator pair for eachcontext, thuscontext; thus, a single context cannot accomplish this. For this reason, the Shim6 protocol supports the notion of context forking. This is a mechanism by which a ULP can specify (using some API not yet defined) that acontext forcontext, e.g., the ULID pair <A1,B2>B2>, should be forked into two contexts. In thiscasecase, the forked-off context will be assigned a non-zero Forked Instance Identifier, while the default context has FII zero. The Forked Instance Identifier (FII) is a 32-bit identifierwhichthat has no semantics in the protocol otherthenthan being part of the tuplewhichthat identifies the context. For example, a host might allocate FIIs as sequential numbers for any given ULID pair. No other special considerations are needed in the Shim6 protocol to handle forked contexts. Note that forking as specified does NOT allow A to be able to tell B that certain traffic (a 5-tuple?) should be forked for the reverse direction. The Shim6 forking mechanism as specified applies only to the sending of ULP packets. If some ULP wants to fork for both directions, it is up to the ULP to set thisup,up and then instruct the shim at each end to transmit using the forked context. 4.3. API Extensions Several API extensions have been discussed for Shim6, but their actual specification is out of scope for this document. The simplest one would be to add a socket option to be able to have traffic bypass the shim (not create anystate,state and not use any state created by other traffic). This could be an IPV6_DONTSHIM socket option. Such an option would be useful for protocols, such as DNS, where the application has its own failover mechanism (multiple NS records in the case of DNS) and using the shim could potentially add extra latency with no added benefits. Some other API extensions are discussed inSection 19.Appendix A. The actual API extensions are defined in[22].[23]. 4.4. Securing Shim6 The mechanisms are secured using a combination of techniques: o The HBA technique [3] for verifying the locators to prevent an attacker from redirecting the packet stream to somewhere else. o Requiring a Reachability Probe+Reply/defined(defined in [4]) before a new locator is used as the destination, in order to prevent 3rd party flooding attacks. o The first message does not create any state on the responder.EssentiallyEssentially, a 3-way exchange is required before the responder creates any state. This means that a state-based DoS attack (trying to use up allofmemory on the responder) at least provides an IPv6 address that the attacker was using. o Thecontext establishmentcontext-establishment messages use nonces to prevent replayattacks,attacks and to prevent off-path attackers from interfering with the establishment. o Every control message of the Shim6 protocol, past the context establishment,carrycarries thecontext tagContext Tag assigned to the particular context. This implies that an attacker needs to discover thatcontext tagContext Tag before being able to spoof any Shim6 control message. Such discovery probably requires any potential attacker to be along the path in order tobesniff thecontext tagContext Tag value. The result is that through this technique, the Shim6 protocol is protected against off-path attackers. 4.5. Overview of Shim Control Messages The Shim6 context establishment is accomplished using four messages; I1, R1, I2, R2.NormallyNormally, they are sent in that order from initiator and responder, respectively. Should both ends attempt to set up context state at the same time (for the same ULID pair), then their I1 messages might cross in flight, and result in an immediate R2 message.[The(The names of these messages are borrowed from HIP[19].][20].) R1bis and I2bis messages aredefined, whichdefined; they are used to recover a context after it has been lost.AAn R1bis message is sent when a Shim6 control or Shim6 PayloadextensionExtension header arrives and there is no matching context state at the receiver. When such a message is received, it will result in the re-creation of the Shim6 context using the I2bis and R2 messages. The peers' lists of locators are normally exchanged as part of thecontext establishmentcontext-establishment exchange. But the set of locators might be dynamic. For thisreasonreason, there are Update Request and Update Acknowledgementmessages, andmessages as well as a Locator List option. Even when the list of locators is fixed, a host might determine that some preferences might have changed. For instance, it might determine that there is a locally visible failure that implies that some locator(s) are no longer usable. This uses a Locator Preferences option in the Update Request message. The mechanism for (un)reachability detection is called Forced Bidirectional Communication (FBD). FBD uses a Keepalive message which is sent when a host has received packets from its peer but has not yet sent any packets from its ULP to the peer. The message type is reserved in this document, but the message format and processing rules are specified in [4]. In addition, when the context is established and there is a subsequentfailurefailure, there needs to be a way to probe the set of locator pairs to efficiently find a working pair. This document reserves a Probe message type, with the packet format and processing rules specified in [4]. The aboveprobeProbe andkeepaliveKeepalive messages assume we have an established ULID-pair context. However, communication might fail during the initial contact (that is, when the application or transport protocol is trying tosetupset up some communication). This is handled using the mechanisms in the ULP to try different address pairs as specified in [7][8].and [9]. Inthefuture versions of the protocol, and with a richer API between the ULP and the shim, the shim might be able to help optimize discovering a working locator pair during initial contact. This is for further study. 4.6. Extension Header Order Since the shim is placed between the IP endpointsub-layersublayer and the IP routingsub-layer,sublayer, theshimShim header will be placed before anyendpoint extensionEndpoint Extension headers(fragmentation(Fragmentation headers,destination optionsDestination Options header, AH,ESP),ESP) but after anyrouting relatedrouting-related headers(hop-by-hop extensions(Hop-by-Hop Extensions header,routingRouting header, and adestinations options headerDestinations Options header, which precedes aroutingRouting header). When tunneling is used, whether IP-in-IP tunneling or the special form of tunneling that Mobile IPv6 uses (with Home AddressOptionsoptions and Routing header type 2), there is a choice whether the shim applies inside the tunnel or outside the tunnel, which affects the location of the Shim6 header. In mostcasescases, IP-in-IP tunnels are used as a routingtechnique, thustechnique; thus, it makes sense to apply them on thelocatorslocators, which means that the sender would insert the Shim6 header after any IP-in-IPencapsulation; thisencapsulation. This is what occurs naturally when routers apply IP- in-IP encapsulation.ThusThus, the packets would have: o Outer IP header o Inner IP header o Shim6extensionExtension header (if needed) o ULP But the shim can also be used to create "shimmedtunnels"tunnels", i.e., where an IP-in-IP tunnel uses the shim to be able to switch the tunnel endpoint addresses between different locators. In such acasecase, the packets would have: o Outer IP header o Shim6extensionExtension header (if needed) o Inner IP header o ULP In any case, the receiver behavior is well-defined; a receiver processes theextensionExtension headers in order. However, the precise interaction between Mobile IPv6 and Shim6 is for furtherstudy, butstudy; it might make sense to have Mobile IPv6 operate on locators as well, meaning that the shim would be layered on top of the MIPv6 mechanism. 5. Message Formats The Shim6 messages are all carried using a new IP protocol number[to be assigned by IANA].(140). The Shim6 messages have a commonheader, defined below,header (defined below) with some fixed fields, followed bytype specifictype-specific fields. The Shim6 messages are structured as an IPv6extensionExtension header since the Shim6 PayloadextensionExtension header is used to carry the ULP packets after a locator switch. The Shim6 control messages use the same extension header formats so that a single "protocol number" needs to be allowed through firewalls in order for Shim6 to function across the firewall. 5.1. Common Shim6 Message Format The first 17 bits of the Shim6 header is common for the Shim6 PayloadextensionExtension header and for the controlmessages andmessages. It looks as follows: 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len |P| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: The payloadwhichthat follows this header. Hdr Ext Len: 8-bit unsigned integer. Length of the Shim6 header in 8-octet units, not including the first 8 octets. P: A single bit to distinguish Shim6 PayloadextensionExtension headers from control messages. Shim6signallingsignaling packets may not be larger than 1280 bytes, including the IPv6 header and any intermediate headers between the IPv6 header and the Shim6 header. One way to meet this requirement is to omit part of the locator address informationifif, with this information included, the packet would become larger than 1280 bytes. Another option is to perform option engineering, dividing into different Shim6 messages the information to be transmitted. An implementation may impose administrative restrictions to avoid excessively large Shim6 packets, such as a limitation on the number of locators to be used. 5.2. Shim6 Payload Extension Header Format Thepayload extension headersShim6 Payload Extension header is used to carry ULP packets where the receiver must replace the content of thesourceSource and/ordestinationDestination fields in the IPv6 header before passing the packet to the ULP.ThusThus, this extension header is required when thelocatorslocator pair that is used is not the same as the ULID pair. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | 0 |1| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Receiver Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: The payloadwhichthat follows this header. Hdr Ext Len: 0 (since the header is 8 octets). P: Set to one. A single bit to distinguish this from the Shim6 control messages. Receiver Context Tag: 47-bit unsigned integer. Allocated by the receiverfor useto identify the context. 5.3. Common Shim6 ControlheaderHeader The common part of the header has anext headerNext Header field andheader extension lengtha Header Extension Length fieldwhich isthat are consistent with the other IPv6extensionExtension headers, even if thenext headerNext Header value is always "NO NEXT HEADER" for the control messages. The Shim6 headers must be a multiple of 8octets, henceoctets; hence, the minimum size is 8 octets. The commonshim controlShim6 Control message header is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len |P| Type |Type-specific|S| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Type-specific format | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: 8-bit selector. Normally set to NO_NXT_HDR (59). Hdr Ext Len: 8-bit unsigned integer. Length of the Shim6 header in 8-octet units, not including the first 8 octets. P: Set to zero. A single bit to distinguish this from the Shim6payload extensionPayload Extension header. Type: 7-bit unsigned integer. Identifies the actual message from the table below. Type codes 0-63 will not trigger R1bis messages on a missing context, while64- 127codes 64-127 will trigger R1bis. S: A single bit set to zerowhichthat allows Shim6 and HIP to have a common header format yettellingstill distinguishes between Shim6 and HIPmessages apart.messages. Checksum: 16-bit unsigned integer. The checksum is the 16-bit one's complement of the one's complement sum of the entire Shim6 headermessagemessage, starting with the Shim6next header field,Next Header field and ending as indicated by the Hdr Ext Len.ThusThus, when there is a payload following the Shim6 header, the payload is NOT included in the Shim6 checksum. Notethatthat, unlikeprotocolprotocols like ICMPv6, there is no pseudo-header checksum part of thechecksum, in order to providechecksum; this provides locator agility without having to change the checksum. Type-specific: Part of the message that is different for different message types.+------------+-----------------------------------------------------++------------+----------------------------------------------------+ | Type Value | Message |+------------+-----------------------------------------------------++------------+----------------------------------------------------+ | 1 | I1(first(1st establishment message from the initiator) | || | |2 | R1(first(1st establishment message from the responder) | || | |3 | I2 (2nd establishment message from the initiator) | || | |4 | R2 (2nd establishment message from the responder) | || | |5 | R1bis (Reply to reference to non-existent context) | || | |6 | I2bis (Reply toaan R1bis message) | || | |64 | Update Request | || | |65 | Update Acknowledgement | || | |66 | Keepalive | || | |67 | Probe Message | || | |68 | Error Message |+------------+-----------------------------------------------------++------------+----------------------------------------------------+ Table 1 5.4. I1 Message Format The I1 message is the first message in thecontext establishmentcontext-establishment exchange. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 1 | Reserved1 |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum |R| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Initiator Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Initiator Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Options + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 1, since the header is 16 octets when there are no options. Type: 1 Reserved1: 7-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. R: 1-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Initiator Context Tag: 47-bit field. The Context Tag that the initiator has allocated for the context. Initiator Nonce: 32-bit unsigned integer. A random number picked by theinitiatorinitiator, which the responder will return in the R1 message. The following options are defined for this message: ULID pair: When the IPv6 source and destination addresses in the IPv6 header does not match the ULID pair, this option MUST be included. An example of this is when recovering from a lost context. Forked Instance Identifier: When another instance of an existent context with the same ULID pair is being created, a Forked Instance Identifier option MUST be included to distinguish this new instance from the existent one. Future protocol extensions might define additional options for this message. The C-bit in the option format defines how such a new option will be handled by an implementation. See Section 5.15. 5.5. R1 Message Format The R1 message is the second message in thecontext establishmentcontext-establishment exchange. The responder sends this in response to an I1 message, without creating any state specific to the initiator. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 2 | Reserved1 |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum | Reserved2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Initiator Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Responder Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Options + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 1, since the header is 16 octets when there are no options. Type: 2 Reserved1: 7-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Reserved2: 16-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Initiator Nonce: 32-bit unsigned integer. Copied from the I1 message. Responder Nonce: 32-bit unsigned integer. A number picked by theresponderresponder, which the initiator will return in the I2 message. The following options are defined for this message: Responder Validator: Variable length option. This option MUST be included in the R1 message.TypicallyTypically, it contains a hash generated by the responder, which the responder uses together with the Responder Nonce value to verify that an I2 message is indeed sent in response toaan R1 message, and that the parameters in the I2 message are the same as those in the I1 message. Future protocol extensions might define additional options for this message. The C-bit in the option format defines how such a new option will be handled by an implementation. See Section 5.15. 5.6. I2 Message Format The I2 message is the third message in thecontext establishmentcontext-establishment exchange. The initiator sends this in response toaan R1 message, after checking the Initiator Nonce, etc. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 3 | Reserved1 |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum |R| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Initiator Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Initiator Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Responder Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Options + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 2, since the header is 24 octets when there are no options. Type: 3 Reserved1: 7-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. R: 1-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Initiator Context Tag: 47-bit field. The Context Tag that the initiator has allocated for the context. Initiator Nonce: 32-bit unsigned integer. A random number picked by theinitiatorinitiator, which the responder will return in the R2 message. Responder Nonce: 32-bit unsigned integer. Copied from the R1 message. Reserved2: 32-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. (Needed to make the options start on a multiple of 8 octet boundary.) The following options are defined for this message: Responder Validator: Variable length option. This option MUST be included in the I2 message and MUST be generated by copying the Responder Validator option received in the R1 message. ULID pair: When the IPv6 source and destination addresses in the IPv6 headerdoesdo not match the ULID pair, this option MUST be included. An example of this is when recovering from a lost context. Forked Instance Identifier: When another instance of an existent context with the same ULID pair is being created, a Forked Instance Identifier option MUST be included to distinguish this new instance from the existent one. Locatorlist:List: Optionally sent when the initiator immediately wants to tell the responder its list of locators. When it is sent, the necessary HBA/CGA information for verifying the locator list MUST also be included. Locator Preferences: Optionally sent when the locators don't all have equal preference. CGA Parameter Data Structure: This option MUST be included in the I2 message when the locator list is included so the receiver can verify the locator list. CGA Signature: This option MUST be included in the I2 message when some of the locators in the list use CGA (and not HBA) for verification. Future protocol extensions might define additional options for this message. The C-bit in the option format defines how such a new option will be handled by an implementation. See Section 5.15. 5.7. R2 Message Format The R2 message is the fourth message in thecontext establishmentcontext-establishment exchange. The responder sends this in response to an I2 message. The R2 message is also used when both hosts send I1 messages at the same time and the I1 messages cross in flight. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 4 | Reserved1 |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum |R| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Responder Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Initiator Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Options + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 1, since the header is 16 octets when there are no options. Type: 4 Reserved1: 7-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. R: 1-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Responder Context Tag: 47-bit field. The Context Tag that the responder has allocated for the context. Initiator Nonce: 32-bit unsigned integer. Copied from the I2 message. The following options are defined for this message: Locator List: Optionally sent when the responder immediately wants to tell the initiator its list of locators. When it is sent, the necessary HBA/CGA information for verifying the locator list MUST also be included. Locator Preferences: Optionally sent when the locators don't all have equal preference. CGA Parameter Data Structure: Included when the locator list is included so the receiver can verify the locator list. CGA Signature: Included whenthesome of the locators in the list use CGA (and not HBA) for verification. Future protocol extensions might define additional options for this message. The C-bit in the option format defines how such a new option will be handled by an implementation. See Section 5.15. 5.8. R1bis Message Format Should a host receive a packet with ashimShim6 PayloadextensionExtension header or Shim6 control message with type code 64-127 (such as an Update or Probe message), and the host does not have any context state for the receivedcontext tag,Context Tag, then it will generate a R1bis message. This message allows the sender of the packet referring to the non- existent context to re-establish the context with a reducedcontextcontext- establishment exchange. Upon the reception of the R1bis message, the receiver can proceedreestablishingwith re-establishing the lost context by directly sending an I2bis message. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 5 | Reserved1 |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum |R| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Packet Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Responder Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Options + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 1, since the header is 16 octets when there are no options. Type: 5 Reserved1: 7-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. R: 1-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Packet Context Tag: 47-bit unsigned integer. Thecontext tagContext Tag contained in the received packet that triggered the generation of the R1bis message. Responder Nonce: 32-bit unsigned integer. A number picked by the responder which the initiator will return in the I2bis message. The following options are defined for this message: Responder Validator: Variable length option.TypicallyTypically, a hash generated by the responder, which the responder uses together with the Responder Nonce value to verify that an I2bis message is indeed sent in response toaan R1bis message. Future protocol extensions might define additional options for this message. The C-bit in the option format defines how such a new option will be handled by an implementation. See Section 5.15. 5.9. I2bis Message Format The I2bis message is the third message in thecontext recoverycontext-recovery exchange. This is sent in response toaan R1bis message, after checking that the R1bis message refers to an existing context, etc. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 6 | Reserved1 |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum |R| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Initiator Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Initiator Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Responder Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved2 | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Packet Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Options + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 3, since the header is 32 octets when there are no options. Type: 6 Reserved1: 7-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. R: 1-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Initiator Context Tag: 47-bit field. The Context Tag that the initiator has allocated for the context. Initiator Nonce: 32-bit unsigned integer. A random number picked by theinitiatorinitiator, which the responder will return in the R2 message. Responder Nonce: 32-bit unsigned integer. Copied from the R1bis message. Reserved2: 49-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. (Note that 17 bits are not sufficient since the options need to start on amultiple of 8 octetmultiple-of-8-octet boundary.) Packet Context Tag: 47-bit unsigned integer. Copied from the Packet Context Tag field contained in the received R1bis. The following options are defined for this message: Responder Validator: Variable length option. Just a copy of the Responder Validator option in the R1bis message. ULID pair: When the IPv6 source and destination addresses in the IPv6 headerdoesdo not match the ULID pair, this option MUST be included. Forked Instance Identifier: When another instance of an existent context with the same ULID pair is being created, a Forked Instance Identifier option is included to distinguish this new instance from the existent one. Locatorlist:List: Optionally sent when the initiator immediately wants to tell the responder its list of locators. When it is sent, the necessary HBA/CGA information for verifying the locator list MUST also be included. Locator Preferences: Optionally sent when the locators don't all have equal preference. CGA Parameter Data Structure: Included when the locator list is included so the receiver can verify the locator list. CGA Signature: Included whenthesome of the locators in the list use CGA (and not HBA) for verification. Future protocol extensions might define additional options for this message. The C-bit in the option format defines how such a new option will be handled by an implementation. See Section 5.15. 5.10. Update Request Message Format The Update RequestMessagemessage is used to update either the list of locators, the locator preferences,andor both. When the list of locators is updated, the message also contains the option(s) necessary for HBA/CGA to secure this. The basic sanity check that prevents off-path attackers from generating bogus updates is thecontext tagContext Tag in the message. TheupdateUpdate Request message contains options (the Locator List and the Locator Preferences) that, when included, completely replace the previous locator list and locator preferences, respectively.ThusThus, there is no mechanism to just send deltas to the locator list. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 64 | Reserved1 |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum |R| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Receiver Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Request Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Options + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 1, since the header is 16 octets when there are no options. Type: 64 Reserved1: 7-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. R: 1-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Receiver Context Tag: 47-bit field. The Context Tag that the receiver has allocated for the context. Request Nonce: 32-bit unsigned integer. A random number picked by theinitiatorinitiator, which the peer will return in theacknowledgementUpdate Acknowledgement message. The following options are defined for this message: Locator List: The list of the sender's (new) locators. The locators might be unchanged and only the preferences have changed. Locator Preferences: Optionally sent when the locators don't all have equal preference. CGA Parameter Data Structure (PDS): Included when the locator list is included and the PDS was not included in the I2/ I2bis/R2 messages, so the receiver can verify the locator list. CGA Signature: Included whenthesome of the locators in the list use CGA (and not HBA) for verification. Future protocol extensions might define additional options for this message. The C-bit in the option format defines how such a new option will be handled by an implementation. See Section 5.15. 5.11. Update Acknowledgement Message Format This message is sent in response toaan Update Request message. It implies that the Update Request has beenreceived,received and that any new locators in the Update Request can now be used as the source locators of packets. But it does not imply that the (new) locators have been verified to be used as a destination, since the host might defer the verification of a locator until it sees a need to use a locator as the destination. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 65 | Reserved1 |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum |R| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Receiver Context Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Request Nonce | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Options + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 1, since the header is 16 octets when there are no options. Type: 65 Reserved1: 7-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. R: 1-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. Receiver Context Tag: 47-bit field. The Context Tag the receiver has allocated for the context. Request Nonce: 32-bit unsigned integer. Copied from the Update Request message. No options are currently defined for this message. Future protocol extensions might define additional options for this message. The C-bit in the option format defines how such a new option will be handled by an implementation. See Section 5.15. 5.12. Keepalive Message Format This message format is defined in [4]. The message is used to ensure that when a peer is sending ULP packets on a context, it always receives some packets in the reverse direction. When the ULP is sending bidirectional traffic, no extra packets need to be inserted. But for a unidirectional ULP traffic pattern, the shim will send back some Keepalive messages when it is receiving ULP packets. 5.13. Probe Message Format This message and its semantics are defined in [4]. The goal of this mechanism is to test whether or not locator pairs workor notin the general case. In particular, this mechanism is to be able to handle the case when one locator pair worksinfrom A toB,B and another locator pair works from B to A, but there is no locator pairwhichthat works in both directions. The protocol mechanism isthatthat, as A is sendingprobeProbe messages to B, B will observe which locator pairs it has receivedfromand report that back inprobeProbe messages itis sendingsends to A. 5.14. Error Message Format The ErrorMessagemessage is generated by a Shim6 receiver upon the reception of a Shim6 message containing critical information that cannot be processed properly. In the case that a Shim6 node receives a Shim6 packetwhichthat contains information that is critical for the Shim6 protocol and that is not supported by the receiver, it sends an Error Message back to the originator of the Shim6 message. The ErrorMessagemessage is unacknowledged. In addition, Shim6 Error messages defined in this section can be used to identify problems with Shim6 implementations. In order to dothat,so, a range of Error CodeTypestypes is reserved for that purpose. In particular, implementations may generate Shim6 Error messages with CodeTypetypes in thatrangerange, instead of silently discarding Shim6 packets during the debugging process. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 59 | Hdr Ext Len |0| Type = 68 | Error Code |0| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum | Pointer | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Packet in error + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Next Header: NO_NXT_HDR (59). Hdr Ext Len: At least 1, since the header is 16 octets. Depends on the specific Error Data. Type: 68 Error Code: 7-bit field describing the error that generated the ErrorMessage.message. See Error Code listbelowbelow. Pointer: 16-bitfield.Identifiesfield. Identifies the octet offset within the invoking packet where the error was detected. Packet in error: As much of invoking packet as possible without the Error message packet exceeding the minimum IPv6 MTU. The following Error Codes are defined: +---------+---------------------------------------------------------+ | Code | Description | | Value | | +---------+---------------------------------------------------------+ | 0 | Unknown Shim6 message type | || | |1 | CriticalOptionoption not recognized | || | |2 | Locator verification method failed (Pointer to the | | | inconsistentVerificationverification method octet) | || | |3 | Locator List Generation number out of sync. | || | |4 | Error in the number of locators in a Locator Preference | | | option | || | |120-127 | Reserved for debugging purposes | +---------+---------------------------------------------------------+ Table 2 5.15. Option Formats The format of the options is a snapshot of the current HIP option format[19].[20]. However, there is no intention to track any changes to the HIP option format, nor is there an intent to use the same name space for the option type values. But using the same format will hopefully make it easier to import HIP capabilities into Shim6 as extensions to Shim6, should this turn out to be useful. All of the TLV parameters have a length (including Type and Length fields)whichthat is a multiple of 8 bytes. When needed, padding MUST be added to the end of the parameter so that the total length becomes a multiple of 8 bytes. This rule ensures proper alignment of data. If padding is added, the Length field MUST NOT include the padding. Any added padding bytes MUST be zeroed by the sender, and their values SHOULD NOT be checked by the receiver. Consequently, the Length field indicates the length of the Contents field (in bytes). The total length of the TLV parameter (including Type, Length, Contents, and Padding) is related to the Length field according to the following formula: Total Length = 11 + Length - (Length + 3) mod 8; TheTotal Lengthtotal length of the option is the smallest multiple of 8 bytes that allows for the 4 bytes ofoptionthe Option header andthe optionoption, itself. The amount of padding required can be calculated as follows: padding = 7 - ((Length + 3) mod 8) And: Total Length = 4 + Length + padding 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type |C| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ ~ ~ Contents ~ ~ +-+-+-+-+-+-+-+-+ ~ | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Type: 15-bit identifier of the type of option. The options defined in this document are below. C: Critical.OneOne, if this parameter iscritical,critical and MUST be recognized by therecipient,recipient; zero otherwise. An implementation might view theC bitC-bit as part of the Typefield,field by multiplying the type values in this specification by two. Length: Length of the Contents, in bytes. Contents:Parameter specific,Parameter-specific, defined by Type. Padding: Padding, 0-7 bytes, added if needed. +------+------------------------------+ | Type | Option Name | +------+------------------------------+ | 1 | Responder Validator | || | |2 | Locator List | || | |3 | Locator Preferences | || | |4 | CGA Parameter Data Structure | || | |5 | CGA Signature | || | |6 | ULID Pair | || | |7 | Forked Instance Identifier | || | |10 | Keepalive Timeout Option | +------+------------------------------+ Table 3 Future protocol extensions might define additional options for the Shim6 messages. The C-bit in the option format defines how such a new option will be handled by an implementation. If a host receives an option that it does not understand (an option that was defined in some future extension to this protocol) or that is not listed as a valid option for the different message types above, then the Critical bit in the option determines the outcome. o IfC=0C=0, then the option is silently ignored, and the rest of the message is processed. o IfC=1C=1, then the host SHOULD send back a Shim6 ErrorMessagemessage with Error Code=1, with the Pointer field referencing the first octet in the Option Type field. WhenC=1C=1, the rest of the message MUST NOT be processed. 5.15.1. Responder Validator Option Format The responder can choose exactly what input is used to compute thevalidator,validator and what one-way function (such asMD5,MD5 or SHA1) it uses, as long as the responder can check that the validator it receives back in the I2 or I2bis message is indeed one that:1)- it1) computed,2)- it2) computed for the particular context, and3)- that it3) isn't a replayed I2/I2bis message. Some suggestions on how to generate the validators are captured inSectionSections 7.10.1 andSection7.17.1. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 1 |0| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ Validator ~ ~ +-+-+-+-+-+-+-+-+ ~ | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Validator: Variable length content whose interpretation is local to the responder. Padding: Padding, 0-7 bytes, added if needed. See Section 5.15. 5.15.2. Locator List Option Format The Locator ListOptionoption is used to carry all the locators of the sender. Note that the order of the locators is important, since the Locator Preferences option refers to the locators by using the index in the list. Note that we carry all the locators in this option even though some of them can be created automatically from the CGA Parameter Data Structure. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 2 |0| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Locator List Generation | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Num Locators | N Octets of Verification Method | +-+-+-+-+-+-+-+-+ | ~ ~ ~ +-+-+-+-+-+-+-+-+ ~ | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ Locators 1 through N ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Locator List Generation: 32-bit unsigned integer. Indicates a generation numberwhichthat is increased by one for each new locator list. This is used to ensure that the index in the Locator Preferencesreferrefers to the right version of the locator list. Num Locators: 8-bit unsigned integer. The number of locators that are included in the option. We call this number "N" below. Verification Method: N octets. Thei'thith octet specifies the verification method for thei'thith locator. Padding: Padding, 0-7 bytes, added if needed so that the Locators start on amultiple of 8 octetmultiple-of-8-octet boundary.NOTENote that for thisoptionoption, there is never a need to pad at theend,end since thelocatorsLocators are amultiple of 8multiple-of-8- octets in length. This internal padding is included in thelengthLength field. Locators: N 128-bit locators. The defined verification methods are: +-------+----------+ | Value | Method | +-------+----------+ | 0 | Reserved | || | |1 | HBA | || | |2 | CGA | || | |3-255 | Reserved | +-------+----------+ Table 4 5.15.3. Locator Preferences Option Format The Locator Preferences option can have some flags to indicate whether or not a locator is known to work. In addition, the sender can include a notion of preferences. It might make sense to define "preferences" as a combination of priority andweightweight, the same way that DNS SRV recordshashave such information. The priority would provide a way to rank the locators,andand, within a given priority, the weight would provide a way to do some load sharing. See [5] for how SRV defines the interaction of priority and weight. The minimum notion of preferences we need is to be able to indicate that a locator is "dead". We can handle this using a single octet flag for each locator. We can extend that by carrying a larger "element" for each locator. This document presently also defines 2-octet and 3-octet elements, and we can add more information by having even larger elements if need be. The locators are not included in the preference list. Instead, the first element refers to the locator that was in the first element in the Locator List option. The generation number carried in this option and the Locator List option is used to verify that they refer to the same version of the locator list. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 3 |0| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Locator List Generation | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Element Len | Element[1] | Element[2] | Element[3] | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ ... ~ ~ +-+-+-+-+-+-+-+-+ ~ | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Case of Element Len = 1 is depicted. Fields: Locator List Generation: 32-bit unsigned integer. Indicates a generation number for the locator list to which the elements should apply. Element Len: 8-bit unsigned integer. The length in octets of each element. This specification defines the cases when the length is 1, 2, or 3. Element[i]: A field with a number of octets defined by the Element Len field. Provides preferences for thei'thith locator in the Locator List option that is in use. Padding: Padding, 0-7 bytes, added if needed. See Section 5.15. When the Element length equals one, then the element consists of only aone octet flagsone-octet Flags field. The currently defined set of flags are: BROKEN: 0x01 TRANSIENT: 0x02 The intent of the BROKEN flag is to inform the peer that a given locator is known to be not working. The intent of TRANSIENT is to allow the distinction between more stable addresses and less stable addresses when Shim6 is combined with IP mobility, and when we might have more stable homelocators,locators and less stable care-of-locators. When the Element length equals two, then the element consists of a1 octet flagsone-octet Flags field followed by a1 octet priorityone-octet Priority field.The priorityThis Priority field has the same semantics as thepriorityPriority field in DNS SRV records. When the Element length equals three, then the element consists of a1 octet flagsone-octet Flags field followed by a1 octet priority field,one-octet Priority field and a1 octet weightone-octet Weight field.The weightThis Weight field has the same semantics as theweightWeight field in DNS SRV records. This document doesn't specify the format when the Element length is more than three, except that any such formats MUST be defined so that the first three octets are the same as in the above case, that is, aof a 1 octet flagsone-octet Flags field followed by a1 octet priorityone-octet Priority field, and a1 octet weightone-octet Weight field. 5.15.4. CGA Parameter Data Structure Option Format This option contains the CGA Parameter Data Structure (PDS). When HBA is used to verify the locators, the PDS contains the HBA multiprefix extension in addition to the PDS mandatory fields and other extensions unrelated to Shim6 that the PDS might have. When CGA is used to verify the locators, in addition to the PDS option, the host also needs to include the signature in the form of a CGA Signature option. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 4 |0| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ CGA Parameter Data Structure ~ ~ +-+-+-+-+-+-+-+-+ ~ | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: CGA Parameter Data Structure: Variable length content. Content defined in [2] and [3]. Padding: Padding, 0-7 bytes, added if needed. See Section 5.15. 5.15.5. CGA Signature Option Format When CGA is used for verification of one or more of the locators in the Locator List option, then the message in question will need to contain this option. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 5 |0| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ CGA Signature ~ ~ +-+-+-+-+-+-+-+-+ ~ | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: CGA Signature: A variable-length field containing a PKCS#1 v1.5 signature, constructed by using the sender's private key over the following sequence of octets: 1. The 128-bit CGA Message Type tag [CGA] value forShim6,Shim6: 0x4A 30 5662 4858 574B 3655 416F 506A 6D48. (The tag value has been generated randomly by the editor of this specification.). 2. The Locator List Generationvaluenumber of the correspondent Locator ListOption.option. 3. The subset of locators included in the correspondent Locator ListOption whichoption whose verification method is set to CGA. The locators MUST be included in the order in which they are listed in the Locator List Option. Padding: Padding, 0-7 bytes, added if needed. See Section 5.15. 5.15.6. ULID Pair Option Format I1, I2, and I2bis messages MUST contain the ULID pair;normallynormally, this is in the IPv6sourceSource anddestinationDestination fields. In casethatthe ULID for the contextdifferdiffers from the address pair included in thesourceSource anddestination addressDestination Address fields of the IPv6 packet used to carry theI1/I2/I2bisI1/ I2/I2bis message, the ULIDpairPair option MUST be included in theI1/ I2/I2bisI1/I2/ I2bis message. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 6 |0| Length = 36 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Sender ULID + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Receiver ULID + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Reserved2: 32-bit field. Reserved for future use. Zero on transmit. MUST be ignored on receipt. (Needed to make the ULIDs start on amultiple of 8 octetmultiple-of-8-octet boundary.) Sender ULID: A 128-bit IPv6 address. Receiver ULID: A 128-bit IPv6 address. 5.15.7. Forked Instance Identifier Option Format 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 7 |0| Length = 4 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Forked Instance Identifier | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Fields: Forked Instance Identifier: 32-bit field containing the identifier of the particular forked instance. 5.15.8. Keepalive Timeout Option Format This option is defined in [4]. 6. Conceptual Model of a Host This section describes a conceptual model of one possible data structure organization that hosts will maintain for the purposes of Shim6. The described organization is provided to facilitate the explanation of how the Shim6 protocol should behave. This document does not mandate that implementations adhere to this model as long as their external behavior is consistent with that described in this document. 6.1. Conceptual Data Structures The key conceptual data structure for the Shim6 protocol is theULIDULID- pair context. This is a data structurewhichthat contains the following information: o The state of the context. See Section 6.2. o The peerULID; ULID(peer)ULID: ULID(peer). o The localULID; ULID(local)ULID: ULID(local). o The Forked InstanceIdentifier;Identifier: FII. This is zero for the defaultcontextcontext, i.e., when there is no forking. o The list of peerlocators,locators with theirpreferences; Ls(peer)preferences: Ls(peer). o The generation number for the most recently received, verified peer locator list. o For each peer locator, the verification method to use (from the Locator List option). o For each peer locator, a flag specifying whether it has been verified using HBA or CGA, and a bit specifying whether the locator has been probed to verify that the ULID is present at that location. o The current peerlocator,locator is the locator used as the destination address when sendingpackets; Lp(peer)packets: Lp(peer). o The set of local locators and thepreferences; Ls(local)preferences: Ls(local). o The generation number for the most recently sent Locator List option. o The current locallocator,locator is the locator used as the source address when sendingpackets; Lp(local)packets: Lp(local). o Thecontext tagContext Tag used to transmit control messages andpayload extension headers -Shim6 Payload Extension headers; this is allocated by thepeer; CT(peer)peer: CT(peer). o The context to expect in received control messages andpayload extension headers -Shim6 Payload Extension headers; this is allocated by the localhost; CT(local)host: CT(local). o Timers for retransmission of the messages duringcontextcontext- establishment and update messages. o Depending how an implementation determines whether a context is still in use, there might be a need to track the last time a packet was sent/received using the context. o Reachability state for the locator pairs as specified in [4]. o During pair exploration, information about theprobeProbe messages that have been sent and received as specified in [4]. o Duringcontext establishmentcontext-establishment phase,Initthe Initiator Nonce, Responder Nonce, ResponderValidatorValidator, and timers related to the different packets sent (I1,I2, R2), as described in Section77. 6.2. Context STATES The STATES that are used to describe the Shim6 protocol are as follows: +---------------------+---------------------------------------------+ | STATE | Explanation | +---------------------+---------------------------------------------+ | IDLE | State machine start | | | | | I1-SENT | Initiatingcontext establishmentcontext-establishment exchange | | | | | I2-SENT | Waiting to completecontext establishmentcontext-establishment | | | exchange | | | | | I2BIS-SENT | Potential context loss detected | | | | || | |ESTABLISHED | SHIM context established | | | | | E-FAILED |Context establishmentContext-establishment exchange failed | | | | | NO-SUPPORT | ICMP Unrecognized Next Header type | | | (type 4, code 1)receivedreceived, indicating | | | that Shim6 is not supported | +---------------------+---------------------------------------------+ In addition, in each of the aforementioned STATES, the following state information is stored: +---------------------+---------------------------------------------+ | STATE | Information | +---------------------+---------------------------------------------+ | IDLE | None | | | | | I1-SENT | ULID(peer), ULID(local), [FII], CT(local), | | | INITnonce,Nonce, Lp(local), Lp(peer), Ls(local) | | | | | I2-SENT | ULID(peer), ULID(local), [FII], CT(local), | | | INITnonce,Nonce, RESPnonce,Nonce, Lp(local), Lp(peer),| | | Ls(local), Responder Validator | | | | | ESTABLISHED | ULID(peer), ULID(local), [FII], CT(local), | | | CT(peer), Lp(local), Lp(peer),Ls(local)Ls(local), | | | Ls(peer), INITnonce?(toNonce?(to receive late R2) | | | | | I2BIS-SENT | ULID(peer), ULID(local), [FII], CT(local), | | | CT(peer), Lp(local), Lp(peer),Ls(local)Ls(local), | | | Ls(peer), CT(R1bis), RESPnonce,Nonce, | | | INITnonce,Nonce, RespondervalidatorValidator | | | | | E-FAILED | ULID(peer), ULID(local) | | | | | NO-SUPPORT | ULID(peer), ULID(local) | +---------------------+---------------------------------------------+ 7. Establishing ULID-Pair Contexts ULID-pair contexts are established using a 4-way exchange, which allows the responder to avoid creating state on the first packet. As part of thisexchangeexchange, each end allocates acontext tag,Context Tag anditshares thiscontext tagContext Tag and its set of locators with the peer. In somecasescases, the 4-way exchange is notnecessary,necessary -- forinstanceinstance, when both ends try tosetupset up the context at the same time, or when recovering from a context that has been garbage collected or lost at one of the hosts. 7.1. Uniqueness of Context Tags As part of establishing a new context, each host has to assign a uniquecontext tag.Context Tag. Since the Shim6 Payload Extension headers are demultiplexed based solely on thecontext tagContext Tag value (without using the locators), thecontext tagContext Tag MUST be unique for each context. It is important thatcontext tagsContext Tags are hard to guess for off-path attackers. Therefore, if an implementation uses structure in thecontext tagContext Tag to facilitate efficient lookups, at least 30 bits of thecontext tagContext Tag MUST be unstructured and populated by random or pseudo- random bits. In addition, in order to minimize the reuse ofcontext tags,Context Tags, the host SHOULD randomly cycle through the unstructured tag name space that is reserved for randomly assignedcontext tag values,(e.g.Context Tag values (e.g., following the guidelines described in[12]).[13]). 7.2. Locator Verification The peer's locators might need to be verified during context establishment as well as when handling locator updates in Section 10. There are two separate aspects of locator verification. One is to verify that the locator is tied to the ULID, i.e., that the hostwhichthat "owns" the ULID is also the one that is claiming the locator "ownership". The Shim6 protocol uses the HBA or CGA techniques for doing this verification. The other aspect is to verify that the host is indeed reachable at the claimed locator. Such verification is neededbothnot only to make sure communication canproceed,proceed but also to prevent 3rd party flooding attacks[14].