<?xml version="1.0" encoding="US-ASCII"?>

 <!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
     <!ENTITY rfc2119 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml'>
     <!ENTITY rfc2460 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2460.xml'>
     <!ENTITY rfc2461 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2461.xml'>
     <!ENTITY rfc2462 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2462.xml'>
     <!ENTITY rfc2463 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2463.xml'>
     <!ENTITY rfc2782 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2782.xml'>
     <!ENTITY rfc2827 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2827.xml'>
     <!ENTITY rfc3041 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3041.xml'>
     <!ENTITY rfc3484 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3484.xml'>
     <!ENTITY rfc3550 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3550.xml'>
     <!ENTITY rfc3582 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3582.xml'>
     <!ENTITY rfc3697 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3697.xml'>
     <!ENTITY rfc3972 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3972.xml'>
     <!ENTITY rfc4086 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.4086.xml'>
     <!ENTITY rfc4193 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.4193.xml'>
     <!ENTITY rfc4218 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.4218.xml'>
     <!ENTITY rfc4884 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.4884.xml'>
     <!ENTITY rfc4821 PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.4821.xml'>
     <!ENTITY arch PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-shim6-arch.xml'>
     <!ENTITY mobike PUBLIC '' 
       'http://xml.resource.org/public/rfc/bibxml/reference.RFC.4555.xml'>
 ]>

 <?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>

 <?rfc toc="yes" ?>
 <?rfc strict="yes" ?>
 <?rfc symrefs="no"?>
 <?rfc rfcedstyle="yes"?>
 <?rfc subcompact="no"?>

 <rfc category="std" number="5533">

     <front>

	 <title abbrev="Shim6 Protocol">
		 Shim6: Level 3 Multihoming Shim Protocol for IPv6
	 </title>

	 <author initials='E' surname="Nordmark" fullname='Erik Nordmark'>
	     <organization abbrev="Sun Microsystems">
	       Sun Microsystems 
	     </organization>
	     <address>
		 <postal>
		     <street>17 Network Circle</street>
		     <street>Menlo Park, CA 94025</street>
		     <country>USA</country>
		 </postal>
		 <phone>+1 650 786 2921</phone>
		 <email>erik.nordmark@sun.com</email>
	     </address>
	 </author>

	 <author initials="M" surname="Bagnulo" fullname="Marcelo Bagnulo">
	  <organization abbrev="UC3M">
    Universidad Carlos III de Madrid
	  </organization>
	  <address>
	   <postal>
	    <street>Av. Universidad 30</street>
	    <street>Leganes, Madrid  28911</street>
	    <country>SPAIN</country>
	   </postal>
	   <phone>+34 91 6248814</phone>
	   <email>marcelo@it.uc3m.es</email>
	   <uri>http://www.it.uc3m.es</uri>
	  </address>
	 </author>

	 <date  month="May" year="2009"/>
	 <area>Internet</area>
	 <workgroup>SHIM6 WG</workgroup>
	 <keyword>SHIM6</keyword>

	 <abstract>
 <t>This document defines the Shim6 protocol, a layer 3 shim 
 for providing locator agility below the transport
 protocols, so that multihoming can be provided for IPv6 with
 failover and load-sharing properties, without assuming that a multihomed site
 will have a provider-independent IPv6 address prefix announced in the
 global IPv6 routing table. The hosts in a site that has multiple
 provider-allocated IPv6 address prefixes will use the Shim6 protocol specified
 in this document to set up state with peer hosts so that the state can
 later be used to failover to a different locator pair, should the original
 one stop working.</t>
	 </abstract>

     </front>

     <middle>

 <section title="Introduction" anchor="introduction">

 <t>This document describes a layer 3 shim approach and protocol for providing 
 locator agility below the transport
 protocols, so that multihoming can be provided for IPv6 with
 failover and load-sharing properties <xref target='RFC3582'/>,
 without assuming that a multihomed site
 will have a provider-independent IPv6 address announced in the
 global IPv6 routing table. The hosts in a site that has multiple
 provider-allocated IPv6 address prefixes will use the Shim6 protocol specified
 in this document to set up state with peer hosts so that the state can
 later be used to failover to a different locator pair, should the original
 one stop working (the term locator is defined in <xref target="terminology"/>).</t>

 <t>The Shim6 protocol is a site-multihoming solution in the sense that 
 it allows existing communication to continue when a site that has 
 multiple connections to the Internet experiences an outage on a subset 
 of these connections or further upstream. However, Shim6 processing is 
 performed in individual hosts rather than through site-wide mechanisms.
 </t>


 <t>We assume that redirection attacks are prevented using 
 Hash-Based Addresses (HBA) as defined in <xref target="RFC5535"/>.</t>

 <t>The reachability and failure-detection mechanisms, including how a
 new working locator pair is discovered after a failure, are specified in
 RFC 5534 <xref target="RFC5534"/>. This document allocates
 message types and option types for that sub-protocol, and leaves the 
 specification of the message and option formats, as well as the protocol 
 behavior, to RFC 5534.</t>

 <section title="Goals">
 <t>The goals for this approach are to:
  <list style='symbols'>
   <t>Preserve established communications in the presence of 
   certain classes of failures, for example,
   TCP connections and UDP streams.</t>

   <t>Have minimal impact on upper-layer protocols in general and on transport 
   protocols and applications in particular.</t>

   <t>Address the security threats in <xref target='RFC4218'/>
   through a combination of the HBA/CGA approach specified 
   in RFC 5535 <xref target="RFC5535"/> and the
   techniques described in this document.</t>

   <t>Not require an extra roundtrip up front to set up shim-specific state. 
   Instead, allow the upper-layer traffic (e.g., TCP) to flow as normal and defer
   the set up of the shim state until some number of packets have been 
   exchanged.</t>

   <t>Take advantage of multiple locators/addresses for load spreading
   so that different sets of communication to a host (e.g., different connections)
   might use different locators of the host. Note that this might cause load
   to be spread unevenly; thus, we use the term "load spreading" instead of
   "load balancing". This capability might enable some forms of 
   traffic engineering, but the details for traffic engineering, including
   what requirements can be satisfied, are not specified in this
   document, and form part of potential extensions to this protocol.</t>
  </list>
 </t>

 </section>
 <section title="Non-Goals">

 <t>The problem we are trying to solve is site
 multihoming, with the ability to have the set of site prefixes change
 over time due to site renumbering. Further, we assume that such changes to
 the set of locator prefixes can be relatively slow and managed: slow enough
 to allow updates to the DNS to propagate (since the protocol defined in this
 document depends on the DNS to find the appropriate locator sets).
However, note that it is an explicit non-goal to make communication 
 survive a renumbering event (which causes all the locators of a host to 
 change to a new set of locators). This proposal does not attempt to solve the related problem
 of host mobility. However, it might turn out that the Shim6 protocol can be a useful component for
 future host mobility solutions, e.g., for route optimization.</t>

 <t> Finally, this proposal also does not try to provide a new
   network-level or transport-level identifier name space distinct
   from the current IP address name space.
 Even though such a concept would be useful to upper-layer protocols (ULPs)
 and applications, especially if the management burden for such a name 
 space was negligible and there was an efficient yet secure mechanism 
 to map from identifiers to locators, such a name space isn't necessary 
 (and furthermore doesn't seem to help) to solve the multihoming problem.</t>

 <t>The Shim6 proposal doesn't fully separate the identifier and locator 
 functions that have traditionally been overloaded in the IP address. 
 However, throughout this document the term "identifier" or, more 
 specifically, upper-layer identifier (ULID), refers to the identifying 
 function of an IPv6 address. "Locator" refers to the network-layer routing 
 and forwarding properties of an IPv6 address.</t>

 </section>
 <section title="Locators as Upper-Layer Identifiers (ULID)">

 <t>The approach described in this document does not introduce a new 
 identifier name space but instead 
 uses the locator that is selected in the initial contact with the remote peer
 as the preserved upper-layer identifier (ULID). While there may be subsequent
 changes in the selected network-level locators over time (in response to
 failures in using the original locator), the upper-level protocol stack 
 elements will continue to use this upper-level identifier without change.</t>

