IPv6Essentials
BySilviaHagen
...............................................
Publisher:O'Reilly
PubDate:May2006
PrintISBN-10:0-596-10058-2
PrintISBN-13:978-0-59-610058-2
Pages:436
TableofContents|Index
IPv6Essentials,SecondEditionprovidesasuccinct,in-depthtourofallthenewfeatures
andfunctionsinIPv6.Itguidesyouthrougheverythingyouneedtoknowtogetstarted,
includinghowtoconfigureIPv6onhostsandroutersandwhichapplicationscurrently
supportIPv6.ThenewIPv6protocolsoffersextendedaddressspace,scalability,improved
supportforsecurity,real-timetrafficsupport,andauto-configurationsothatevenanovice
usercanconnectamachinetotheInternet.Aimedatsystemandnetworkadministrators,
engineers,networkdesigners,andITmanagers,thisbookwillhelpyouunderstand,plan
for,design,andintegrateIPv6intoyourcurrentIPv4infrastructure.
BeginningwithashorthistoryofIPv6,authorSilviaHagenprovidesanoverviewofnew
functionalityanddiscusseswhyweneedIPv6.Hagenalsosharesexhaustivediscussionsof
thenewIPv6headerformatandExtensionHeaders,IPv6addressandICMPv6message
format,Security,QoS,Mobilityand,lastbutnotleast,offersaQuickStartGuidefor
differentoperatingsystems.IPv6Essentials,SecondEditionalsocovers:
In-depthtechnicalguidetoIPv6
MechanismsandCaseStudiesthatshowhowtointegrateIPv6intoyournetwork
withoutinterruptionofIPv4services
Routingprotocolsandupperlayerprotocols
SecurityinIPv6:conceptsandrequirements.IncludestheIPSECframeworkand
securityelementsavailableforauthenticationandencryption
QualityofService:coverstheelementsavailableforQoSinIPv6andhowtheycan
beimplemented
DetaileddiscussionofDHCPv6andMobileIPv6
Discussionofmigrationcostandbusinesscase
Gettingstartedondifferentoperatingsystems:SunSolaris,Linux,BSD,WindowsXP,
andCiscorouters
Whetheryou'rereadytostartimplementingIPv6todayorareplanningyourstrategyfor
thefuture,IPv6Essentials,SecondEditionwillprovidethesolidfoundationyouneedto
getstarted.
"Silvia'slookatIPv6isalwaysrefreshingasshetranslatescomplex
technologyfeaturesintobusinessdriversandgenuineend-userbenefitsto
enablebuildingnewbusinessconceptsbasedonendtoendmodels."
LatifLadid,PresidentIPv6Forum,ChairEUIPv6TaskForce
IPv6Essentials
BySilviaHagen
...............................................
Publisher:O'Reilly
PubDate:May2006
PrintISBN-10:0-596-10058-2
PrintISBN-13:978-0-59-610058-2
Pages:436
TableofContents|Index
Copyright
Preface
Chapter1.WhyIPv6?
Section1.1.TheHistoryofIPv6
Section1.2.What'sNewinIPv6?
Section1.3.WhyDoWeNeedIPv6?
Section1.4.CommonMisconceptions
Section1.5.WhenIsItTimeforIPv6?
Section1.6.IPv6AroundtheWorld
Section1.7.IPv6StatusandVendorSupport
Section1.8.References
Chapter2.TheStructureoftheIPv6Protocol
Section2.1.GeneralHeaderStructure
Section2.2.TheFieldsintheIPv6Header
Section2.3.ExtensionHeaders
Section2.4.References
Chapter3.IPv6Addressing
Section3.1.TheIPv6AddressSpace
Section3.2.AddressTypes
Section3.3.AddressNotation
Section3.4.PrefixNotation
Section3.5.GlobalRoutingPrefixes
Section3.6.GlobalUnicastAddress
Section3.7.SpecialAddresses
Section3.8.Link-andSite-LocalAddresses
Section3.9.AnycastAddress
Section3.10.MulticastAddress
Section3.11.RequiredAddresses
Section3.12.DefaultAddressSelection
Section3.13.References
Chapter4.ICMPv6
Section4.1.GeneralMessageFormat
Section4.2.ICMPErrorMessages
Section4.3.ICMPInformationalMessages
Section4.4.ProcessingRules
Section4.5.TheICMPv6HeaderinaTraceFile
Section4.6.NeighborDiscovery(ND)
Section4.7.Autoconfiguration
Section4.8.NetworkRenumbering
Section4.9.PathMTUDiscovery
Section4.10.MulticastListenerDiscovery(MLD)
Section4.11.MulticastRouterDiscovery(MRD)