[15]. These differentverificationsaspects of locator verification happen at differenttimes,times since the first might need to be performed before packets can be received by the peer with the source locator in question, but the latter verification is only needed before packets are sent to the locator. Before a host can use a locator (different than the ULID) as the source locator, it must know that the peer will accept packets with that source locator asbeingpart of this context.ThusThus, the HBA/CGA verification SHOULD be performed by the host before the host acknowledges the newlocator,locator by sending either an Update Acknowledgementmessage,message or an R2 message. Before a host can use a locator (different than the ULID) as the destinationlocatorlocator, it MUST perform the HBA/CGA verification if this was not performedbeforeuponthereception of the locator set. In addition, it MUST verify that the ULID is indeed present at that locator. This verification is performed by doing areturn- routabilityreturn-routability test as part of the Probe sub-protocol [4]. If the verification method in the Locator List option is not supported by the host, or if the verification method is not consistent with the CGA Parameter Data Structure (e.g., the Parameter Data Structure doesn't contain the multiprefixextension,extension and the verification method says to use HBA), then the host MUST ignore the Locator List and the message in which it iscontained, and thecontained. The host SHOULD generate a Shim6 ErrorMessagemessage with ErrorCode=2,Code=2 and with the Pointer referencing the octet in theVerificationverification method that was found inconsistent. 7.3. Normalcontext establishmentContext Establishment The normal context establishment consists of a4 message4-message exchange in the order of I1, R1, I2,R2R2, as can be seen in Figure 3. Initiator Responder IDLE IDLE ------------- I1 --------------> I1-SENT <------------ R1 --------------- IDLE ------------- I2 --------------> I2-SENT <------------ R2 --------------- ESTABLISHED ESTABLISHED Figure 3: Normalcontext establishmentContext Establishment 7.4. Concurrentcontext establishmentContext Establishment When both ends try to initiate a context for the same ULID pair, then we might end up with crossing I1 messages. Alternatively, since no state is created when receiving the I1, a host might sendaan I1 after having sentaan R1 message. Since a host remembers that it has sent an I1, it can respond to an I1 from the peer (for the sameULID-pair),ULID pair) withaan R2, resulting in the message exchange shown in Figure 4. Such behavior is needed forotherreasons such astocorrectlyrespondresponding to retransmitted I1 messages, which occur when the R2 message has been lost. Host A Host B IDLE IDLE -\ I1-SENT---\ ---\ /--- --- I1 ---\ /--- I1-SENT ---\ /--- I1 ---/ ---\ /--- --> <--- -\ I1-SENT---\ ---\ /--- --- R2 ---\ /--- I1-SENT ---\ /--- R2 ---/ ---\ /--- --> <--- ESTABLISHED ESTABLISHED Figure 4: Crossing I1messagesMessages If a host has received an I1 and sent an R1, it has no state to remember this.ThusThus, if the ULP on the host sends down packets, this might trigger the host to send an I1 message itself.ThusThus, while one end is sending anI1I1, the other is sending anI2I2, as can be seen in Figure 5. Host A Host B IDLE IDLE -\ ---\ I1-SENT ---\ --- I1 ---\ ---\ ---\ --> /--- /--- IDLE --- /--- R1--/ /--- <--- -\ I2-SENT---\ ---\ /--- --- I2---\ /--- I1-SENT ---\ /--- I1 ---/ ---\ /--- --> <--- ESTABLISHED -\ I2-SENT---\ ---\ /--- --- R2 ---\ /--- ---\ /--- R2 ---/ ---\ /--- --> <--- ESTABLISHED ESTABLISHED Figure 5: Crossing I2 and I1 7.5. ContextrecoveryRecovery Due to garbage collection, we can end up with one end having and using the context state, and the other end not having any state. We need to be able to recover this state at the end that has lostit,it before we can use it. This need can arise in the following cases: o The communication is working using the ULID pair as the locatorpair,pair but a problem arises, and the end that has retained the context state decides to probe alternate locator pairs. o The communication is working using a locator pair that is not the ULIDpair, hencepair; hence, the ULP packets sent from a peer that has retained the context state use the Shim6 PayloadextensionExtension header. o The host that retained the state sends a control message(e.g.(e.g., an Update Request message). In allthe casescases, the result is that the peer without state receives a shim message for which it has no context for thecontext tag. In all of those cases weContext Tag. We can recover the context by having the nodewhichthat doesn't have a contextstate,state send back an R1bis message, andhavethen complete the recovery withaan I2bis and R2messagemessage, as can be seen in Figure 6. Host A Host B Context for CT(peer)=X Discards context for CT(local)=X ESTABLISHED IDLE ---- payload, probe, etc. -----> No context state for CT(local)=X <------------ R1bis ------------ IDLE ------------- I2bis -----------> I2BIS_SENT <------------ R2 --------------- ESTABLISHED ESTABLISHED Figure 6: ContextlossLoss atreceiverReceiver If one end has garbage collected or lost the context state, it might try to create a new context state (for the same ULID pair), by sending an I1 message.TheIn this case, the peer (that still has the context state) will reply with an R1messagemessage, and the full 4-way exchange will be performedagain in this caseagain, as can be seen in Figure 7. Host A Host B Context for CT(peer)=X Discards context for ULIDs A1, B1 CT(local)=X ESTABLISHED IDLE Finds <------------ I1 --------------- Tries tosetupset up existing for ULIDs A1, B1 context, but CT(peer) I1-SENT doesn't match ------------- R1 ---------------> Left old context in ESTABLISHED <------------ I2 ---------------RecreateRe-create context with new CT(peer) I2-SENT and Ls(peer). ESTABLISHED ------------- R2 --------------> ESTABLISHED ESTABLISHED Figure 7: ContextlossLoss atsenderSender 7.6. ContextconfusionConfusion Since each end might garbage collect the contextstatestate, we can have the casewhenwhere one end has retained the context state and tries to use it, while the other end has lost the state. We discussed this in the previous section on recovery.ButBut, for the same reasons, when one host retainscontext tagContext Tag X as CT(peer) for ULID pair <A1, B1>, the other end might end up allocating thatcontext tagContext Tag as CT(local) for another ULIDpair, e.g.,pair (e.g., <A3,B1>B1>) between the same hosts. In thiscasecase, wecan notcannot use the recovery mechanisms since thereneedneeds to be separatecontext tagsContext Tags for the two ULID pairs. This type of "confusion" can be observed in two cases (assuming it is A that has retained the state and B that has dropped it): o B decides to create a context for ULID pair <A3, B1>,andallocates X as itscontext tagContext Tag for this, and sends an I1 to A. o A decides to create a context for ULID pair <A3,B1>,B1> and starts the exchange by sending I1 to B. When B receives the I2 message, it allocates X as thecontext tagContext Tag for this context. In both cases, A can detect that B has allocated X for ULID pair <A3, B1> even thoughthatA still has X as CT(peer) for ULID pair <A1, B1>.ThusThus, A can detect that B must have lost the context for <A1, B1>. The confusion can be detected when I2/I2bis/R2 isreceivedreceived, since we require that those messages MUST include a sufficiently large set of locators in a Locator List option that the peer can determine whether or not two contexts have the same host as the peer by comparing if there is any common locators in Ls(peer). Therequirement is that theold contextwhichthat used thecontext tagContext Tag MUST be removed; it can no longer be used to send packets.ThusThus, A would forcibly remove the context state for <A1, B1,X>,X> so that it can accept the new context for <A3, B1, X>. An implementation MAY re-create a context to replace the one that wasremoved;removed -- in thiscasecase, for <A1, B1>. The normal I1, R1, I2, R2 establishment exchange would then pick uniquecontext tagsContext Tags for that replacement context. Thisre- creationre-creation is OPTIONAL, but might be useful when there is ULP communicationwhichthat is using the ULID pair whose context was removed. Note that an I1 message with a duplicatecontext tagContext Tag should not cause the removal of the old context state; this operation needs to be deferred until the reception of the I2 message. 7.7. Sending I1messagesMessages When the shim layer decides tosetupset up a context for a ULID pair, it starts by allocating and initializing the context state for its end. As part ofthisthis, it assigns a randomcontext tagContext Tag to the context that is not being used as CT(local) by any other context . In the case that a new API is used and the ULP requests a forked context, the Forked Instance Identifier value will be set to a non-zero value. Otherwise, the FII value is zero. Then the initiator can send an I1 message and set the context STATE to I1-SENT. The I1 message MUST include the ULIDpair; normallypair -- normally, in the IPv6sourceSource anddestinationDestination fields. But if the ULID pair for the context is not used as a locator pair for the I1 message, then a ULID option MUST be included in the I1 message. In addition, if a Forked Instance Identifier value is non-zero, the I1 message MUST include a Context Instance Identifier option containing the correspondent value. 7.8. Retransmitting I1messagesMessages If the host does not receive an I2 or R2 message in response to the I1 message after I1_TIMEOUT time, then it needs to retransmit the I1 message. The retransmissions should use a retransmission timer with binary exponential backoff to avoid creating congestion issues for the network when lots of hosts perform I1 retransmissions. Also, the actual timeout value should be randomized between 0.5 and 1.5 of the nominal value to avoid self-synchronization. If, after I1_RETRIES_MAX retransmissions, there is no response, then most likely the peer does not implement the Shim6protocol, orprotocol (or there could be a firewall that blocks theprotocol.protocol). In thiscasecase, it makes sense for the host to remembertonot to try again to establish a context with that ULID. However, any such negative caching should be retained for at most NO_R1_HOLDDOWN_TIME, in order to be able to latersetupset up a context should the problem have been that the host was not reachable at all when the shim tried to establish the context. If the host receives an ICMP error with "Unrecognized Next Header" type (type 4, code 1) and the included packet is the I1 message it just sent, then this is a more reliable indication that the peer ULID does not implement Shim6. Again, in this case, the host should remembertonot to try again to establish a context with that ULID. Such negative caching should be retained for at most ICMP_HOLDDOWN_TIME, which should be significantly longer than the previous case. 7.9. Receiving I1messagesMessages A host MUST silently discard any received I1 messages that do not satisfy all of the following validity checks in addition to those specified in Section 12.3: o The Hdr Ext Len field is at least 1, i.e., the length is at least 16 octets. Upon the reception of an I1 message, the host extracts the ULID pair and the Forked Instance Identifier from the message. If there is no ULID-pair option, then the ULID pair is taken from thesourceSource anddestinationDestination fields in the IPv6 header. If there is no FII option in the message, then the FII value is taken to be zero.NextNext, the host looks for an existing contextwhichthat matches the ULID pair and the FII. If no state is found (i.e., the STATE is IDLE), then the host replies withaan R1 message as specified below. If such a context exists in ESTABLISHED STATE, the host verifies that the locator of theInitiatorinitiator is included inLs(peer)Ls(peer). (This check is unnecessary if there is no ULID-pair option in the I1message).message.) If the state exists in ESTABLISHED STATE and the locators do not fall in the locator sets, then the host replies withaan R1 message as specified below. This completes the I1 processing, with the context STATE being unchanged. If the state exists in ESTABLISHED STATE and the locators do fall in the sets, then the host compares CT(peer) for the context with the CT contained in the I1 message. o If thecontext tagsContext Tags match, then this probably means that the R2 message was lost and this I1 is a retransmission. In this case, the host replies withaan R2 message containing the information available for the existent context. o If thecontext tagsContext Tags do not match, then it probably means that theInitiatorinitiator has lost the context information for this context anditis trying to establish a new one for the sameULID-pair.ULID pair. In this case, the host replies withaan R1 message as specified below. This completes the I1 processing, with the context STATE being unchanged. If the state exists in other STATE (I1-SENT, I2-SENT, I2BIS-SENT), we are in the situation ofConcurrentconcurrent contextestablishmentestablishment, described in Section 7.4. In this case, the host leaves CT(peer)unchanged,unchanged and replies withaan R2 message. This completes the I1 processing, with the context STATE being unchanged. 7.10. Sending R1messagesMessages When the host needs to sendaan R1 message in response to the I1 message, it copies the Initiator Nonce from the I1 message to the R1 message, generates a ResponderNonceNonce, and calculates a Responder Validator option as suggested in the following section. No state is created on the host in thiscase.(Notecase. (Note that the information used to generate the R1 reply message is either contained in the received I1 message oritis global information that is not associated with the particular requested context (the S and the Respondernonce values)).Nonce values.)) When the host needs to sendaan R2 message in response to the I1 message, it copies the Initiator Nonce from the I1 message to the R2 message, and otherwise follows the normal rules for forming an R2 message (see Section 7.14). 7.10.1. Generating the R1 Validator As it is stated in Section 5.15.1, theValidator generationvalidator-generation mechanism is a local choice since the validator is generated and verified by the samenode i.e.node, i.e., the responder. However, in order to provide the required protection, theValidatorvalidator needs to be generatedfullfllingby fulfilling the conditions described in Section 5.15.1. One way for the responder to properly generate validators is to maintain a single secret (S) and a running counter (C) for the Responder Nonce that is incremented in fixed periods of time (this allows theResponderresponder to verify the age of a Responder Nonce, independently of the context in which it is used). When the validator is generated to be included inaan R1message, that ismessage sent inresposeresponse to a specific I1 message, the responder can perform the following procedure to generate the validator value: First, the responder uses the current counter C value as the Responder Nonce. Second, it uses the following information (concatenated) as input to the one-way function: o The secret S o That Responder Nonce o The Initiator Context Tag from the I1 message o The ULIDs from the I1 message o The locators from the I1 message (strictly only needed if they are different from the ULIDs) o Theforked instance identifierForked Instance Identifier, if such option was included in the I1 message Third, it uses the output of the hash function as the validator value included in the R1 message. 7.11. Receiving R1messagesMessages andsendingSending I2messagesMessages A host MUST silently discard any received R1 messages that do not satisfy all of the following validity checks in addition to those specified in Section 12.3: o The Hdr Ext Len field is at least 1, i.e., the length is at least 16 octets. Upon the reception of an R1 message, the host extracts the Initiator Nonce and the Locator Pair from the message (the latter from thesourceSource anddestinationDestination fields in the IPv6 header).NextNext, the host looks for an existing contextwhichthat matches the Initiator Nonce and where the locators are contained in Ls(peer) and Ls(local), respectively. If no such context is found, then the R1 message is silently discarded. If such a context is found, then the host looks at the STATE: o If the STATE is I1-SENT, then it sends an I2 message as specified below. o In any other STATE (I2-SENT, I2BIS-SENT,ESTABLISHED)ESTABLISHED), then the host has already sent an I2 messagethenand this is probably a reply to a retransmitted I1 message, so this R1 message MUST be silently discarded. When the host sends an I2 message,thenit includes the Responder Validator option that was in the R1 message. The I2 message MUST include the ULIDpair; normallypair -- normally, in the IPv6sourceSource anddestinationDestination fields. If a ULID-pair option was included in the I1messagemessage, then it MUST be included in the I2 message as well. In addition, if the Forked Instance Identifier value for this context is non-zero, the I2 message MUST contain a Forked Instance IdentifierOptionoption carryingthisthe Forked Instance Identifier value. Besides, the I2 message contains an Initiator Nonce. This is not required to be the samethanas the one included in the previous I1 message. The I2 message may also include theInitiator'sinitiator's locator list. If this is thethecase, then it must also include the CGA Parameter Data Structure. If CGA (and not HBA) is used to verify one or more of the locators included in the locator list, thenInitiatorthe initiator must also include a CGAsignatureSignature option containing the signature. When the I2 message has been sent, the STATE is set to I2-SENT. 7.12. Retransmitting I2messagesMessages If the initiator does not receive an R2 message after I2_TIMEOUT time after sending an I2messagemessage, it MAY retransmit the I2 message, using binary exponential backoff and randomized timers. The Responder Validator option might have a limitedlifetime,lifetime -- that is, the peer might reject Responder Validator options that are older than VALIDATOR_MIN_LIFETIME to avoid replay attacks. In the case that the initiator decides not to retransmit I2messagesmessages, or in the case that the initiator still does not receive an R2 message after retransmitting I2 messages I2_RETRIES_MAX times, the initiator SHOULD fall back to retransmitting the I1 message. 7.13. Receiving I2messagesMessages A host MUST silently discard any received I2 messages that do not satisfy all of the following validity checks in addition to those specified in Section 12.3: o The Hdr Ext Len field is at least 2, i.e., the length is at least 24 octets. Upon the reception of an I2 message, the host extracts the ULID pair and the Forked InstanceidentifierIdentifier from the message. If there is no ULID-pair option, then the ULID pair is taken from thesourceSource anddestinationDestination fields in the IPv6 header. If there is no FII option in the message, then the FII value is taken to be zero.NextNext, the host verifies that the Responder Nonce is a recent one(Nonces(nonces that are no older than VALIDATOR_MIN_LIFETIME SHOULD be consideredrecent),recent) and that the Responder Validator option matches the validator the host would have computed for the ULID, locators,responder nonce, initiator nonceResponder Nonce, Initiator Nonce, and FII. If a CGA Parameter Data Structure (PDS) is included in the message, then the host MUST verify if the actual PDS contained in the message corresponds to the ULID(peer). If any of the above verificationsfails,fail, then the host silently discards themessage andmessage; it has completed the I2 processing. If all the above verifications are successful, then the host proceeds to look for a context state for theInitiator.initiator. The host looks for a context with the extracted ULID pair and FII. If noneexistexist, then STATE of the (non-existing) context is viewed as beingIDLE, thusIDLE; thus, the actions depend on the STATE as follows: o If the STATE is IDLE (i.e., the context does notexist)exist), the host allocates acontext tagContext Tag (CT(local)), creates the context state for the context, and sets its STATE to ESTABLISHED. It recordsCT(peer),CT(peer) and the peer's locator set as well as its own locator set in the context. It SHOULD perform the HBA/CGA verification of the peer's locator set at this point in time, as specified in Section 7.2.ThenThen, the host sends an R2 message back as specified below. o If the STATE is I1-SENT, then the host verifies if the source locator is included in Ls(peer)or, it is includedor in the Locator List contained in the I2message andmessage; the HBA/CGA verification for this specific locator issuccessfulsuccessful. * If this is not the case, then the message is silently discarded and the context STATE remains unchanged. * If this is the case, then the host updates the context information (CT(peer), Ls(peer)) with the data contained in the I2messagemessage, and the host MUST sendaan R2 message back as specified below. Note that before updating Ls(peer) information, the host SHOULD perform the HBA/CGA validation of the peer's locator set at this point intimetime, as specified in Section 7.2. The host moves to ESTABLISHED STATE. o If the STATE is ESTABLISHED, I2-SENT, or I2BIS-SENT, then the host verifies if the source locator is included in Ls(peer)or, it is includedor in the Locator List contained in the I2message andmessage; the HBA/CGA verification for this specific locator issuccessfulsuccessful. * If this is not the case, then the message is silently discarded and the context STATE remains unchanged. * If this is the case, then the host updates the context information (CT(peer), Ls(peer)) with the data contained in the I2messagemessage, and the host MUST sendaan R2 message back as specified in Section 7.14. Note that before updating Ls(peer) information, the host SHOULD perform the HBA/CGA validation of the peer's locator set at this point intimetime, as specified in Section 7.2. The context STATE remains unchanged. 7.14. Sending R2messagesMessages Before the host sends the R2messagemessage, it MUST look for a possible contextconfusion i.e.confusion, i.e., where it would end up with multiple contexts using the same CT(peer) for the same peer host. See Section 7.15. When the host needs to send an R2 message, the host forms the message itscontext tag,Context Tag and copies the Initiator Nonce from the triggering message (I2, I2bis, or I1). In addition, it may include alternative locators andthe thenecessary options so that the peer can verify them. In particular, the R2 message may include theResponder'sresponder's locator list and the PDS option. If CGA (and not HBA) is used to verify the locator list, then theResponderresponder also signs the key parts of the message and includes a CGA Signature option containing the signature. R2 messages are never retransmitted. If the R2 message is lost, then the initiator will retransmit either the I2/I2bis or I1 message. Either retransmission will cause the responder to find the context state and respond with an R2 message. 7.15. Match for Context Confusion When the host receives an I2, I2bis, orR2R2, it MUST look for a possible contextconfusion i.e.confusion, i.e., where it would end up with multiple contexts using the same CT(peer) for the same peer host. This can happen whenitthe host has received the abovemessagesmessages, since they create a new context with a new CT(peer).SameThe same issue applies when CT(peer) is updated for an existing context. The host takes CT(peer) for the newly created or updated context, and looks for other contexts which: o Are in STATE ESTABLISHED orI2BIS-SENT.I2BIS-SENT o Have the sameCT(peer).CT(peer) oWhereHave an Ls(peer) that has at least one locator in common with the newly created or updatedcontext.context If such a context is found, then the host checks if the ULID pair or the Forked Instance Identifier are different than the ones in the newly created or updated context: o If either or both are different, then the peer is reusing thecontext tagContext Tag for the creation of a context with different ULID pair or FII, which is an indication that the peer has lost the original context. In this case, we are inthe Contexta context confusion situation, and the host MUST NOT use the old context to send any packets. It MAY just discard the old context (after all, the peer has discarded it), or it MAY attempt to re-establish the old context by sending a new I1 message and moving its STATE to I1-SENT. In any case, once that this situation is detected, the host MUST NOT keep two contexts with overlapping Ls(peer) locator sets and the samecontext tagContext Tag in ESTABLISHED STATE, since this would result in demultiplexing problems on the peer. o If both are the same, then this context is actually the context that is created orupdated, henceupdated; hence, there is no confusion. 7.16. Receiving R2messagesMessages A host MUST silently discard any received R2 messages that do not satisfy all of the following validity checks in addition to those specified in Section 12.3: o The Hdr Ext Len field is at least 1, i.e., the length is at least 16 octets. Upon the reception of an R2 message, the host extracts the Initiator Nonce and the Locator Pair from the message (the latter from thesourceSource anddestinationDestination fields in the IPv6 header).NextNext, the host looks for an existing contextwhichthat matches the Initiator Nonce and where the locators are Lp(peer) and Lp(local), respectively. Based on the STATE: o If no such context is found, i.e., the STATE is IDLE, then the message is silently dropped. o If STATE is I1-SENT, I2-SENT, orI2BIS-SENTI2BIS-SENT, then the host performs the followingactions:actions. If a CGA Parameter Data Structure (PDS) is included in the message, then the host MUST verify that the actual PDS contained in the message corresponds to the ULID(peer) as specified in Section 7.2. If the verification fails, then the message is silently dropped. If the verification succeeds, then the host records the information from the R2 message in the context state; it records the peer's locator set and CT(peer). The host SHOULD perform the HBA/CGA verification of the peer's locator set at this point in time, as specified in Section 7.2. The host sets its STATE to ESTABLISHED. o If the STATE is ESTABLISHED, the R2 message is silently ignored, (since this is likely to be a reply to a retransmitted I2 message). Before the host completes the R2processingprocessing, it MUST look for a possible contextconfusion i.e.confusion, i.e., where it would end up with multiple contexts using the same CT(peer) for the same peer host. See Section 7.15. 