 <t>This implies that the ULID selection is performed as today's default 
 address selection as specified in RFC 3484 <xref target='RFC3484'/>.
 Some extensions are needed to RFC 3484 to try different source addresses,
 whether or not the Shim6 protocol is used, as outlined in 
 <xref target='3484BIS'/>.
 Underneath, and transparently, the multihoming shim selects working 
 locator pairs
 with the initial locator pair being the ULID pair. If communication
 subsequently fails, the shim can test and select alternate locators.
 A subsequent section discusses the issues that arise when the selected ULID is not
 initially working, which creates the need to switch locators up front.</t>

 <t>Using one of the locators as the ULID has certain benefits for applications
 that have long-lived session state or that perform callbacks or referrals,
 because both the Fully Qualified Domain Name (FQDN) and the 128-bit
 ULID work as handles for the applications.
 However, using a single 128-bit ULID doesn't provide seamless communication
 when that locator is unreachable. See 
 <xref target='APP-REF'/> for further discussion of
 the application implications.</t>

 <t>There has been some discussion of using non-routable addresses,
 such as Unique-Local Addresses (ULAs) <xref target='RFC4193' />,
 as ULIDs in a multihoming solution.
 While this document doesn't specify all aspects of this,
 it is believed that the approach can be extended to handle the non-routable address case.
 For example, the protocol already needs to handle ULIDs that are not
 initially reachable. Thus, the same mechanism can handle ULIDs that
 are permanently unreachable from outside their site. The issue
 becomes how to make the protocol perform well when the ULID is known
 a priori to be  unreachable (e.g., the ULID is a ULA), for instance,
 avoiding any timeout and retries in this case.
 In addition, one would need to understand how the ULAs would
 be entered in the DNS to avoid a performance impact on existing,
 non-Shim6-aware IPv6 hosts potentially trying to communicate to the (unreachable) ULA.
 </t>

 </section>
 <section title="IP Multicast">

 <t>IP multicast requires that the IP Source Address field contain
 a topologically correct locator for the interface that is used to
 send the packet, since IP multicast routing uses both the source address
 and the destination group to determine where to forward the packet.
 In particular, IP multicast routing needs to be able to do the
 Reverse Path Forwarding (RPF) check.
 (This isn't much different than the situation with widely implemented
 ingress filtering <xref target='RFC2827'/> for unicast.)</t>

 <t>While in theory it would be possible to apply the shim re-mapping of the 
 IP address fields between ULIDs and locators, the fact that all the
 multicast receivers would need to know the mapping to perform makes
 such an approach difficult in practice.
 Thus, it makes sense to have multicast ULPs operate directly on locators
 and not use the shim. This is quite a natural fit for protocols that use
 RTP <xref target='RFC3550'/>, 
 since RTP already has an explicit identifier in the form
 of the synchronization source (SSRC) field in the RTP headers. Thus,
 the actual IP address fields are not important to the
 application.</t>

 <t>In summary, IP multicast will not need the shim to remap the IP 
 addresses.</t>

 <t>This doesn't prevent the receiver of multicast to change its locators, since
 the receiver is not explicitly identified; the destination address
 is a multicast address and not the unicast locator of the receiver.</t>

 </section>
 <section title="Renumbering Implications">

 <t>As stated above, this approach does not try to make communication 
 survive renumbering in the general case.</t>

 <t>When a host is renumbered, the effect is that one or more locators become
 invalid, and zero or more locators are added to the host's network interface.
 This means that the set of locators that is used in the shim will change,
 which the shim can handle as long as not all the original locators become
 invalid at the same time; the shim's ability to handle this also
 depends on the time that is required to
 update the DNS and for those updates to propagate.</t>

 <t>But IP addresses are also used as ULIDs, and making the communication
 survive locators becoming invalid can potentially cause some confusion at the
 upper layers. The fact that a ULID might be used with
 a different locator over time opens up the possibility that communication
 between two ULIDs might continue to work after one or both of
 those ULIDs are no longer reachable as locators, for example, due to
 a renumbering event. This opens up the possibility that the ULID 
 (or at least the prefix on which it is based) may be  reassigned to another site
 while it is still being used (with another locator) for existing  communication.</t>

 <t>In the worst case, we could end up with two separate hosts using the same ULID while
 both of them are communicating with the same host.</t>

 <t>This potential source for confusion is avoided by requiring that
 any communication using a ULID MUST be terminated when the ULID becomes
 invalid (due to the underlying prefix becoming invalid). This behavior can 
 be accomplished by explicitly discarding the shim state
 when the ULID becomes invalid. The context-recovery mechanism will then
 make the peer aware that the context is gone and that the ULID is no longer
 present at the same locator(s).</t>

 </section>
 <section title="Placement of the Shim">

 <figure anchor='shim-stack' title="Protocol Stack">
  <artwork><![CDATA[
			  -----------------------
			  | Transport Protocols |
			  -----------------------

		       -------------- -------------    IP endpoint
		       | Frag/reass | | Dest opts |    sub-layer
		       -------------- -------------

			   ---------------------
			   | Shim6 shim layer  |
			   ---------------------

				  ------               IP routing
				  | IP |               sub-layer
				  ------
 ]]></artwork>
 </figure>

 <t>The proposal uses a multihoming shim layer within the IP layer, i.e., 
 below the ULPs, as shown in <xref target='shim-stack'/>,
 in order to provide ULP independence.
 The multihoming shim layer behaves as if it is associated with
 an extension header, which
 would be placed after any routing-related headers in the packet
 (such as any hop-by-hop options).
 However, when the locator pair is the ULID pair, there is no data
 that needs to be carried in an extension header; thus, none is needed
 in that case.</t>

 <t>Layering the Fragmentation header above the multihoming shim
 makes reassembly robust in the case that there is broken multi-path routing
 that results in using different paths, hence potentially different source
 locators, for different fragments. Thus, the multihoming shim 
 layer is placed between the IP endpoint sublayer (which handles
 fragmentation and reassembly) and the IP routing sublayer (which 
 selects the next hop and interface to use for sending out packets).</t>

 <t>Applications and upper-layer protocols use ULIDs that the Shim6 layer maps
 to/from different locators. The Shim6 layer maintains state, called ULID-pair
 context, per ULID pair (that is, such state applies to all ULP connections between the 
 ULID pair) in order to perform this mapping. 
 The mapping is performed consistently at the sender and the
 receiver so that ULPs see packets that appear to be sent
 using ULIDs from end to end. This property is maintained
 even though the packets travel through the network containing locators in the IP address fields, and even
 though those locators may be changed by the transmitting
 Shim6 layer.</t>

 <t>The context state is maintained per remote ULID, i.e.,
 approximately per peer host, and not at any finer granularity. In particular,
 the context state is independent of the ULPs and any ULP connections.
 However, the forking capability enables Shim6-aware ULPs to use more than
 one locator pair at a time for a single ULID pair.</t>

 <figure anchor='packet-flow' title="Mapping with Changed Locators">
  <artwork><![CDATA[
 ----------------------------          ----------------------------
 | Sender A                 |          | Receiver B               |
 |                          |          |                          |
 |     ULP                  |          |     ULP                  |
 |      | src ULID(A)=L1(A) |          |      ^                   |
 |      | dst ULID(B)=L1(B) |          |      | src ULID(A)=L1(A) |
 |      v                   |          |      | dst ULID(B)=L1(B) |
 |   multihoming shim       |          |   multihoming shim       |
 |      | src L2(A)         |          |      ^                   |
 |      | dst L3(B)         |          |      | src L2(A)         |
 |      v                   |          |      | dst L3(B)         |
 |      IP                  |          |      IP                  |
 ----------------------------          ----------------------------
	|                                     ^
	------- cloud with some routers -------
 ]]></artwork>
 </figure>

 <t>The result of this consistent mapping is that there is no impact
 on the ULPs. In particular, there is no impact on pseudo-header
 checksums and connection identification.</t>

 <t>Conceptually, one could view this approach as if both ULIDs and locators
 are present in every packet, and as if a header-compression mechanism
 is applied that removes the need for the ULIDs to be carried in the packets once the compression
 state has been established. In order for
 the receiver to re-create a packet with the correct ULIDs, there is a need
 to include some "compression tag" in the data packets. This serves to
 indicate the correct context to use for decompression when the locator pair
 in the packet is insufficient to uniquely identify the context.</t>

 <t>There are different types of interactions between the Shim6 layer and other 
 protocols. Those intereactions are influenced by the usage of the
addresses that these other protocols do and the impact of the Shim6
mapping on these usages.  