Section4.12.References
Chapter5.SecuritywithIPv6
Section5.1.GeneralSecurityConcepts
Section5.2.GeneralSecurityPractices
Section5.3.IPsecBasics
Section5.4.IPv6SecurityElements
Section5.5.OverviewofNewIPsecRFCs
Section5.6.InteractionofIPsecwithIPv6Elements
Section5.7.IPv6Security"Gotchas"
Section5.8.EnterpriseSecurityModelsforIPv6
Section5.9.References
Chapter6.QualityofService
Section6.1.QoSBasics
Section6.2.QoSinIPv6Protocols
Section6.3.UsingQoS
Section6.4.References
Chapter7.NetworkingAspects
Section7.1.Layer2SupportforIPv6
Section7.2.DetectingNetworkAttachment(DNA)
Section7.3.References
Chapter8.RoutingProtocols
Section8.1.TheRoutingTable
Section8.2.RIPng
Section8.3.OSPFforIPv6(OSPFv3)
Section8.4.BGP-4SupportforIPv6
Section8.5.AdditionalRoutingProtocolsforIPv6
Section8.6.References
Chapter9.Upper-LayerProtocols
Section9.1.UDP/TCP
Section9.2.DHCP
Section9.3.DNS
Section9.4.SLP
Section9.5.FTP
Section9.6.Telnet
Section9.7.WebServers
Section9.8.References
Chapter10.Interoperability
Section10.1.Dual-StackTechniques
Section10.2.TunnelingTechniques
Section10.3.NetworkAddressandProtocolTranslation
Section10.4.Comparison
Section10.5.IntegrationScenarios
Section10.6.CaseStudies
Section10.7.WhatIsMissing?
Section10.8.SecurityAspects
Section10.9.Applications
Section10.10.CostofIntroduction
Section10.11.VendorSupport
Section10.12.References
Chapter11.MobileIPv6
Section11.1.Overview
Section11.2.TheMobileIPv6Protocol
Section11.3.ICMPv6andMobileIPv6
Section11.4.MobileIPv6Communication
Section11.5.Security
Section11.6.ExtensionstoMobileIPv6
Section11.7.References
Chapter12.GetYourHandsDirty
Section12.1.Linux
Section12.2.BSD
Section12.3.SunSolaris
Section12.4.Macintosh
Section12.5.Microsoft
Section12.6.CiscoRouter
Section12.7.Applications
Section12.8.DescriptionoftheTests
RFCs
SectionA.1.GeneralRFCInformation
SectionA.2.Drafts
SectionA.3.RFCIndexforIPv6
IPv6Resources
SectionB.1.EthertypeField
SectionB.2.NextHeaderFieldValues(Chapter2)
SectionB.3.ReservedAnycastIDs(Chapter3,RFC2526)
SectionB.4.ValuesfortheMulticastScopeField(Chapter3,RFC4291)
SectionB.5.Well-KnownMulticastGroupAddresses(Chapter3,RFC2375)
SectionB.6.ICMPv6MessageTypesandCodeValues(Chapter4,RFC2463)
SectionB.7.QoSinIPv6(Chapter6)
SectionB.8.MulticastGroupAddressesandTokenRingFunctionalAddresses
(Chapter7)
SectionB.9.OSPFv3MessagesandtheLinkStateDatabase(Chapter8)
SectionB.10.BGP-4MessageTypesandParameters(Chapter8)
SectionB.11.DHCPv6andMulticastAddressesforSLPoverIPv6(Chapter9)
SectionB.12.MobileIPv6(Chapter11,RFC3775)
RecommendedReading
AbouttheAuthor
Colophon
Index
IPv6Essentials,SecondEdition
bySilviaHagen
Copyright©2006,2002O'ReillyMedia,Inc.Allrightsreserved.
PrintedintheUnitedStatesofAmerica.
PublishedbyO'ReillyMedia,Inc.,1005GravensteinHighway
North,Sebastopol,CA95472.
O'Reillybooksmaybepurchasedforeducational,business,or
salespromotionaluse.Onlineeditionsarealsoavailablefor
mosttitles(safari.oreilly.com).Formoreinformation,contact
ourcorporate/institutionalsalesdepartment:(800)998-9938or
Editor:TatianaApandiandMikeLoukides
ProductionEditors:RebaLibbyandGenevieved'Entremont
Copyeditor:RebaLibby
Proofreader:Genevieved'Entremont
Indexer:JohnBickelhaupt
CoverDesigner:HannaDyer
InteriorDesigner:DavidFutato
Illustrators:RobertRomanoandJessamynRead
PrintingHistory:
May2006:SecondEdition.
July2002:FirstEdition.
NutshellHandbook,theNutshellHandbooklogo,andthe
O'ReillylogoareregisteredtrademarksofO'ReillyMedia,Inc.
IPv6Essentials,theimageofarigatellasnail,andrelatedtrade
dressaretrademarksofO'ReillyMedia,Inc.
