Shim6                                                          G. Huston
Internet-Draft                                                     APNIC
Expires: January 3, 2006                                    July 2, 2005


   Architectural Commentary on Site Multi-homing using a Level 3 Shim
                      draft-ietf-shim6-arch-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on January 3, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document provides an architectural description of the level 3
   shim approach to site Multi-homing in IPv6 as described in
   [ID.SHIM6], [ID.REFER], [ID.FUNC], and [ID.HBA], using as a framework
   for this analysis the approach described in [ID.ARCH].

Notes

   This initial draft has been prepared as a commentary on the Shim6
   proposal as originally developed by a design team of the Multi6



Huston                   Expires January 3, 2006                [Page 1]


Internet-Draft             Multi6 Architecture                 July 2005


   Working Group, currently being further developed by the Shim6 Working
   Group.  The document provides am architectural description of the
   approach, using the framework described in the multi-homing
   architecture document.

   The Shim6 specification is at an initial state, and there are areas
   where the documentation is incomplete.  This architectural
   description is also incomplete at this stage, and will require
   further revision as the Shim6 approach is refined by the Shim6
   Working Group.

   In addition, this initial draft does not analyze the properties of
   the HBA and CGA address types, and their role in providing some
   resilience against various forms of third party attacks.  This
   analysis will be included in future revisions of this document.




































Huston                   Expires January 3, 2006                [Page 2]


Internet-Draft             Multi6 Architecture                 July 2005


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Summary of Shim6 . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Endpoint Identity  . . . . . . . . . . . . . . . . . . . . . .  6
   4.  Functional Decomposition . . . . . . . . . . . . . . . . . . .  7
     4.1   Establishing Session State . . . . . . . . . . . . . . . .  7
     4.2   Rehoming Triggers  . . . . . . . . . . . . . . . . . . . . 10
     4.3   Rehoming Locator Pair Selection  . . . . . . . . . . . . . 11
     4.4   Locator Change . . . . . . . . . . . . . . . . . . . . . . 11
     4.5   Removal of Session State . . . . . . . . . . . . . . . . . 12
   5.  Additional Comments  . . . . . . . . . . . . . . . . . . . . . 13
   6.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     6.1   Normative References . . . . . . . . . . . . . . . . . . . 14
     6.2   Informative References . . . . . . . . . . . . . . . . . . 15
       Author's Address . . . . . . . . . . . . . . . . . . . . . . . 15
       Intellectual Property and Copyright Statements . . . . . . . . 16


































Huston                   Expires January 3, 2006                [Page 3]


Internet-Draft             Multi6 Architecture                 July 2005


1.  Introduction

   As noted in the general architectural overview of approached to
   Multi-homing in IPv6 [ID.ARCH] document, there are a number of
   general approaches to supporting site Multi-homing.  These include
   the use of the routing system, use of mobility mechanisms,
   modification of existing elements in the protocol stack, or the
   introduction of a new protocol stack element, and the modification of
   behaviours of hosts and site-exit routers.

   This document provides an commentary of the Level 3 Shim approach to
   site Multi-homing (Shim6) as described in [ID.SHIM6], [ID.REFER],
   [ID.FUNC], and [ID.HBA], using as a framework for this analysis the
   approach as described in [ID.ARCH].

2.  Summary of Shim6

   The approach used by "Level 3 Shim for IPv6" (Shim6) is, as the name
   suggests, one that is based on the modification of the Internet
   Protocol stack element within the protocol stack of the endpoint.
   The modification is in the form of an additional functionality block,
   as indicated in Figure 1.


   +-----------------------------------------------------------------+
   | Transport Protocols                                             |
   +-----------------------------------------------------------------+
   +-----------------------------------------------------------------+
   | IP Protocol                                                     |
   |                                                                 |
   |   IP Endpoint     ------ ------- -------------- -------------   |
   |    sub-layer      | AH | | ESP | | Frag/reass | | Dest opts |   |
   |                   ------ ------- -------------- -------------   |
   |                                   |                             |
   |   Multi6                 =====================                  |
   |    sub-layer  ========> ||  shim6  insert    ||                 |
   |                          =====================                  |
   |                                   |                             |
   |   IP Routing                   -------                          |
   |   sub-layer                    | IP  |                          |
   |                                -------                          |
   |                                                                 |
   +-----------------------------------------------------------------+


   Shim6 Protocol Stack (From [ID.SHIM6])

                                 Figure 1



Huston                   Expires January 3, 2006                [Page 4]


Internet-Draft             Multi6 Architecture                 July 2005


   Above the Shim6 protocol element the protocol stack uses constant
   endpoint identities to refer to both itself and to the remote
   protocol stack.  The shim layer provider a set of associations
   between endpoint identity pairs and locator sets.