7.17. Sending R1bismessagesMessages Upon the receipt of a Shim6payload extensionPayload Extension header where there is no current Shim6 context at the receiver, the receiver is to respond with an R1bis message in order to enable a fast re-establishment of the lost Shim6 context.AlsoAlso, a host is to respond withaan R1bis upon receipt of any control messages thathashave a message type in the range 64-127 (i.e., excluding thecontext setupcontext-setup messages such as I1, R1, R1bis, I2, I2bis,R2R2, and future extensions), where the control message refers to anon existentnon-existent context. We assume that all the incoming packets that trigger the generation of an R1bis message contain a locator pair (in the address fields of the IPv6 header) and a Context Tag. Upon reception of any of the packets described above, the host will reply with an R1bis including the following information: o The Responder Nonce is a number picked by the responderwhichthat the initiator will return in the I2bis message. o Packet Context Tag is thecontext tagContext Tag contained in the received packet that triggered the generation of the R1bis message. o The Responder Validator option is included, with a validator that is computed as suggested in the next section. 7.17.1. Generating the R1bis Validator One way for the responder to properly generate validators is to maintain a single secret (S) and a running counter C for the Responder Nonce that is incremented in fixed periods of time (this allows theResponderresponder to verify the age of a Responder Nonce, independently of the context in which it is used). When the validator is generated to be included inaan R1bismessage,message -- thatisis, sent inresposeresponse to a specificcontrolscontrol packet or a packet containing the Shim6payload extensionPayload Extension headermessage,message -- the responder can perform the following procedure to generate the validator value: First, the responder uses the counter C value as the Responder Nonce. Second, it uses the following information (concatenated) as input to the one-way function: o The secret S o That Responder Nonce o The Receiver ContexttagTag included in the received packet o The locators from the received packet Third, it uses the output of the hash function as the validator string. 7.18. Receiving R1bismessagesMessages andsendingSending I2bismessagesMessages A host MUST silently discard any received R1bis messages that do not satisfy all of the following validity checks in addition to those specified in Section 12.3: o The Hdr Ext Len field is at least 1, i.e., the length is at least 16 octets. Upon the reception of an R1bis message, the host extracts the Packet Context Tag and the Locator Pair from the message (the latter from thesourceSource anddestinationDestination fields in the IPv6 header).NextNext, the host looks for an existing context where the Packet Context Tag matches CT(peer) and where the locators match Lp(peer) and Lp(local), respectively. o If no such context isnotfound, i.e., the STATE is IDLE, then the R1bis message is silently discarded. o If the STATE is I1-SENT, I2-SENT, or I2BIS-SENT, then the R1bis message is silently discarded. o If the STATE is ESTABLISHED, then we are in the case where the peer has lost thecontextcontext, and the goal is to try to re-establish it. For that, the host leaves CT(peer) unchanged in the context state, transitions to I2BIS-SENT STATE, and sendsaan I2bis message, including the computed Responder Validator option, the Packet Context Tag, and the Responder Nonce that were received in the R1bis message. This I2bis message is sent using the locator pair included in the R1bis message. In the case that this locator pair differs from the ULID pair defined for this context, thenana ULID option MUST be included in the I2bis message. In addition, if the Forked Instance Identifier for this context is non-zero, then a Forked Instance Identifier option carrying the instance identifier value for this context MUST be included in the I2bis message. The I2bis message may also include a locator list. If this is thethecase, then it must also include the CGA Parameter Data Structure. If CGA (and not HBA) is used to verify one or more of the locators included in the locator list, thenInitiatorthe initiator must also include a CGAsignatureSignature option containing the signature. 7.19. Retransmitting I2bismessagesMessages If the initiator does not receive an R2 message after I2bis_TIMEOUT time after sending an I2bismessagemessage, it MAY retransmit the I2bis message, using binary exponential backoff and randomized timers. The Responder Validator option might have a limitedlifetime,lifetime -- that is, the peer might reject Responder Validator options that are older than VALIDATOR_MIN_LIFETIME to avoid replay attacks. In the case that the initiator decides not to retransmit I2bismessagesmessages, or in the case that the initiator still does not receive an R2 message after retransmitting I2bis messages I2bis_RETRIES_MAX times, the initiator SHOULDfallbackfall back to retransmitting the I1 message. 7.20. Receiving I2bismessagesMessages andsendingSending R2messagesMessages A host MUST silently discard any received I2bis messages that do not satisfy all of the following validity checks in addition to those specified in Section 12.3: o The Hdr Ext Len field is at least 3, i.e., the length is at least 32 octets. Upon the reception of an I2bis message, the host extracts the ULID pair and the Forked InstanceidentifierIdentifier from the message. If there is no ULID-pair option, then the ULID pair is taken from thesourceSource anddestinationDestination fields in the IPv6 header. If there is no FII option in the message, then the FII value is taken to be zero.NextNext, the host verifies that the Responder Nonce is a recent one(Nonces(nonces that are no older than VALIDATOR_MIN_LIFETIME SHOULD be consideredrecent),recent) and that the Responder Validator option matches the validator the host would have computed for the locators, Responder Nonce, and Receiver ContexttagTag as part of sending an R1bis message. If a CGA Parameter Data Structure (PDS) is included in the message, then the host MUST verify if the actual PDS contained in the message corresponds to the ULID(peer). If any of the above verificationsfails,fail, then the host silentlydiscarddiscards themessage andmessage; it has completed the I2bis processing. If both verifications are successful, then the host proceeds to look for a context state for theInitiator.initiator. The host looks for a context with the extracted ULID pair and FII. If noneexistexist, then STATE of the (non-existing) context is viewed as beingIDLE, thusIDLE; thus, the actions depend on the STATE as follows: o If the STATE is IDLE (i.e., the context does notexist)exist), the host allocates acontext tagContext Tag (CT(local)), creates the context state for the context, and sets its STATE to ESTABLISHED. The host SHOULD NOT use the Packet Context Tag in the I2bis message for CT(local);insteadinstead, it should pick a new randomcontext tagContext Tag just as when it processes an I2 message. It recordsCT(peer),CT(peer) and the peer's locator set as well as its own locator set in the context. It SHOULD perform the HBA/CGA verification of the peer's locator set at this point intimetime, as specified in Section 7.2. Then the host sends an R2 message back as specified in Section 7.14. o If the STATE is I1-SENT, then the host verifies if the source locator is included in Ls(peer)or, it is includedor in the Locator List contained in theI2I2bis message and if the HBA/CGA verification for this specific locator issuccessfulsuccessful. * If this is not the case, then the message is silently discarded. Thethecontext STATE remains unchanged. * If this is the case, then the host updates the context information (CT(peer), Ls(peer)) with the data contained in theI2 messageI2bis message, and the host MUST sendaan R2 message back as specified below. Note that before updating Ls(peer) information, the host SHOULD perform the HBA/CGA validation of the peer's locator set at this point intimetime, as specified in Section 7.2. The host moves to ESTABLISHED STATE. o If the STATE is ESTABLISHED, I2-SENT, or I2BIS-SENT, then the hostwhtherdetermines whether at least one of the two following conditions hold: i) if the source locator is included in Ls(peer) or, ii) if the source locator is included in the Locator List contained in theI2I2bis message and if the HBA/CGA verification for this specific locator issuccessfulsuccessful. * If none of the two aforementioned conditions hold, then the message is silently discarded. Thethecontext STATE remains unchanged. * If at least one of the two aforementioned conditions hold, then the host updates the context information (CT(peer), Ls(peer)) with the data contained in theI2 messageI2bis message, and the host MUST sendaan R2 messagebackback, as specified in Section 7.14. Note that before updating Ls(peer) information, the host SHOULD perform the HBA/CGA validation of the peer's locator set at this point intimetime, as specified in Section 7.2. The context STATE remains unchanged. 8. Handling ICMP Error Messages The routers in the path as well as the destination might generate ICMP error messages. In some cases, the Shim6 can take action and solve thesolve theproblem that resulted in the error. In other cases, the Shim6 layercan notcannot solve theproblemproblem, and it is critical that these packets make it back up to the ULPs so that they can take appropriate action. This is an implementation issue in the sense that the mechanism is completely local to the host itself. But the issue of how ICMP errors are correctly dispatched to the ULP on the host areimportant, henceimportant; hence, this section specifies the issue. All ICMP messages MUST be delivered to the ULP in allcasescases, except when Shim6 successfully acts on the message(e.g.(e.g., selects a new path). There SHOULD be a configuration option to unconditionally deliver all ICMP messages (including ones acted on by shim6) to the ULP. According to that recommendation, the following ICMP error messages should be processed by the Shim6 layer and not passed to the ULP: ICMP error DestinationunreachableUnreachable, withcodescodes: 0 (No route todestination),destination) 1 (Communication with destination administrativelyprohibited),prohibited) 2 (Beyond scope of sourceaddress),address) 3 (Addressunreachable),unreachable) 5 (Source address failed ingress/egresspolicy),policy) 6 (Reject route todestination),destination) ICMP Time exceedederror,error. ICMP Parameter problemerrorerror, with the parameter that caused the error being a Shim6 parameter. The following ICMP error messages report problems that cannot be addressed by the Shim6 layer and that should be passed to the ULP (as described below): ICMP Packet too bigerror,error. ICMP Destination Unreachable with Code 4 (Portunreachable)unreachable). ICMP Parameter problem (if the parameter that caused the problem is not a Shim6 parameter). +--------------+ | IPv6 Header | | | +--------------+ | ICMPv6 | | Header | - - +--------------+ - - | IPv6 Header | | src, dst as | Can be dispatched IPv6 | sent by ULP | unmodified to ULP | on host | ICMP error handler Packet +--------------+ | ULP | in | Header | +--------------+ Error | | ~ Data ~ | | - - +--------------+ - - Figure 8: ICMPerror handlingError Handling withoutpayload extension headerthe Shim6 Payload Extension Header When the ULP packets are sent without thepayload extension header,Shim6 Payload Extension header -- that is, while the initial locators=ULIDs areworking,working -- this introduces no new concerns; an implementation's existing mechanism for delivering these errors to the ULP will work. See Figure 8. But when the shim on the transmitting side inserts thepayload extensionShim6 Payload Extension header and replaces the ULIDs in the IP address fields with some other locators, then an ICMP error coming back will have a "packet inerror"error", which is not a packet that the ULP sent.ThusThus, the implementation will have to applythereverse mapping to the "packet in error" before passing the ICMP error up to the ULP, including the ICMP extensions defined in[24].[25]. See Figure 9. +--------------+ | IPv6 Header | | | +--------------+ | ICMPv6 | | Header | - - +--------------+ - - | IPv6 Header | | src, dst as | Needs to be IPv6 | modified by | transformed to | shim on host | have ULIDs +--------------+ in src, dst fields, Packet | Shim6 ext. | and Shim6ext.Ext. | Header | header removed in +--------------+ before it can be | Transport | dispatched to the ULP Error | Header | ICMP error handler. +--------------+ | | ~ Data ~ | | - - +--------------+ - - Figure 9: ICMPerror handlingError Handling withpayload extension headerthe Shim6 Payload Extension Header Note that this mapping is different than when receiving packets from the peer witha payload extension headers, becauseShim6 Payload Extension headers because, in thatcasecase, the packets contain CT(local). But the ICMP errors have a "packet in error" withan payload extensiona Shim6 Payload Extension header containing CT(peer). This is because they were intended to be received by the peer. In any case, since the <Source Locator, Destination Locator, CT(peer)> has to be unique when received by the peer, the local host should also only be able to find one context that matches this tuple. If the ICMP error is aPacket Too Big,"packet too big", the reported MTU must be adjusted to be 8 octets less, since the shim will add 8 octets when sending packets. After the "packet in error" has had the original ULIDs inserted, then thispayload extensionShim6 Payload Extension header can be removed. The result is a "packet in error" that is passed to the ULP which looks as if the shim did not exist. 9. Teardown of the ULID-Pair Context Each host can unilaterally decide when to tear down a ULID-pair context. It is RECOMMENDED that hosts do not tear down the context when they know that there is someupper layerupper-layer protocol that might use the context. For example, an implementation might know this if there is an open socketwhichthat is connected to the ULID(peer). However, there might be cases when the knowledge is not readily available to the shim layer, forinstanceinstance, for UDP applicationswhichthat do not connect theirsockets,sockets or for any applicationwhichthat retains somehigher levelhigher-level state across (TCP) connections and UDP packets.ThusThus, it is RECOMMENDED that implementations minimize premature teardown by observing the amount of traffic that is sent and received using the context, and tear down the state only after it appearsquiescent, tear down the state.quiescent. A reasonable approach would benotto not tear down a context until at least 5 minutes have passed since the last message was sent or received using the context. (Note that packets that use the ULID pair as a locator pair and that do not require address rewriting by the Shim6 layer are also considered as packets using the associated Shim6context)context.) Since there is no explicit, coordinated removal of the context state, there are potential issues aroundcontext tagContext Tag reuse. One end might remove thestate,state and potentially reuse thatcontext tagContext Tag for some other communication, and the peer might later try to use the old context (which it didn't remove). The protocol has mechanisms to recover from this, which work whether the state removal was total and accidental (e.g., crash and reboot of thehost),host) or just a garbage collection of shim state that didn't seem to be used. However, the host should try to minimize the reuse ofcontext tagsContext Tags by trying to randomly cycle through the 2^47context tagContext Tag values. (SeeSection 21Appendix C for a summary of how the recovery works in the different cases.) 10. Updating the Peer The Update Request and Acknowledgement are used both to update the list of locators (only possible when CGA is used to verify thelocator(s)), as well as updatinglocator(s)) and to update the preferences associated with each locator. 10.1. Sending Update RequestmessagesMessages When a host has a change in the locator set,thenit can communicate this to the peer by sending an Update Request. When a host has a change in the preferences for its locator set, it can also communicate this to the peer. The Update Request message can include just a Locator Listoption, tooption (to convey the new set oflocators,locators), just a Locator Preferences option, or both a new Locator List and new Locator Preferences. Should the host send a new Locator List, the host picks a newrandomrandom, local generation number, records this in the context, and puts it in the Locator List option. Any Locator Preference option, whethersendsent in the same Update Request or in some future Update Request, will use that generation number to make sure the preferences get applied to the correct version of the locator list. The host picks a random Request Nonce for eachupdate,update and keeps the same nonce for any retransmissions of the Update Request. The nonce is used to match the acknowledgement with the request. TheUPDATEUpdate Request message can also include a CGA Parameter Data Structure (this is needed if the CGA PDS was not previouslyexchanged,).exchanged). If CGA (and not HBA) is used to verify one or more of the locators included in the locator list, then a CGAsignatureSignature option containing the signature must also be included in theUPDATEUpdate Request message. 10.2. Retransmitting Update RequestmessagesMessages If the host does not receive an Update Acknowledgement R2 message in response to the Update Request message after UPDATE_TIMEOUT time, then it needs to retransmit the Update Request message. The retransmissions should use a retransmission timer with binary exponential backoff to avoid creating congestion issues for the network when lots of hosts perform Update Request retransmissions. Also, the actual timeout value should be randomized between 0.5 and 1.5 of the nominal value to avoid self-synchronization. Should there be no response, the retransmissions continue forever. The binary exponential backoff stops at MAX_UPDATE_TIMEOUT. But the only way the retransmissions would stop when there is noacknowledgement,acknowledgement is whenthe shim,Shim6, through theProbeREAP protocol or some other mechanism, decides to discard the context state due to lack of ULP usage in combination with no responses to theProbes.REAP protocol. 10.3. Newer InformationWhilewhile Retransmitting There can be at most one outstanding Update Request message at any time. Thusuntil e.g.until, for example, an update with a new Locator List has been acknowledged, anyevennewer Locator List or new Locator Preferencescan notcannot just be sent. However, when there is newer information and the older information has not yet been acknowledged, the hostcancan, instead of waiting for an acknowledgement, abandon the previous update and construct a new Update Request (with a new Request Nonce)whichthat includes the new information as well as the information thathadn'thasn't yet been acknowledged. For example, if the original locator list was just (A1, A2), and if an Update Request with the Locator List (A1, A3) is outstanding, and the host determines that it should both add A4 to the locatorlist,list and mark A1 as BROKEN, then it would need to: o Pick a new random Request Nonce for the new Update Request. o Pick a new randomGenerationgeneration number for the new locator list. o Form the new locatorlist -list: (A1, A3,A4)A4). o Form a Locator Preference optionwhichthat uses the new generation number and has the BROKEN flag for the first locator. o Send the Update Request and start a retransmission timer. Any Update Acknowledgementwhichthat doesn't match the currentrequest nonce, for instanceRequest Nonce (for instance, an acknowledgement for the abandoned UpdateRequest,Request) will be silently ignored. 10.4. Receiving Update RequestmessagesMessages A host MUST silently discard any received Update Request messages that do not satisfy all of the following validity checks in addition to those specified in Section 12.3: o The Hdr Ext Len field is at least 1, i.e., the length is at least 16 octets. Upon the reception of an Update Request message, the host extracts the Context Tag from the message. It then looks for a contextwhichthat has a CT(local) that matches thecontext tag.Context Tag. If no such context is found, it sendsaan R1bis message as specified in Section 7.17. Sincecontext tagsContext Tags can be reused, the host MUST verify that the IPv6source addressSource Address field is part of Ls(peer) and that the IPv6destination addressDestination Address field is part of Ls(local). If this is not the case, the sender of the Update Request has a stale contextwhichthat happens to match the CT(local) for this context. In thiscasecase, the host MUST sendaan R1bismessage,message and otherwise ignore the Update Request message. If a CGA Parameter Data Structure (PDS) is included in the message, then the host MUST verify if the actual PDS contained in the packet corresponds to the ULID(peer). If this verification fails, the message is silently discarded. Then, depending on the STATE of the context: o IfESTABLISHED: ProceedESTABLISHED, proceed to process message. o If I1-SENT, discard the message and stay in I1-SENT. o If I2-SENT,thensend I2 and proceed to process the message. o If I2BIS-SENT,thensend I2bis and proceed to process the message. The verification issues for the locators carried in theLocatorUpdate Request message are specified in Section 7.2. If the locator listcan notcannot be verified, this procedure should send a Shim6 Error message with Error Code=2. In any case, if itcan notcannot be verified, there is no further processing of the Update Request. Once any Locator List option in the Update Request has been verified, the peer generation number in the context is updated to be the one in the Locator List option. If the Update Request message contains a Locator Preference option, then theGenerationgeneration number in the preference option is compared with the peer generation number in the context. If they do not match, then the host generates a Shim6 ErrorMessagemessage with Error Code=3 and with the Pointer field referring to the first octet in the Locator List Generation number in the Locator Preference option. In addition, if the number of elements in the Locator Preference option does not match the number of locators in Ls(peer), then a Shim6 ErrorMessagemessage with Error Code=4 is sent with the Pointer field referring to the first octet of the Length field in the Locator Preference option. In both cases offailures,failure, no further processing is performed for theLocatorUpdate Request message. If the generationnumber matches,numbers match, the locator preferences are recorded in the context. Once the Locator List option (if present) has been verified and any new locator list or locator preferences have been recorded, the host sends an Update Acknowledgement message, copying the nonce from therequest,request and using the CT(peer)inas the Receiver Context Tag. Any newlocators, orlocators (or, morelikelylikely, new locatorpreferences,preferences) might result in the host wanting to select a different locator pair for thecontext. Forcontext -- for instance, if the Locator Preferences option lists the current Lp(peer) as BROKEN. The host uses the reachability exploration procedure described in [4] to verify that the new locator is reachable before changing Lp(peer). 10.5. Receiving Update AcknowledgementmessagesMessages A host MUST silently discard any received Update Acknowledgement messages that do not satisfy all of the following validity checks in addition to those specified in Section 12.3: o The Hdr Ext Len field is at least 1, i.e., the length is at least 16 octets. Upon the reception of an Update Acknowledgement message, the host extracts the Context Tag and the Request Nonce from the message. It then looks for a contextwhichthat has a CT(local) that matches thecontext tag.Context Tag. If no such context is found, it sendsaan R1bis message as specified in Section 7.17. Sincecontext tagsContext Tags can be reused, the host MUST verify that the IPv6source addressSource Address field is part of Ls(peer) and that the IPv6destination addressDestination Address field is part of Ls(local). If this is not the case, the sender of the Update Acknowledgement has a stale contextwhichthat happens to match the CT(local) for this context. In thiscasecase, the host MUST sendaan R1bismessage,message and otherwise ignore the Update Acknowledgement message. Then, depending on the STATE of the context: o IfESTABLISHED: ProceedESTABLISHED, proceed to process message. o If I1-SENT, discard the message and stay in I1-SENT. o If I2-SENT,thensend R2 and proceed to process the message. o If I2BIS-SENT,thensend R2 and proceed to process the message. If the Request Nonce doesn't match theNoncenonce for the last sent Update Request for the context, then the Update Acknowledgement is silently ignored. If the nonce matches, then the update has been completed and the Update retransmit timer can be reset. 11. Sending ULP Payloads When there is no context state for the ULID pair on the sender, there is no effect on how ULP packets are sent. If the host is using some heuristic for determining when to perform a deferred context establishment, then the host might need to do some accounting (count the number of packets sent and received) even before there is a ULID- pair context. If the context is not in ESTABLISHED or I2BIS-SENT STATE, thenitthere is also no effect on how the ULP packets are sent. Only in the ESTABLISHED and I2BIS-SENTSTATESSTATEs does the host have CT(peer) and Ls(peer) set. If there is a ULID-pair context for the ULID pair, then the sender needs to verify whether the context uses the ULIDs aslocators,locators -- that is, whether Lp(peer) == ULID(peer) and Lp(local) == ULID(local). If this is the case, then packets can be sent unmodified by the shim. If it is not the case, then the logic in Section 11.1 will need to be used. There will also be some maintenance activity relating to (un)reachability detection, whether or not packets are sent with the originallocators or not.locators. The details of thisisare out of scope for this document andisare specified in [4]. 