Manyofthedesignationsusedbymanufacturersandsellersto
distinguishtheirproductsareclaimedastrademarks.Where
thosedesignationsappearinthisbook,andO'ReillyMedia,Inc.
wasawareofatrademarkclaim,thedesignationshavebeen
printedincapsorinitialcaps.
Whileeveryprecautionhasbeentakeninthepreparationofthis
book,thepublisherandauthor(s)assumenoresponsibilityfor
errorsoromissions,orfordamagesresultingfromtheuseof
theinformationcontainedherein.
ISBN:0-596-10058-2
[M]
Preface
ThisbookisaboutthenextgenerationInternetprotocol.We
havebecomefamiliarwiththestrengthsandweaknessesof
IPv4;weknowhowtodesignandconfigureit,andwehave
learnedhowtotroubleshootit.Andnowwehavetolearnanew
protocol?Startfromscratch?Notreally.ThedesignersofIPv6
havelearnedalotfromover15yearsofexperiencewithIPv4,
andtheyhavebeenworkingonthenewprotocolsincetheearly
1990s.TheyretainedthestrengthsofIPv4,extendedthe
addressspacefrom32bitsto128bits,andaddedfunctionality
thatismissinginIPv4.Theydevelopedtransitionmechanisms
thatmakeIPv4andIPv6coexistpeacefullyandthatguarantee
asmoothtransitionbetweentheprotocols.Infact,thiswasone
ofthemajorrequirementsforthedevelopmentofthenew
protocolversion.
SoyoudonotneedtoforgetwhatyouknowaboutIPv4;many
thingswillfeelfamiliarwithIPv6.Whenyougetstarted,you
willdiscovernewfeaturesandfunctionalitiesthatwillmake
yourlifealoteasier.IPv6hasfeaturesthatyouwillneedin
tomorrow'snetworksfeaturesthatIPv4doesnotprovide.The
daywillcomewhenourPersonalDigitalAssistants(PDAs)and
mobilephoneshaveIPaddresses.Asidefromthefactthatthe
IPv4addressspacecouldnevercoverthedemandforthat
numberofIPaddresses,imagineconfiguringthosedeviceswith
themeanswehavetoday!
OneofthecoolestfeaturesbuiltintoIPv6isthe
autoconfigurationcapability.Haven'twealwaysstruggledwith
IPaddressassignment?TheadventofDHCPmadeourlivesa
littleeasier,butnowweneedtomaintainandtroubleshootthe
DHCPservers.Andwhenourrefrigerator,ourPDA,andourTV
eachhaveanIPaddress,willweneedaDHCPserverathome?
Notwithautoconfiguration.IfyouhaveanIPv6-enabledhost,
youcanplugitintoyournetwork,anditwillconfigure
automaticallyforavalidIPv6address.InternetControlMessage
Protocol(ICMP),whichisanetworker'sbestfriend,hasbecome
muchmorepowerfulwithIPv6.Manyofthenewfeaturesof
IPv6,suchasautoconfiguration,optimizedmulticastrouting
andmulticastgroupmanagement,NeighborDiscovery,path
MTUdiscovery,andMobileIPv6arebasedonICMPv6.
Ihopethatthisbookwillhelpyoutobecomefamiliarwiththe
protocolandprovideaneasy-to-understandentrypointand
guidetoexploringthisnewarea.
Audience
ThisbookcoversabroadrangeofinformationaboutIPv6andis
anexcellentresourceforanybodywhowantstounderstandor
implementtheprotocol.Whetheryouaretheownerormanager
ofacompanyoranITdepartment;whetheryouareasystem
ornetworkadministrator,anengineer,oranetworkdesigner;
orwhetheryouarejustgenerallyinterestedinlearningabout
theimportantchangeswithIPv6,thisbookdiscusseseconomic
andstrategicaspectsaswellastechnicaldetails.Idescribe
interoperabilitymechanismsandscenariosthatensurea
smoothintroductionofIPv6.Quickstartguidesfordifferent
operatingsystemshelpwiththefirsthands-onsteps.Ifyouare
acompanyownerormanager,youwillbemostinterestedin
Chapters1and10.Ifyouneedtoplanyourcorporatenetwork
strategy,youwillbemostinterestedinChapters1,4,8,9,and
10.Ifyoumanagetheinfrastructureinyourcompany,youwill
especiallybeinterestedinChapters4,7,and8,whichcover
ICMPv6,Layer2issuesandrouting,andinChapter10,which
addressesinteroperability.Ifyouareasystemornetwork
administrator,allchaptersarerelevant:thisbookprovidesa
foundationforIPv6implementationandintegrationwithIPv4.
AboutThisBook
ThisbookcoversIPv6indetailandexplainsallthenewfeatures
andfunctions.Itwillshowyouhowtoplanfor,design,and
integrateIPv6inyourcurrentIPv4infrastructure.Italso
teachesyouwhatyouneedtoknowtogetstarted,toconfigure
IPv6onyourhostsandrouters,andtofindtheright
applicationsthatsupportIPv6.