<!-- [rfced] Should the above read as follows

 Those interactions are influenced by the usage these
 protocols have of the addresses and by the impact of the Shim6
 mapping on these usages.  
-->

 A detailed analysis of the interactions of different protocols,
 including the Stream Control Transmission Protocol (SCTP), mobile IP
 (MIP), and Host Identity Protocol (HIP), can be found in
 <xref target='SHIM6-APP'/>.
 Moreover, some applications may need to have a richer interaction with the Shim6 
 sublayer. In order to enable that, an API <xref target='SHIM-API'/> 
 has been defined to enable greater control 
 and information exchange for those applications that need it.</t> 

 </section>
 <section title="Traffic Engineering">

 <t>At the time of this writing, it is not clear what requirements for
 traffic engineering make sense for the Shim6 protocol, since the
 requirements must both result in some useful behavior as well as
 be implementable using a host-to-host locator agility mechanism like
 Shim6.</t>

 <t>Inherent in a scalable multihoming mechanism that separates the locator 
 function of the IP address from 
 identifying function of the IP address is that each host ends up with multiple locators.
 This means that, at least for initial contact, it is the remote peer application 
 (or layer working on its behalf) that needs to select an initial ULID,
 which automatically becomes the initial locator. In the case of Shim6, this 
 is performed by applying RFC 3484 address selection.</t>

 <t>This is quite different than the common case of IPv4 multihoming where 
 the site has a single IP address prefix, since in that case the peer performs 
 no destination address selection.</t>

 <t>  Thus, in "single prefix multihoming", the site (and in many cases its
   upstream ISPs) can use BGP to exert some control of the ingress path
   used to reach the site.  This capability does not by itself exist
   in "multiple prefix multihoming" approaches such as Shim6.   It is
   conceivable that
   extensions allowing site or provider guidance of host-based
   mechanisms could be developed. But it should be noted
   that traffic engineering via BGP, MPLS, or other similar techniques
   can still be applied for traffic on each individual prefix; Shim6 does
   not remove the capability for this. It does provide some additional
   capabilities for hosts to choose between prefixes.
 </t>
 <t>
   These capabilities also carry some risk for non-optimal behaviour
   when more than one mechanism attempts to correct problems at
   the same time. However, it should be noted that this is not necessarily
   a situation brought about by Shim6. A more constrained
   form of this capability already exists in IPv6, itself, via its support of
   multiple prefixes and address-selection rules for starting new
   communications. Even IPv4 hosts with multiple interfaces may
   have limited capabilities to choose interfaces on which they
   communicate. Similarly, upper layers may choose different
   addresses.
 </t>
 <t>
   In general, it is expected that Shim6 is applicable in relatively
   small sites and individual hosts where BGP-style traffic engineering
   operations are unavailable, unlikely, or if run with
   provider-independent addressing, possibly even harmful, considering
   the growth rates in the global routing table.
 </t>

 <t>The protocol provides a placeholder, in the form of the Locator Preferences
 option, that can be used by hosts to express priority and weight values
 for each locator. 
 This option is merely a placeholder when it comes to providing traffic engineering;
 in order to use this in a large site, there would have to be a mechanism
 by which the host can find out what preference values to use, either statically
 (e.g., some new DHCPv6 option) or dynamically.</t>

 <t>Thus, traffic engineering is listed as a possible extension in
 <xref target='possible-extensions' />.</t>

 </section>

 </section>


 <section title="Terminology" anchor="terminology">


 <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
       this document are to be interpreted as described in RFC 2119 <xref target='RFC2119'/>.</t>

 <section title="Definitions">

 <t>This document introduces the following terms:
  <list style='hanging' hangIndent='20'>

   <t hangText="upper-layer protocol (ULP)"> 
   <vspace blankLines='0' />
 A protocol layer immediately above IP. Examples are
 transport protocols such as TCP and UDP; control
 protocols such as ICMP; routing protocols such as OSPF;
 and Internet or lower-layer protocols being "tunneled"
 over (i.e., encapsulated in) IP, such as the Internet Packet Exchange (IPX),
 AppleTalk, or IP itself.
  </t>

   <t hangText="interface">A node's attachment to a link.
  </t>

   <t hangText="address">
 An IP-layer name that both contains topological significance
 and acts as a unique identifier for an interface. 128 bits.
 This document only uses the "address" term in the case where it isn't specific 
 whether it is a locator or an identifier.
  </t>

   <t hangText="locator">
 An IP-layer topological name for an interface or a set of
 interfaces. 128 bits. The locators are carried in the IP address fields
 as the packets traverse the network.
  </t>

   <t hangText="identifier">
 An IP-layer name for an IP-layer endpoint.
 The transport endpoint name is a function of the transport protocol and would
 typically include the IP identifier plus a port number.
   <vspace blankLines='1' />
 NOTE: This proposal does not specify any new form of IP-layer identifier, but 
 still separates the identifying and locating properties of the IP 
 addresses.
  </t>

   <t hangText="upper-layer identifier (ULID)">
   <vspace blankLines='0' />
 An IP address that has been selected for communication with a peer
 to be used by the upper-layer protocol. 128 bits. This is used for
 pseudo-header checksum computation and connection identification in the ULP.
 Different sets of communication to a host (e.g., different connections)
 might use different ULIDs in order to enable load spreading.
   <vspace blankLines='1' />
 Since the ULID is just one of the IP locators/addresses of the node, there 
 is no need for a separate name space and allocation mechanisms.
  </t>

   <t hangText="address field">
 The Source and Destination Address fields in the IPv6 header.
 As IPv6 is currently specified, these fields carry "addresses".
 If identifiers and locators are separated, these fields will contain
 locators for packets on the wire.
  </t>

   <t hangText="FQDN"> Fully Qualified Domain Name
  </t>

   <t hangText="ULID-pair context">
 The state that the multihoming shim maintains between a pair of upper-layer
 identifiers. The context is identified by a Context Tag for each 
 direction of the communication and also by a ULID-pair and
 a Forked Instance Identifier (see below).
  </t>

   <t hangText="Context Tag">
 Each end of the context allocates a Context Tag for the context. This is used
 to uniquely associate both received control packets and Shim6 Payload 
 Extension headers as belonging to the context.
  </t>

   <t hangText="current locator pair">
   <vspace blankLines='0' />
 Each end of the context has a current locator pair that is used to send 
 packets to the peer. However, the two ends might use different current
 locator pairs.
  </t>

   <t hangText="default context">
 At the sending end, the shim uses the ULID pair (passed down from the ULP)
 to find the context for that pair. Thus, normally, a host can have
 at most one context for a ULID pair. We call this the "default context".
  </t>

   <t hangText="context forking">
 A mechanism that allows ULPs that are aware of multiple locators to use
 separate contexts for the same ULID pair, in order to be able use different
 locator pairs for different communication to the same ULID. Context forking
 causes more than just the default context to be created for a ULID pair.
   </t>

   <t hangText="Forked Instance Identifier (FII)">
   <vspace blankLines='0' />
 In order to handle context forking, a context is identified by
 a ULID pair and a Forked Context Identifier. The default context has an FII
 of zero.
   </t>

   <t hangText="initial contact">
 We use this term to refer to the pre-shim communication when a ULP
 decides to start communicating with a peer by sending and receiving ULP
 packets. Typically, this would not invoke any operations in the shim,
 since the shim can defer the context establishment until some arbitrary,
 later point in time.
   </t>

   <t hangText="Hash-Based Addresses (HBA)">
   <vspace blankLines='0' />
 A form of IPv6 address where the interface ID is derived from a cryptographic
 hash of all the prefixes assigned to the host.
 See <xref target="RFC5535"/>.
   </t>

   <t hangText="Cryptographically Generated Addresses (CGA)">
   <vspace blankLines='0' />
 A form of IPv6 address where the interface ID is derived from a cryptographic
 hash of the public key. See  <xref target="RFC3972"/>.
   </t>

   <t hangText="CGA Parameter Data Structure (PDS)">
   <vspace blankLines='0' />
 The information that CGA and HBA exchange in order to inform the peer
 of how the interface ID was computed. 
 See <xref target="RFC3972"/> and <xref target="RFC5535"/>.
   </t>
  </list>
 </t>