   As packets are passed from the IP Endpoint sub-layer to the IP
   Routing sub-layer, the endpoint identities are mapped to a current
   pair of locators.  The reverse mapping is applied to incoming
   packets, where the incoming locator pair is stripped off the packet,
   and the associated endpoint identity pair is associated with the
   packet which is then passed to the IP Endpoint sub-layer.
   Demultiplexing the IP packet to the appropriate transport session is
   based on the endpoint identities.  In this Shim6 approach the
   endpoint identities and the locators are both IP addresses.  The
   endpoint identities are the initial addresses used between the two
   hosts.  The locators are the set of IP addresses that are associated
   with the endpoint.

   The intention of this approach is to minimise the amount of change
   required to support dynamic locator agility in the protocol stack,
   and support dynamic locator agility as a negotiated endpoint-to-
   endpoint capability.  An application can initiate a session with a
   remote host by using an entirely conventional lookup of the host's
   domain name in the DNS, and open up a session with the remote
   endpoint using one of its addresses as the destination address.  The
   application can continue to exchange packets with this remote host
   for the duration of the session by continuing to use this destination
   address.  If the local host subsequently opens up a new session with
   the same remote host, the same destination address may be used, or if
   the local host passes a reference to a third party as a referral, the
   same destination address may be used.  In terms of semantics and
   functionality this represented no change to the use of addresses as
   endpoint identifiers in the IPv6 architecture.

   Shim6 operates as a per-host header address mapping function.  When
   the Shim6 locator mapping function is activated for a remote endpoint
   packets passed from the IP endpoint sub-layer to the shim sub-layer
   have the packet's headers source and destination addresses rewritten
   with the currently selected locator pair.  Incoming packets passed
   from the IP Routing sub-layer undergo a similar lookup using the
   locator pair.  The packet header is rewritten with the mapped
   endpoint identifier pair is there is an active mapping entry.  This
   functionality is indicated in Figure 2.  Here the endpoint identities
   are referred to as Upper Layer Identifiers (ULIDs), and the packet
   header addresses are referred to as Locators (L).  The Shim6 element
   contains a context state, associating a ULID pair (in this case the
   pair [ULID(A),ULID(B)] with a set of locators for A and a set of
   locators for B. The shim elements are synchronised such that



Huston                   Expires January 3, 2006                [Page 5]


Internet-Draft             Multi6 Architecture                 July 2005


   complementary mappings are performed at each end of the connection.

    ----------------------------          ----------------------------
    | Sender A                 |          | Receiver B               |
    |                          |          |                          |
    |     ULP                  |          |     ULP                  |
    |      |                   |          |      ^                   |
    |      | src ULID(A)       |          |      | src ULID(A)       |
    |      | dst ULID(B)       |          |      | dst ULID(B)       |
    |      v                   |          |      |                   |
    |---Shim6-----------------|          |---Shim6-----------------|
    |      |                   |          |      ^                   |
    |      | src L(A)          |          |      | src L(A)          |
    |      | dst L(B)          |          |      | dst L(A)          |
    |      v                   |          |      |                   |
    |      IP                  |          |      IP                  |
    ----------------------------          ----------------------------
           |                                     ^
           --------------- network path -- -------

   Mapping with changed locators.(From [ID.SHIM6])

                                 Figure 2

   The implication of the decision to place the endpoint identity-to-
   locator mapping protocol element within the IP element is that this
   mapping function is not implicitly aware of session start and tear
   down.  At this level of the protocol stack there is no information to
   indicate wither this packet is a single datagram, or the start of an
   extended packet exchange with a remote entity.  Similarly there is no
   explicit information provided to the shim protocol element to
   indicate when a session is complete, at which point the mapping state
   information could be discarded and the associated host resources
   reclaimed.  This is offset by the advantages of this approach in that
   there is no explicit need to alter the function of any transport
   protocol, as the shim element continues to present constant endpoint
   identities to the upper protocol levels, irrespective of the current
   endpoint/locator mapping being used between the two hosts.