Nowthatyouknowwhatthisbookisabout,Ishouldexplain
thisthisbookisnotwrittenfordevelopers.Thisdoesn'tmean
youshouldnotbereadingitifyouareadeveloper.Ifyoudo
readit,youwillunderstandtheimplicationsofintroducingIPv6
inyournetworkandhowimportantitistodevelopcool
applicationsforIPv6.Ifyouneedaspecificguidetodeveloping
forIPv6,lookfordeveloperresources.
Thisbookassumesthatyouhaveagoodunderstandingof
networkissuesingeneralandafamiliaritywithIPv4.Itis
beyondthescopeofthisbooktodiscussIPv4conceptsin
detail.Irefertothemwhennecessary,butifyouwanttolearn
moreaboutIPv4,therearealotofgoodresourcesonthe
market.YoucanfindalistofbooksinAppendixC.
Organization
ThisbookisorganizedsothatareaderfamiliarwithIPv4can
easilylearnaboutthenewfeaturesinIPv6byreadingChapters
2through6.Thesechapterscoverwhatyouneedtoknow
aboutaddressing,thenewIPv6header,ICMPv6,security,and
QualityofService(QoS).Chapters7through11covertopics
suchasnetworkingaspects,supportofdifferentlink-layer
services,routing,upperlayerprotocolsupport,thetransition
mechanismsthatmakeIPv6interoperablewithIPv4,and
MobileIPv6.Chapter12isaquick-startguideandincludesa
shortdescriptionofhowdifferentoperatingsystemsare
configuredforIPv6.Hereisachapter-by-chapterbreakdownof
thebook:
Chapter1,WhyIPv6?,brieflyexplainsthehistoryofIPv6
andgivesanoverviewofthenewfunctionality.Itdrawsa
biggerpictureofInternetandserviceevolution,showing
thatthelargeaddressspaceandtheadvancedfunctionality
ofIPv6aremuchneededfordifferentreasons.Itthen
discussesthemostcommonmisconceptionsthatprevent
peoplefromexploringandintegratingtheprotocol,and
providesasummaryofthemostimportantstepsto
undertaketoday,alongwithapictureofwhatishappening
aroundtheworld.
Chapter2,TheStructureoftheIPv6Protocol,describesthe
newIPv6headerformatwithadiscussionofeachfieldand
tracefileexamples.ItalsodescribeswhatExtension
headersare,whattypesofExtensionheadershavebeen
defined,andhowtheyareused.
Chapter3,IPv6Addressing,explainseverythingyouneed
toknowaboutthenewaddressformat,addressnotation,
addresstypes,internationalregistryservices,andprefix
allocation.
Chapter4,ICMPv6,describesthenewICMPv6message
format,theICMPv6ErrormessagesandInformational
messages,andtheICMPv6headerinthetracefile.This
chapteralsodiscussestheextendedfunctionalitybasedon
ICMPv6,suchasNeighborDiscovery,Autoconfiguration,
PathMTUDiscovery,andMulticastListenerDiscovery
(MLD).YouwilllearnhowICMPv6makesanadministrator's
lifeeasier.
Chapter5,SecuritywithIPv6,beginswithashort
discussionofbasicsecurityconceptsandrequirements.It
thencoverstheIPsecframework,securityelements
availableinIPv6forauthenticationandencryption,andhow
theyareused.Ourfuturenetworkswillrequirenewsecurity
architectures.Thischapterincludesadescriptionofanew
model.
Chapter6,QualityofService,discussesbasicrequirements
andtypesofQoS.IexplaintheQoSelementsavailablein
IPv6andhowtheycanbeimplemented.Ialsodescribe
differentQoSarchitecturesandintroducefurtherworkin
thisarea.
Chapter7,NetworkingAspects,discussesLayer2support
forIPv6(Ethernet,TokenRing,ATM,framerelay,etc.),the
mappingofmulticastaddressestoLayer2addresses,and
theDetectingNetworkAttachment(DNA)workinggroup.
Chapter8,RoutingProtocols,discussestheadvanced
routingfeaturesofIPv6andcoverstheavailablerouting
protocolssuchasRIPng,OSPFv3forIPv6,andBGP
extensionsforIPv6,IS-IS,andEIGRPv6.(Thischapterwas
writtenbyStefanMarzohl.)
Chapter9,Upper-LayerProtocols,discusseswhatisgoing
onabovetheIPlayer,startingwithchangesforTCPand
UDP,continuingwithadetaileddiscussionoftheDHCPv6
specification,DNSextensionsforIPv6,SLPv2inIPv6
networks,FTP,Telnet,andwebservers.
Chapter10,Interoperability,discussesthedifferent
transitionmechanismsthathavebeendefined,suchas
dual-stackoperation,tunneling,andtranslationtechniques.