 </section>
 <section title="Notational Conventions">

 <t>A, B, and C are hosts. X is a potentially malicious host.</t>

 <t>FQDN(A) is the Fully Qualified Domain Name for A.</t>

 <t>Ls(A) is the locator set for A, which consists of the locators
 L1(A), L2(A), ... Ln(A). The locator set is not ordered in any particular way
 other than maybe what is returned by the DNS. A host might form different
 locator sets containing different subnets of the host's IP addresses. This
 is necessary in some cases for security reasons. See <xref target="ipsec"/>.</t>

 <t>ULID(A) is an upper-layer identifier for A.&nbsp;&nbsp;In this proposal, ULID(A) is always one
 member of A's locator set.</t>

 <t>CT(A) is a Context Tag assigned by A.</t>

 <t>STATE (in uppercase) refers to the specific state of the state 
 machine described in <xref target="context-states"/>
 </t>

 </section>

 <section title="Conceptual">

 <t>This document also makes use of internal conceptual variables to
 describe protocol behavior and external variables that an
 implementation must allow system administrators to change. The
 specific variable names, how their values change, and how their
 settings influence protocol behavior are provided to demonstrate
 protocol behavior. An implementation is not required to have them in
 the exact form described here, so long as its external behavior is
 consistent with that described in this document. See 
 <xref target="conceptual"/>
 for a description of the conceptual data structures.</t>
 </section>

 </section>


 <section title="Assumptions" anchor="assumptions">
 <t>
   The design intent is to ensure that the Shim6 protocol is capable of
   handling path failures independently of the number of IP addresses
   (locators) available to the two communicating hosts, and
   independently of which host detects the failure condition.
 </t>
 <t>
   Consider, for example, the case in which both A and B have active
   Shim6 state and where A has only one locator while B has multiple
   locators.  In this case, it might be that B is trying to send a
   packet to A, and has detected a failure condition with the current
   locator pair.  Since B has multiple locators, it presumably has
   multiple ISPs, and (consequently) likely has alternate egress paths
   toward A.&nbsp;&nbsp;B cannot vary the destination address (i.e., A's
   locator), since A has only one locator. However, B may need to 
   vary the source address in order to ensure packet delivery. 
 </t>
 <t>
   In many cases, normal operation of IP routing may cause the packets
   to follow a path towards the correct (currently operational) egress. 
   In some cases, it is possible that a path may be selected based on 
   the source address, implying that B will need to select a source 
   address corresponding to the currently operating egress.  The 
   details of how routing can be accomplished is beyond the scope of 
   this document.
 </t>
 <t>
   Also, when the site's ISPs perform ingress filtering based on
   packet source addresses, Shim6 assumes that packets sent with
   different source and destination combinations have a reasonable
   chance of making it through the relevant ISP's ingress filters.  This
   can be accomplished in several ways (all outside the scope of this
   document), such as having the ISPs relax their ingress filters or
   selecting the egress such that it matches the IP source address
   prefix. In the case that one egress path has failed but another is 
   operating correctly, it may be necessary for the packet's source
   (node B in the previous paragraph) to select a source address that 
   corresponds to the operational egress, in order to pass the ISP's 
   ingress filters. 
 </t>

 <t>The Shim6 approach assumes that there are no IPv6-to-IPv6 NATs on the paths,
 i.e., that the two ends can exchange their own notion of their IPv6 addresses
 and that those addresses will also make sense to their peer.</t>

 <t> The security of the Shim6 protocol relies on the usage of Hash-Based Addresses (HBA)
 <xref target='RFC5535'/> and/or Cryptographically Generated Addresses (CGA) 
 <xref target='RFC3972'/>. In the case that HBAs are used, all the addresses assigned 
 to the host that are included in the Shim6 protocol (either as a locator or as a ULID) must be part of the same HBA set. 
 In the case that CGAs are used, the address used as ULID must be a
 CGA, but the other addresses that are used as locators do not need to
 be either CGAs or HBAs. It should be noted that it is perfectly
 acceptable to run the Shim6 protocol between a host that has multiple
 locators and another host that has a single IP address. 
 In this case, the address of the host with a single address does not need to be an HBA or a CGA. 
 </t>

 </section>


 <section title="Protocol Overview" anchor="overview">

 <t>The Shim6 protocol operates in several phases over time.
 The following sequence illustrates the concepts:

  <list style='symbols'>
   <t>An application on host A decides to contact an application on host B 
   using some upper-layer protocol. This results in the ULP on host A sending 
   packets to host B.&nbsp;&nbsp;We call this the initial contact. Assuming 
   the IP addresses selected by default address 
   selection <xref target="RFC3484"/> and its extensions 
   <xref target='3484BIS'/> 
   work, then there is no action by the shim at this point in time. 
   Any shim context establishment can be deferred until later.
   </t>

   <t>Some heuristic on A or B (or both) determine that it is appropriate
   to pay the Shim6 overhead to make this host-to-host communication robust 
   against locator failures. For instance, 
   this heuristic might be that more than 50 packets have been sent or received,
   or that there was a timer expiration while active packet exchange was in place.
   This makes the shim initiate the 4-way, context-establishment exchange.
   The purpose of this heuristic is to avoid setting up a shim context when 
   only a small number of packets is exchanged between two hosts.
   <vspace blankLines='1' />
   As a result of this exchange, both A and B will know a list of locators for
   each other. 
   <vspace blankLines='1' />
   If the context-establishment exchange fails, the initiator will then know
   that the other end does not support Shim6, and will continue with
   standard (non-Shim6) behavior for the session.
   </t>

   <t>Communication continues without any change for the ULP packets. In 
   particular, there are no Shim6 Extension headers added to the ULP packets,
   since the ULID pair is the same as the locator pair.
   In addition, there might be some messages exchanged between the shim sublayers
   for (un)reachability detection.
   </t>

   <t>At some point in time, something fails. Depending on the approach to
   reachability detection, there might be some advice from the ULP, or
   the shim (un)reachability detection might discover that there is a problem.
   <vspace blankLines='1' />
   At this point in time, one or both ends of the communication need to probe
   the different alternate locator pairs until a working pair is
   found, and then switch to using that locator pair.
   </t>

   <t>Once a working alternative locator pair has been found, the shim will
   rewrite the packets on transmit and tag the packets with the Shim6 Payload 
   Extension header, which contains the receiver's Context Tag.
   The receiver will use the Context Tag to find the context state, which will 
   indicate which addresses to place in the IPv6 header before passing the
   packet up to the ULP. The result is that, from the perspective of the ULP,
   the packet passes unmodified end-to-end, even though the IP routing 
   infrastructure sends the packet to a different locator.
   </t>

   <t>The shim (un)reachability detection will monitor the new locator
   pair as it monitored the original locator pair, so that subsequent failures
   can be detected.
   </t>

   <t>In addition to failures detected based on end-to-end observations, 
   one endpoint might know for certain that one or more of its locators is 
   not working. For instance, the network interface might have failed or gone 
   down (at layer 2), or an IPv6 address might have become deprecated or invalid.
   In such cases, the host can signal its peer that trying this address is no longer 
   recommended. This triggers something similar to a failure 
   handling, and a new working locator pair must be found.
   <vspace blankLines='1' />
 The protocol also has the ability to express other forms of locator 
 preferences. A change in any preference can be signaled to the peer, which 
 will have made the peer record the new preferences. A change in the preferences
 might optionally make the peer want to use a different locator pair.
 In this case, the peer follows the same locator switching procedure as
 after a failure (by verifying that its peer is indeed present at the alternate
 locator, etc).
   </t>

   <t>When the shim thinks that the context state is no longer used, it
 can garbage collect the state; there is no coordination necessary with the
 peer host before the state is removed. There is a recovery message defined to
 be able to signal when there is no context state, which can be used to
 detect and recover from both premature garbage collection as well as from
 complete state loss (crash and reboot) of a peer.
   <vspace blankLines='1' />
 The exact mechanism to determine when the context state is no longer used
 is implementation dependent. For example, an implementation might use the existence of
 ULP state (where known to the implementation) as an indication that the
 state is still used, combined with a timer (to handle ULP state that might
 not be known to the shim sublayer) to determine when the state is likely to
 no longer be used.
   </t>
  </list>
 </t>

