<?xml version="1.0" encoding="utf-8"?>
<!-- name="GENERATOR" content="github.com/mmarkdown/mmark Mmark Markdown Processor - mmark.miek.nl" -->
<rfc version="3" ipr="trust200902" docName="draft-thain-ipv8-00" submissionType="IETF" category="std" xml:lang="en" xmlns:xi="http://www.w3.org/2001/XInclude" indexInclude="true" consensus="true">

<front>
<title abbrev="IPv8">Internet Protocol Version 8 (IPv8)</title><seriesInfo value="draft-thain-ipv8-00" stream="IETF" status="standard" name="Internet-Draft"></seriesInfo>
<author initials="J." surname="Thain" fullname="Jamie Thain"><organization>One Limited</organization><address><postal><street></street>
<city>Hamilton</city>
<country>Bermuda</country>
</postal><email>jamie@one.bm</email>
</address></author><date/>
<area>Internet</area>
<workgroup>Network Working Group</workgroup>
<keyword>IPv8</keyword>
<keyword>internet protocol</keyword>
<keyword>network management</keyword>
<keyword>BGP8</keyword>
<keyword>Zone Server</keyword>

<abstract>
<t>Internet Protocol Version 8 (IPv8) is a managed network protocol
suite that transforms how networks of every scale -- from home
networks to the global internet -- are operated, secured, and
monitored. Every manageable element in an IPv8 network is
authorised via OAuth2 JWT tokens served from a local cache. Every
service a device requires is delivered in a single DHCP8 lease
response. Every packet transiting to the internet is validated
at egress against a DNS8 lookup and a WHOIS8 registered active
route. Network telemetry, authentication, name resolution, time
synchronisation, access control, and translation are unified into
a single coherent Zone Server platform.</t>
<t>IPv4 is a proper subset of IPv8. An IPv8 address with the routing
prefix field set to zero is an IPv4 address. No existing device,
application, or network requires modification. The suite is 100%
backward compatible. There is no flag day and no forced migration
at any layer.</t>
<t>IPv8 also resolves IPv4 address exhaustion. Each Autonomous System
Number (ASN) holder receives 4,294,967,296 host addresses. The
global routing table is structurally bounded at one entry per ASN.</t>
<t>This document is one of the companion specifications:</t>

<ul spacing="compact">
<li>draft-thain-ipv8-00          Core protocol (this document)</li>
<li>draft-thain-routing-protocols-00 BGP8, IBGP8, OSPF8, IS-IS8, CF</li>
<li>draft-thain-rine-00          Regional Inter-Network Exchange</li>
<li>draft-thain-zoneserver-00    Zone Server Architecture</li>
<li>draft-thain-whois8-00        WHOIS8 Protocol</li>
<li>draft-thain-netlog8-00       NetLog8 Protocol</li>
<li>draft-thain-support8-00      ARP8, ICMPv8, Route8</li>
<li>draft-thain-ipv8-mib-00      IPv8 MIB and SNMPv8</li>
<li>draft-thain-wifi8-00         WiFi8 Protocol</li>
<li>draft-thain-update8-00       Update8 and NIC Certification</li>
</ul>
</abstract>

</front>

<middle>

<section anchor="introduction"><name>Introduction</name>

<section anchor="requirements-language"><name>Requirements Language</name>
<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL
NOT&quot;, &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;,
&quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"></xref> <xref target="RFC8174"></xref> when, and only when,
they appear in all capitals, as shown here.</t>
</section>

<section anchor="the-network-management-problem"><name>The Network Management Problem</name>
<t>Modern network management is characterised by fragmentation.
DHCP, DNS, NTP, logging, monitoring, and authentication are
separate products, separately licensed, separately configured,
and separately maintained with no shared awareness of network
state. A device connecting to a network may require manual
configuration of a dozen independent services before it is
operational. Security is inconsistent -- some services are
authenticated, others are not. Failures require correlating
data across systems that were never designed to work together.</t>
<t>This fragmentation scales with every device added. Small
networks cannot afford the operational complexity. Large
networks cannot afford the inconsistency. The global internet
has no coherent mechanism to validate that advertised routes
are legitimately held by their advertisers, or that packets
transiting to external destinations have been validated against
any registry of active routes.</t>
<t>IPv6 <xref target="RFC8200"></xref> addressed address exhaustion but did not address
management fragmentation. After 25 years of deployment effort
IPv6 carries a minority of global internet traffic. The
operational cost of the dual-stack transition model, combined
with the absence of management improvement, proved commercially
unacceptable.</t>
<t>IPv8 addresses both problems simultaneously.</t>
</section>

<section anchor="the-ipv8-management-philosophy"><name>The IPv8 Management Philosophy</name>
<t>The central operational concept in IPv8 is the Zone Server --
a paired active/active platform that runs every service a
network segment requires: address assignment (DHCP8), name
resolution (DNS8), time synchronisation (NTP8), telemetry
collection (NetLog8), authentication caching (OAuth8), route
validation (WHOIS8 resolver), access control enforcement
(ACL8), and IPv4/IPv8 translation (XLATE8).</t>
<t>A device connecting to an IPv8 network sends one DHCP8
Discover and receives one response containing every service
endpoint it requires. No subsequent manual configuration is
needed for any service. The device is fully operational --
authenticated, logged, time-synchronised, zone-policy-enforced
-- before its first user interaction.</t>
<t>Every manageable element in an IPv8 network is authorised via
OAuth2 JWT tokens <xref target="RFC7519"></xref>. Tokens are validated locally by
the OAuth8 cache on the Zone Server without round trips to
external identity providers. A device in a remote location
with a temporarily unreachable cloud identity provider
continues to authenticate normally -- the OAuth8 cache holds
all public keys and validates signatures locally in sub-
millisecond time. JWT tokens may be served by a local OAuth2
authority (home router operating in local authority mode) or
by a cached enterprise OAuth2 provider. Authentication is
universal, consistent, and requires no per-service credential
management.</t>
<t>Firmware and software updates for L1-L4 stack components are
managed via the Update8 protocol <xref target="UPDATE8"></xref>. Update8 defines
a standard vendor feed format, Zone Server validated proxy,
optional local caching, device criticality-based scheduling,
and rollback prevention enforced in NIC hardware. Devices
receive updates only from DNS-named sources validated by the
Zone Server. Connection to an update source identified by IP
address is blocked by default.</t>
<t>The 127.0.0.0/8 r.r.r.r range is permanently reserved as the
IPv8 internal zone prefix space. Organisations assign internal
zone prefixes (127.1.0.0, 127.2.0.0 etc) to network zones
and regions. Internal zone addresses are never routed
externally. No address conflict between zones is possible.
An organisation may build a network of arbitrary geographic
and organisational scale -- with dozens of regional zones, each
containing thousands of devices -- using familiar routing
protocols without any external address coordination.</t>
</section>