Italsoshowshowtheycanbeusedandcombinedtoensure
peacefulcoexistenceandsmoothtransition.Abroadvariety
ofcasestudiesshowthatIPv6ismatureenoughtobe
introducedandthattherearemanywaystodothis.Italso
providesanoverviewofwhatisstillmissing,securityand
applicationaspects,vendorstatus,andthecostof
introduction.
Chapter11,MobileIPv6,coversMobileIPv6.Thischapter
explainswhythistechnologywillbecomethefoundationfor
anewgenerationofmobileservices.
Chapter12,GetYourHandsDirty,explainshowtoget
startedwithIPv6ondifferentoperatingsystems,suchas
SunSolaris,Linux,BSD,Windows2003,WindowsXP,Mac
OS,andaCiscorouter.ItintroducesthemostcommonIPv6
toolsavailableforeachoperatingsystem.Thischapteralso
explainswhatIdidinmylabandprovidesexamplesof
tracefiles.
AppendixA,RFCs,includesashortintroductiontotheRFC
processandauthorities,andprovidesalistofrelevantRFCs
forIPv6.
AppendixB,IPv6Resources,reflectsthechapter
organizationofthebookandprovidessummariesofall
indexes,protocolnumbers,messagetypes,andaddress
allocations.
AppendixC,RecommendedReading,providesalistof
booksthatIrecommend.
Someimportanttopicsandinformationappearinmultiple
placesinthebook.ThisisnotbecauseIwanttoboreyou,but
becauseIassumethatmostreaderswillnotreadthebookfrom
thefirstpagetothelastpage,butratherwillpickandchoose
chaptersandsectionsdependingoninterest.Soifthe
informationisimportantwithregardtodifferentsectionsand
contexts,Imaymentionitagain.
ConventionsUsedinThisBook
Iusethefollowingfontconventionsinthisbook:
Italic
Usedtoindicatecommands,directorypaths,filenames,and
URLs.
Constantwidth
UsedtoindicateIPandMACaddresses,command-line
utilitiesandtools,interfaces,andflags.
Constantwidthitalic
Usedincodeexamplestoshowsampletexttobereplaced
withyourownvalues.
Constantwidthbold
Usedtohighlightportionsofcode,typicallynewadditionsto
oldcode.
UsingCodeExamples
Thisbookisheretohelpyougetyourjobdone.Ingeneral,you
mayusethecodeinthisbookinyourprogramsand
documentation.Youdonotneedtocontactusforpermission
unlessyou'rereproducingasignificantportionofthecode.For
example,writingaprogramthatusesseveralchunksofcode
fromthisbookdoesnotrequirepermission.Sellingor
distributingaCD-ROMofexamplesfromO'Reillybooksdoes
requirepermission.Answeringaquestionbycitingthisbook
andquotingexamplecodedoesnotrequirepermission.
Incorporatingasignificantamountofexamplecodefromthis
bookintoyourproduct'sdocumentationdoesrequire
permission.
Weappreciate,butdonotrequire,attribution.Anattribution
usuallyincludesthetitle,author,publisher,andISBN.For
example:"IPv6Essentials,SecondEdition,bySilviaHagen.
Copyright2006O'ReillyMedia,Inc.,0-596-10058-2."
Safari®Enabled
WhenyouseeaSafari®enabledicononthecoverof
yourfavoritetechnologybook,thatmeansthebookisavailable
onlinethroughtheO'ReillyNetworkSafariBookshelf.
Safarioffersasolutionthat'sbetterthane-Books.It'savirtual
librarythatletsyoueasilysearchthousandsoftoptechbooks,
cutandpastecodesamples,downloadchapters,andfindquick
answerswhenyouneedthemostaccurate,currentinformation.
Tryitforfreeat.
CommentsandQuestions
Pleaseaddresscommentsandquestionsconcerningthisbookto
thepublisher:
O'ReillyMedia,Inc.
1005GravensteinHighwayNorth
Sebastopol,CA95472
(800)998-9938(intheUnitedStatesorCanada)
(707)829-0515(internationalorlocal)
(707)829-0104(fax)
Thisbook'swebsitelistserrata,examples,oranyadditional
information.Youcanaccessthispageat:
/>Tocommentorasktechnicalquestionsaboutthisbook,send
emailto:
Formoreinformationaboutbooks,conferences,Resource
Centers,andtheO'ReillyNetwork,seetheO'Reillywebsiteat:
/>
Acknowledgments
Therearemanypeopleallovertheworldwhohavecontributed
tothisbook.Withouttheirhelpandinput,itwouldnotbewhat
itis.BigthanksgotoStefanMarzohl,whoisaCisco-and
Nortel-certifiedinstructorandtheauthorofChapter8.Hewrote
thechapterforthefirsteditionandmadealltheupdatesand
additionsforthesecondedition.ManythanksgoouttoAnja
Spittler(Maggy).Shespenthours,days,andweeksinourlab
settingupSuSELinux,gettingBINDandotherservicestowork,
andwritingpartsofChapters9and12inthefirstedition.Ialso
wanttothankthetechnicaleditors,whohavemadethisbook
muchbetterwiththeirinvaluablecomments,corrections,and
clarifications.TheyweregreatresourceswhenIwasstruggling
withatopicandneededsomeanswers.Thetechnicalreviewers
ofthefirsteditionwerePatrickGrossetete,whoworksasa
productmanagerfortheInternetTechnologyDivision(ITD)at
Cisco,andNeilCashell,whoisagreatTCP/IPguyatNovell.