   Assuming that the initial choice of a ULID corresponds to a viable
   network path, the initial state of the Shim6 is a null mapping, as
   the ULID is also a viable locator.  The use of alternate locators by
   the Shim6 is a triggered response, based on a network path
   unreachability signal.

3.  Endpoint Identity

   There are a number of options in the choice of an endpoint identity



Huston                   Expires January 3, 2006                [Page 6]


Internet-Draft             Multi6 Architecture                 July 2005


   realm, including the use of existing addresses as an identity tokens,
   the use of distinguished (possibly non-routeable) addresses as
   tokens, or the use of tokens drawn from a different realm (such as
   use of a fully qualified domain name).

   Shim6 uses the first of these options, and the endpoint identity for
   a host is one of the locator addresses that are normally associated
   with the host.  The particular locator address selected to be the
   endpoint identity (or ULID) is specified in [RFC3484].  Shim6 does
   not mandate the use of distinguished addresses as identities,
   although the use non-routeable distinguished addresses in this
   context is described as an option in this approach.

   The Shim6 approach defines the initial selector of the locator
   addresses pair is to be the same as the ULID pair.  Accordingly, the
   initial state of the multi6 shim element is a null transform.  This
   allows the initial establishment of a transport session without the
   requirement to perform a multi6 capability negotiation.

   The choice of a locator as the endpoint identity for the upper
   protocol layers implies there is no impact in terms of implied
   changes to transport protocols or the upper level applications.
   Applications can continue to resolve fully qualified domain names to
   a set of addresses, and then open a session with the remote party
   specifying a selected address as the address of the remote party.
   The addresses used as source and destination identifiers can continue
   to be used in the context of pseudo-header checksums, session
   demultiplexing, packet reassembly contexts following fragmentation,
   IPSEC security associations, callbacks and referrals, all without
   alteration.  The use in callbacks and referrals can be further
   generalised to the use of these address in the application payload.
   Irrespective of any subsequent change in the locator pair, the
   protocol stack above the Level 3 shim element will continue to use
   the original ULID pair, and any use of these values in payloads will
   continue to match the endpoint identities.

4.  Functional Decomposition

4.1  Establishing Session State

      What form of token is passed to the IP layer from the upper level
      protocol element as an identification of the local protocol stack?

         There is no requirement to change the conventional behaviour of
         the protocol stack.  The upper protocol level may use a
         specified address as a source address, or the upper level may
         explicitly defer the selection of a source address to the IP
         level.  Conventionally, the selected source address is the IP



Huston                   Expires January 3, 2006                [Page 7]


Internet-Draft             Multi6 Architecture                 July 2005


         address of the outbound interface that the IP protocol will use
         to send the packet towards the destination address.  In the
         case of an Shim6-enabled stack, the source address selection
         function would need to consult a local state as to whether the
         destination address is associated with a currently active M6
         state (interpreting the destination address as a ULID).  In
         this case the selected source address, as seen by the upper
         level protocol stack element is the ULID of the stored state
         associated with the destination ULID.  Otherwise the selected
         source address is a selected IP address from the set of
         addresses associated with the particular host interface that
         will be used to send the packet, as happens in a conventional
         IPv6 protocol stack.

      What form of token is passed to the IP layer from the upper level
      protocol element as an identification of the remote session
      target?

         The token passed to the IP layer as the ULID of the destination
         is the address of the destination host.  If the initial
         identification of the remote host is via a domain name, then
         this approach assumes that there are a one or more locators
         held in the DNS.  The local host to performs a name-to-address
         DNS lookup to obtain a set of locators (recorded in the DNS
         using AAAA resource records).  The host then performs a
         selection from this set of locators and uses the selected
         address as the identification of the remote host.  This implies
         no change to the conventional behaviour of the IP protocol
         stack element.

      What form of token is used by the upper level protocol element as
      a endpoint identification mechanism for use within the application
      payload?