<section anchor="east-west-and-north-south-security"><name>East-West and North-South Security</name>
<t>IPv8 addresses two distinct traffic security problems:</t>
<t><strong>East-west security</strong> -- traffic between devices within a
network -- is enforced by ACL8 zone isolation. Devices
communicate only with their designated service gateway. The
service gateway communicates only with the designated cloud
service. Lateral movement between devices or zones is
architecturally prevented by the absence of any permitted
route to any other destination. Three independent enforcement
layers provide defence in depth: NIC firmware ACL8, Zone
Server gateway ACL8, and switch port OAuth2 hardware VLAN
enforcement.</t>
<t><strong>North-south security</strong> -- traffic from internal devices to
the internet -- is enforced at the Zone Server egress by two
mandatory validation steps. First, every outbound connection
must have a corresponding DNS8 lookup -- no DNS lookup means
no XLATE8 state table entry means the connection is blocked.
Second, the destination ASN is validated against the WHOIS8
registry -- if the destination prefix is not registered as an
active route by a legitimately registered ASN holder the
packet is dropped. These two steps together eliminate the
primary malware command-and-control channel: connection to
hardcoded IP addresses without DNS resolution.</t>
<t>At the global routing level, BGP8 route advertisements are
validated against WHOIS8 before installation in the routing
table. A route that cannot be validated is not installed.
Manual bogon filter list maintenance is eliminated. Prefix
hijacking is architecturally difficult -- an attacker must
compromise both an RIR registry entry and produce a validly
signed WHOIS8 record.</t>
</section>

<section anchor="address-exhaustion"><name>Address Exhaustion</name>
<t>IANA completed allocation of the IPv4 unicast address space
in February 2011. CGNAT has extended IPv4 life but introduces
latency, breaks peer-to-peer protocols, and complicates
troubleshooting. The address exhaustion problem is
architectural and cannot be resolved within the 32-bit IPv4
address space.</t>
<t>IPv8 resolves address exhaustion as a consequence of its
addressing architecture, not as a primary design goal. The
64-bit IPv8 address space provides 2^64 unique addresses.
Each ASN holder receives 2^32 host addresses -- 4,294,967,296
addresses -- sufficient for any organisation at any scale
without address exhaustion, CGNAT, or renumbering.</t>
<t>IPv4 is a proper subset of IPv8. An IPv8 address with
r.r.r.r = 0.0.0.0 is an IPv4 address, processed by standard
IPv4 rules. No existing device, application, or network
requires modification to participate in an IPv8 network.
The suite is 100% backward compatible. There is no flag day
and no forced migration at any layer.</t>
<t>The global BGP8 routing table is structurally bounded at one
entry per ASN. The /16 minimum injectable prefix rule prevents
deaggregation. Most carriers advertise a single /8 summary
route per regional ASN. The BGP4 routing table exceeded
900,000 prefixes with no architectural bound. The BGP8 routing
table is bounded by ASN allocation rate -- approximately
175,000 entries today.</t>
</section>

<section anchor="routing-protocol-improvements"><name>Routing Protocol Improvements</name>
<t>IPv8 extends OSPF8 <xref target="RFC2328"></xref>, BGP8 <xref target="RFC4271"></xref> (both iBGP8 and
eBGP8), and IS-IS8 with a unified path quality
metric -- the Cost Factor (CF).</t>
<t>CF is a 32-bit accumulated metric derived from seven
components measured from TCP session telemetry: round trip
time, packet loss, congestion window state, session stability,
link capacity, economic policy, and geographic distance as a
physics floor. CF accumulates across every BGP8 hop from
source to destination. Every router independently selects the
path with the lowest accumulated CF without coordination.</t>
<t>CF combines the dynamic composite path quality of EIGRP, the
accumulated cost model of OSPF, and proportional load
balancing across multiple paths -- in a single open versioned
algorithm that operates end-to-end across AS boundaries.
OSPF and EIGRP stop at the AS boundary. CF does not.</t>
<t>The geographic component of CF sets a physics floor -- no path
can appear better than the speed of light over the great
circle distance allows. A path that measures faster than
physics permits is flagged immediately as a CF anomaly.</t>
<t>CF is an open versioned algorithm. CFv1 is the mandatory
baseline. Future versions may add carbon cost, jitter, time
of day, and application layer latency signals through the
IETF process.</t>
</section>

<section anchor="backward-compatibility-and-transition"><name>Backward Compatibility and Transition</name>
<t>IPv4 is a proper subset of IPv8:</t>

<artwork>IPv8 address with r.r.r.r = 0.0.0.0 = IPv4 address
Processed by standard IPv4 rules
No modification to IPv4 device required
No modification to IPv4 application required
No modification to IPv4 internal network required
</artwork>
<t>IPv8 does not require dual-stack operation. There is no flag
day. 8to4 tunnelling enables IPv8 islands separated by IPv4-
only transit networks to communicate immediately. CF naturally
incentivises IPv4 transit ASNs to upgrade by measuring higher
latency on 8to4 paths -- an automatic economic signal without
any mandate.</t>
<t>Transition phases are independent. Tier 1 ISPs, cloud
providers, enterprises, and consumer ISPs may adopt IPv8 in
any order and at any pace. 8to4 ensures interoperability
throughout.</t>
</section>
</section>

<section anchor="motivation-and-problem-statement"><name>Motivation and Problem Statement</name>

<section anchor="management-fragmentation"><name>Management Fragmentation</name>
<t>IPv4 network management has no coherent integrated model.
The protocols that operate a network -- DHCP, DNS, NTP,
syslog, SNMP, authentication -- were specified independently
over four decades, share no common identity model, no common
authentication mechanism, and no common telemetry format.</t>
<t>The consequences are operational: networks require specialist
knowledge of each protocol independently. Security is
inconsistent -- some services require authentication, others
accept unauthenticated requests from any source. Failures
require correlating logs across systems with different
timestamp formats, different severity models, and different
identity representations. Management scales with operational
burden, not with network size.</t>
<t>IPv8 addresses this by defining a coherent management suite
in which every service shares a common identity model (OAuth2
JWT), a common delivery mechanism (DHCP8), a common telemetry
format (NetLog8), and a common authentication cache (OAuth8).</t>
</section>