11.1. Sending ULP Payload after a Switch When sending packets, if there is a ULID-pair context for the ULID pair, and if the ULID pair is no longer used as the locator pair, then the sender needs to transform the packet. Apart from replacing the IPv6sourceSource anddestinationDestination fields with a locator pair, an 8-octet header is added so that the receiver can find the context and inverse the transformation. If there has been a failure causing a switch, and later the context switches back to sending things using the ULID pair as the locator pair, then there is no longer a need to do any packet transformation by thesender, hencesender; hence, there is no need to include the 8-octetextensionExtension header. First, the IP address fields are replaced. The IPv6source addressSource Address field is set to Lp(local) and thedestination addressDestination Address field is set to Lp(peer).NOTENote that this MUST NOT cause any recalculation of the ULP checksums, since the ULP checksums are carried end-to-end and the ULP pseudo-header contains the ULIDswhichthat are preserved end-to-end. The sender skips any"routing sub-layer extension"Routing Sublayer Extension headers" that the ULP might haveincluded, thusincluded; thus, it skips anyhop-by-hop extensionHop-by-Hop Extension header, anyroutingRouting header, and anydestination optionsDestination Options header that is followed by aroutingRouting header. After any suchheadersheaders, the Shim6extensionExtension header will be added. This might be before a Fragment header, a Destination Options header, an ESP or AH header, or a ULP header. The inserted Shim6 PayloadextensionExtension header includes the peer'scontext tag.Context Tag. It takes on thenext headerNext Header value from the precedingextensionExtension header, since thatextensionExtension header will have anext headerNext Header value of Shim6. 12. Receiving Packets The receive side of the communication can receive packets associated to a Shim6contextcontext, with or without the Shim6extensionExtension header. In casethatthe ULID pair is being used as a locator pair, the packets received will not have the Shim6extensionExtension header and will be processed by the Shim6 layer as described below. If the received packet does carry the Shim6extensionExtension header, as in normal IPv6receive sidereceive-side packetprocessingprocessing, the receiver parses the (extension) headers in order. Should it find a Shim6extension headerExtension header, it will look at the "P" field in that header. If this bit is zero, then the packet must be passed to the Shim6 payload handling for rewriting. Otherwise, the packet is passed to the Shim6 control handling. 12.1. ReceivingpayloadPayload withoutextension headersExtension Headers The receiver extracts the IPv6sourceSource anddestination fields,Destination fields and uses this to find a ULID-pair context, such that the IPv6 address fields match the ULID(local) and ULID(peer). If such a context is found, the context appears not to bequiescent andquiescent; this should be remembered in order to avoid tearing down the context and for reachability detection purposes as described in [4]. The host continues with the normal processing of the IP packet. 12.2. Receiving Shim6 Payload Extension Headers The receiver extracts thecontext tagContext Tag from thepayload extension header,Shim6 Payload Extension header and uses this to find a ULID-pair context. If no context is found, the receiver SHOULD generateaan R1bis message (see Section 7.17). Then, depending on the STATE of the context: o IfESTABLISHED: ProceedESTABLISHED, proceed to process message. o If I1-SENT, discard the message and stay in I1-SENT. o If I2-SENT,thensend I2 and proceed to process the message. o If I2BIS-SENT,thensend I2bis and proceed to process the message. With the context in hand, the receiver can now replace the IP address fields with the ULIDs kept in the context. Finally, the Shim6 PayloadextensionExtension header is removed from the packet (so that the ULP doesn't get confused by it), and thenext headerNext Header value in the preceding header is set to be the actual protocol number for the payload. Then the packet can be passed to the protocol identified by thenext headerNext Header value (which might be some function associated with the IP endpointsublayer,sublayer or a ULP). If the host is using some heuristic for determining when to perform a deferred context establishment, then the host might need to do some accounting (count the number of packets sent and received) for packets thatdoesdo not have a Shim6extensionExtension header and for which there is no context. But the need for this depends on what heuristics the implementation has chosen. 12.3. Receiving Shim ControlmessagesMessages A shim control message has thechecksumChecksum field verified. The Shimheader lengthHeader Length field is also verified against the length of the IPv6 packet to make sure that the shim message doesn't claim to end past the end of the IPv6 packet. Finally, it checks thattheneither the IPv6destinationDestination field nor the IPv6sourceSource field is a multicast addressnor theor an unspecified address. If any of those checks fail, the packet is silently dropped. The message is then dispatched based on the shim message type. Each message type is then processed as described elsewhere in this document. If the packet contains a shim message typewhichthat is unknown to the receiver, then a Shim6 ErrorMessagemessage with Error Code=0 is generated and sent back. The Pointer field is set to point at the first octet of the shim message type. All the control messages can contain any options with C=0. If there is any option in the message with C=1 that isn't known to the host, then the host MUST send a Shim6 ErrorMessagemessage with ErrorCode=1,Code=1 with the Pointer field referencing the first octet of the Option Type. 12.4. Context Lookup We assume that each shim context has its own STATE machine. We assume that a dispatcher delivers incoming packets to the STATE machine that it belongs to.HereHere, we describe the rules used for the dispatcher to deliver packets to the correct shim context STATE machine. There is one STATE machine percontextidentified context that is conceptually identified by the ULID pair and Forked Instance Identifier (which is zero bydefault),default) or identified by CT(local). However, the detailed lookup rules are more complex, especially during context establishment. Clearly, if the required context is not established, it will be in IDLE STATE. During context establishment, the context is identified as follows: o I1 packets: Deliver to the context associated with the ULID pair and the Forked Instance Identifier. o I2 packets: Deliver to the context associated with the ULID pair and the Forked Instance Identifier. o R1 packets: Deliver to the context with the locator pair included in the packet and the InitiatornonceNonce included in the packet (R1 does not contain a ULID pairnoror the CT(local)). If no contextexistexists with this locator pair and Initiatornonce,Nonce, then silently discard. o R2 packets: Deliver to the context with the locator pair included in the packet and the InitiatornonceNonce included in the packet (R2 does not contain a ULID pairnoror the CT(local)). If no context exists with this locator pair andINIT nonce,Initiator Nonce, then silently discard. o R1bispacket: deliverpackets: Deliver to the context that has the locator pair and the CT(peer) equal to the Packet Context Tag included in the R1bis packet. o I2bis packets: Deliver to the context associated with the ULID pair and the Forked Instance Identifier. o Shim6 PayloadextensionExtension headers: Deliver to the context with CT(local) equal to the Receiver Context Tag included in the packet. o Other control messages (Update, Keepalive, Probe): Deliver to the context with CT(local) equal to the Receiver Context Tag included in the packet. Verify that the IPv6source addressSource Address field is part of Ls(peer) and that the IPv6destination addressDestination Address field is part of Ls(local). If not, sendaan R1bis message. o Shim6 ErrorMessagesmessages and ICMP errorswhichthat contain a Shim6payload extensionPayload Extension header or other shim control packet in the "packet in error": Use the "packet in error" for dispatching as follows. Deliver to the context with CT(peer) equal to the Receiver ContextTag,Tag -- Lp(local) being the IPv6 sourceaddress,address and Lp(peer) being the IPv6 destination address. In addition, the shim on the sending side needs to be able to find the context state when a ULP packet is passed down from the ULP. In thatcasecase, the lookup key is the pair of ULIDs and FII=0. If we have a ULP API that allows the ULP to do context forking, then presumably the ULP would pass down the Forked Instance Identifier. 13. Initial Contact The initial contact is some non-shim communication between two ULIDs, as described in Section 2. At that point intimetime, there is no activity in the shim. Whether or not the shim ends up being usedor not(e.g., the peer might not supportShim6)Shim6), it is highly desirable that the initial contact can be established even if there is a failure for one or more IP addresses. The approach taken is to rely on the applications and the transport protocols to retry with different source and destination addresses, consistent with what is already specified inDefault"Default Address Selection[7], andfor IPv6" [7] as well as with some fixes to that specification[8][9], to make it try different source addresses and not only different destination addresses. The implementation of such an approach can potentially result in long timeouts. For instance, consider a naive implementation at the socket APIwhichthat uses getaddrinfo() to retrieve all destination addresses and then tries to bind() and connect() to try all source and destination address combinationswaitingand waits for TCP to time out for each combination before trying the next one. However, if implementations encapsulate this in some new connect-by- name()API,API and use non-blocking connect calls, it is possible to cycle through the available combinations in a more rapid manner until a working source and destination pair is found.ThusThus, the issues in this domain are issues of implementations and the current socket API, and not issues of protocol specification. In all honesty, while providing an easy to use connect-by-name() API for TCP and other connection-oriented transports iseasy;easy, providing a similar capability at the API for UDP is hard due to the protocol itself not providing any "success" feedback.ButYet, even the UDP issue is one of APIs and implementation. 14. ProtocolconstantsConstants The protocol uses the following constants: I1_RETRIES_MAX = 4 I1_TIMEOUT = 4 seconds NO_R1_HOLDDOWN_TIME = 1 min ICMP_HOLDDOWN_TIME = 10 min I2_TIMEOUT = 4 seconds I2_RETRIES_MAX = 2 I2bis_TIMEOUT = 4 seconds I2bis_RETRIES_MAX = 2 VALIDATOR_MIN_LIFETIME = 30 seconds UPDATE_TIMEOUT = 4 seconds MAX_UPDATE_TIMEOUT = 120 seconds The retransmit timers (I1_TIMEOUT, I2_TIMEOUT, UPDATE_TIMEOUT) are subject to binary exponentialbackoff,backoff as well as to randomization across a range of 0.5 and 1.5 times the nominal (backed off) value. This removes any risk of synchronization between lots of hosts performing independent shim operations at the same time. The randomization is applied after the binary exponential backoff.ThusThus, the first retransmission would happen based on a uniformly distributed random number in the range of [0.5*4, 1.5*4]seconds,seconds; the secondretransmissionretransmission, [0.5*8, 1.5*8] seconds after the first one, etc. 15. Implications Elsewhere 15.1. Congestion Control Considerations When the locator pair currently used for exchanging packets in a Shim6 context becomes unreachable, the Shim6 layer will divert the communication through an alternative locator pair, which in most cases will result in redirecting the packet flow through an alternative network path. In this case, it is recommended that the Shim6 follows the recommendation defined in[20][21] anditinforms the upper layers about the path change, in order to allow the congestion control mechanisms of the upper layers to react accordingly. 15.2.Middle-boxes considerationsMiddle-Boxes Considerations Data packets belonging to a Shim6 context carrying the Shim6 PayloadHeaderheader contain alternative locators other than the ULIDs in thesourceSource anddestination addressDestination Address fields of the IPv6 header. On the other hand, the upper layers of the peers involved in the communication operate on the ULID pair presented to them by the Shim6layer to them,layer, rather than on the locator pair contained in the IPv6 header of the actual packets. It should be noted that the Shim6 layer does not modify the datapackets, butpackets but, because a constant ULID pair is presented to upper layers irrespective of the locator pair changes, the relation between theupper layerupper-layer header (such as TCP, UDP, ICMP, ESP, etc) and the IPv6 header is modified. In particular, when the Shim6 Extension header is present in the packet, if those data packets are TCP,UDPUDP, or ICMP packets, thepseudoheaderpseudo-header used for the checksum calculation will contain the ULID pair, rather than the locator pair contained in the data packet. It is possible that some firewalls or othermiddle boxesmiddle-boxes will try to verify the validity ofupper layerupper-layer sanity checks of the packet on the fly. If they do that based on the actual source and destination addresses contained in the IPv6 header without considering the Shim6 context information (inparticularparticular, without replacing the locator pair by the ULID pair used by the Shim6context)context), such verifications may fail. Those middle-boxes need to be updated in order to be able to parse the Shim6payloadPayload header and find the nextheader header after that.header. It is recommended that firewalls and other middle-boxes do not drop packets that carry the Shim6 Payload header with apparently incorrectupperupper- layer validity checks that involve the addresses in the IPv6 header for their computation, unless they are able to determine the ULID pair of the Shim6 context associated to the data packet and use the ULID pair for the verification of the validity check. In the particular case of TCP,UDPUDP, and ICMP checksums, it is recommended that firewalls and other middle-boxes do not drop TCP,UDPUDP, and ICMP packets that carry the Shim6 Payload header with apparently incorrect checksums when using the addresses in the IPv6 header for thepseudoheaderpseudo-header computation, unless theyimplementare able to determine the ULID pair of the Shim6 context associated to the data packet and use the ULID pair to determine the checksum that must be present in a packet with addresses rewritten by Shim6. In addition, firewalls that today pass limited traffic, e.g., outbound TCP connections, would presumably block the Shim6 protocol. This means that even whenShim6 capableShim6-capable hosts are communicating, the I1 messages would bedropped, hencedropped; hence, the hosts would not discover that their peer isShim6 capable.Shim6-capable. Thisisis, infactfact, afeature, sincebenefit since, if the hosts managed to establish a ULID-pair context,thenthe firewall would probably drop the "different" packets that are sent after a failure (those using the Shim6payload extensionPayload Extension header with a TCP packet inside it).ThusThus, stateful firewalls that are modified to pass Shim6 messages should also be modified to pass thepayload extension header,Shim6 Payload Extension header so that the shim can use the alternate locators to recover from failures. This presumably implies that the firewall needs to track the set of locators in use by looking at the Shim6 control exchanges. Such firewalls might even want to verify the locators using the HBA/CGA verification themselves, which they can do without modifying any of the Shim6 packets through which theypass through.pass. 15.3. Operation and Management Considerations This section considers some aspects related to the operations and management of the Shim6 protocol. Deployment ofththe Shim6 protocol: The Shim6 protocol is ahost based solution, so,host-based solution. So, in order to be deployed, the stacks of the hosts using the Shim6 protocol need to be updated to support it. This enables an incremental deployment of theprotocol,protocol since it does notrequiresrequire a flag day for thedeployment,deployment -- just single host updates. If the Shim6 solution will be deployed in a site, the host can be gradually updated to support the solution. Moreover, for supporting the Shim6 protocol, only end hosts need to be updated and no router changes are required. However, it should be notedthatthat, in order to benefit from the Shim6 protocol, both ends of a communication should support the protocol, meaning that both hosts must be updated to be able to use the Shim6 protocol. Nevertheless, the Shim6 protocol uses a deferredcontext setup capability,context-setup capability that allows end hosts to establish normal IPv6 communicationsandand, later on, if both endpoints areShim6-capable, protectShim6- capable, establish thecommunication withShim6 context using the Shim6 protocol. This has an important deployment benefit, sinceShim6 enabledShim6-enabled nodes canperfectlytalk perfectly tonon-Shim6 capablenon-Shim6-capable nodeswihtoutwithout introducing any problemininto the communication. Configuration of Shim6-capable nodes: The Shim6 protocol itself does notrequiresrequire anyspcificspecific configuration to provide its basic features. The Shim6 protocol is designed to provide a default service to upper layers that should satisfy general applications.ThThe Shim6 layer would automatically attempt to protectlong lived communications,long-lived communications by triggering the establishment of the Shim6 context using some predefined heuristics. Of course, if some special tunning is required by some applications, this mayrequiredrequire additional configuration. Similar considerations apply to a site attempting to perform some forms of traffic engineering by using different preferences for different locators. Address and prefix configuration: The Shim6 protocol assumesthatthat, in a multihomedsitesite, multiple prefixes will be available. Such configuration can increase the operation work in a network. However, it should be noted that the capability of havingmultiuplmultiple prefixes in a site and multiple addresses assigned to an interface is an IPv6 capability that goes beyond the Shim6casecase, and it is expected to be widely used. So, even though this is the case for Shim6, we consider that the implications of such a configuration is beyond the particular case of Shim6 and must be addressed for the generic IPv6 case. Nevertheless, Shim6 also assumes the usage of CGA/HBA addresses by Shim6 hosts.thisThis implies thatShim6 capableShim6-capable hosts should configure addresses using HBA/CGA generationmechanims.mechanisms. Additional consideration about this issue can be found at[18][19]. 15.4. OtherconsiderationsConsiderations The general Shim6approach,approach as well as the specifics of this proposedsolution, hassolution have implications elsewhere, including: o Applications that performreferrals,referrals or callbacks using IP addresses as the 'identifiers' can still function in limited ways, as described in[17]. But[18]. But, in order for such applications to be able to take advantage of the multiple locators for redundancy, the applications need to be modified to either usefully qualified domain namesFully Qualified Domain Names as the'identifiers','identifiers' or they need to pass all the locators as the'identifiers''identifiers', i.e., the 'identifier' from theapplicationsapplication's perspective becomes a set of IP addresses instead of a single IP address. o Signaling protocols for QoS or for other things that involve having devices in the network path look at IP addresses and portnumbers, ornumbers (or at IP addresses and FlowLabels,Labels) need to be invoked on the hosts when the locator pair changes due to a failure. At that point intimetime, those protocols need to inform the devices that a new pair of IP addresses will be used for the flow. Note that this is the case even though this protocol, unlike some earlier proposals, does not overload theflow labelFlow Label as acontext tag;Context Tag; the in-path devices need to know about the use of the new locators even though theflow labelFlow Label stays the same. o MTU implications.TheBy computing a minimum over the recently observed path MTUs, the path MTU mechanisms we use are robust against different packets taking different paths through theInternet, by computing a minimum over the recently observed path MTUs.Internet. When Shim6 fails over from using one locator pair toanother pair,another, this means that packets might travel over a different path through theInternet, henceInternet; hence, the path MTU might be quite different. In order to deal with thischangeschange in the MTU, the usage of Packetization Layer Path MTU Discovery as defined in[23][24] isreccommended.recommended. The fact that the shim will add an8 octet8-octet Shim6 Payload Extension header to the ULP packets after a locatorswitch,switch can also affect the usable path MTU for the ULPs. In thiscasecase, the MTU change is local to the sendinghost, thushost; thus, conveying the change to the ULPs is an implementation matter. By conveying the information to the transport layer, it can adapt and reduce theMSSMaximum Segment Size (MSS) accordingly. 16. Security Considerations This document satisfies the concerns specified in[14][15] as follows: o The HBA[2][3] and CGAtechnique [3][2] techniques for verifying the locators to prevent an attacker from redirecting the packet stream to somewhere else,preventingprevent threats described insectionsSections 4.1.1, 4.1.2,4.1.34.1.3, and 4.2 of[14].[15]. These twoapproachestechniques provide a similar level of protection buttheyalso provide different functionality withadifferent computationalcost.costs. The HBA mechanism relies on the capability of generating all the addresses of a multihomed host as an unalterable set of intrinsically bound IPv6 addresses, known as an HBA set. In this approach, addresses incorporate a cryptographic one-way hash of theprefix-setprefix set available into theinterfaceinterfae identifier part. The result is that the binding between all the available addresses is encoded within the addresses themselves, providing hijacking protection. Any peer using the shim protocol node can efficiently verify that the alternative addresses proposed for continuing the communication are bound to the initial address through a simple hash calculation. In aCGA based approachCGA-based approach, the address used as the ULID is a CGA that contains a hash of a public key in its interface identifier. The result is a secure binding between the ULID and the associated key pair. This allows each peer to use the corresponding private key to sign the shim messages that convey locator set information. The trust chain in this case is the following: the ULID used for the communication is securely bound to the key pair because it contains the hash of the public key, and the locator set is bound to the public key through the signature.AnyEither of these twomechanismsmechanisms, HBA andCGA provide time- shiftedCGA, provides time-shifted attack protection (as described insectionSection 4.1.2 of[14]),[15]), since the ULID is securely bound to a locator set that can only be defined by the owner of the ULID. The minimum acceptable key length for RSA keys used in the generation of CGAs MUST be at least 1024 bits. Any implementation should follow prudent cryptographic practice in determining the appropriate key lengths. o 3rd party floodingattacksattacks, described insectionSection 4.3 of[14][15], are prevented by requiring a Shim6 peer to perform a successful Reachability probe + reply exchange before accepting a new locator for use as a packetdestination..destination. o The first message does not create any state on the responder.EssentiallyEssentially, a 3-way exchange is required before the responder creates any state. This means that a state-based DoS attack (trying to use up allofmemory on the responder) at least requires the attacker to create state, consuming his ownresources and alsoresources; it also provides an IPv6 address that the attacker was using. o Thecontext establishmentcontext-establishment messages use nonces to prevent replayattacks asattacks, which are described insectionSection 4.1.4 of[14],[15], and to preventoff- pathoff-path attackers from interfering with the establishment. o Every control message of the Shim6 protocol, past the context establishment, carry thecontext tagContext Tag assigned to the particular context. This implies that an attacker needs to discover thatcontext tagContext Tag before being able to spoof any Shim6 control message as described insectionSection 4.4 of[14].[15]. Such discovery probably requires an attacker to be along the path in order tobesniff thecontext tagContext Tag value. The result isthatthat, through this technique, the Shim6 protocol is protected against off-path attackers. 