         There is no change to the existing behaviour in this approach.
         The upper level protocol element may use a domain name, or an
         IP address as an identification token.

      Does the identity protocol element need to create a mapping from
      the upper level protocol's local and remote identity tokens into
      an identity token that identifies the session?  If so, then is
      this translation performed before or after the initial session
      packet exchange handshake?

         In looking at the interface between the application level and
         the transport level of the protocol stack, there is no
         requirement to create a mapping between the upper level
         identifiers and the session identifiers, as the session



Huston                   Expires January 3, 2006                [Page 8]


Internet-Draft             Multi6 Architecture                 July 2005


         identifiers are the same upper level identifiers.
         In looking at the interface between the transport and internet
         protocol stack elements, then the Shim6 element has to check if
         there is an already established Shim6 state that is associated
         with the ULIDs of the packet being sent.  If so, then the
         translation from the ULID pair to the currently active locator
         pair is performed by the Shim6 protocol element.  If not, then
         no state is created and no mapping is performed.  This infers
         that an initial session packet exchange handshake is supported
         without the requirement to establish an identity to locator
         mapping state.

      How does the session initiator establish that the remote end of
      the session can support the multi-homing capabilities in its
      protocol stack?  If not, does the multi-homing capable protocol
      element report a session establishment failure to the upper level
      protocol, or silently fall back to a non-multi-homed protocol
      operation?

         The session initiator determines the ability of the remote end
         to support the Shim6 protocol via explicit negotiation.  The
         Shim6 protocol will continue to operate in a conventional mode
         if the capability negotiation fails for Shim6 support.  The
         nature of the communication exchange to determine the
         capability to use Shim6 support is not described in [ID.SHIM6].

      How do the endpoints discover the locator set available for each
      other endpoint (locator discovery)?

         The mechanism is by explicit exchange of locator sets between
         the hosts.  The Shim6 description does not describe the precise
         mechanism.  Section 6 of [ID.SHIM6] notes that once the initial
         capability exchange has completed "both ends know a set of
         locators for the peer that are acceptable as the source in
         received packets."  This explicit exchange of locators is not
         necessarily aligned to multiple AAAA Resource records in the
         DNS.

      What mechanisms are used to perform locator selection at each end
      for the local selection of source and destination locators?

         The initial choice of source and destination locators matches
         the initial choice of upper level identifiers, namely the
         initial addresses used as the upper level identifiers.  The
         remote address is obtained using conventional DNS lookup.  The
         local address is based on an address selection from the
         addresses associated with the outbound interface, using the
         procedure described in [RFC3484].



Huston                   Expires January 3, 2006                [Page 9]


Internet-Draft             Multi6 Architecture                 July 2005


      What form of mechanism is used to ensure that the selected site
      exit path matches the selected packet source locator?

         This is not described in the current Shim6 description.


4.2  Rehoming Triggers

   What triggers are used to identify that a switch of locators is
   desirable?

      The Shim6 documentation covers a number of options, but does not
      provide definitive answers to this question.  The [ID.FAIL] notes
      four approaches: namely positive feedback from the upper level
      sessions, negative feedback from the upper level sessions,
      explicit reachability tests and ICMP error messages.
      From the discussion in this draft it appears that negative
      feedback from upper layer transport sessions in the form of ACK
      timeouts is the preferred locator change trigger mechanism.


   Are the triggers based on the end-to-end transport session and/or on
   notification of state changes within the network path from the
   network?

      [ID.FAIL] argues that network path-based triggers, in the form of
      received ICMP errors messages are prone to spoofing, and should
      only be used "as a hint to perform an explicit reachability test".
      Triggers are based on explicit negative information being passed
      from an active transport session (ACK timeouts).  There is also
      the possibility of using positive feedback from the transport
      sessions, where a timeout of positive indication is an indication
      of a reachability problem.  In this case, as with ICMP, an
      explicit reachability test is required to confirm the indication
      of locator failure.


   What triggers can be used to indicate the direction of the failed
   path in order to trigger the appropriate locator repair function?

      The [ID.FAIL] description does not provide a description of
      detection of the failed path.  The Shim6 approach attempts to
      treat path failure as a failure of the locator pair, rather than
      failure of a single locator, so the direction of the failure is
      not necessarily critical information in the search for a new
      functional pair.