ThanksalsotoBrianMcGehee,whohasbeenworkingwithIPv6
formanyyearsandhaswrittennumerouscoursesforIPv6.He
didthefinaltechnicaleditsofthefirsteditionandaddedalotof
usefulinformation.I'dliketothankCiscoSwitzerland,
especiallyRenéRäber,bothforprovidinganupdatedrouterand
accesstotheirtechnicalresourcesaswellasforhiscontinuing
supportofmyworkforIPv6.ThankstotheguysatSuSEfor
providingsoftwareandsupportingusingettingourSuSEhost
readyforIPv6,Microsoftforprovidingsoftwareandinformation
abouttheirimplementations,NetworkGeneralforproviding
SnifferProSoftwareforthetracefiles,BobFinkforrunningthe
6Bonewebsite,CricketLiuforansweringmyDNSquestions,
andPeterBieringerforrunningagreatInternetresourcesite
andforansweringmyquestionswithlightningspeed.
Thereweremanyadditionalsupporters,writers,andreviewers
forthesecondedition.Theyinclude:JimBoundfromHP,CTOof
theIPv6ForumandChairoftheNAv6TF;LatifLadid,President
oftheIPv6Forum;TimChown,DepartmentofElectronicsand
ComputerScienceattheUniversityofSouthampton;and
VijayabhaskarfromMcAfee.YurieRich,JohnSpence,andMike
OwenfromNative6Inc.inSeattlehaveprovidedsubstantial
inputintoChapters1,5,6,and10.GeneCronkfromtheRobin
ShepherdGrouphasgivensubstantialinputintoChapters5and
10,andJohnJasonBrzozowski,NorthAmericanIPv6TaskForce
andChairoftheMid-AtlanticIPv6TaskForce,contributedgreat
inputintoChapters1and9.ThankstoDavidB.GreenfromSRI
InternationalforthepermissiontoquotehisEnterpriseSecurity
ModelpresentationinChapter5andforreviewingdifferent
partsofthebook.ThankstoMerikeKaeo,ChiefNetwork
SecurityArchitectatDoubleShotSecurity,forallherinputsand
commentstoChapter5.AndthankstoChrisEngdahlfrom
MicrosoftforhisreviewofChapter10.ThankstoJimmyOtt
fromSunnyConnectionforresearchingandwritingallupdates
forChapter12.DavidMalone,authorofthecompanionbook
IPv6NetworkAdministration,reviewedthewholebookthank
you,David,foryourgreatandclarifyingcomments.Agreat
thankyougoesouttoallthepeoplewhowerereadytoshare
theirexperiencewithusandhaveprovidedcasestudies.They
arePaoloVieirafromtheUniversityofPorto,PierreDavidfrom
theUniversityofStrasbourg,CodyChristmanfromNTT
Communications,andFlavioCurtiandUeliHeuerfromCyberlink
AGinZurich.WolfgangFritschefromIABGGermanyandKarim
El-MalkifromEricssonABinStockholmreviewedandprovided
inputonChapter11aboutMobility.Thankstothepeopleat
Checkpointforprovidinginformationandconnections,
especiallyPatrikHoneggerandYoniAppel;andthanksalsoto
Jean-MarcUzéatJuniperforhisinformationandconnections.I
alsowanttothankallthepeopleanddevelopersinthe
internationalworkinggroups.Withouttheirvisionarypower,
enthusiasm,andtirelesswork,wewouldnothaveIPv6ready.
AspecialthankyougoestoJimSumser,MikeLoukides,and
TatianaApandiatO'Reilly.JimSumserguidedmethroughthe
wholewritingprocessofthefirsteditionwithalotof
enthusiasm,patience,andexperience.Thankyou,Jim,for
beingthere,andthankyouforneverhasslingmewhenIwas
alreadystruggling.Youmadeadifference!MikeandTatiana,
withwhomIworkedonthesecondedition,havealsobeenvery
supportivethroughoutthewholeprocess.Ialsowanttothank
alltheotherfolksatO'Reillywhocontributedtothisbook,
especiallyTimO'Reillyformakingitpossibleinthefirstplace.