16.1. Interaction with IPSec Shim6 has two modes of processing data packets. If the ULID pair isas wellalso the locator pair being used, then the data packet is not modified by Shim6. In this case, the interaction with IPSec is exactly the same as if the Shim6 layer was not present in the host. If the ULID pair differs from the current locator pair for that Shim6 context, then Shim6 will take the data packet, replace the ULIDs contained in the IPsourceSource anddestination addressDestination Address fieldsbywith the current locatorpairpair, and add the Shim6 extension with thecorrespondentcorresponding Context Tag. In this case, asitis mentioned insection 1.6,,Section 1.6, Shim6 conceptually works as a tunnelmechanismmechanism, where the inner header contains the ULID and the outer header contains the locators. The main differencebeingis that the inner header is "compressed" and a compression tag, namely the Contexttag,Tag, is added to decompress the inner header at the receiving end. In this case, the interaction between IPSec and Shim6 is then similar to the interaction between IPSec and a tunnel mechanism. When the packet is generated by theupper layer protocolupper-layer protocol, it is passed to the IP layer containing the ULIDs in the IPsourceSource anddestinationDestination field. IPSec is then applied to this packet.Then,Then the packet is passed to the Shim6sub-layer,sublayer, which "encapsulates" the received packet and includes a new IP header containing the locator pair in the IPsourceSource anddestinationDestination field. This new IP packet is in turn passed to IPSec for processing, just as in the case of a tunnel. This can be viewed as if IPSec is located both above and below the Shim6 sublayer andthatas if IPSec policies apply both to ULIDs and locators. When IPSec processed the packet after the Shim6 sublayer has processed iti.e.(i.e., the packet carrying the locators in the IPsourceSource anddestination address field,Destination Address field), the Shim6 sublayer may have added the Shim6extensionExtension header. In that case, IPSec needs to skip the Shim6extensionExtension header to find the selectors for the nextlayerlayer's protocols (e.g., TCP, UDP, Stream Control Transmission Protocol(SCTP))(SCTP)). When a packet is received at the other end, it is processed based on the order of the extension headers.ThusThus, if an ESP or AH header precedes a Shim6headerheader, that determines the order. Shim6 introduces the need to do policy checks, analogous to how they are done for tunnels, when Shim6 receives a packetaand the ULID pair forthethat packet is not identical to the locator pair in the packet. 16.2. Residual Threats Some of the residual threats in this proposal are: o An attackerwhichthat arrives late on the path (after the context has been established) can use the R1bis message to cause one peer torecreatere-create thecontext, andcontext and, at that point intime the attackertime, can observe all of the exchange. But this doesn't seem to open any new doors for the attacker since such an attacker can observe thecontext tagsContext Tags that are beingused, andused and, onceknown itknown, can use those to send bogus messages. o An attackerwhich ispresent on the pathso that it canin order to find out thecontext tags,Context Tags can generateaan R1bis message after it has moved off the path. For this packet to beeffectiveeffective, it needs to have a source locatorwhichthat belongs to thecontext, thuscontext; thus, therecan notcannot be "too much" ingress filtering between theattackersattacker's new location and the communicating peers. But this doesn't seem to be thatsevere, becausesevere because, once the R1bis causes the context to bere- established,re-established, a new pair ofcontext tagsContext Tags will be used, which will not be known to the attacker. If this is still a concern, we could require a 2-wayhandshakehandshake, "did you really lose thestate?"state?", in response to the error message. o It might be possible for an attacker to try random 47-bitcontext tagsContext Tags and see if they can cause disruption for communication between two hosts. In particular, in the case of payload packets, the effects of such an attack would be similarofto those of an attacker sending packets with a spoofed source address. In the case of control packets, it is not enough to find the correctcontext tag, butContext Tag -- additional information is required(e.g.(e.g., nonces, proper sourceaddresses) (seeaddresses; see previous bullet for the case of R1bis). If a 47-bit tag, which is the largest that fits in an 8-octetextensionExtension header, isn't sufficient, one could use an even larger tag in the Shim6 controlmessages,messages and use the low-order 47 bits in thepayload extensionShim6 Payload Extension header. o When thepayload extensionShim6 Payload Extension header is used, an attacker that can guess the 47-bit randomcontext tag,Context Tag can inject packets into the context with any source locator.ThusThus, if there is ingress filtering between theattacker,attacker and its target, this could potentially allow the attacker to bypass the ingress filtering. However, in addition to guessing the 47-bitcontext tag,Context Tag, the attacker also needs to find a context where, after the receiver's replacement of the locators with the ULIDs, thetheULP checksum is correct. But even this wouldn't be sufficient with ULPs like TCP, since the TCP port numbers and sequence numbers must match an existing connection. Thus, even though the issues for off-path attackers injecting packets are different than today with ingress filtering, it is still very hard for an off-path attacker to guess. If IPsec isappliedapplied, then the issue goes away completely. o The validator included in the R1 and R1bis packetsareis generated as a hash of several input parameters. While most of the inputs are actually determined by the sender, and only the secret value S is unknown to the sender, the resulting protection is deemed to be enough since it would be easier for the attacker to just obtain a new validator by sendingaan I1 packet thanperformingto perform all the computations required to determine the secret S. Nevertheless, it is recommended that the hostchangeschange the secret S periodically. 17. IANA Considerations IANAis directed to allocateallocated a new IP Protocol Number value (140) for the Shim6 Protocol. IANAis directed to recordrecorded a CGA message type for the Shim6Protocolprotocol in the CGA Extension Type Tags registry with the value 0x4A30 5662 4858 574B 3655 416F 506A 6D48. IANAis directed to establishestablished a Shim6 Parameter Registry withthreefour components: Shim6 Type registrations, Shim6 Optionsregistrationsregistrations, Shim6 Error Code registrations, and Shim6 Verification Method registrations. The initial contents of the Shim6 Type registry are as follows: +------------+-----------------------------------------------------+ | Type Value | Message | +------------+-----------------------------------------------------+ | 0 | RESERVED | || | |1 | I1 (first establishment message from the initiator) | || | |2 | R1 (first establishment message from the responder) | || | |3 | I2 (2nd establishment message from the initiator) | || | |4 | R2 (2nd establishment message from the responder) | || | |5 | R1bis (Reply to reference to non-existent context) | || | |6 | I2bis (Reply to a R1bis message) | || | |7-59 |Can be allocatedAllocated using StandardsAction | | |action | | 60-63 | For Experimental use | || | |64 | Update Request | || | |65 | Update Acknowledgement | || | |66 | Keepalive | || | |67 | Probe Message | | 68 | Error Message | |68-12369-123 |Can be allocatedAllocated using StandardsAction | | |action | | 124-127 | For Experimental use | +------------+-----------------------------------------------------+ The initial contents of the Shim6 Options registry are as follows: +-------------+----------------------------------+ | Type | Option Name | +-------------+----------------------------------+ | 0 | RESERVED | || | |1 | Responder Validator | || | |2 | Locator List | || | |3 | Locator Preferences | || | |4 | CGA Parameter Data Structure | || | |5 | CGA Signature | || | |6 | ULID Pair | || | |7 | Forked Instance Identifier | || | |8-9 | Allocated using Standards action | || | |10 | Keepalive Timeout Option | || | |11-16383 | Allocated using Standards action | || | |16384-32767 | For Experimental use | +-------------+----------------------------------+ The initial contents of the Shim6 Error Code registry are as follows: +------------+--------------------------------------------+ | Code Value | Description | +------------+--------------------------------------------+ | 0 | Unknown Shim6 message type | || | |1 | Critical Option not recognized | || | |2 | Locator verification method failed | || | |3 | Locator List Generation number out of sync | || | |4 | Error in the number of locators | | 5-19 | Allocated using Standards action | | 120-127 | Reserved for debugging purposes | +------------+--------------------------------------------+18. Acknowledgements Over the years many people active inThe initial contents of themulti6 and shim6 WGs have contributed ideas a suggestions thatShim6 Verification Method registry arereflected in this specification. Special thanks to the carefulas follows: +---------+----------------------------------+ | Value | Verification Method | +---------+----------------------------------+ | 0 | RESERVED | | 1 | CGA | | 2 | HBA | | 7-200 | Allocated using Standards action | | 201-254 | For Experimental use | | 255 | RESERVED | +---------+----------------------------------+ 18. Acknowledgements Over the years, many people active in the multi6 and shim6 WGs have contributed ideas and suggestions that are reflected in this specification. Special thanks to the careful comments from Sam Hartman, Cullen Jennings, Magnus Nystrom, Stephen Kent, Geoff Huston, Shinta Sugimoto, Pekka Savola, Dave Meyer, Deguang Le, Jari Arkko, Iljitsch van Beijnum, Jim Bound, Brian Carpenter, Sebastien Barre, Matthijs Mekking, Dave Thaler, BobBradenBraden, Wesley Eddy,Pari EronenPasi Eronen, and Tom Henderson on earlier versions of this document. 19.Appendix:References 19.1. Normative References [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [2] Aura, T., "Cryptographically Generated Addresses (CGA)", RFC 3972, March 2005. [3] Bagnulo, M., "Hash-Based Addresses (HBA)", RFC 5535, May 2009. [4] Arkko, J. and I. van Beijnum, "Failure Detection and Locator Pair Exploration Protocol for IPv6 Multihoming", RFC 5534, May 2009. 19.2. Informative References [5] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS RR for specifying the location of services (DNS SRV)", RFC 2782, February 2000. [6] Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", BCP 38, RFC 2827, May 2000. [7] Draves, R., "Default Address Selection for Internet Protocol version 6 (IPv6)", RFC 3484, February 2003. [8] Nordmark, E., "Multihoming without IP Identifiers", Work in Progress, July 2004. [9] Bagnulo, M., "Updating RFC 3484 for multihoming support", Work in Progress, November 2007. [10] Schulzrinne, H., Casner, S., Frederick, R., and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications", STD 64, RFC 3550, July 2003. [11] Abley, J., Black, B., and V. Gill, "Goals for IPv6 Site- Multihoming Architectures", RFC 3582, August 2003. [12] Rajahalme, J., Conta, A., Carpenter, B., and S. Deering, "IPv6 Flow Label Specification", RFC 3697, March 2004. [13] Eastlake, D., Schiller, J., and S. Crocker, "Randomness Requirements for Security", BCP 106, RFC 4086, June 2005. [14] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast Addresses", RFC 4193, October 2005. [15] Nordmark, E. and T. Li, "Threats Relating to IPv6 Multihoming Solutions", RFC 4218, October 2005. [16] Huitema, C., "Ingress filtering compatibility for IPv6 multihomed sites", Work in Progress, September 2005. [17] Bagnulo, M. and E. Nordmark, "SHIM - MIPv6 Interaction", Work in Progress, July 2005. [18] Nordmark, E., "Shim6-Application Referral Issues", Work in Progress, July 2005. [19] Bagnulo, M. and J. Abley, "Applicability Statement for the Level 3 Multihoming Shim Protocol (Shim6)", Work in Progress, July 2007. [20] Moskowitz, R., Nikander, P., Jokela, P., and T. Henderson, "Host Identity Protocol", RFC 5201, April 2008. [21] Schuetz, S., Koutsianas, N., Eggert, L., Eddy, W., Swami, Y., and K. Le, "TCP Response to Lower-Layer Connectivity-Change Indications", Work in Progress, February 2008. [22] Williams, N. and M. Richardson, "Better-Than-Nothing Security: An Unauthenticated Mode of IPsec", RFC 5386, November 2008. [23] Komu, M., Bagnulo, M., Slavov, K., and S. Sugimoto, "Socket Application Program Interface (API) for Multihoming Shim", Work in Progress, November 2008. [24] Mathis, M. and J. Heffner, "Packetization Layer Path MTU Discovery", RFC 4821, March 2007. [25] Bonica, R., Gan, D., Tappan, D., and C. Pignataro, "Extended ICMP to Support Multi-Part Messages", RFC 4884, April 2007. Appendix A. Possible Protocol Extensions During the development of this protocol, several issues have been brought upasthat are importantonetoaddress,address butare onesthat do not need to be in the base protocolitself butitself; instead, these caninsteadbe done as extensions to the protocol. The key ones are: o As stated in the assumptions in Section 3,thein order for the Shim6 protocol to be able to recover from a wide range offailures, for instancefailures (for instance, when one of the communicating hosts issingle-homed,single-homed) and to cope with a site's ISPs that do ingress filtering based on the source IPv6 address, there is a need for the host to be able to influence the egress selection from its site. Further discussion of this issue is captured in[15].[16]. o Is there need for keeping the list of locators private between the two communicating endpoints? We can potentially accomplish that when using CGA (not when using HBA), butnot with HBA, but it comesonly at the cost of doing some public key encryption and decryption operations as part of the context establishment. The suggestion is to leave this for a future extension to the protocol. o Defining some form of end-to-end "compression" mechanism that removes the needfor includingto include the Shim6 PayloadextensionExtension header when the locator pair is not the ULID pair. o Supporting the dynamic setting of locator preferences on a site- widebasis,basis anduseusing the Locator Preference option in the Shim6 protocol to convey these preferences to remote communicating hosts. This could mirror the DNS SRV record's notion of priority and weight. o Specifying APIs in order for the ULPs to be aware of the locators that the shim isusing,using and to be able to influence the choice of locators (controlling preferences as well as triggering alocatorlocator- pair switch). This includes providing APIs that the ULPs can use to fork a shim context. oWhetherDetermining whether it is feasible to relax the suggestions for when context state isremoved,removed so that one can end up with an asymmetric distribution of the context state and still get (most of) the shim benefits. For example, the busy server would go through the context setup but would quickly remove the context state after this (in order to savememory) butmemory); however, thenot-so-busynot-so- busy client would retain the context state. Thecontext recoverycontext-recovery mechanism presented in Section 7.5 would thenbe recreatere-create the state should the client send either a shim control message (e.g.,probeProbe message because it sees aproblem),problem) or a ULP packet inan payload extensiona Shim6 Payload Extension header (because it had earlier failed over to an alternative locatorpair,pair but had been silent for a while). This seems to provide the benefits of the shim as long as the client can detect the failure. If the client doesn't sendanything,anything and it is the server that tries to send, then it will not be able to recover because the shim on the server has no contextstate,state and hence doesn't know any alternate locator pairs. o Study what it would take to make the Shim6 control protocol not rely at all on a stable source locator in the packets. This can probably be accomplished by having all the shim control messages include the ULID-pair option. o If each host might have lots of locators, then thecurrentlycurrent requirement to include essentially all of them in the I2 and R2 messages might be constraining. If this is thecasecase, we can look into using the CGA Parameter Data Structure for the comparison, instead of the prefix sets, to be able to detect context confusion. This would place some constraint on a (logical) onlyusing e.g.,using, for example, one CGA publickey, andkey; it would also require some carefully crafted rules on how two PDSs are compared for "being the same host". But if we don't expect more than a handful of locators per host, then we don't need this added complexity. oULP specifiedULP-specified timers for the reachability detection mechanism (which can beusefulparticularly useful when there are forked contexts). o Pre-verify some "backup" locator pair, so that the failover time can be shorter. o Study how Shim6 and Mobile IPv6 mightinteract. There existing an initial draft on this topic [16]. 20. Appendix:interact [17]. Appendix B. Simplified STATE Machine TheSTATESSTATEs are defined in Section 6.2. The intent isthatfor the stylized description below to be consistent with the textual description in thespecification, butspecification; however, should they conflict, the textual description is normative. The following table describes the possible actions in STATE IDLE and their respective triggers: +---------------------+---------------------------------------------+ | Trigger | Action | +---------------------+---------------------------------------------+ | Receive I1 | Send R1 and stay in IDLE | | | | | Heuristics trigger | Send I1 and move to I1-SENT | | a new context | | | establishment | | | | | | Receive I2, verify | If successful, send R2 and move to | | validator and | ESTABLISHED | | RESPnonceNonce | | | | If fail, stay in IDLE | | | | | Receive I2bis, | If successful, send R2 and move to | | verify validator | ESTABLISHED | | and RESPnonceNonce | | | | If fail, stay in IDLE | | | | | R1, R1bis, R2 | N/A (This context lacks the required info | | | for the dispatcher to deliver them) | | | | | ReceivepayloadPayload | Send R1bis and stay in IDLE | |extensionExtension header | | | or other control | | | packet | | +---------------------+---------------------------------------------+ The following table describes the possible actions in STATE I1-SENT and their respective triggers: +---------------------+---------------------------------------------+ | Trigger | Action | +---------------------+---------------------------------------------+ | Receive R1, verify | If successful, send I2 and move to I2-SENT | | INITnonceNonce | | | | If fail, discard and stay in I1-SENT | | | | | Receive I1 | Send R2 and stay in I1-SENT | | | | | Receive R2, verify | If successful, move to ESTABLISHED | | INITnonceNonce | | | | If fail, discard and stay in I1-SENT | | | | | Receive I2, verify | If successful, send R2 and move to | | validator and RESP | ESTABLISHED | |nonceNonce | | | | If fail, discard and stay in I1-SENT | | | | | Receive I2bis, | If successful, send R2 and move to | | verify validator | ESTABLISHED | | and RESPnonceNonce | | | | If fail, discard and stay in I1-SENT | | | | | Timeout, increment | If counter =< I1_RETRIES_MAX, send I1 and | | timeout counter | stay in I1-SENT | | | | | | If counter > I1_RETRIES_MAX, go to E-FAILED | | | | | Receive ICMP payload| Move to E-FAILED | | unknown error | | | | | | R1bis | N/A (Dispatcher doesn't deliver since | | | CT(peer) is not set) | | | | | Receive Payloador| Discard and stay in I1-SENT | |extensionExtension header | | | or other control | | | packet | | +---------------------+---------------------------------------------+ The following table describes the possible actions in STATE I2-SENT and their respective triggers: +---------------------+---------------------------------------------+ | Trigger | Action | +---------------------+---------------------------------------------+ | Receive R2, verify | Ifsuccessfulsuccessful, move to ESTABLISHED | | INITnonceNonce | | | | If fail, stay in I2-SENT | | | | | Receive I1 | Send R2 and stay in I2-SENT | | | | | ReceiveI2I2, | Send R2 and stay in I2-SENT | | verify validator | | | and RESPnonceNonce | | | | | | ReceiveI2bisI2bis, | Send R2 and stay in I2-SENT | | verify validator | | | and RESPnonceNonce | | | | | | Receive R1 | Discard and stay in I2-SENT | | | | | Timeout, increment | If counter =< I2_RETRIES_MAX, send I2 and | | timeout counter | stay in I2-SENT | | | | | | If counter > I2_RETRIES_MAX, send I1 and go | | | to I1-SENT | | | | | R1bis | N/A (Dispatcher doesn't deliver since | | | CT(peer) is not set) | | | | | Receivepayload orPayload | Accept and send I2 (probably R2 was sent | |extensionExtension header | by peer and lost) | | or other control | | | packet | | +---------------------+---------------------------------------------+ The following table describes the possible actions in STATE I2BIS- SENT and their respective triggers: +---------------------+---------------------------------------------+ | Trigger | Action | +---------------------+---------------------------------------------+ | Receive R2, verify | Ifsuccessfulsuccessful, move to ESTABLISHED | | INITnonceNonce | | | | If fail, stay in I2BIS-SENT | | | | | Receive I1 | Send R2 and stay in I2BIS-SENT | | | | | ReceiveI2I2, | Send R2 and stay in I2BIS-SENT | | verify validator | | | and RESPnonceNonce | | | | | | ReceiveI2bisI2bis, | Send R2 and stay in I2BIS-SENT | | verify validator | | | and RESPnonceNonce | | | | | | Receive R1 | Discard and stay in I2BIS-SENT | | | | | Timeout, increment | If counter =< I2_RETRIES_MAX, send I2bis | | timeout counter | and stay in I2BIS-SENT | | | | | | If counter > I2_RETRIES_MAX, send I1 and | | | go to I1-SENT | | | | | R1bis | N/A (Dispatcher doesn't deliver since | | | CT(peer) is not set) | | | | | Receivepayload orPayload | Accept and send I2bis (probably R2 was | |extensionExtension header | sent by peer and lost) | | or other control | | | packet | | +---------------------+---------------------------------------------+ The following table describes the possible actions in STATE ESTABLISHED and their respective triggers: +---------------------+---------------------------------------------+ | Trigger | Action | +---------------------+---------------------------------------------+ | Receive I1, compare | If no match, send R1 and stay in ESTABLISHED| | CT(peer) with | | | received CT | If match, send R2 and stay in ESTABLISHED | | | | | | | | Receive I2, verify | If successful,thensend R2 and stay in | | validator and RESP | ESTABLISHED | |nonceNonce | | | | Otherwise, discard and stay in ESTABLISHED | | | | | Receive I2bis, | If successful,thensend R2 and stay in | | verify validator | ESTABLISHED | | and RESPnonceNonce | | | | Otherwise, discard and stay in ESTABLISHED | | | | | Receive R2 | Discard and stay in ESTABLISHED | | | | | Receive R1 | Discard and stay in ESTABLISHED | | | | | Receive R1bis | Send I2bis and move to I2BIS-SENT | | | | | | | | Receivepayload orPayload | Process and stay in ESTABLISHED | |extensionExtension header | | | or other control | | | packet | | | | | |ImplementationImplementation- | Discard state and go to IDLE | | specific heuristic | | |(E.g.,(e.g., No open ULP | | | sockets and idle | | | for some time ) | | +---------------------+---------------------------------------------+ The following table describes the possible actions in STATE E-FAILED and their respective triggers: +---------------------+---------------------------------------------+ | Trigger | Action | +---------------------+---------------------------------------------+ | Wait for | Go to IDLE | | NO_R1_HOLDDOWN_TIME | | | | | | Any packet | Process as in IDLE | +---------------------+---------------------------------------------+ The following table describes the possible actions in STATE NO- SUPPORT and their respective triggers: +---------------------+---------------------------------------------+ | Trigger | Action | +---------------------+---------------------------------------------+ | Wait for | Go to IDLE | | ICMP_HOLDDOWN_TIME | | | | | | Any packet | Process as in IDLE | +---------------------+---------------------------------------------+20.1.B.1. Simplified STATE MachinediagramDiagram Timeout/Null +------------+ I1/R1 +------------------| NO SUPPORT | Payload or Control/R1bis | +------------+ +---------+ | ^ | | | ICMP Error/Null| | V V | +-----------------+ Timeout/Null +----------+ | | |<---------------| E-FAILED | | +-| IDLE | +----------+ | I2 or I2bis/R2 | | | ^ | | +-----------------+ (Tiemout#>MAX)/Null| | | ^ | | | | | +------+ | | I2 or I2bis/R2 | | Heuristic/I1| I1/R2 | | Payload/Null | | | Control/Null | | I1/R1 or R2 | +--+ | Payload/Null | | R1 or R2/Null | |Heuristic/Null | (Tiemout#<MAX)/I1 | | +----------+ | | | +--------+ | | | V V | | | V | | +-------------------+ R2/Null | +----------------+ | | I2 or I2bis/R2 +------->| | | ESTABLISHED |<----------------------------| I1-SENT | | | | | +-------------------+ +----------------+ | ^ ^ | ^ ^ | | |R2/Null +-------------+ | | | | +----------+ |R1/I2 | | | | | V | | | | +------------------+ | | | | | |-------------+ | | | | I2-SENT | (Timeout#>Max)/I1 | | | | | | | | +------------------+ | | | | ^ | | | +--------------+ | | | I1 or I2bis or I2/R2 | | | (Timeout#<Max) or Payload/I2 | | | R1 or R1bis/Null | | +-------+ (Timeout#>Max)/I1 | | R2/Null| +------------------------------------------+ | V | | +-------------------+ | | |<-+ (Timeout#<Max)/I2bis +-------->| I2bis-SENT | | I1 or I2 or I2bis/R2 R1bis/I2bis | |--+ R1 or R1bis/Null +-------------------+ Payload/I2bis21. Appendix:Appendix C. Context Tag Reuse The Shim6 protocol doesn't have a mechanism for coordinated state removal between thepeers,peers because such state removal doesn't seem tohelphelp, given that a host can crash and reboot at any time. A result of this is that the protocol needs to be robust against acontext tagContext Tag being reused for some other context. This section summarizes the different cases in which atagTag can be reused, and how the recovery works. The different cases are exemplified by the following case. Assumehosthosts A and B were communicating using a context with the ULID pair <A1, B2>, and that B had assignedcontext tagContext Tag X to this context. We assume that B uses only thecontext tagContext Tag to demultiplex the receivedpayload extensionShim6 Payload Extension headers, since this is the more general case.FurtherFurther, we assume that B removes this context state, while A retains it. B might then at a later time assign CT(local)=X to some other context,andat which time, we have several