<section anchor="address-exhaustion-1"><name>Address Exhaustion</name>
<t>IANA completed allocation of the IPv4 unicast address space
in February 2011. Regional Internet Registries exhausted their
allocations between 2011 and 2020. CGNAT extended IPv4 life
at the cost of latency, peer-to-peer protocol breakage, and
troubleshooting complexity.</t>
<t>IPv6 <xref target="RFC8200"></xref> was developed to address exhaustion. After 25
years of standardisation and deployment effort IPv6 carries
a minority of global internet traffic. The dual-stack
transition model -- requiring every device, application, and
network to simultaneously support both protocols -- proved
commercially unacceptable. The absence of a forcing function
meant organisations could continue with CGNAT indefinitely.</t>
<t>IPv8 resolves address exhaustion without dual-stack operation.
IPv4 is a proper subset of IPv8. The transition requires no
flag day and creates no operational discontinuity.</t>
</section>

<section anchor="routing-table-growth"><name>Routing Table Growth</name>
<t>The BGP4 global routing table exceeded 900,000 prefixes in
2024 and grows without architectural bound. Prefix
deaggregation -- advertising more specific prefixes to
influence traffic engineering -- is the primary driver of
growth. No protocol mechanism prevents it.</t>
<t>BGP4 has no binding relationship between what an ASN
advertises and what it is authorised to advertise. Prefix
hijacking, route leaks, and bogon injection are possible
because there is no route ownership registry that border
routers enforce as a condition of route acceptance.</t>
<t>IPv8 addresses both problems. The /16 minimum injectable
prefix rule prevents deaggregation at inter-AS boundaries.
WHOIS8 mandatory route validation creates a binding
relationship between BGP8 advertisements and registered
route ownership. The global BGP8 routing table is
structurally bounded at one entry per ASN.</t>
</section>

<section anchor="requirements-for-a-viable-successor"><name>Requirements for a Viable Successor</name>

<ul spacing="compact">
<li>R1. Integrated management -- common identity, authentication,
telemetry, and service delivery across all network services.</li>
<li>R2. Single stack operation -- no dual-stack requirement.</li>
<li>R3. Full backward compatibility -- existing IPv4 applications
unchanged. IPv4 is a proper subset of IPv8.</li>
<li>R4. Full backward compatibility -- RFC 1918 internal networks
unchanged.</li>
<li>R5. Full backward compatibility -- CGNAT deployments unchanged.</li>
<li>R6. Vastly expanded address space.</li>
<li>R7. Implementable as a software update without hardware
replacement.</li>
<li>R8. Human readable addressing consistent with IPv4 operator
familiarity.</li>
<li>R9. East-west and north-south traffic security enforced by
protocol, not by manual configuration.</li>
<li>R10. Structurally bounded global routing table.</li>
</ul>
<t>IPv8 satisfies all ten requirements.</t>
</section>
</section>

<section anchor="ipv8-address-format"><name>IPv8 Address Format</name>

<section anchor="structure"><name>Structure</name>
<t>An IPv8 address is a 64-bit value:</t>

<artwork>r.r.r.r.n.n.n.n
</artwork>

<ul spacing="compact">
<li><strong>r.r.r.r</strong> -- 32-bit ASN Routing Prefix</li>
<li><strong>n.n.n.n</strong> -- 32-bit Host Address (identical semantics to IPv4)</li>
</ul>
</section>

<section anchor="address-space"><name>Address Space</name>

<artwork>2^64 = 18,446,744,073,709,551,616 unique addresses.
2^32 ASN prefixes x 2^32 host addresses per ASN.
</artwork>
</section>

<section anchor="ipv4-representation-in-ipv8"><name>IPv4 Representation in IPv8</name>

<artwork>0.0.0.0.n.n.n.n
</artwork>
<t>Packets with r.r.r.r = 0.0.0.0 MUST be routed using standard
IPv4 rules applied to the n.n.n.n field. IPv4 is a proper
subset of IPv8. No modification to IPv4 devices, applications,
or networks is required.</t>
</section>

<section anchor="asn-encoding-in-r-r-r-r"><name>ASN Encoding in r.r.r.r</name>
<t>The 32-bit ASN is encoded directly into r.r.r.r as a 32-bit
unsigned integer in network byte order:</t>

<artwork>ASN 64496 (Example-A)   = 0.0.251.240
ASN 64497 (Example-B)   = 0.0.251.241
ASN 64498 (Example-C)   = 0.0.251.242
</artwork>
</section>

<section anchor="internal-zone-prefix-127-0-0-0-8"><name>Internal Zone Prefix (127.0.0.0/8)</name>
<t>The 127.0.0.0/8 range of the r.r.r.r field is permanently
reserved for internal IPv8 zone prefixes. Internal zone
prefixes identify network zones within an organisation's
private addressing space.</t>

<artwork>127.x.x.x.n.n.n.n
</artwork>
<t>Where x.x.x identifies the internal zone. Examples:</t>

<artwork>127.1.0.0.n.n.n.n   Internal zone 1 (e.g. Americas)
127.2.0.0.n.n.n.n   Internal zone 2 (e.g. Europe)
127.3.0.0.n.n.n.n   Internal zone 3 (e.g. Asia Pacific)
</artwork>
<t>Internal zone prefix rules:</t>

<ul spacing="compact">
<li>MUST NOT be routed externally beyond the organisation's
AS boundary.</li>
<li>MUST NOT appear on WAN interfaces or public internet links.</li>
<li>MUST NOT be used in eBGP8 advertisements.</li>
<li>MAY be used freely within an organisation's internal
routing infrastructure via OSPF8, IS-IS8, and IBGP8.</li>
<li>Provides 2^56 effective internal addresses across all
zone prefixes. No internal address conflict is possible
between zones.</li>
<li>Enables organisations to build geographically distributed,
region-routed private networks of arbitrary scale without
external address coordination.</li>
</ul>
<t>ASN numbers that encode to the 127.0.0.0/8 range in the
r.r.r.r field (ASN 2130706432 through ASN 2147483647) are
reserved for internal zone use and MUST NOT be allocated by
IANA for public internet routing.</t>
</section>

<section anchor="inter-company-interop-prefix-127-127-0-0"><name>Inter-Company Interop Prefix (127.127.0.0)</name>
<t>The 127.127.0.0 prefix is reserved as the standard inter-
company interoperability DMZ. When two organisations need to
interconnect without exposing their internal zone addressing,
both deploy XLATE8 engines facing a shared 127.127.0.0
address space. Full specification in <xref target="ZONESERVER"></xref>
Section 16.9.</t>
</section>

<section anchor="two-xlate8-interop-model"><name>Two-XLATE8 Interop Model</name>

<artwork>Company A                          Company B
---------                          ---------
127.1.0.0.x   XLATE8-A  127.127.0.0  XLATE8-B  127.2.0.0.x
</artwork>
<t>Properties:</t>