 <t>NOTE 1: The ULP packets in Shim6 can be carried completely unmodified as long
 as the ULID pair is used as the locator pair. After a switch to a different
 locator pair, the packets are "tagged" with a Shim6 Extension header
 so that the receiver can always determine
 the context to which they belong. This is accomplished by including an 8-octet
 Shim6 Payload Extension header before the (extension) headers that are
 processed by the IP endpoint sublayer and ULPs. If, subsequently,
 the original ULIDs are selected as the active locator
 pair, then the tagging of packets with the Shim6 Extension header is no longer
 necessary.</t>

 <section title="Context Tags">

 <t>A context between two hosts is actually a context between two ULIDs.
 The context is identified by a pair of Context Tags. Each end gets to
 allocate a Context Tag, and once the context is established, most Shim6
 control messages contain the Context Tag that the receiver of the
 message allocated. Thus, at a minimum, the combination of &lt;peer ULID,
 local ULID, local Context Tag&gt; have to uniquely identify one context. 
 But, since the Shim6 Payload Extension headers are demultiplexed without looking
 at the locators in the packet, the receiver will need to allocate Context Tags
 that are unique for all its contexts.
 The Context Tag is a 47-bit number (the largest that can fit in an 8-octet 
 extension header), while preserving one bit to differentiate the Shim6 signaling
 messages from the Shim6 header included in data packets, allowing both to use 
 the same protocol number.</t>

 <t>The mechanism for detecting a loss of context state at the peer
 assumes that the receiver can
 tell the packets that need locator rewriting, even after it has lost all
 state (e.g., due to a crash followed by a reboot). This is achieved 
 because, after a rehoming event, the packets that need receive-side rewriting
 carry the Shim6 Payload Extension header.</t>

 </section>
 <section title="Context Forking" anchor="context-forking">

 <t>It has been asserted that it will be important for future ULPs -- in
 particular, future transport protocols -- to be able to control which
 locator pairs are used for different communication. For instance, host A and
 host B might communicate using both Voice over IP (VoIP) traffic and ftp traffic, and
 those communications might benefit from using different locator pairs.
 However, the basic Shim6 mechanism uses a single current locator pair
 for each context; thus, a single context cannot accomplish this.</t>

 <t>For this reason, the Shim6 protocol supports the notion of context forking.
 This is a mechanism by which a ULP can specify (using some API not yet defined)
 that a context, e.g., the ULID pair &lt;A1, B2&gt;, should be forked into
 two contexts. In this case, the forked-off context will be assigned a non-zero
 Forked Instance Identifier, while the default context has FII zero.</t>

 <t>The Forked Instance Identifier (FII) is a 32-bit identifier that has no semantics
 in the protocol other than being part of the tuple that identifies the 
 context. For example, a host might allocate FIIs as sequential numbers for any
 given ULID pair.</t>

 <t>No other special considerations are needed in the Shim6 protocol to
 handle forked contexts.</t>

   <t>Note that forking as specified does NOT allow A to be able to tell B
 that certain traffic (a 5-tuple?) should be forked for the reverse direction.
 The Shim6 forking mechanism as specified applies only to the sending of ULP
 packets. If some ULP wants to fork for both directions, it is up to the ULP
 to set this up and then instruct the shim at each end to transmit using
 the forked context.</t>

 </section>
 <section title="API Extensions" anchor="api-extensions">

 <t>Several API extensions have been discussed for Shim6, but their actual
 specification is out of scope for this document.
 The simplest one would be to add a socket option to be able to have traffic
 bypass the shim (not create any state and not use any state created by
 other traffic). This could be an IPV6_DONTSHIM socket option.
 Such an option would be useful for protocols, such as DNS, where the 
 application has its own failover mechanism (multiple NS records in the
 case of DNS) and using the shim could potentially add extra latency with
 no added benefits.</t>

 <t>Some other API extensions are discussed in 
 <xref target="possible-extensions"/>. The actual API extensions are defined in <xref target='SHIM-API'/>.</t>

 </section>
 <section title="Securing Shim6">

 <t>The mechanisms are secured using a combination of techniques:
  <list style='symbols'>
   <t>The HBA technique <xref target="RFC5535"/>
 for verifying the locators to prevent an
 attacker from redirecting the packet stream to somewhere else.</t>

   <t>Requiring a Reachability Probe+Reply (defined in 
   <xref target="RFC5534"/>) before a new 
   locator is used as the destination, in order to prevent 
   3rd party flooding attacks.</t>

   <t>The first message does not create any state on the responder. Essentially,
 a 3-way exchange is required before the responder creates any state. This
 means that a state-based DoS attack (trying to use up all memory on
 the responder) at least provides an IPv6 address that the attacker was 
 using.</t>

   <t>The context-establishment messages use nonces to prevent replay 
 attacks and to prevent off-path attackers from interfering with the
 establishment.</t>

   <t>Every control message of the Shim6 protocol, past the 
 context establishment, carries the Context Tag assigned to the particular context.
 This implies that an attacker needs to discover that
 Context Tag before being able to spoof any Shim6 control
 message. Such discovery probably requires any potential attacker to be along the
 path in order to sniff the Context Tag value. The result
 is that through this technique, the Shim6 protocol is
 protected against off-path attackers.</t>

  </list>
 </t>

 </section>
 <section title="Overview of Shim Control Messages">

 <t>The Shim6 context establishment is accomplished using four messages; I1,
 R1, I2, R2. Normally, they are sent in that order from initiator and responder,
 respectively. Should both ends attempt to set up context state at the same
 time (for the same ULID pair), then their I1 messages might cross in flight,
 and result in an immediate R2 message. (The names of these messages are 
 borrowed from HIP <xref target="RFC5201"/>.)</t>

 <t>R1bis and I2bis messages are defined; they are used to recover a
 context after it has been lost. An R1bis message is sent 
 when a Shim6 control or Shim6 Payload Extension header
 arrives and there is no matching context state at the receiver.
 When such a message is received, it will result in the re-creation of the Shim6
 context using the I2bis and R2 messages.</t>

 <t>The peers' lists of locators are normally exchanged as part of the
 context-establishment exchange. But the set of locators might be dynamic. For 
 this reason, there are Update Request and Update Acknowledgement
 messages as well as a Locator List option.</t>

 <t>Even when the list of locators is fixed, a host might determine that
 some preferences might have changed. For instance, it might determine that
 there is a locally visible failure that implies that some locator(s) are no
 longer usable. This uses a Locator Preferences option in the Update Request 
 message.</t>

 <t>The mechanism for (un)reachability detection is called Forced Bidirectional
 Communication (FBD). 
 FBD uses a Keepalive message which is sent when a host has
 received packets from its peer but has not yet sent any
 packets from its ULP to the peer. 
 The message type is
 reserved in this document, but the message format and processing rules are
 specified in <xref target='RFC5534' />.
 </t>

 <t>In addition, when the context is established and there is a subsequent failure,
 there needs to be a way to probe the set of locator pairs to efficiently
 find a working pair. This document reserves a Probe message type,
 with the packet format and processing rules specified in
 <xref target="RFC5534"/>.
 </t>

 <t>The above Probe and Keepalive messages assume we have an established
 ULID-pair context. However, communication might fail during the initial
 contact (that is, when the application or transport protocol is trying to
 set up some communication). This is handled using the mechanisms in the ULP
 to try different address pairs as specified in <xref target='RFC3484'
 /> and  <xref target='3484BIS'/>.
 In future versions of the protocol, and with a richer API between the ULP
 and the shim, the shim might be able to help optimize discovering a
 working locator pair during initial contact. This is for further
 study.</t>


 </section>
 <section title="Extension Header Order" anchor="extension-header-order">

 <t>Since the shim is placed between the IP endpoint sublayer and the IP
 routing sublayer, the Shim header will be placed before any
 Endpoint Extension headers (Fragmentation headers, Destination Options header,
 AH, ESP) but after any routing-related headers (Hop-by-Hop Extensions header,
 Routing header, and a Destinations Options header, which precedes a Routing header).
 When tunneling is used, whether IP-in-IP tunneling or the special form
 of tunneling that Mobile IPv6 uses (with Home Address options and Routing
 header type 2), there is a choice whether the shim applies inside the
 tunnel or outside the tunnel, which affects the location of the Shim6 
 header.</t>