AnotherveryspecialthankyougoestoHanspeterBütler,who
wasmyteacherbackinschool,forteachingmethebeautyof
theancientGreeklanguage.Hisinsightfulandsensitivewayof
guidingmeintounderstandingandfeelingtherichnessofold
languageslaidthefoundationformyunderstandingoflanguage
ingeneral,ofdifferentculturesandhowthedifferencesin
viewingtheworldareexpressedinlanguage.Icanprobably
makehimpartiallyresponsibleformybecominganauthor.
Languageismadetocommunicate,andthemorepreciselywe
useourlanguage,thebetterwecanunderstandandbe
understood.Withoutcommunication,therecanbeno
understanding.Onadifferentlevel,TCP/IPistheprotocolthat
enablescommunicationinthenetworkandthereforecreates
thefoundationforInternetcommunication.AndtheInternet
createsthephysicalfoundationforglobalcommunication.It
offersagreatopportunitytocommunicate,share,and
understandgloballyacrossallcultures.Thatishowweshould
beusingit.
Chapter1.WhyIPv6?
TheIPversioncurrentlyusedinnetworksandtheInternetisIP
Version4(IPv4).IPv4wasdevelopedintheearly'70sto
facilitatecommunicationandinformationsharingbetween
governmentresearchersandacademicsintheUnitedStates.At
thetime,thesystemwasclosedwithalimitednumberof
accesspoints,andconsequentlythedevelopersdidn'tenvision
requirementssuchassecurityorqualityofservice.Toitscredit,
IPv4hassurvivedforover30yearsandhasbeenanintegral
partoftheInternetrevolution.Buteventhemostcleverly
designedsystemsageandeventuallybecomeobsolete.Thisis
certainlythecaseforIPv4.Today'snetworkingrequirements
extendfarbeyondsupportforwebpagesandemail.Explosive
growthinnetworkdevicediversityandmobilecommunications,
alongwithglobaladoptionofnetworkingtechnologies,are
overwhelmingIPv4andhavedriventhedevelopmentofanextgenerationInternetProtocol.
IPv6hasbeendevelopedbasedontherichexperiencewehave
fromdevelopingandusingIPv4.Provenandestablished
mechanismshavebeenretained,knownlimitationshavebeen
discarded,andscalabilityandflexibilityhavebeenextended.
IPv6isaprotocoldesignedtohandlethegrowthrateofthe
Internetandtocopewiththedemandingrequirementson
services,mobility,andend-to-endsecurity.
WhentheInternetwasswitchedfromusingNetworkControl
Protocol(NCP)toInternetProtocol(IP)inonedayin1983,IP
wasnotthematureprotocolthatweknowtoday.Manyofthe
well-knownandcommonlyusedextensionsweredevelopedin
subsequentyearstomeetthegrowingrequirementsofthe
Internet.Incomparison,hardwarevendorsandoperating
systemprovidershavebeensupportingIPv6since1995whenit
becameaDraftStandard.Inthedecadesincethen,those
implementationshavematured,andIPv6supporthasspread
beyondthebasicnetworkinfrastructureandwillcontinuetobe
extended.
Thereiscertainlyaneedforcautionwhenconsideringadoption
ofIPv6thereisstillworktobedonetoreachparitywiththe
maturityofIPv4(refertoChapter10formoredetails).The
missingpiecesofIPv6willbedevelopedinthecomingyears,
justthewayithappenedwithIPv4.Andmanyenterprisesare
notfindingenoughreasonstoadoptitrightnow.However,itis
veryimportantfororganizationstopayattentiontothe
introductionofIPv6becauseitsuseisinevitableinthelong
term.IfIPv6isincludedinstrategicplanning;iforganizations
thinkaboutpossibleintegrationscenariosaheadoftime;andif
itsintroductionisconsideredwheninvestinginITcapital
expenditures,organizationscansaveconsiderablecostandcan
enableIPv6moreefficientlywhenitisneeded.
Aninterestingandhumorousoverviewofthehistoryofthe
InternetcanbefoundinRFC2235,"Hobbes'InternetTimeline."
Theaccountstartsin1957withthelaunchofSputnikinRussia
andtheformationoftheAdvancedResearchProjectsAgency
(ARPA)bytheDepartmentofDefense(DoD)intheUnited
States.TheRFCcontainsalistofyearlygrowthrateofhosts,
networks,anddomainregistrationsintheInternet.
SomeexcerptsfromtheRFC:
1969:SteveCrockermakesthefirstRequestforComment
(RFC1):"HostSoftware."
1970:ARPANEThostsstartusingNetworkControlProtocol
(NCP).
1971:23hostsconnectwithARPANET(UCLA,SRI,UCSB,
UniversityofUtah,BBN,MIT,RAND,SDC,Harvard,Lincoln
Lab,Stanford,UIU(C),CWRU,CMU,NASA/Ames).
1972:InterNetworkingWorkingGroup(INWG)iscreated
withVintonCerfasChairmantoaddresstheneedfor
establishingagreed-uponprotocols.Telnetspecification
(RFC318)ispublished.