<ul spacing="compact">
<li>Company A never sees Company B's 127.2.0.0 addresses.</li>
<li>Company B never sees Company A's 127.1.0.0 addresses.</li>
<li>Each company controls exactly what it exposes.</li>
<li>No address overlap possible. No NAT complexity.</li>
<li>Setup time: minutes per service exposed.</li>
</ul>
</section>

<section anchor="private-interop-asn-asn-65534"><name>Private Interop ASN (ASN 65534)</name>
<t>ASN 65534 is reserved for private inter-company BGP8 peering
consistent with <xref target="RFC6996"></xref>:</t>

<artwork>0.0.255.254.x.x.x.x
</artwork>
<t>ASN 65533 (0.0.255.253.x.x.x.x) is reserved for
documentation and testing purposes.</t>
</section>

<section anchor="rine-peering-prefix-100-0-0-0-8"><name>RINE Peering Prefix (100.0.0.0/8)</name>
<t>The 100.0.0.0/8 range of the r.r.r.r field is permanently
reserved for the Regional Inter-Network Exchange (RINE)
peering fabric. RINE addresses are used exclusively for
AS-to-AS peering link addressing at IXPs and private
interconnect facilities. Full specification in <xref target="RINE"></xref>.</t>
<t>RINE addresses:</t>

<ul spacing="compact">
<li>MUST NOT be advertised in the global BGP8 routing table.</li>
<li>MUST NOT be assigned to end devices.</li>
<li>MUST be filtered at all eBGP8 border routers.</li>
</ul>
</section>

<section anchor="interior-link-convention-222-0-0-0-8"><name>Interior Link Convention (222.0.0.0/8)</name>
<t>The n.n.n.n range 222.0.0.0/8 is the well-known IPv8 interior
link address convention. Every AS MAY use &lt;own-asn&gt;.222.x.x.x
for router-to-router interior link addressing within their AS.</t>
<t>This convention is analogous to RFC 1918 <xref target="RFC1918"></xref> for IPv4
-- universally recognised, universally filtered, never routed
externally, never an endpoint.</t>
</section>

<section anchor="address-usage-model"><name>Address Usage Model</name>
<table>
<thead>
<tr>
<th>Address Space</th>
<th>Usage</th>
<th>Routable</th>
</tr>
</thead>

<tbody>
<tr>
<td>127.x.x.x.n.n.n.n</td>
<td>Internal devices (all zones)</td>
<td>Never</td>
</tr>

<tr>
<td>127.127.0.0.n.n.n.n</td>
<td>Inter-company interop DMZ</td>
<td>Private</td>
</tr>

<tr>
<td>100.x.x.x.n.n.n.n</td>
<td>RINE peering links only</td>
<td>Never</td>
</tr>

<tr>
<td>&lt;asn&gt;.222.x.x.x</td>
<td>Interior router links</td>
<td>Never</td>
</tr>

<tr>
<td>0.0.255.254.n.n.n.n</td>
<td>Private BGP8 peering</td>
<td>Private</td>
</tr>

<tr>
<td>&lt;own-asn&gt;.n.n.n.n</td>
<td>Explicit public services only</td>
<td>Global</td>
</tr>

<tr>
<td>0.0.0.0.n.n.n.n</td>
<td>IPv4 compatible (r.r.r.r = 0)</td>
<td>IPv4 only</td>
</tr>
</tbody>
</table><t>Most devices on most networks use 127.x.x.x internal
addressing. Public ASN addresses are used only for explicitly
public-facing services.</t>
</section>
</section>

<section anchor="address-classes"><name>Address Classes</name>
<table>
<thead>
<tr>
<th>r.r.r.r Value</th>
<th>Class</th>
<th>Description</th>
</tr>
</thead>

<tbody>
<tr>
<td>0.0.0.0</td>
<td>IPv4 Compatible</td>
<td>Route on n.n.n.n using IPv4 rules</td>
</tr>

<tr>
<td>0.0.0.1 through</td>
<td>ASN Unicast</td>
<td>Route to ASN, deliver to n.n.n.n</td>
</tr>

<tr>
<td>99.255.255.255</td>
<td></td>
<td>Public internet routing via eBGP8</td>
</tr>

<tr>
<td>100.0.0.0 through</td>
<td>RINE Peering</td>
<td>AS-to-AS peering link addressing</td>
</tr>

<tr>
<td>100.255.255.255</td>
<td></td>
<td>MUST NOT be globally routed</td>
</tr>

<tr>
<td>101.0.0.0 through</td>
<td>ASN Unicast</td>
<td>Route to ASN, deliver to n.n.n.n</td>
</tr>

<tr>
<td>126.255.255.255</td>
<td></td>
<td>Public internet routing via eBGP8</td>
</tr>

<tr>
<td>127.0.0.0 through</td>
<td>Internal Zone Prefix</td>
<td>Internal zone identifier</td>
</tr>

<tr>
<td>127.255.255.255</td>
<td></td>
<td>MUST NOT be routed externally</td>
</tr>

<tr>
<td>128.0.0.0 through</td>
<td>ASN Unicast</td>
<td>Route to ASN, deliver to n.n.n.n</td>
</tr>

<tr>
<td>ff.fe.ff.ff</td>
<td></td>
<td>Public internet routing via eBGP8</td>
</tr>

<tr>
<td>ff.ff.00.00</td>
<td>Cross-ASN Multicast</td>
<td>General cross-ASN multicast</td>
</tr>

<tr>
<td>ff.ff.00.01</td>
<td>OSPF8 Reserved</td>
<td>OSPF8 protocol multicast traffic</td>
</tr>

<tr>
<td>ff.ff.00.02</td>
<td>BGP8 Reserved</td>
<td>BGP8 peer discovery multicast</td>
</tr>

<tr>
<td>ff.ff.00.03</td>
<td>EIGRP Reserved</td>
<td>Reserved. Deprecated. Vendor ext.</td>
</tr>

<tr>
<td>ff.ff.00.04</td>
<td>RIP Reserved</td>
<td>Reserved. Deprecated.</td>
</tr>

<tr>
<td>ff.ff.00.05</td>
<td>IS-IS8 Reserved</td>
<td>IS-IS8. Vendor extensible.</td>
</tr>

<tr>
<td>ff.ff.00.06 through</td>
<td>Cross-ASN Multicast</td>
<td>Available for future IANA</td>
</tr>

<tr>
<td>ff.ff.ef.ff</td>
<td>(available)</td>
<td>assignment.</td>
</tr>

<tr>
<td>ff.ff.f0.00 through</td>
<td>Reserved</td>
<td>Future use.</td>
</tr>

<tr>
<td>ff.ff.fe.ff</td>
<td></td>
<td></td>
</tr>

<tr>
<td>ff.ff.ff.ff</td>
<td>Broadcast</td>
<td>Maps to L2 broadcast.</td>
</tr>