Huston                   Expires January 3, 2006               [Page 10]


Internet-Draft             Multi6 Architecture                 July 2005


4.3  Rehoming Locator Pair Selection

   What parameters are used to determine the selection of a locator to
   use to reference the local endpoint?

      The selection of a locator is based on the application of the
      tables as described in RFC 3484 [RFC3484].  The approach also
      allows local policy settings to place a preference for particular
      locator pairs.  Selection of a specific locator pair is based on
      the successful outcome of a return reachability test between the
      two endpoints.


   If the remote endpoint is multi-homed, what parameters are used to
   determine the selection of a locator to use to reference the remote
   endpoint?

      Same as the previous response.


   Must a change of an egress site exit router be accompanied by a
   change in source and / or destination locators?

      This appears to be an area for further study.  The situation is
      not explicitly addressed in the Shim6 documentation.


   How can new locators be added to the locator pool of an existing
   session?

      The explicit Shim6 capability negotiation allows the two endpoints
      to exchange a set of locators as part of the initial setup.  This
      set is then tested, as required, using explicitly reachability
      tests when the endpoints are searching for a viable locator pair.
      The outcome of locator pair reachability tests are stored in an
      ageing local cache.  This allows recently tested pairs that passed
      the reachability test to be used in preference to untested locator
      pairs.
      [ID.FAIL] describes a set of abstract message exchanges for Shim6
      locator set maintenance that includes explicit "add" and Delete"
      commands to allow a host to instruct the remote end to add or
      remove locators from its locator set.


4.4  Locator Change

   What are the preconditions that are necessary for a locator change?




Huston                   Expires January 3, 2006               [Page 11]


Internet-Draft             Multi6 Architecture                 July 2005


      The preconditions necessary is that there has been a successful
      establishment of packets between the two hosts, Shim6 capabilities
      have been successfully negotiated and locator sets have been
      exchanged, and there is an explicit trigger for a locator change
      that has been generated by an active transport session.  IN
      addition reception of a packet where the locator par is a member
      of the locator set for this host pair implies a remotely-triggered
      locator change.


   How can the locator change be confirmed by both ends?

      The approach proposed here is by using a return reachability test,
      where a host searches through locator pair selections until it
      receives an explicit acknowledgement of a poll.


   What interactions are necessary for synchronisation of locator change
   and transport session behaviour?

      As noted in [ID.FAIL], there is consideration that any locator
      change in the Shim6 state should trigger a notification to the
      transport layer protocol.  In the case of TCP this notification
      would be used to trigger a resetting of the TCP congestion state
      to slow start, corresponding to the selection of a new network
      path.


4.5  Removal of Session State

   How is identity / locator binding state removal synchronised with
   session closure?

      As this is a layer 3 function there is no explicit concept of
      sessions.  A Shim6 mapping state needs to be maintained for as
      long as there is packet activity in either direction.  The removal
      of state would most likely be associated with a removal
      eligibility condition associated with a packet activity timeout,
      and an eligible state removal pass being undertaken by the Shim6
      statement management module.


   What binding information is cached for possible future use?

      The Shim6 state information is the association of a ULID pair with
      a set of local and remote locators.  This information may require
      periodic refreshing with the exchange of locator sets with the
      remote host in order to ensure that the remote host is also



Huston                   Expires January 3, 2006               [Page 12]


Internet-Draft             Multi6 Architecture                 July 2005


      maintaining a Shim6 state, and the locator sets are synchronised.


5.  Additional Comments

   The approach of using a IP layer mapping between upper level endpoint
   identity and lower level locators has a number of specific issues
   that have yet to be fully specified in the Shim6 documentation.  Some
   of these are listed here.

   The signalling interface between the Shim6 and the upper layers pf
   the protocol stack requires further consideration.  The decision to
   initiate a Shim6 capability negotiation with a remote host may
   benefit from an explicit upper layer signal to the shim protocol
   element.  In turn this could allow applications to signal a desire to
   initiate this capability negotiation at the start of an extended
   communication session.  Equally, it may be of benefit for the upper
   level protocol to be able to query the L3 state for a particular
   remote host, to establish whether there has been a capability
   negotiation performed, and if successful, the current active locator
   and the full locator set.