1973:FirstinternationalconnectionstotheARPANETare
madeattheUniversityCollegeofLondon(England)and
RoyalRadarEstablishment(Norway).BobMetcalfe's
HarvardPh.D.thesisoutlinestheideaforEthernet.File
transferspecification(RFC454)ispublished.
1976:QueenElizabethIIsendsanemail.
1981:Minitel(Teletel)isdeployedacrossFrancebyFrance
Telecom.
1983:ThecutoverfromNCPtoTCP/IPhappensonJanuary
1.
1984:Thenumberofhostsbreaks1,000.
1987:AnemaillinkisestablishedbetweenGermanyand
ChinausingCSNETprotocols,withthefirstmessagefrom
ChinasentonSeptember20.ThethousandthRFCis
published.Thenumberofhostsbreaks10,000.
1988:AnInternetwormburrowsthroughtheNet,affecting
10percentofthe60,000hostsontheInternet.
1989:Thenumberofhostsbreaks100,000.CliffordStoll
writesCuckoo'sEgg,whichtellsthereal-lifetaleofa
GermancrackergroupthatinfiltratednumerousU.S.
facilities.
1991:TheWorldWideWeb(WWW)isdevelopedbyTim
Berners-LeeandreleasedbyCERN.
1992:Thenumberofhostsbreaks1,000,000.TheWorld
Bankcomesonline.
1993:TheWhiteHousecomesonlineduringPresidentBill
Clinton'stimeinoffice.Wormsofanewkindfindtheirway
aroundtheNetWWWWorms(W4)arejoinedbySpiders,
Wanderers,Crawlers,andSnakes.
1994:Internetshoppingisintroduced;thefirstspammail
issent;PizzaHutcomesonline.
1995:TheVaticancomesonline.Registrationofdomain
namesisnolongerfree.
1996:9,272organizationsfindthemselvesunlistedafter
theInterNICdropstheirnameserviceasaresultoftheir
nothavingpaidtheirdomainnamefees.
1997:The2,000thRFCispublished.
ThisisasfarastheRFCgoes.Buthistorygoeson.Accordingto
the
worldwideonlinepopulationreached254millionusersin2000
and580millionusersin2002.Accordingto
theonlineuser
populationreached1.08billionusersin2005.In2003,theU.S.
DepartmentofDefense(DoD)announcedthattheywouldbe
migratingtheDoDnetworktoIPv6by2008,andtheMoonv6
()projectwasstarted.In2005,Google
registereda/32IPv6prefix,andVintCerf,knownas"Fatherof
theInternet,"joinedGoogle.Thesearejustafewselected
eventsandmilestonesoftheInternet'shistory.Keepwatching
asmorehistoryunfolds.
1.1.TheHistoryofIPv6
TheInternetEngineeringTaskForce(IETF)begantheeffortto
developasuccessorprotocoltoIPv4intheearly1990s.Several
paralleleffortstosolvetheforeseenaddressspacelimitation
andtoprovideadditionalfunctionalitybegansimultaneously.
TheIETFstartedtheInternetProtocolNextGeneration(IPng)
areain1993toinvestigatethedifferentproposalsandtomake
recommendationsforfurtherprocedures.
TheIPngareadirectorsoftheIETFrecommendedthecreation
ofIPv6attheTorontoIETFmeetingin1994.Their
recommendationisspecifiedinRFC1752,"The
RecommendationfortheIPNextGenerationProtocol."The
DirectorsformedanAddressLifetimeExpectation(ALE)working
grouptodeterminewhethertheexpectedlifetimeforIPv4
wouldallowthedevelopmentofaprotocolwithnew
functionality,oriftheremainingtimewouldallowonlythe
developmentofanaddressspacesolution.In1994,theALE
workinggroupprojectedthattheIPv4addressexhaustion
wouldoccursometimebetween2005and2011basedonthe
availablestatistics.
Forthoseofyouwhoareinterestedinthedifferentproposals,
here'ssomemoreinformationabouttheprocess(fromRFC
1752).Therewerefourmainproposals:CNAT,IPEncaps,
Nimrod,andSimpleCLNP.Threemoreproposalsfollowed:theP
InternetProtocol(PIP),theSimpleInternetProtocol(SIP),and
TP/IX.AftertheMarch1992SanDiegoIETFmeeting,Simple
CLNPevolvedintoTCPandUDPwithBiggerAddresses(TUBA),
andIPEncapsbecameIPAddressEncapsulation(IPAE).IPAE
mergedwithPIPandSIPandcalleditselfSimpleInternet
ProtocolPlus(SIPP).TheTP/IXworkinggroupchangedits
nametoCommonArchitecturefortheInternet(CATNIP).The
mainproposalswerenowCATNIP,TUBA,andSIPP.Forashort
discussionoftheproposals,refertoRFC1752.