<tr>
<td></td>
<td></td>
<td>MUST NOT be routed.</td>
</tr>
</tbody>
</table><t>The n.n.n.n range 222.0.0.0/8 is reserved by convention for
interior link addressing per Section 3.10.</t>

<section anchor="anycast"><name>Anycast</name>
<t>Anycast is not a separate address class in IPv8. Anycast is
a routing property implemented via eBGP8. The Cost Factor
(CF) metric defined in <xref target="ROUTING-PROTOCOLS"></xref> routes each packet
to the nearest BGP8 instance by measured cost automatically.</t>
</section>
</section>

<section anchor="ipv8-packet-header"><name>IPv8 Packet Header</name>

<section anchor="header-format"><name>Header Format</name>
<t>IPv8 uses IP version number 8 in the Version field. The header
extends IPv4 by replacing the 32-bit src/dst address fields
with 64-bit equivalents.</t>
<t>&lt;CODE BEGINS&gt;</t>

<artwork> 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version|  IHL  |Type of Service|          Total Length         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Identification        |Flags|      Fragment Offset    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Time to Live |    Protocol   |         Header Checksum       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Source ASN Prefix (r.r.r.r)                |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Source Host Address (n.n.n.n)              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Destination ASN Prefix (r.r.r.r)              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Destination Host Address (n.n.n.n)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
<t>&lt;CODE ENDS&gt;</t>
<t>The IPv8 header is 8 octets longer than the IPv4 header.</t>
</section>

<section anchor="socket-api-compatibility"><name>Socket API Compatibility</name>
<t>Existing IPv4 applications use the standard BSD socket API
with AF_INET and sockaddr_in. The IPv8 compatibility layer
intercepts socket calls transparently -- the application has
zero IPv8 awareness. New applications MAY use AF_INET8 with
sockaddr_in8:</t>

<artwork>struct sockaddr_in8 {
    sa_family_t    sin8_family;   /* AF_INET8 */
    in_port_t      sin8_port;     /* port number */
    uint32_t       sin8_asn;      /* r.r.r.r ASN prefix */
    struct in_addr sin8_addr;     /* n.n.n.n host address */
};
</artwork>
</section>
</section>

<section anchor="asn-dot-notation"><name>ASN Dot Notation</name>
<t>Format: <tt>&lt;ASN&gt;.&lt;n&gt;.&lt;n&gt;.&lt;n&gt;.&lt;n&gt;</tt></t>
<t>Where ASN is the autonomous system number and n.n.n.n is
the host address. Example ASNs 64496-64511 are reserved
for documentation per <xref target="RFC5398"></xref>.</t>

<artwork>64496.192.0.2.1  = 0.0.251.240.192.0.2.1  (Example-A)
64497.192.0.2.1  = 0.0.251.241.192.0.2.1  (Example-B)
</artwork>
<t>All IPv8-compliant implementations MUST accept ASN Dot
Notation in all contexts where an IPv8 address is accepted.</t>
</section>

<section anchor="dns-a8-record-type"><name>DNS A8 Record Type</name>

<ul spacing="compact">
<li><strong>Type:</strong> A8 (IANA assignment pending)</li>
<li><strong>Format:</strong> 64-bit IPv8 address in network byte order</li>
<li>RFC 1918 addresses MUST NOT be published as A8 records
in public DNS.</li>
<li>An IPv8 resolver SHOULD request both A and A8 records.</li>
<li>For IPv4 applications on IPv8 hosts, the resolver returns
the n.n.n.n portion; the stack prepends r.r.r.r
transparently.</li>
<li>The nominal A8 response is an even/odd pair -- one even
address and one odd address providing load balancing and
redundancy by default.</li>
</ul>
<t>Example records:</t>

<artwork>ns1.example.com.  IN  A8  0.0.59.65.192.0.2.1
ns1.example.com.  IN  A8  0.0.59.65.192.0.2.2
</artwork>
</section>

<section anchor="routing-protocol-behaviour"><name>Routing Protocol Behaviour</name>

<section anchor="mandatory-routing-protocols"><name>Mandatory Routing Protocols</name>
<table>
<thead>
<tr>
<th>Protocol</th>
<th>Scope</th>
<th>Function</th>
<th>Status</th>
</tr>
</thead>

<tbody>
<tr>
<td>eBGP8</td>
<td>Inter-AS</td>
<td>Mandatory EGP for public internet</td>
<td>MANDATORY</td>
</tr>

<tr>
<td>IBGP8</td>
<td>Inter-zone</td>
<td>Mandatory for internal zone routing</td>
<td>MANDATORY</td>
</tr>

<tr>
<td>OSPF8</td>
<td>Intra-zone</td>
<td>Mandatory for intra-zone routing</td>
<td>MANDATORY</td>
</tr>

<tr>
<td>IS-IS8</td>
<td>Intra-AS</td>
<td>Available in all L3 stacks</td>
<td>MUST BE AVAIL.</td>
</tr>

<tr>
<td>Static</td>
<td>All scopes</td>
<td>Mandatory for legacy and VRF routing</td>
<td>MANDATORY</td>
</tr>

<tr>
<td>BGP4</td>
<td>Transition</td>
<td>IPv4 AS compatibility</td>
<td>TRANSITION</td>
</tr>
</tbody>
</table></section>

<section anchor="deprecated-routing-protocols"><name>Deprecated Routing Protocols</name>
<table>
<thead>
<tr>
<th>Protocol</th>
<th>Status in IPv8</th>
<th>Notes</th>
</tr>
</thead>

<tbody>
<tr>
<td>RIP/RIPv2</td>
<td>DEPRECATED</td>
<td>Replaced by OSPF8</td>
</tr>

<tr>
<td>EIGRP</td>
<td>DEPRECATED</td>
<td>Vendor extensible</td>
</tr>
</tbody>
</table></section>

<section anchor="ebgp8-mandatory-exterior-gateway-protocol"><name>eBGP8 - Mandatory Exterior Gateway Protocol</name>
<t>eBGP8 is the mandatory exterior gateway protocol. All L3
devices MUST implement eBGP8. eBGP8 is 100% backward
compatible with BGP4 <xref target="RFC4271"></xref>. Full specification in
<xref target="ROUTING-PROTOCOLS"></xref>.</t>
<t>The minimum injectable prefix at inter-AS boundaries is /16.
Prefixes more specific than /16 MUST NOT be advertised across
AS boundaries.</t>
</section>

<section anchor="ibgp8-inter-zone-routing"><name>IBGP8 - Inter-Zone Routing</name>
<t>IBGP8 distributes WHOIS8-validated external routes throughout
an autonomous system with full CF metric awareness.</t>