 <t>In most cases, IP-in-IP tunnels are used as a routing technique;
 thus, it makes sense to apply them on the locators, which means that the sender
 would insert the Shim6 header after any IP-in-IP encapsulation.  This is
 what occurs naturally when routers apply IP-in-IP encapsulation. Thus, the
 packets would have:
  <list style='symbols'>
   <t>Outer IP header</t>
   <t>Inner IP header</t>
   <t>Shim6 Extension header (if needed)</t>
   <t>ULP</t>
  </list>
 </t>

 <t>But the shim can also be used to create "shimmed tunnels", i.e., where
 an IP-in-IP tunnel uses the shim to be able to switch the tunnel endpoint addresses 
 between different locators. In such a case, the packets would have:
  <list style='symbols'>
   <t>Outer IP header</t>
   <t>Shim6 Extension header (if needed)</t>
   <t>Inner IP header</t>
   <t>ULP</t>
  </list>
 </t>

 <t>In any case, the receiver behavior is well-defined; a receiver processes the
 Extension headers in order. However, the precise interaction between Mobile IPv6
 and Shim6 is for further study; it might make sense to have Mobile IPv6
 operate on locators as well, meaning that the shim would be layered on top
 of the MIPv6 mechanism.</t>

 </section>
 </section>


 <section title="Message Formats" anchor="formats">

 <t>The Shim6 messages are all carried using a new IP protocol number
 (140). The Shim6 messages have a common header (defined 
 below) with some fixed fields, followed by type-specific fields.</t>

 <t>The Shim6 messages are structured as an IPv6 Extension header
 since the Shim6 Payload Extension header is used to carry the ULP packets
 after a locator switch. The Shim6 control messages use the same
 extension header formats so that a single "protocol number" needs to
 be allowed through firewalls in order for Shim6 to function across
 the firewall.</t>

 <section title="Common Shim6 Message Format">

 <t>The first 17 bits of the Shim6 header is common for the Shim6 Payload 
 Extension header and for the control messages. It looks as follows:</t>

 <figure>
  <artwork><![CDATA[
  0                   1             
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Next Header  |  Hdr Ext Len  |P|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> The payload that follows this header.</t>
   <t hangText="Hdr Ext Len:"> 8-bit unsigned integer. Length of the Shim6
 header in 8-octet units, not including the first 8 octets.</t>
   <t hangText="P:"> A single bit to distinguish Shim6 Payload Extension headers
 from control messages.</t>
  </list>
 </t>
 <t>Shim6 signaling packets may not be larger than 1280 bytes, including 
 the IPv6 header and any intermediate headers between the IPv6 header and 
 the Shim6 header. One way to meet this requirement is to omit part of the 
 locator address information if, with this information included, 
 the packet would become larger than 1280 bytes. Another option is to perform
 option engineering, dividing into different Shim6 messages the information to 
 be transmitted. An implementation may impose administrative
 restrictions to avoid excessively large Shim6  packets, such as a
 limitation on the number of locators to be used.
 </t>

 </section>

 <section title="Shim6 Payload Extension Header Format">

 <t>The Shim6 Payload Extension header is used to carry ULP packets where the receiver must 
 replace the content of the Source and/or Destination fields in the IPv6 header 
 before passing the packet to the ULP. Thus, this extension header is required 
 when the locator pair that is used is not the same as the ULID pair.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Next Header  |       0       |1|                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                      Receiver Context Tag                     |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> The payload that follows this header.</t>
   <t hangText="Hdr Ext Len:"> 0 (since the header is 8 octets).</t>
   <t hangText="P:"> Set to one. 
 A single bit to distinguish this from the Shim6 control
 messages.</t>
   <t hangText="Receiver Context Tag:"> 47-bit unsigned integer. Allocated by
 the receiver to identify the context.
 </t>
  </list>
 </t>
 </section>
 <section title="Common Shim6 Control Header">

 <t>The common part of the header has a Next Header field
  and a Header Extension Length field that are consistent with the
  other IPv6 Extension headers, even if the Next Header value is
  always "NO NEXT HEADER" for the control messages.</t>


 <t>The Shim6 headers must be a multiple of 8 octets; hence, the minimum
 size is 8 octets.</t>

 <figure>
  <preamble>The common Shim6 Control message header is as follows:</preamble>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Next Header  |  Hdr Ext Len  |P|     Type    |Type-specific|S|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
 |                    Type-specific format                       |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>

 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> 
 8-bit selector. Normally set to NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> 8-bit unsigned integer. Length of the Shim6
 header in 8-octet units, not including the first 8 octets.</t>
   <t hangText="P:"> Set to zero.
 A single bit to distinguish this from the Shim6 Payload Extension header.</t>
   <t hangText="Type:"> 7-bit unsigned integer. Identifies the actual 
 message from the table below. Type codes 0-63 will not trigger R1bis
 messages on a missing context, while codes 64-127 will trigger R1bis.</t>
   <t hangText="S:"> A single bit set to zero that allows Shim6 and HIP to
 have a common header format yet still distinguishes between Shim6 and HIP messages.</t>
   <t hangText="Checksum:"> 16-bit unsigned integer. The checksum is the 16-bit 
 one's complement of the one's complement sum of the entire Shim6
 header message, starting with the Shim6 Next Header field and ending
 as indicated by the Hdr Ext Len.&nbsp;&nbsp;Thus, when there is a payload
 following the Shim6 header, the payload is NOT included in the
 Shim6 checksum. Note that, unlike protocols like ICMPv6, there is no 
 pseudo-header checksum part of the checksum; this provides locator
 agility without having to change the checksum. </t>
   <t hangText="Type-specific:"> Part of the message that is different
 for different message types.</t>
  </list>
 </t>

 <texttable anchor='message types'>
  <ttcol align='center'> Type Value</ttcol>
  <ttcol align='center'> Message</ttcol>
  <c>1</c> <c>I1 (1st establishment message from the initiator)</c>
  <c>2</c> <c>R1 (1st establishment message from the responder)</c>
  <c>3</c> <c>I2 (2nd establishment message from the initiator)</c>
  <c>4</c> <c>R2 (2nd establishment message from the responder)</c>
  <c>5</c> <c>R1bis (Reply to reference to non-existent context) </c>
  <c>6</c> <c>I2bis (Reply to an R1bis message) </c>
  <c>64</c> <c>Update Request</c>
  <c>65</c> <c>Update Acknowledgement</c>
  <c>66</c> <c>Keepalive</c>
  <c>67</c> <c>Probe Message</c>
  <c>68</c> <c>Error Message</c>
 </texttable>

 </section>
 <section title="I1 Message Format">

 <t>The I1 message is the first message in the context-establishment
 exchange.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 1   |   Reserved1 |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |R|                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                  Initiator Context Tag                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Initiator Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Options                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork> 
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 1, since the header is 16 octets
 when there are no options.</t>
   <t hangText="Type:"> 1</t>
   <t hangText="Reserved1:"> 7-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="R:"> 1-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Initiator Context Tag:"> 47-bit field.
 The Context Tag that the initiator has allocated for the context.</t>
   <t hangText="Initiator Nonce:"> 32-bit unsigned integer. A random number 
 picked by the initiator, which the responder will return in the R1 message.</t>
  </list>
 </t>
 <t>The following options are defined for this message:
  <list style='hanging' hangIndent='15'>
   <t hangText="ULID pair:"> When the IPv6 source and destination 
 addresses in the IPv6 header does not match the ULID pair, this option MUST be
 included. An example of this is when recovering from a lost context.</t>
   <t hangText="Forked Instance Identifier:"> When another instance of an 
   existent context with the same ULID pair is being created, a Forked
   Instance Identifier option MUST be included to distinguish this new instance 
   from the existent one.</t>
  </list>
 </t>

 <t>Future protocol extensions might define additional options for 
 this message. The C-bit in the option format defines how such a new 
 option will be handled by an implementation.
 See <xref target='option-formats'/>.</t>