possible cases: o Thecontext tagContext Tag is reassigned to a context for the same ULID pair <A1, B2>. We've called this"Context Recovery""context recovery" in this document. o Thecontext tagContext Tag is reassigned to a context for a different ULID pair between the sametotwo hosts, e.g., <A3, B3>. We've called this"Context Confusion""context confusion" in this document. o Thecontext tagContext Tag is reassigned to a context between B andotheranother host C, forinstanceinstance, for the ULID pair <C3, B2>. That is a form ofthree partythree-party context confusion.21.1.C.1. Context Recovery This case is relativelysimple,simple and is discussed in Section 7.5. The observation is that since the ULID pair is the same, when either A or B tries to establish the new context, A can keep the old context while B re-creates the context with the samecontext tagContext Tag CT(B) = X.21.2.C.2. Context Confusion Thiscasescase is a bit morecomplex,complex and is discussed in Section 7.6. When the new context is created, whether A or B initiates it, host A can detect when it receives B's locator set (in theI2,I2 or R2message),message) in that it ends up with two contexts to the same peer host (overlapping Ls(peer) locator sets) that have the samecontext tagContext Tag: CT(peer) = X. At this point intimetime, host A can clear up any possibility of causing confusion by not using the old context to send any more packets. It either just discards the old context (it might not be used by any ULP traffic, since B had discardedit),it) or itrecreatesre- creates a different context for the old ULID pair (<A1, B2>), for which B will assign a unique CT(B) as part of the normalcontextcontext- establishment mechanism.21.3. Three PartyC.3. Three-Party Context Confusion The third case does not have a place where the old state on A can beverified,verified since the new context is established between B and C.ThusThus, when B receivespayload extensionShim6 Payload Extension headers with X as thecontext tag,Context Tag, it will find the context for <C3,B2>, henceB2> and, hence, will rewrite the packets to have C3 in thesource addressSource Address field and B2 in thedestination addressDestination Address field before passing them up to the ULP. This rewriting is correct when the packets are in fact sent by host C, but if host A ever happens to send a packet using the old context, then the ULP on A sends a packet with ULIDs <A1, B2> and the packet arrives at the ULP on B with ULIDs <C3, B2>. This is clearly an error, and the packet will most likely be rejected by the ULP on B due to a bad pseudo-header checksum. Even if the checksum isokokay (probability 2^-16), the ULP isn't likely to have a connection for those ULIDs and port numbers. And if the ULP is connection-less, processing the packet is most likely harmless; such a ULP must be able to copy with random packets being sent by random peers in any case. This broken state, where packets are sent from A to B using the old context on hostAA, might persist for sometime,time butitwill not remain for very long. The unreachability detection on host A will kickin,in because it does not see any return traffic (payload or Keepalive messages) for the context. This will result in host A sending Probe messages to host B to find a working locator pair. The effect of this is that host B will notice that it does not have a context for the ULID pair <A1, B2> and CT(B) = X, which will make host B send an R1bis packet to re-establish that context. The re-established context, just like in the previous section, will get a unique CT(B) assigned by hostB, thusB; thus, there will no longer be any confusion.21.4.C.4. Summary In summary, there are cases where acontext tagContext Tag might be reused while some peer retains the state, but the protocol can recover from it. The probability of these events islowlow, given the47 bit context tag47-bit Context Tag size. However, it is important that these recovery mechanisms be tested.ThusThus, during development andtestingtesting, it is recommended that implementations not use the full47 bit space,47-bit space but insteadkeep e.g.keep, for example, the top 40 bits as zero, only leaving the host with 128 uniquecontext tags.Context Tags. This will help test the recovery mechanisms.22. Appendix:Appendix D. Design Alternatives This document has picked a certain set of design choices in order to try to work out a bunch of thedetails,details and to stimulate discussion.ButBut, as has been discussed on the mailing list, there are other choices that make sense. This appendix tries to enumerate some alternatives.22.1.D.1. ContextgranularityGranularity Over theyearsyears, various suggestions have been made whether the shim should, even if it operates at the IP layer, be aware of ULP connections andsessions, andsessions and, as aresultresult, be able to make separate shim contexts for separate ULP connections and sessions. A few different options have been discussed: o Each ULP connection maps to its own shim context. o The shim is unaware of the ULP notion of connections and just operates on a host-to-host (IP address) granularity. o Hybridswherein which the shim is aware of some ULPs (such as TCP) and handles other ULPs on a host-to-host basis. Having shim state for every ULP connection potentially means higher overhead since thestate setupstate-setup overhead might become significant; there is utility in being able to amortize this over multiple connections. But being completely unaware of the ULP connections might hamper ULPs that want different communication to use different locator pairs, forinstanceinstance, for quality or cost reasons. The protocol has a shimwhichthat operates with host-level granularity (strictly speaking, with ULID-pairgranularity,granularity) to be able to amortize the context establishment over multiple ULP connections. This is combined with the ability forshim-awareShim6-aware ULPs to request context forking so that different ULP traffic can use different locator pairs.22.2.D.2. Demultiplexing ofdata packetsData Packets in Shim6communicationsCommunications Once a ULID-pair context is established between two hosts, packets may carry locators that differ from the ULIDs presented to the ULPs using the established context. One of the main functions of the Shim6 layer is to perform the mapping between the locators used to forward packets through the network and the ULIDs presented to the ULP. In order to perform that translation for incoming packets, the Shim6 layer needs to first identify which of the incoming packets need to be translated and then perform the mapping between locators and ULIDs using the associated context. Such operation is calleddemultiplexing."demultiplexing". It should be notedthatthat, because any address can be used both as a locator and as a ULID, additionalinformationinformation, other than the addresses carried in packets,needneeds to be taken into account for this operation. For example, if a host hasaddressaddresses A1 and A2 and starts communicating with a peer with addresses B1 and B2, then some communication (connections) might use the pair <A1, B1> as ULID and others mightuse e.g.,use, for example, <A2, B2>. Initially there are nofailuresfailures, so these address pairs are used aslocators i.e.locators, i.e., in the IP address fields in the packets on the wire. But when there is afailurefailure, the Shim6 layer on A might decide to send packets that used <A1, B1> as ULIDs using <A2, B2> as the locators. In thiscasecase, B needs to be able to rewrite the IP address field for some packets and not others, but the packets all have the same locator pair. In order to accomplish the demultiplexing operation successfully, data packets carry acontext tagContext Tag that allows the receiver of the packet to determine the shim context to be used to perform the operation. Two mechanisms for carrying thecontext tagContext Tag information have been considered in depth during the shim protocoldesign. Thosedesign: those carrying thecontext tagContext Tag in theflow labelFlow Label field of the IPv6 header andthe usage ofthose using a newextensionExtension header to carry thecontext tag.Context Tag. In thisappendixappendix, we will describe the pros and cons of eachapproachmechanism and justify the selected option.22.2.1. Flow-labelD.2.1. Flow Label A possible approach is to carry thecontext tagContext Tag in the Flow Label field of the IPv6 header. This means that when a Shim6 context is established, a Flow Label value is associated with this context (and perhaps a separateflow labelFlow Label for each direction). The simplestapproach that doesway to do this is to have the triple <Flow Label, Source Locator, Destination Locator> identify the context at the receiver. The problem with this approach isthatthat, because the locator sets are dynamic, it is not possible at any given moment to be sure that two contexts for which the samecontext tagContext Tag is allocated will have disjoint locator sets during the lifetime of the contexts. Suppose that Node A has addresses IPA1, IPA2,IPA3IPA3, and IPA4 and that Host B has addresses IPB1 and IPB2. Suppose that two different contexts are established betweenHostAHost A andHostB.Host B. Context #1 is using IPA1 and IPB1 as ULIDs. The locator set associated to IPA1 is IPA1 andIPA2IPA2, while the locator set associated to IPB1 is just IPB1. Context #2 uses IPA3 and IPB2 as ULIDs. The locator set associated to IPA3 is IPA3 andIPA4 andIPA4, while the locator set associated to IPB2 is just IPB2. Because the locator sets oftheContext #1 and Context #2 are disjoint, hosts could think that the samecontext tagContext Tag value can be assigned to both of them. The problem arriveswhenwhen, lateronon, IPA3 is added as a valid locator for IPA1 in Context #2 and IPB2 is added as a valid locator for IPB1 in Context #1. In this case, the triple <Flow Label, Source Locator, Destination Locator> would not identify a unique contextanymoreanymore, and correct demultiplexing is no longer possible. A possible approach to overcome this limitation is to simply nottorepeat the Flow Label values for any communication established in a host. This basically means that each time a new communication that is using different ULIDs is established, a new Flow Label value is assigned to it. Bythis mean,these means, each communication that is using different ULIDs can be differentiated becauseiteach has a different Flow Label value. The problem with such an approach is that it requiresthatthe receiver of the communicationallocatesto allocate the Flow Label value used for incoming packets, in order to assign them uniquely. For this, a shim negotiation of the Flow Label value to use in the communication is needed before exchanging data packets. This poses problems with non-shim capableShim6-capable hosts, since they would not be able to negotiate an acceptable value for the Flow Label. This limitation can be lifted by marking the packets that belong to shim sessions from those that do not. Thesemarkingmarkings would require at least a bit in the IPv6 header that is not currently available, so more creative options would be required, forinstanceinstance, using new Next Header values to indicate that the packet belongs to aShim6 enabledShim6-enabled communication and that the Flow Label carries context information as proposed inthe now expired NOID draft.[8]. However, even if new Next Header values are used in thisis done, thisway, such an approach is incompatible with thedeferred establishmentdeferred-establishment capability of the shim protocol, which is a preferredfunction,function since it suppressesthedelay due totheshim context establishment prior to the initiation ofthe communication and itcommunication. Such capability also allows nodes to define at which stage of the communication they decide, based on their own policies, that a given communication requiresto be protectedprotection by the shim. In order to cope with the identified limitations, an alternative approach that does notconstraintsconstrain theflow labelFlow Label values that are used by communicationsthat areusing ULIDs equal to the locators(i.e.(i.e., no shim translation) is to only require that differentflow labelFlow Label values are assigned to different shim contexts. In suchapproachan approach, communications start with unmodifiedflow labelFlow Label usage (could bezero,zero or as suggested in[11]).[12]). The packets sent after a failure when a different locator pair is used would use a completely differentflow label,Flow Label, and thisflow labelFlow Label could be allocated by the receiver as part of the shim context establishment. Since it is allocated during the context establishment, the receiver of the "failed over" packets can pick aflow labelFlow Label of its choosing (that is unique in the sense that no other context is using it as acontext tag),Context Tag), without any performance impact,andrespectingthatthat, for each locator pair, theflow labelFlow Label value used for a given locator pair doesn't change due to the operation of the multihoming shim. In this approach, the constraint is that Flow Label values being used as context identifiers cannot be used by other communications that use non-disjoint locator sets. This means that oncethata given Flow Label value has been assigned to a shim context that has a certain locator sets associated, the same value cannot be used for other communications that use an address pair that is contained in the locator sets of the context. This is a constraint in the potential Flow Label allocation strategies. A possible workaround to this constraint is to mark shim packets that require translation, in order to differentiate them from regular IPv6 packets, using the artificial Next Header values described above. In this case, the Flow Label values constrained are only those of the packets that are being translated by the shim. This last approach would be the preferred approach if thecontext tagContext Tag is to be carried in the Flow Label field. This is the case not only because it imposes the minimum constraints to the Flow Label allocation strategies, limiting the restrictions only to those packets that need to be translated by the shim, but also becauseContext Losscontext-loss detection mechanisms greatly benefit from the fact that shim data packets are identified as such, allowing the receiving end to identify if a shim context associated to a received packet issupposesupposed to exist, asitwill be discussed in theContext Losscontext-loss detection appendix below.22.2.2.D.2.2. Extension Header Another approach, which is the one selected for this protocol, is to carry thecontext tagContext Tag in a new ExtensionHeader.header. Thesecontext tagsContext Tags are allocated by the receiving end during the Shim6 protocol initial negotiation, implying that each context will have twocontext tags,Context Tags, one for each direction. Data packets will be demultiplexed using thecontext tagContext Tag carried in the ExtensionHeader.header. This seems a clean approach since it does not overload existing fields. However, it introduces additional overhead in the packet due to the additional header. The additional overhead introduced is 8 octets. However, it should be noted that thecontext tagContext Tag is only required when a locator other than the one used as ULID is contained in the packet. Packets where both thesourceSource anddestination addressDestination Address fields contain the ULIDs do not require acontext tag,Context Tag, since no rewriting is necessary at the receiver. This approach would reduce theoverhead,overhead because the additional header is only required after a failure. On the other hand, this approach would cause changes in the available MTU for some packets, since packets that include the ExtensionHeaderheader will have an MTU that is 8 octets shorter. However, path changes through the network can result in a different MTU in anycase, thuscase; thus, having a locator change, which implies a path change, affect the MTU doesn't introduce any new issues.22.3. Context LossD.3. Context-Loss Detection In thisappendixappendix, we will present different approaches considered to detect context loss and potentialcontext recoverycontext-recovery strategies. The scenario being considered is the following: Node A and Node B are communicating using IPA1 and IPB1. Sometime later, a shim context is established between them, with IPA1 and IPB1 as ULIDs and with IPA1,...,IPAn and IPB1,...,IPBm as locatorsetsets, respectively. It mayhappen, thathappen that, later on, one of thehosts, e.g.hosts (e.g., HostAA) loses the shim context. The reason for this can be that Host A has a more aggressive garbage collection policy thanHostBHost B or that an error occurred in the shim layer athostHost Aresultingand resulted in the loss of the context state. The mechanisms considered in this appendix are aimedto dealat dealing with this problem. There are essentially two tasks that need to be performed in order to cope with this problem: first, the context loss must be detectedand secondand, second, the context needs to be recovered/reestablished.re-established. Mechanisms for detecting context loss. These mechanisms basically consist inthateach end of the context that periodically sends a packet containing context-specific information to the other end. Upon reception of such packets, the receiver verifies that the required context exists. In the case that the context does not exist, it sends a packet notifying theproblem tosender of thesender.problem. An obvious alternative for this would be to create a specific context keepalive exchange, which consists in periodically sending packets with this purpose. This option was considered and discarded because it seemed an overkill to define a new packet exchange to deal with this issue.AnAnother alternative is to piggyback thecontext losscontext-loss detection function in other existent packet exchanges. In particular, both shim control and data packets can be used for this. Shim control packets can be trivially used forthis,this because they carrycontext specific information, so thatcontext-specific information. This way, when a node receives oneofsuchpackets,packet, it will verify if the context exists. However, shim control frequency may not be adequate forcontext losscontext-loss detection since control packet exchanges can be very limited for a session in certain scenarios. Data packets, on the other hand, are expected to be exchanged with a higher frequency buttheydo not necessarily carrycontext specificcontext-specific information. In particular, packets flowing before a locator change(i.e.(i.e., a packet carrying the ULIDs in the address fields) do not need context information since they do not need any shim processing. Packets that carry locators that differ from the ULIDs carry context information. However, we need to make a distinction here between the different approaches considered to carry thecontext tag,Context Tag -- inparticularparticular, between those approaches where packets are explicitly marked as shim packets and those approaches where packets are not marked as such. For instance, in the case where thecontext tagContext Tag is carried in the Flow Label and packets are not marked as shim packets(i.e.(i.e., no new Next Header values are defined for shim), a receiver that has lost the associated context is not able to detect that the packet is associated with a missing context. The result is that the packet will be passed unchanged to theupper layerupper-layer protocol, which in turn will probably silently discard it due to a checksum error. The resulting behavior is that the context loss is undetected. This is one additional reason to discard an approach that carries thecontext tagContext Tag in the Flow Label field and does not explicitly mark the shim packets as such. On the other hand, approaches that mark shim data packets (like those that use the ExtensionHeaderheader or the Flow Label with new Next Headervalues approaches)values) allow the receiver to detect if the context associated to the received packet is missing. In this case, data packets also perform the function of acontext losscontext-loss detection exchange. However, it must be noted that only those packets that carry a locator that differsformfrom the ULID are marked. This basically means that context loss will be detected after an outage hasoccurred i.e.occurred, i.e., alternative locators are being used. Summarizing, the proposedcontext losscontext-loss detection mechanismsusesuse shim control packets andpayload extensionShim6 Payload Extension headers to detect context loss. Shim control packets detect context loss during the whole lifetime of the context, but the expected frequency in some cases is very low. On the other hand,payload extensionShim6 Payload Extension headers have a higher expected frequency in general, but they only detect context loss after an outage. This behavior implies that it will be common that context loss is detected after afailure i.e.failure, i.e., oncethatit is actually needed. Because of that, a mechanism for recovering from context loss is required if this approach is used. Overall, the mechanism for detecting lost context would work as follows: the end that still has the context available sends a message referring to the context. Upon the reception of such message, the end that has lost the context identifies the situation and notifies thecontext loss event to theother end of the context-loss event by sending a packet containing the lost context information extracted from the received packet. One option is to simply send an error message containing the received packets (or at least as much of the received packet that the MTU allows tofit in).fit). One of the goals of this notification is to allow the other end that still retains contextstate,state toreestablishre-establish the lost context. The mechanism toreestablishre-establish thelosslost context consists in performing the 4-way initial handshake. This is atimetime- consuming exchangeandand, at thispointpoint, time may be critical since we arereestablishingre-establishing a context that is currently needed (becausecontext losscontext-loss detection may occur after a failure).So,So another option, which is the one used in this protocol, is to replace the error messagebywith a modified R1message,message so that the time required to perform thecontext establishmentcontext-establishment exchange can be reduced. Upon the reception of this modified R1 message, the end that still has the context state can finish thecontext establishmentcontext-establishment exchange and restore the lost context.22.4.D.4. Securinglocator setsLocator Sets The adoption of a protocol likeSHIM thatSHIM, which allows the binding of a given ULID with a set oflocatorslocators, opens thedoorsdoor for different types of redirection attacks as described in[14].