<artwork>CF_total = CF_external + CF_intrazone
</artwork>
</section>

<section anchor="ospf8-intra-zone-routing"><name>OSPF8 - Intra-Zone Routing</name>
<t>OSPF8 is OSPFv2 <xref target="RFC2328"></xref> extended with a CF export interface.
All L3 devices MUST implement OSPF8. Full specification in
<xref target="ROUTING-PROTOCOLS"></xref> Section 10.3.</t>
</section>

<section anchor="is-is8-optional-interior-gateway-protocol"><name>IS-IS8 - Optional Interior Gateway Protocol</name>
<t>IS-IS8 MUST be available in all IPv8 L3 routing stacks.
Carriers and operators MAY deploy IS-IS8 at their discretion.
IPv8 makes no recommendation regarding IGP selection. Full
specification in <xref target="ROUTING-PROTOCOLS"></xref> Section 10.4.</t>
</section>

<section anchor="two-tier-routing-table"><name>Two-Tier Routing Table</name>
<table>
<thead>
<tr>
<th>Tier</th>
<th>Scope</th>
<th>Index</th>
<th>Description</th>
</tr>
</thead>

<tbody>
<tr>
<td>1</td>
<td>Global</td>
<td>r.r.r.r</td>
<td>Routes to correct AS border router</td>
</tr>

<tr>
<td>2</td>
<td>Local</td>
<td>n.n.n.n</td>
<td>Identical to existing IPv4 routing table</td>
</tr>
</tbody>
</table><t>When r.r.r.r = 0.0.0.0 the Tier 1 lookup is bypassed.</t>
</section>

<section anchor="vrf-virtual-routing-and-forwarding"><name>VRF - Virtual Routing and Forwarding</name>
<t>VRF is mandatory for all IPv8 L3 devices. The management VRF
(VLAN 4090) and OOB VRF (VLAN 4091) MUST be implemented on
all IPv8-compliant devices. VRF isolation is a routing table
property that cannot be bypassed by software misconfiguration.</t>
</section>
</section>

<section anchor="icmpv8"><name>ICMPv8</name>
<t>ICMPv8 extends ICMP <xref target="RFC792"></xref> to support 64-bit IPv8 addresses.
ICMPv8 is backward compatible with ICMPv4. Both versions MUST
be supported simultaneously. ICMPv8 carries full 64-bit IPv8
addresses in Echo, Destination Unreachable, Time Exceeded,
Redirect, and Parameter Problem messages. Path MTU Discovery
is extended for the larger IPv8 header. Full specification
in <xref target="SUPPORT8"></xref>.</t>
</section>

<section anchor="multicast"><name>Multicast</name>

<section anchor="intra-asn-multicast"><name>Intra-ASN Multicast</name>

<artwork>0.0.0.0.224.0.0.0/4   All intra-ASN multicast
0.0.0.0.239.0.0.0/8   Administratively scoped intra-ASN
</artwork>
<t>Packets with r.r.r.r = 0.0.0.0 and n.n.n.n in the multicast
range MUST NOT be forwarded beyond the local AS boundary.</t>
</section>

<section anchor="cross-asn-multicast"><name>Cross-ASN Multicast</name>

<artwork>ff.ff.00.00.n.n.n.n   General cross-ASN multicast
ff.ff.00.01.n.n.n.n   OSPF8 protocol traffic
ff.ff.00.02.n.n.n.n   BGP8 peer discovery
ff.ff.00.03.n.n.n.n   EIGRP (reserved, deprecated)
ff.ff.00.04.n.n.n.n   RIP (reserved, deprecated)
ff.ff.00.05.n.n.n.n   IS-IS8 (reserved, vendor ext.)
</artwork>
</section>

<section anchor="cross-asn-multicast-group-assignments"><name>Cross-ASN Multicast Group Assignments</name>

<artwork>ff.ff.00.00.224.0.0.1    All IPv8 routers
ff.ff.00.00.224.0.0.2    All IPv8 Zone Servers
ff.ff.00.00.224.0.0.5    OSPF8 all routers
ff.ff.00.00.224.0.0.6    OSPF8 designated routers
ff.ff.00.00.224.0.0.10   IBGP8 peer discovery
ff.ff.00.00.239.0.0.0/8  Administratively scoped
</artwork>
</section>
</section>

<section anchor="anycast-1"><name>Anycast</name>
<t>Anycast in IPv8 is a routing property implemented via eBGP8
and the Cost Factor (CF) metric. No special r.r.r.r prefix
is required. CF routes each packet to the nearest instance
by measured path cost.</t>
</section>

<section anchor="broadcast"><name>Broadcast</name>
<t>The r.r.r.r value ff.ff.ff.ff is permanently reserved for
broadcast and maps to the Layer 2 broadcast address. Packets
with r.r.r.r = ff.ff.ff.ff MUST NOT be routed beyond the
local network segment.</t>
</section>

<section anchor="compatibility-and-transition"><name>Compatibility and Transition</name>

<section anchor="single-stack-operation"><name>Single Stack Operation</name>
<t>IPv8 does not require dual-stack operation. IPv4 is a proper
subset of IPv8 with r.r.r.r = 0.0.0.0. There is no flag day
and no forced migration.</t>
</section>

<section anchor="ipv4-network-compatibility"><name>IPv4 Network Compatibility</name>
<t>Networks that have not deployed IPv8 continue to operate
unchanged. IPv8 border routers strip the r.r.r.r prefix for
IPv4-only destinations.</t>
</section>

<section anchor="eightto4"><name>8to4 - IPv8 Across IPv4-Only Networks</name>
<t>IPv8 ASNs separated by IPv4-only transit ASNs communicate
via 8to4 tunnelling. HTTPS tunnelling is the preferred
encapsulation -- it provides automatic encryption and
traverses most firewalls without special configuration.
The 8TO4-ENDPOINT BGP8 attribute carries the IPv4 tunnel
endpoint automatically. Zero manual tunnel configuration
required. Full specification in <xref target="ROUTING-PROTOCOLS"></xref>
Section 11.</t>
</section>

<section anchor="transition-sequence"><name>Transition Sequence</name>

<artwork>Phase 1: Tier 1/2 ISP routers deploy IPv8 via software update.
Phase 2: Cloud providers deploy IPv8 internally.
Phase 3: Enterprise networks optionally adopt ASN prefixes.
Phase 4: Consumer ISPs deploy IPv8.
</artwork>
<t>8to4 tunnelling enables each phase to interoperate with
phases not yet completed. There is no dependency between
phases.</t>
</section>
</section>