 </section>
 <section title="R1 Message Format">

 <t>The R1 message is the second message in the context-establishment
 exchange. The responder sends this in response to an I1 message, without
 creating any state specific to the initiator.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 2   |   Reserved1 |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |           Reserved2           |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Initiator Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Responder Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Options                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 1, since the header is 16 octets
 when there are no options.</t>
   <t hangText="Type:"> 2</t>
   <t hangText="Reserved1:"> 7-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Reserved2:"> 16-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Initiator Nonce:"> 32-bit unsigned integer. Copied from
 the I1 message.</t>
   <t hangText="Responder Nonce:"> 32-bit unsigned integer. A number 
 picked by the responder, which the initiator will return in the I2 message.</t>
  </list>
 </t>
 <t>The following options are defined for this message:
  <list style='hanging' hangIndent='15'>
   <t hangText="Responder Validator:"> Variable length 
 option. This option MUST be included in the R1 message. Typically, it contains
 a hash generated by the responder, which the responder uses together with
 the Responder Nonce value to verify that an I2 message is indeed sent
 in response to an R1 message, and that the parameters in the I2 message
 are the same as those in the I1 message.</t>
  </list>
 </t>

 <t>Future protocol extensions might define additional options for 
 this message. The C-bit in the option format defines how such a new 
 option will be handled by an implementation.
 See <xref target='option-formats'/>.</t>

 </section>
 <section title="I2 Message Format">

 <t>The I2 message is the third message in the context-establishment
 exchange. The initiator sends this in response to an R1 message, after
 checking the Initiator Nonce, etc.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 3   |   Reserved1 |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |R|                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                  Initiator Context Tag                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Initiator Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Responder Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       Reserved2                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Options                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 2, since the header is 24 octets
 when there are no options.</t>
   <t hangText="Type:"> 3</t>
   <t hangText="Reserved1:"> 7-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="R:"> 1-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Initiator Context Tag:"> 47-bit field.
 The Context Tag that the initiator has allocated for the context.</t>
   <t hangText="Initiator Nonce:"> 32-bit unsigned integer. A random number 
 picked by the initiator, which the responder will return in the R2 message.</t>
   <t hangText="Responder Nonce:"> 32-bit unsigned integer. Copied from
 the R1 message.</t>
   <t hangText="Reserved2:"> 32-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt. (Needed to make the options start on a multiple of
 8 octet boundary.)</t>
  </list>
 </t>
 <t>The following options are defined for this message:
  <list style='hanging' hangIndent='15'>
   <t hangText="Responder Validator:"> Variable length 
 option. This option MUST be included in the I2 message and MUST be
 generated by copying the Responder Validator option received in the R1 message.</t>
   <t hangText="ULID pair:"> When the IPv6 source and destination 
 addresses in the IPv6 header do not match the ULID pair, this option MUST be
 included. An example of this is when recovering from a lost context.</t>
   <t hangText="Forked Instance Identifier:"> When another instance of an 
   existent context with the same ULID pair is being created, a Forked
   Instance Identifier option MUST be included to distinguish this new instance 
   from the existent one.</t>
   <t hangText="Locator List:"> Optionally sent when the
 initiator immediately wants to tell the responder its list of locators.
 When it is sent, the necessary HBA/CGA information for verifying the
 locator list MUST also be included.</t>
   <t hangText="Locator Preferences:"> Optionally sent when the locators don't
 all have equal preference.</t>
   <t hangText="CGA Parameter Data Structure:"> This option MUST be included in the I2 message
   when the locator list is included so the receiver can verify the locator list.</t>
   <t hangText="CGA Signature:"> This option MUST be included in the I2 message 
   when some of the locators in the list use CGA (and not HBA) for verification.</t>
  </list>
 </t>

 <t>Future protocol extensions might define additional options for 
 this message. The C-bit in the option format defines how such a new 
 option will be handled by an implementation.
 See <xref target='option-formats'/>.</t>

 </section>
 <section title="R2 Message Format">

 <t>The R2 message is the fourth message in the context-establishment
 exchange. The responder sends this in response to an I2 message.
 The R2 message is also used when both hosts send I1 messages at the
 same time and the I1 messages cross in flight.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 4   |   Reserved1 |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |R|                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                  Responder Context Tag                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Initiator Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Options                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 1, since the header is 16 octets
 when there are no options.</t>
   <t hangText="Type:"> 4</t>
   <t hangText="Reserved1:"> 7-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="R:"> 1-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Responder Context Tag:"> 47-bit field.
 The Context Tag that the responder has allocated for the context.</t>
   <t hangText="Initiator Nonce:"> 32-bit unsigned integer. Copied from
 the I2 message.</t>
  </list>
 </t>
 <t>The following options are defined for this message:
  <list style='hanging' hangIndent='15'>
   <t hangText="Locator List:"> Optionally sent when the
 responder immediately wants to tell the initiator its list of locators.
 When it is sent, the necessary HBA/CGA information for verifying the
 locator list MUST also be included.</t>
   <t hangText="Locator Preferences:"> Optionally sent when the locators don't
 all have equal preference.</t>
   <t hangText="CGA Parameter Data Structure:"> Included when the locator 
 list is included so the receiver can verify the locator list.</t>
   <t hangText="CGA Signature:"> Included when  some of the locators
 in the list use CGA (and not HBA) for verification.</t>
  </list>
 </t>

 <t>Future protocol extensions might define additional options for 
 this message. The C-bit in the option format defines how such a new 
 option will be handled by an implementation.
 See <xref target='option-formats'/>.</t>

 </section>
 <section title="R1bis Message Format">

 <t>Should a host receive a packet with a Shim6 Payload Extension header
 or Shim6 control message with type code 64-127 (such as an Update or 
 Probe message), and the host does not have any context state
 for the received Context Tag, then it will generate a R1bis message.</t>

 <t>This message allows the sender of the packet referring to the non-existent 
 context to re-establish the context with a reduced context-establishment 
 exchange. Upon the reception of the R1bis message, 
 the receiver can proceed with re-establishing the lost context by directly sending 
 an I2bis message.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 5   |   Reserved1 |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |R|                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                     Packet Context Tag                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Responder Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Options                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 1, since the header is 16 octets
 when there are no options.</t>
   <t hangText="Type:"> 5</t>
   <t hangText="Reserved1:"> 7-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="R:"> 1-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Packet Context Tag:"> 47-bit unsigned integer. The Context 
 Tag contained in the received packet that triggered the generation of the
 R1bis message.</t>
   <t hangText="Responder Nonce:"> 32-bit unsigned integer. A number 
 picked by the responder which the initiator will return in the I2bis
 message.</t>
  </list>
 </t>
 <t>The following options are defined for this message:
  <list style='hanging' hangIndent='15'>
    <t hangText="Responder Validator:"> Variable length 
 option. Typically,
 a hash generated by the responder, which the responder uses together with
 the Responder Nonce value to verify that an I2bis message is indeed sent
 in response to an R1bis message.</t>
  </list>
 </t>

 <t>Future protocol extensions might define additional options for 
 this message. The C-bit in the option format defines how such a new 
 option will be handled by an implementation.
 See <xref target='option-formats'/>.</t>

 </section>
 <section title="I2bis Message Format">

 <t>The I2bis message is the third message in the context-recovery


 exchange. This is sent in response to an R1bis message, after
 checking that the R1bis message refers to an existing context, etc.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 6  |   Reserved1 |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |R|                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                  Initiator Context Tag                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Initiator Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Responder Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       Reserved2                               |
 |                                 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                 |                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                     Packet Context Tag                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Options                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 3, since the header is 32 octets
 when there are no options.</t>
   <t hangText="Type:"> 6</t>
   <t hangText="Reserved1:"> 7-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="R:"> 1-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Initiator Context Tag:"> 47-bit field.
 The Context Tag that the initiator has allocated for the context.</t>
   <t hangText="Initiator Nonce:"> 32-bit unsigned integer. A random number 
 picked by the initiator, which the responder will return in the R2 message.</t>
   <t hangText="Responder Nonce:"> 32-bit unsigned integer. Copied from
 the R1bis message.</t>
   <t hangText="Reserved2:"> 49-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt. (Note that 17 bits are not sufficient since
 the options need to start on a multiple-of-8-octet boundary.)</t>
   <t hangText="Packet Context Tag:"> 47-bit unsigned integer. Copied
 from the Packet Context Tag field contained in the received
 R1bis.</t>