[15]. Thegoalgoal, in terms ofsecuritysecurity, for the design of the shim protocol isnotto not introduce any new vulnerabilityininto the Internet architecture. It is a non-goal to provide additional protection other thanthewhat is currently available in the single-homed IPv6 Internet. Multiple security mechanisms were considered to protect the shim protocol. In this appendix we will present some of them. The simplest option to protect the shim protocolwasis to usecookies i.e.cookies, i.e., a randomly generated bit string that is negotiated during thecontext establishmentcontext-establishment phase and thenitis included infollowingsubsequent signaling messages. Bythis mean,these means, it would be possible to verify that the party that was involved in the initial handshake is the same party that is introducing new locators. Moreover, before using a new locator, an exchange is performed through the new locator, verifying that the party located at the new locator knows thecookie i.e.cookie, i.e., that it is the same party that performed the initial handshake. While this securitymechanismsmechanism does indeed provide a fair amount of protection, itdoes leaveleaves the door open fortheso-calledtime shiftedtime-shifted attacks. In these attacks, an attackerthat once wason thepath, itpath discovers the cookie by sniffing any signaling message. After that, the attacker can leave the path and still perform a redirectionattack, sinceattack since, as he is in possession of the cookie, he can introduce a new locatorininto the locator set andhecan also successfully perform the reachability exchange if he is able to receive packets at the new locator. The difference with the current single-homed IPv6 situation is that in the current situation the attacker needs to be on-path during the whole lifetime of the attack, while in this new situationwhere(where only cookie protectionif provided,is provided), an attacker thatoncewas once on the path can perform attacks after he has left the on-path location. Moreover, because the cookie is included in signaling messages, the attacker can discover the cookie by sniffing any of them, making the protocol vulnerable during the whole lifetime of the shim context. A possible approach to increasethesecuritywasis to use a sharedsecret i.e.secret, i.e., a bit string that is negotiated during the initial handshake but that is used as a key to protect following messages. With this technique, the attacker must be present on the path and sniffing packets during the initial handshake, sinceitthis is the only momentwherewhen the shared secret is exchanged.While this improves the security, it is still vulnerable to time shifted attacks, even thoughThough it imposes that the attacker must be on path at a very specific moment (the establishmentphase) to actually be able to launch the attack. Whilephase), and though it improves security, thisseemsapproach is still vulnerable tosubstantially improve the situation, ittime-shifted attacks. It should be noted that, depending on protocol details, an attacker may be able to force therecreationre-creation of the initial handshake (forinstanceinstance, by blocking messages and making the parties think that the context has beenlost), solost); thus, the resulting situation may not differ that much from thecookie basedcookie-based approach. Another option that was discussed during the design ofthethis protocol was the possibility of using IPsec for protecting the shim protocol. Now, the problem under consideration in this scenario is how to securely bind an address that is being used as ULID with a locator set that can be used to exchange packets. The mechanism provided by IPsec to securely bind the address that is used withthecryptographic keys is the usage of digital certificates. This implies that anIPsec basedIPsec-based solution would requirethat the generation ofa common and mutually trusted third party to generate digital certificates that bind the key and theULID by a common third trusted party for both parties involved in the communication.ULID. Considering that the scope of application of the shim protocol is global, this would imply a global public keyinfrastructure.infrastructure (PKI). The major issues with this approach are the deployment difficulties associated with a global PKI. The other possibility would be to use some form of opportunistic IPSec, likeBTNS [21].Better-Than-Nothing-Security (BTNS) [22]. However, this would still present someissues, inissues. In particular, this approach requires aleap-of- faithleap- of-faith in order to bind a given address to the publickykey that is being used, which would actually preventfrom providingthe most critical security feature that a Shim6 security solution needs toachieve, i.e.achieve from being provided: proving identifier ownership. On top of that, using IPsec would require to turn on per-packet AH/ESP just for multihoming to occur.FinallyIn general, SHIM6 was expected to work between pairs of hosts that have no prior arrangement, security association, or common, trusted third party. It was also seen as undesirable to have to turn on per- packet AH/ESP just for the multihoming to occur. However, Shim6 should work and have an additional level of security where two hosts choose to use IPsec. Another design alternative would have employed some form of opportunistic or Better-Than-Nothing Security (BTNS) IPsec to perform these tasks with IPsec instead. Essentially, HIP in opportunistic mode is very similar to SHIM6, except that HIP uses IPsec, employs per-packet ESP, and introduces another set of identifiers. Finally, two different technologies were selected to protect the shim protocol: HBA [3] and CGA [2]. These twoapproachestechniques provide a similar level of protection buttheyalso provide different functionality withadifferent computationalcost.costs. The HBA mechanism relies on the capability of generating all the addresses of a multihomed host as an unalterable set of intrinsically bound IPv6 addresses, known as an HBA set. In this approach, addresses incorporate a cryptographic one-way hash of theprefix-setprefix set available into the interface identifier part. The result is that the binding between all the available addresses is encoded within the addresses themselves, providing hijacking protection. Any peer using the shim protocol node can efficiently verify that the alternative addresses proposed for continuing the communication are bound to the initial address through a simple hash calculation. A limitation of the HBA technique isthatthat, oncegeneratedgenerated, the address set is fixed and cannot be changed without also changing all the addresses of the HBA set. In other words, the HBA technique does not support dynamic addition of address to a previously generated HBA set. An advantage of this approach is that it requires only hash operations to verify a locator set, imposing very low computational cost to the protocol. In aCGA based approachCGA-based approach, the address used as ULID is a CGA that contains a hash of a public key in its interface identifier. The result is a secure binding between the ULID and the associated key pair. This allows each peer to use the corresponding private key to sign the shim messages that convey locator set information. The trust chain in this case is the following: the ULID used for the communication is securely bound to the key pair because it contains the hash of the public key, and the locator set is bound to the public key through the signature. The CGA approach then supports dynamic addition of new locators in the locator set, since in order to dothat,that the node only needs to sign the new locator with the private key associated with the CGA used as ULID. A limitation of this approach is that it imposes systematic usage of public key cryptography with its associate computational cost.AnyEither of these twomechanismsmechanisms, HBA andCGA provideCGA, provides time-shifted attack protection, since the ULID is securely bound to a locator set that can only be defined by the owner of the ULID.So,So the design decision adopted was that bothmechanismsmechanisms, HBA andCGACGA, aresupported, so thatsupported. This way, when only stable address sets are required, the nodes can benefit from the low computational cost offered byHBAHBA, while when dynamic locator sets are required, this can be achieved through CGAs with an additional cost. Moreover, because HBAs are defined as a CGA extension, the addresses available in a node can simultaneously be CGAs and HBAs, allowing the usage of the HBA and CGA functionality whenneededneeded, without requiring a change in the addresses used.22.5. ULID-pair context establishment exchangeD.5. ULID-Pair Context-Establishment Exchange Two options were considered for the ULID-paircontext establishmentcontext-establishment exchange: a 2-way handshake and a 4-way handshake. A key goal for the design of this exchange wasthatprotection against DoS attacks. The attack under consideration was basically a situation where an attacker launches a great amount of ULID-pairestablishmentestablishment- request packets, exhausting the victim'sresources, similarresources similarly to TCP SYN flooding attacks. A4 way-handshake4-way handshake exchange protects against these attacks because the receiver does notcreatescreate any stateassociateassociated to a given context until the reception of the secondpacketpacket, which containsa priorprior- contact proof in the form of a token. At thispointpoint, the receiver can verify that at least the address used by the initiator isatvalid to someextent valid,extent, since the initiator is able to receive packets at this address. In theworseworst case, the responder can track down the attacker using this address. The drawback of this approach is that it imposes a4 packet4-packet exchange for any context establishment. This would be a great deal if the shim context needed to be established up front, before the communication can proceed. However, thanks to the deferredcontext establishmentcontext-establishment capability of the shim protocol, this limitation has a reduced impact in the performance of the protocol.(It(However, it mayhoweverhave a greater impact in the situation of contextrecoverrecovery, as discussedearlier, butearlier. However, in this case, it is possible to perform optimizations to reduce the number of packets as describedabove)above.) The other option considered was a 2-way handshake with the possibility to fall back to a 4-way handshake in case of attack. In this approach, the ULID-pair establishment exchange normally consistsinof a 2-packet exchange anditdoes not verify that the initiator has performed a prior contact before creating context state. In casethata DoS attack is detected, the responder falls back to a 4-way handshake similar to the one describedpreviouslypreviously, in order to prevent the detected attackto proceed.from proceeding. The main difficulty with this attack is how to detect that a responder is currently under attack. It should benoted, thatnoted that, because this is a 2-way exchange, it is not possible to use the number ofhalf openhalf-open sessions (as in TCP) to detect an ongoingattack andattack; different heuristics need to be considered. The design decision taken wasthatthat, considering the current impact of DoS attacks and the low impact of the 4-way exchange in the shim protocolthanks(thanks to the deferredcontext establishment capability,context-establishment capability), a 4-way exchange would be adopted for the base protocol.22.6.D.6. Updatinglocator setsLocator Sets There are two possible approaches to the addition and removal of locators: atomic and differential approaches. The atomic approach essentiallysendsends the completelocatorslocator set each timethata variation in the locator set occurs. The differential approachsendsends the differences between the existing locator set and the new one. The atomic approach imposes additionaloverhead,overhead since all of the locator set has to be exchanged eachtimetime, while the differential approach requires re-synchronization of both ends through changesi.e.(i.e., requires that both ends have the same idea about what the current locator setis.is). Because of the difficulties imposed by the synchronization requirement, the atomic approach was selected.22.7.D.7. State Cleanup There are essentially two approaches for discarding an existing state about locators,keyskeys, and identifiers of a correspondent node: a coordinated approach and an unilateral approach. In the unilateral approach, each node discardstheinformation about the other node without coordination with the othernodenode, based on some local timers and heuristics. No packet exchange is required for this. In this case, it would be possible that one of the nodes has discarded the state while the other node still hasn't. In this case, aNo-Context errorNo Context Error message may be required to inform the other node about thesituation andsituation; possibly a recovery mechanism is also needed. A coordinated approach would use an explicit CLOSE mechanism, akin to the one specified in HIP[19].[20]. If an explicit CLOSE handshake and associated timer is used, then there would no longer be a need for the No Context Error message due to a peer having garbage collected at its end of the context. However, there is still potentially a need to have a No Context Error message in the case of a complete state loss of the peer (also known as a crash followed by a reboot). Only if we assume that the reboot takes at least the time of the CLOSE timer, or that it isokokay to not provide complete service untilCLOSE timerCLOSE-timer minutes after the crash, can we completely do away with the No Context Error message. In addition,otheranother aspect that is relevant for this design choice is the context confusion issue. In particular, usingana unilateral approach to discard context state clearly opens up the possibility of context confusion, where one of the ends unilaterally discards the context state, while thepeerother does not. In this case, the end that has discarded the state can re-use thecontext tagContext Tag value used for the discarded state foraanother context, creatingapotential contextconfusion situation.confusion. In order to illustrate the cases where problems wouldarisearise, consider the following scenario: o Hosts A and B establish context 1 using CTA and CTB ascontext tags.Context Tags. o Later on, A discards context 1 and thecontext tagContext Tag value CTA becomes available for reuse. o However, B still keeps context 1. This wouldbecome acreate context confusionsituationin the following two cases: o A new context 2 is established between A and B with a different ULID pair (or Forked Instance Identifier), and A uses CTA ascontext tag,the Context Tag. If the locator sets used for both contexts are not disjoint, weare in ahave contextconfusion situation.confusion. o A new context is established between A andCC, and A uses CTA ascontext tagthe Context Tag value for this new context. Later on, B sends PayloadextensionExtension header and/or control messages containing CTA, which could be interpreted by A as belonging to context 2 (if no proper care is taken). Again weare in ahave contextconfusion situation.confusion. One could think that using a coordinated approach would eliminatethesesuch contextconfusion situations,confusion, making the protocol much simpler. However, this is not the case, because even in the case of a coordinated approach using a CLOSE/CLOSE ACK exchange, there is still the possibility of a host rebooting without having the time to perform the CLOSE exchange. So, it is true that the coordinated approach eliminates the possibility ofacontext confusionsituation becausedue to premature garbage collection, but it does not prevent the same situations due to a crash and reboot of one of the involved hosts. The result isthatthat, even if we went for a coordinated approach, we would still need to deal with context confusion and provide the means to detect and recover fromthisthese situations.23. Appendix: Change Log [RFC Editor: please remove this section] The following changes have been made since draft-ietf-shim6-proto-11: o Reworded the placement of shim6 w.r.t. IPsec o Updated text on the IPsec considerations The following changes have been made since draft-ietf-shim6-proto-10: o Reworded the placement of shim6 w.r.t. IPsec o Updated text on the IPsec considerations The following changes have been made since draft-ietf-shim6-proto-09: o Explicitly added a reference to the applicability document o Added text on why oportunistic IPSec was not used for securing locator sets o Reowrded the Validator generation text to make it clearer o Reworded security considerations to explicitly address RFC 4218 threats o Added OandM section o Added text on TE considerations o Added requirement to properly support RFC4884 icmp messages o Added th usage of Packetization Layer Path MTU Discovery o Reworded the placement of shim6 w.r.t. IPsec o Added text on the IPsec considerations The following changes have been made since draft-ietf-shim6-proto-08: o Clarified that the validator option must be included in R1 and I2 messages o changed preferred peer/local locator to current peer/local locator to align it with faliure detection draft o Reworded sections describing the generation and reception of I2,I2bis, R2 and Update message to clarify that the CGA PDS may be included in them o ruled out the unspcified address as posible address to be used in shim6 control messages o added clarifyig note that explains that is possible that one of the peers is not multiaddrssed and does not have CGA/HBA o added assumption explaining that ULIDs are HBAs or CGAs o Editorial changes The following changes have been made since draft-ietf-shim6-proto-07: o New Error Message format added in the Format section o Added new registry for Error codes in the IANA considerations section o Changed the Format section so a Shim6 error message is sent back when a crtical option is not recognized (instead of an ICMP error message) o Changed the ULID estbalishment section so that a Shim6 error message is sent back when the locator verification is not recgnized or not consistent with the current CGA PDS o Changed the Locator Update section so that Shim6 error messages are sent instead of ICMP error messages o Changed the receiving packet section so that Shim6 error messages are generated instead of ICMP error messages o added new section about middle box consideration in the implication elsewhere section o added text for allowing strcuture in context tag name space, while still randomly cycling though part of the tag name space o changed the name of TEMPORARY flag for the TRANSIENT flag o clarified option length calculation o Editorial commnets from Iljitsch review o added new sub-section in the introduction about congestion notification to upper layer and include a reference to I-D.schuetz-tcpm-tcp-rlci o added reccomendation to keep the shim6 message length below 1280 bytes o added the init nonce in the description of the verification of the validator when receiving I2 messages o removed FII and ULID in the verification of the validator when receiving I2BIS meesages, and added receiver context tag. o Clarified section about retransmision of I2 and I2bis messages, in case that the initiator decides not to retransmit I2/I2bis messages and retransmits I1 message o Clarified the effect of packets associated with a context but without the shim6 header when considering tearing down a context o Added new section in section 12 about how to process packets associated with a context that do not carry the shim6 ext header o Added respon der validator as information stored in I2-SENT and Responder validator, init nonce and RESP nonce as information available in I2BISSENT o Added Init Nonce, Responder Nonce, and Responder validator as information available for a shim6 context in the conceptual model during establishment phase. o Clarified how the Responder Validator is calculated based on a running counter that is independent of any received message o Editorial corrections resulting from Dave Thaler and Bob Braden reviews. The following changes have been made since draft-ietf-shim6-proto-06: o Changed wording in the renumberin considerations section, so that a shim6 context using a ULID that has been renumbered, MUST be discarded o Included text in the security considerations about IPSec BITW and IPSec tunnels. o Added text about the minimum key length of CGA in the security considerations section o fixed Payload/update message processing o synchonized with READ draft The following changes have been made since draft-ietf-shim6-proto-05: o Removed the possibility to keep on using the ULID after a renumbering event o Editorial corrections resulting from Dave Meyer's and Jim Bound's reviews. The following changes have been made since draft-ietf-shim6-proto-04: o Defined I1_RETRIES_MAX as 4. o Added text in section 7.9 clarifying the no per context state is stored at the receiver in order to reply an I1 message. o Added text in section 5 and in section 5.14 in particular, on defining additional options (including critical and non critical options). o Added text in the security considerations about threats related to secret S for generating the validators and recommendation to change S periodically. o Added text in the security considerations about the effects of attacks based on guessing the context tag being similar to spoofing source addresses in the case of payload packets. o Added clarification on what a recent nonce is in I2 and I2bis. o Removed (empty) open issues section. o Editorial corrections. The following changes have been made since draft-ietf-shim6-proto-03: o Editorial clarifications based on comments from Geoff, Shinta, Jari. o Added "no IPv6 NATs as an explicit assumption. o Moving some things out of the Introduction and Overview sections to remove all SHOULDs and MUSTs from there. o Added requirement that any Locator Preference options which use an element length greater than 3 octets have the already defined first 3 octets of flags, priority and weight. o Fixed security hole where a single message (I1) could cause CT(peer) to be updated. Now a three-way handshake is required before CT(peer) is updated for an existing context. The following changes have been made since draft-ietf-shim6-proto-02: o Replaced the Context Error message with the R1bis message. o Removed the Packet In Error option, since it was only used in the Context Error message. o Introduced a I2bis message which is sent in response to an I1bis message, since the responders processing is quite in this case than in the regular R1 case. o Moved the packet formats for the Keepalive and Probe message types and Event option to [4]. Only the message type values and option type value are specified for those in this document. o Removed the unused message types. o Added a state machine description as an appendix. o Filled in all the TBDs - except the IANA assignment of the protocol number. o Specified how context recovery and forked contexts work together. This required the introduction of a Forked Instance option to be able to tell which of possibly forked instances is being recovered. o Renamed the "host-pair context" to be "ULID-pair context". o Picked some initial retransmit timers for I1 and I2; 4 seconds. o Added timer values as protocol constants. The retransmit timers use binary exponential backoff and randomization (between .5 and 1.5 of the nominal value). o Require that the R1/R1bis verifiers be usable for some minimum time so that the initiator knows for how long time it can safely retransmit I2 before it needs to go back to sending I1 again. Picked 30 seconds. o Split the message type codes into 0-63, which will not generate R1bis messages, and 64-127 which will generate R1bis messages. This allows extensibility of the protocol with new message types while being able to control when R1bis is generated. o Expanded the context tag from 32 to 47 bits. o Specified that enough locators need to be included in I2 and R2 messages. Specified that the HBA/CGA verification must be performed when the locator set is received. o Specified that ICMP parameter problem errors are sent in certain error cases, for instance when the verification method is unknown to the receiver, or there is an unknown message type or option type. o Renamed "payload message" to be "payload extension header". o Many editorial clarifications suggested by Geoff Huston. o Modified the dispatching of payload extension header to only compare CT(local) i.e., not compare the source and destination IPv6 address fields. The following changes have been made since draft-ietf-shim6-proto-00: o Removed the use of the flow label and the overloading of the IP protocol numbers. Instead, when the locator pair is not the ULID pair, the ULP payloads will be carried with an 8 octet extension header. The belief is that it is possible to remove these extra bytes by defining future Shim6 extensions that exchange more information between the hosts, without having to overload the flow label or the IP protocol numbers. o Grew the context tag from 20 bits to 32 bits, with the possibility to grow it to 47 bits. This implies changes to the message formats. o Almost by accident, the new Shim6 message format is very close to the HIP message format. o Adopted the HIP format for the options, since this makes it easier to describe variable length options. The original, ND-style, option format requires internal padding in the options to make them 8 octet length in total, while the HIP format handles that using the option length field. o Removed some of the control messages, and renamed the other ones. o Added a "generation" number to the Locator List option, so that the peers can ensure that the preferences refer to the right "version" of the Locator List. o In order for FBD and exploration to work when there the use of the context is forked, that is different ULP messages are sent over different locator pairs, things are a lot easier if there is only one current locator pair used for each context. Thus the forking of the context is now causing a new context to be established for the same ULID; the new context having a new context tag. The original context is referred to as the "default" context for the ULID pair. o Added more background material and textual descriptions. 24. References 24.1. Normative References [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [2] Aura, T., "Cryptographically Generated Addresses (CGA)", RFC 3972, March 2005. [3] Bagnulo, M., "Hash Based Addresses (HBA)", draft-ietf-shim6-hba-05 (work in progress), December 2007. [4] Arkko, J. and I. Beijnum, "Failure Detection and Locator Pair Exploration Protocol for IPv6 Multihoming", draft-ietf-shim6-failure-detection-13 (work in progress), June 2008. 24.2. Informative References [5] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS RR for specifying the location of services (DNS SRV)", RFC 2782, February 2000. [6] Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", BCP 38, RFC 2827, May 2000. [7] Draves, R., "Default Address Selection for Internet Protocol version 6 (IPv6)", RFC 3484, February 2003. [8] Bagnulo, M., "Updating RFC 3484 for multihoming support", draft-bagnulo-ipv6-rfc3484-update-00 (work in progress), December 2005. [9] Schulzrinne, H., Casner, S., Frederick, R., and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications", STD 64, RFC 3550, July 2003. [10] Abley, J., Black, B., and V. Gill, "Goals for IPv6 Site- Multihoming Architectures", RFC 3582, August 2003. [11] Rajahalme, J., Conta, A., Carpenter, B., and S. Deering, "IPv6 Flow Label Specification", RFC 3697, March 2004. [12] Eastlake, D., Schiller, J., and S. Crocker, "Randomness Requirements for Security", BCP 106, RFC 4086, June 2005. [13] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast Addresses", RFC 4193, October 2005. [14] Nordmark, E. and T. Li, "Threats Relating to IPv6 Multihoming Solutions", RFC 4218, October 2005. [15] Huitema, C., "Ingress filtering compatibility for IPv6 multihomed sites", draft-huitema-shim6-ingress-filtering-00 (work in progress), September 2005. [16] Bagnulo, M. and E. Nordmark, "SHIM - MIPv6 Interaction", draft-bagnulo-shim6-mip-00 (work in progress), July 2005. [17] Nordmark, E., "Shim6 Application Referral Issues", draft-ietf-shim6-app-refer-00 (work in progress), July 2005. [18] Bagnulo, M. and J. Abley, "Applicability Statement for the Level 3 Multihoming Shim Protocol (Shim6)", draft-ietf-shim6-applicability-03 (work in progress), July 2007. [19] Moskowitz, R., Nikander, P., Jokela, P., and T. Henderson, "Host Identity Protocol", draft-ietf-hip-base-10 (work in progress), October 2007. [20] Schuetz, S., Koutsianas, N., Eggert, L., Eddy, W., Swami, Y., and K. Le, "TCP Response to Lower-Layer Connectivity-Change Indications", draft-schuetz-tcpm-tcp-rlci-03 (work in progress), February 2008. [21] Williams, N. and M. Richardson, "Better-Than-Nothing-Security: An Unauthenticated Mode of IPsec", draft-ietf-btns-core-07 (work in progress), August 2008. [22] Komu, M., Bagnulo, M., Slavov, K., and S. Sugimoto, "Socket Application Program Interface (API) for Multihoming Shim", draft-ietf-shim6-multihome-shim-api-07 (work in progress), November 2008. [23] Mathis, M. and J. Heffner, "Packetization Layer Path MTU Discovery", RFC 4821, March 2007. [24] Bonica, R., Gan, D., Tappan, D., and C. Pignataro, "Extended ICMP to Support Multi-Part Messages", RFC 4884, April 2007.Authors' Addresses Erik Nordmark Sun Microsystems 17 Network Circle Menlo Park, CA 94025 USA Phone: +1 650 786 2921Email:EMail: erik.nordmark@sun.com Marcelo Bagnulo Universidad Carlos III de Madrid Av. Universidad 30 Leganes, Madrid 28911 SPAIN Phone: +34 91 6248814Email:EMail: marcelo@it.uc3m.es URI: http://www.it.uc3m.es