   It may also be useful to allow the upper level protocol to explicitly
   indicate that any form of L3 functionality should not be applied to
   this session.  The implication of this functionality is that incoming
   packets need to provide some form of positive indication that the
   incoming locator pair should be mapped to an equivalent ULID pair,
   while packets without this indication should be processed in a
   conventional fashion with any Shim6 packet header mapping.  The Shim6
   documentation suggests that some form of explicit tagging should be
   performed in the IPv6 Flow Id field, but further details have not
   been provided.

   The potential use of unreachable ULIDs as the initial choice of ULIDs
   and the consequent requirement to undertake a reachable locator
   search, capability negotiation and establishment of a Shim6 mapping
   state is mentioned in the Shim6 documents, but at a relatively
   abstract level.  This requires further consideration in terms of the
   potential failures, and the appropriate signalling to be passed back
   to the ULP in such cases.

   The issue of ambiguity of demultiplexing may require further
   consideration.  If there are multiple AAAA resource records in the
   DNS, or the resource records change over the lifetime of active
   communication, it is possible to have multiple Shim6 states set up
   for the same remote host, with distinct ULIDs for the remote host.
   An incoming packet with a given locator pair will, according to the
   Shim6 documentation, need to use the locator pair as a lookup key



Huston                   Expires January 3, 2006               [Page 13]


Internet-Draft             Multi6 Architecture                 July 2005


   into the Shim6 state information to establish the associated ULID
   pair.  In the case of multiple active ULIDs for the same remote host
   this lookup will result in multiple ULIDs.

   The treatment of trigger conditions for locator change also requires
   further consideration.  As noted in [ID.ARCH], different upper level
   transports may have different sensitivity requirements to locator
   triggers.  When the mapping is performed on a host-by-host basis
   rather than per transport session, there is a consequent requirement
   to balance the relative levels of sensitivity to locator change
   across all concurrently active transport session.  It may be
   necessary to explore the concept of associating a Shim6 state to
   particular transport sessions, allowing each session to establish its
   preferred level of sensitivity to network events that may trigger a
   locator change.

   The interaction between locator pair selection, local forwarding
   decision, site exit routers and packet ingress filters on the
   immediately adjacent upstream provider routers does not appear to be
   considered in the current Shim6 documentation.

6.  References

6.1  Normative References

   [ID.ARCH]  Huston, G., "Architectural Approaches to Multi-Homing for
              IPv6", Work in progress: Internet
              Drafts draft-ietf-multi6-architecture-04.txt,
              February 2005.

   [ID.FAIL]  Arkko, J., "", Work in progress: Internet
              Drafts draft-arkko-multi6dt-failure-detection-00.txt,
              January 2005.

   [ID.FUNC]  Bagnulo, M. and J. Arkko, "Functional Decomposition of the
              M6 protocol", Work in progress: Internet
              Drafts draft-ietf-multi6-functional-dec-00.txt,
              December 2004.

   [ID.HBA]   Bagnulo, M., "Hash Based Addresses (HBA)", Work in
              progress: Internet Drafts draft-ietf-multi6-hba-00.txt,
              December 2004.

   [ID.REFER]
              Nordmark, E., "Multi6 Application Referral Issues", Work
              in progress: Internet
              Drafts draft-ietf-multi6-app-refer-00.txt, January 2005.




Huston                   Expires January 3, 2006               [Page 14]


Internet-Draft             Multi6 Architecture                 July 2005


   [ID.SHIM6]
              Nordmark, E. and M. Bagnulo, "Multihoming Shim6 Approach",
              Work in progress: Internet
              Drafts draft-ietf-multi6-l3shim-00.txt, January 2005.

6.2  Informative References

   [RFC3484]  Draves, R., "Default Address Selection for Internet
              Protocol version 6 (IPv6)", RFC 3484, February 2003.


Author's Address

   Geoff Huston
   APNIC




































Huston                   Expires January 3, 2006               [Page 15]


Internet-Draft             Multi6 Architecture                 July 2005


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2005).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Huston                   Expires January 3, 2006               [Page 16]