<section anchor="cgnat-behaviour"><name>CGNAT Behaviour</name>
<t>CGNAT devices require no modification. IPv8-aware CGNAT MUST
NOT modify the r.r.r.r field during translation. Only the
n.n.n.n field is subject to NAT translation. CGNAT operators
without an ASN MUST use r.r.r.r = 0.0.0.0.</t>
</section>

<section anchor="application-compatibility"><name>Application Compatibility</name>
<t>Existing IPv4 applications require no modification. The IPv8
socket compatibility layer transparently manages r.r.r.r via
DNS8 interception and XLATE8. New applications MAY use
AF_INET8 and sockaddr_in8 as defined in Section 5.2.</t>
</section>

<section anchor="cloud-provider-applicability"><name>Cloud Provider Applicability</name>
<t>IPv8 resolves VPC address overlap, VPC peering complexity,
and multi-cloud routing through ASN-based disambiguation.
The 127.x.x.x internal zone prefix enables cloud providers
to assign unique zone prefixes to customer VPCs without
address renumbering. Each customer VPC receives a unique
127.x.x.x zone prefix -- no two customer networks can overlap
regardless of RFC 1918 address reuse within each VPC.</t>
</section>

<section anchor="device-compliance-tiers"><name>Device Compliance Tiers</name>

<section anchor="tier-1-end-device"><name>Tier 1 - End Device</name>
<t>End devices MUST implement: Route8 unified routing table,
static routes, VRF (management plane), two default gateways
(even/odd), DHCP8 client, ARP8, ICMPv8, TCP/443 persistent
connection to Zone Server, NetLog8 client, ACL8 client-side
enforcement, management VRF (VLAN 4090), OOB VRF (VLAN 4091),
gratuitous ARP8 on boot.</t>
<t>End devices MAY implement: OSPF8, IS-IS8, eBGP8, IBGP8.</t>
<t>End devices DO NOT require any routing protocol to reach
their default gateway.</t>
</section>

<section anchor="tier-2-l2-network-device"><name>Tier 2 - L2 Network Device</name>
<t>L2 devices MUST implement: 802.1Q trunking, VLAN auto-
creation on tagged traffic, management VRF (VLAN 4090),
OOB VRF (VLAN 4091), switch port OAuth2 binding, LLDP,
NetLog8 client, ARP8 (management plane only), ICMPv8
(management plane only), PVRST, Zone Server as PVRST root
capability, sticky MAC binding, Zone Server MAC notification.</t>
</section>

<section anchor="tier-3-l3-network-device"><name>Tier 3 - L3 Network Device</name>
<t>L3 devices MUST implement: All Tier 1 requirements, eBGP8,
IBGP8, OSPF8, IS-IS8 (available), static routes, VRF (full),
XLATE8 (mandatory on edge devices), WHOIS8 resolver, ACL8
gateway enforcement, Zone Server services (if Zone Server
role), PVRST root capability, switch port OAuth2 binding
support.</t>
</section>

<section anchor="spanning-tree-pvrst-mandatory"><name>Spanning Tree - PVRST Mandatory</name>
<t>PVRST is mandatory for all IPv8 L2 and L3 devices. MST is
not recommended. Zone Servers are PVRST roots by default:</t>

<ul spacing="compact">
<li>Primary Zone Server (.254): PVRST root for even VLANs,
priority 4096.</li>
<li>Secondary Zone Server (.253): PVRST root for odd VLANs,
priority 4096.</li>
</ul>
</section>

<section anchor="nic-rate-limits"><name>NIC Rate Limits</name>
<t>IPv8 certified NIC firmware enforces rate limits that cannot
be overridden by software:</t>

<artwork>Broadcasts:            10 per second maximum
User unauthenticated:  10 per second, max 30 per minute
User authenticated:    100 per second, max 300 per minute
</artwork>
<t>The DHCP8 Zone Server is the sole authority for rate limit
elevation. Full NIC certification specification in <xref target="UPDATE8"></xref>.</t>
</section>
</section>

<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="asn-prefix-spoofing"><name>ASN Prefix Spoofing</name>
<t>IPv8 border routers MUST implement ingress filtering
validating that the source r.r.r.r of received packets
matches the ASN of the BGP8 peer. Consistent with BCP 38
<xref target="RFC2827"></xref>.</t>
</section>

<section anchor="internal-zone-prefix-protection"><name>Internal Zone Prefix Protection</name>
<t>The 127.x.x.x internal zone prefix MUST NOT appear on WAN
interfaces. Border routers MUST drop packets with 127.x.x.x
source or destination r.r.r.r on external interfaces.
NetLog8 SEC-ALERT MUST be generated for each violation.</t>
</section>

<section anchor="rine-prefix-protection"><name>RINE Prefix Protection</name>
<t>The 100.x.x.x RINE prefix MUST NOT appear in eBGP8
advertisements or on non-peering interfaces. NetLog8
SEC-ALERT MUST be generated for each violation.</t>
</section>

<section anchor="interior-link-convention-protection"><name>Interior Link Convention Protection</name>
<t>Border routers MUST filter received BGP8 advertisements
containing n.n.n.n addresses in the 222.0.0.0/8 range.
NetLog8 E3 trap MUST be generated for each violation.</t>
</section>

<section anchor="rfc-1918-address-privacy"><name>RFC 1918 Address Privacy</name>
<t>RFC 1918 private addresses in n.n.n.n remain non-routable
on the public internet consistent with IPv4 behaviour.</t>
</section>

<section anchor="cross-asn-multicast-filtering"><name>Cross-ASN Multicast Filtering</name>
<t>Routing protocol reserved prefixes ff.ff.00.01 through
ff.ff.00.05 MUST be filtered at all border routers.</t>
</section>

<section anchor="min-prefix-enforcement"><name>/16 Minimum Prefix Enforcement</name>
<t>Prefixes more specific than /16 MUST NOT be accepted from
external BGP8 peers. Such advertisements MUST be rejected
and logged via NetLog8 as SEC-ALERT.</t>
</section>
</section>

<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="ip-version-number"><name>IP Version Number</name>
<t>IANA is requested to assign version number 8 in the IP
Version Number registry to Internet Protocol Version 8.</t>
</section>

<section anchor="internal-zone-prefix-reservation"><name>Internal Zone Prefix Reservation</name>
<t>IANA is requested to reserve the r.r.r.r range 127.0.0.0
through 127.255.255.255 as the IPv8 internal zone prefix
space. ASN numbers 2130706432 through 2147483647 MUST NOT
be allocated for public internet routing.</t>
</section>

<section anchor="rine-prefix-reservation"><name>RINE Prefix Reservation</name>
<t>IANA is requested to reserve the r.r.r.r range 100.0.0.0
through 100.255.255.255 as the IPv8 RINE peering fabric
range. ASN numbers 1677721600 through 1694498815 MUST NOT
be allocated for public internet routing.</t>
</section>

<section anchor="interior-link-convention"><name>Interior Link Convention</name>
<t>IANA is requested to document the n.n.n.n range 222.0.0.0/8
as the IPv8 interior link address convention.</t>
</section>

<section anchor="cross-asn-multicast-range"><name>Cross-ASN Multicast Range</name>
<t>IANA is requested to establish a registry for IPv8 cross-ASN
multicast prefixes within ff.ff.00.00 through ff.ff.ef.ff.</t>
</section>

<section anchor="broadcast-reservation"><name>Broadcast Reservation</name>
<t>IANA is requested to reserve r.r.r.r value ff.ff.ff.ff as
the IPv8 broadcast address.</t>
</section>

<section anchor="dns-a8-record-type-1"><name>DNS A8 Record Type</name>
<t>IANA is requested to assign a DNS resource record type number
for the A8 record type defined in Section 7.</t>
</section>

<section anchor="multicast-group-assignments"><name>Multicast Group Assignments</name>
<t>IANA is requested to assign multicast groups within
ff.ff.00.00.224.0.0.0/24 as defined in Section 10.3.</t>
</section>

<section anchor="private-asn-reservations"><name>Private ASN Reservations</name>
<t>IANA is requested to reserve ASN 65534 for private inter-
company BGP8 peering and ASN 65533 for documentation and
testing purposes consistent with <xref target="RFC6996"></xref>.</t>
</section>
</section>

</middle>

<back>
<references><name>Informative References</name>
<reference anchor="RFC1918" target="https://www.rfc-editor.org/info/rfc1918">
  <front>
    <title>Address Allocation for Private Internets</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"></author>
    <date year="1996" month="February"></date>
  </front>
  <seriesInfo name="BCP" value="5"></seriesInfo>
  <seriesInfo name="RFC" value="1918"></seriesInfo>
</reference>
<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"></author>
    <date year="1997" month="March"></date>
  </front>
  <seriesInfo name="BCP" value="14"></seriesInfo>
  <seriesInfo name="RFC" value="2119"></seriesInfo>
</reference>
<reference anchor="RFC2328" target="https://www.rfc-editor.org/info/rfc2328">
  <front>
    <title>OSPF Version 2</title>
    <author fullname="J. Moy" initials="J." surname="Moy"></author>
    <date year="1998" month="April"></date>
  </front>
  <seriesInfo name="STD" value="54"></seriesInfo>
  <seriesInfo name="RFC" value="2328"></seriesInfo>
</reference>
<reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827">
  <front>
    <title>Network Ingress Filtering</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"></author>
    <author fullname="D. Senie" initials="D." surname="Senie"></author>
    <date year="2000" month="May"></date>
  </front>
  <seriesInfo name="BCP" value="38"></seriesInfo>
  <seriesInfo name="RFC" value="2827"></seriesInfo>
</reference>
<reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271">
  <front>
    <title>A Border Gateway Protocol 4 (BGP-4)</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"></author>
    <date year="2006" month="January"></date>
  </front>
  <seriesInfo name="RFC" value="4271"></seriesInfo>
</reference>
<reference anchor="RFC5398" target="https://www.rfc-editor.org/info/rfc5398">
  <front>
    <title>Autonomous System (AS) Numbers Reserved for Documentation Use</title>
    <author fullname="G. Huston" initials="G." surname="Huston"></author>
    <date year="2008" month="December"></date>
  </front>
  <seriesInfo name="RFC" value="5398"></seriesInfo>
</reference>
<reference anchor="RFC6996" target="https://www.rfc-editor.org/info/rfc6996">
  <front>
    <title>Autonomous System (AS) Reservation for Private Use</title>
    <author fullname="J. Mitchell" initials="J." surname="Mitchell"></author>
    <date year="2013" month="July"></date>
  </front>
  <seriesInfo name="BCP" value="6"></seriesInfo>
  <seriesInfo name="RFC" value="6996"></seriesInfo>
</reference>
<reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
  <front>
    <title>JSON Web Token (JWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"></author>
    <date year="2015" month="May"></date>
  </front>
  <seriesInfo name="RFC" value="7519"></seriesInfo>
</reference>
<reference anchor="RFC792" target="https://www.rfc-editor.org/info/rfc792">
  <front>
    <title>Internet Control Message Protocol</title>
    <author fullname="J. Postel" initials="J." surname="Postel"></author>
    <date year="1981" month="September"></date>
  </front>
  <seriesInfo name="STD" value="5"></seriesInfo>
  <seriesInfo name="RFC" value="792"></seriesInfo>
</reference>
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"></author>
    <date year="2017" month="May"></date>
  </front>
  <seriesInfo name="BCP" value="14"></seriesInfo>
  <seriesInfo name="RFC" value="8174"></seriesInfo>
</reference>
<reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"></author>
    <author fullname="R. Hinden" initials="R." surname="Hinden"></author>
    <date year="2017" month="July"></date>
  </front>
  <seriesInfo name="STD" value="86"></seriesInfo>
  <seriesInfo name="RFC" value="8200"></seriesInfo>
</reference>
<reference anchor="RINE" target="">
  <front>
    <title>Regional Inter-Network Exchange</title>
    <author fullname="Jamie Thain" initials="J." surname="Thain"></author>
    <date year="2026" month="April"></date>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-thain-rine-00"></seriesInfo>
</reference>
<reference anchor="ROUTING-PROTOCOLS" target="">
  <front>
    <title>IPv8 Routing Protocols</title>
    <author fullname="Jamie Thain" initials="J." surname="Thain"></author>
    <date year="2026" month="April"></date>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-thain-routing-protocols-00"></seriesInfo>
</reference>
<reference anchor="SUPPORT8" target="">
  <front>
    <title>IPv8 Support Protocols -- ARP8, ICMPv8, and Route8</title>
    <author fullname="Jamie Thain" initials="J." surname="Thain"></author>
    <date year="2026" month="April"></date>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-thain-support8-00"></seriesInfo>
</reference>
<reference anchor="UPDATE8" target="">
  <front>
    <title>Update8 and NIC Certification</title>
    <author fullname="Jamie Thain" initials="J." surname="Thain"></author>
    <date year="2026" month="April"></date>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-thain-update8-00"></seriesInfo>
</reference>
<reference anchor="ZONESERVER" target="">
  <front>
    <title>IPv8 Zone Server Architecture</title>
    <author fullname="Jamie Thain" initials="J." surname="Thain"></author>
    <date year="2026" month="April"></date>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-thain-zoneserver-00"></seriesInfo>
</reference>
</references>

</back>

</rfc>