  </list>
 </t>
 <t>The following options are defined for this message:
  <list style='hanging' hangIndent='15'>
   <t hangText="Responder Validator:"> Variable length 
 option. Just a copy of the Responder Validator option in the R1bis message.</t>
   <t hangText="ULID pair:"> When the IPv6 source and destination 
 addresses in the IPv6 header do not match the ULID pair, this option MUST be
 included.</t>
   <t hangText="Forked Instance Identifier:"> When another instance of an 
   existent context with the same ULID pair is being created, a Forked
   Instance Identifier option is included to distinguish this new instance 
   from the existent one.</t>
   <t hangText="Locator List:"> Optionally sent when the
 initiator immediately wants to tell the responder its list of locators.
 When it is sent, the necessary HBA/CGA information for verifying the
 locator list MUST also be included.</t>
   <t hangText="Locator Preferences:"> Optionally sent when the locators don't
 all have equal preference.</t>
   <t hangText="CGA Parameter Data Structure:"> Included when the locator list is
 included so the receiver can verify the locator list.</t>
   <t hangText="CGA Signature:"> Included when some of the locators
 in the list use CGA (and not HBA) for verification.</t>
  </list>
 </t>

 <t>Future protocol extensions might define additional options for 
 this message. The C-bit in the option format defines how such a new 
 option will be handled by an implementation.
 See <xref target='option-formats'/>.</t>

 </section>
 <section title="Update Request Message Format">

 <t>The Update Request message is used to update either the list of locators,
 the locator preferences, or both. When the list of locators is updated, the
 message also contains the option(s) necessary for HBA/CGA to secure
 this. The basic sanity check that prevents off-path attackers from
 generating bogus updates is the Context Tag in the message.</t>

 <t>The Update Request message contains options (the Locator List and the Locator 
 Preferences) that, when included, completely replace the previous locator
 list and locator preferences, respectively. Thus, there is no mechanism to
 just send deltas to the locator list.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 64  |   Reserved1 |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |R|                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                   Receiver Context Tag                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Request Nonce                              |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Options                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 1, since the header is 16 octets
 when there are no options.</t>
   <t hangText="Type:"> 64</t>
   <t hangText="Reserved1:"> 7-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="R:"> 1-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Receiver Context Tag:"> 47-bit field.
 The Context Tag that the receiver has allocated for the context.</t>
   <t hangText="Request Nonce:"> 32-bit unsigned integer. A random number 
 picked by the initiator, which the peer will return in the 
 Update Acknowledgement message.</t>
  </list>
 </t>
 <t>The following options are defined for this message:
  <list style='hanging' hangIndent='15'>
   <t hangText="Locator List:">The list of the sender's (new) locators. 
 The locators might be unchanged and only the preferences have changed.</t>
   <t hangText="Locator Preferences:"> Optionally sent when the locators don't
 all have equal preference.</t>
   <t hangText="CGA Parameter Data Structure (PDS):"> Included 
 when the locator list is included and the PDS was not included in the
 I2/I2bis/R2 messages, so the receiver can verify the locator list.</t>
   <t hangText="CGA Signature:"> Included when some of the locators
 in the list use CGA (and not HBA) for verification.</t>
  </list>
 </t>

 <t>Future protocol extensions might define additional options for 
 this message. The C-bit in the option format defines how such a new 
 option will be handled by an implementation. See <xref target='option-formats'/>.</t>

 </section>
 <section title="Update Acknowledgement Message Format">

 <t>This message is sent in response to an Update Request message. It implies
 that the Update Request has been received and that any new locators in the 
 Update Request can now be used as the source locators of packets. But it does 
 not imply that the (new) locators have been verified to be used as a 
 destination, since the host might defer the verification of a locator until it
 sees a need to use a locator as the destination.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 65  |   Reserved1 |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |R|                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                             |
 |                   Receiver Context Tag                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                      Request Nonce                            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Options                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 1, since the header is 16 octets
 when there are no options.</t>
   <t hangText="Type:"> 65</t>
   <t hangText="Reserved1:"> 7-bit field. 
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="R:"> 1-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt.</t>
   <t hangText="Receiver Context Tag:"> 47-bit field.
 The Context Tag the receiver has allocated for the context.</t>
   <t hangText="Request Nonce:"> 32-bit unsigned integer. Copied from
 the Update Request message.</t>
  </list>
 </t>
 <t>No options are currently defined for this message.</t>

 <t>Future protocol extensions might define additional options for 
 this message. The C-bit in the option format defines how such a new 
 option will be handled by an implementation.
 See <xref target='option-formats'/>.</t>

 </section>
 <section title="Keepalive Message Format">

 <t>This message format is defined in
 <xref target="RFC5534"/>.</t>

 <t>The message is used to ensure that when a peer is sending ULP packets on
 a context, it always receives some packets in the reverse direction.
 When the ULP is sending bidirectional traffic, no extra packets need to be
 inserted. But for a unidirectional ULP traffic pattern, the shim will 
 send back some Keepalive messages when it is receiving ULP packets.</t>

 </section>
 <section title="Probe Message Format">

 <t>This message and its semantics are defined in 
 <xref target="RFC5534"/>.</t>

 <t> The goal of this mechanism is to test whether or not locator pairs work
     in the general case. In particular, this mechanism
 is to be able to handle the case when one locator pair works from A to B
 and another locator pair works from B to A, but there is no locator pair
 that works in both directions. The protocol mechanism is that, as A is sending
 Probe messages to B, B will observe which locator pairs it has received
 and report that back in Probe messages it sends to A.</t>

 </section>
 <section title="Error Message Format">

 <t>The Error message is generated by a Shim6 receiver upon the reception 
 of a Shim6 message containing critical information that cannot be
 processed properly.</t>

 <t>
 In the case that a Shim6 node receives a Shim6 packet that contains information 
 that is critical for the Shim6 protocol and that is not supported by the receiver, it 
 sends an Error Message back to the originator of the Shim6 message. The Error message 
 is unacknowledged.</t>

 <t>In addition, Shim6 Error messages defined in this section can be
 used to identify problems with Shim6 implementations. In order to do
 so, a range of Error Code types is reserved for that purpose. In
 particular, implementations may generate Shim6 Error messages with
 Code types in that range, instead of silently discarding Shim6 packets
 during the debugging process.</t>




 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3   
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |       59      |  Hdr Ext Len  |0|  Type = 68  |  Error Code |0|
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |            Checksum           |            Pointer            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Packet in error                       +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Next Header:"> NO_NXT_HDR (59).</t>
   <t hangText="Hdr Ext Len:"> At least 1, since the header is 16 octets. Depends on
   the specific Error Data.</t>
   <t hangText="Type:"> 68</t>
   <t hangText="Error Code:"> 7-bit field describing the error that
   generated the Error message. See Error Code list below.</t>
   <t hangText="Pointer:"> 16-bit field. Identifies the octet offset within the 
   invoking packet where the error was detected.</t>
   <t hangText="Packet in error:"> As much of invoking packet as possible without 
   the Error message packet exceeding the minimum IPv6 MTU.</t>
  </list>
 </t>
 <t>The following Error Codes are defined:
 </t>

 <texttable anchor='error codes'>
  <ttcol align='center'> Code Value</ttcol>
  <ttcol align='center'> Description</ttcol>
  <c>0</c> <c>Unknown Shim6 message type</c>
  <c>1</c> <c>Critical option not recognized </c>
  <c>2</c> <c>Locator verification method failed (Pointer to the
	      inconsistent verification method octet)</c>
  <c>3</c> <c>Locator List Generation number out of sync.</c>
  <c>4</c> <c>Error in the number of locators in a 
	      Locator Preference option</c>

  <c>120-127</c> <c>Reserved for debugging purposes</c>
 </texttable>


 </section>

 <section title="Option Formats" anchor='option-formats'>

 <t>The format of the options is a snapshot of the current HIP option format
 <xref target="RFC5201"/>. However, there is no intention to track any
 changes to the HIP option format, nor is there an intent to use the same
 name space for the option type values. But using the same format will
 hopefully make it easier to import HIP capabilities into Shim6 as extensions
 to Shim6, should this turn out to be useful.</t>

 <t>All of the TLV parameters have a length (including Type and Length
 fields) that is a multiple of 8 bytes. When needed, padding MUST be
 added to the end of the parameter so that the total length becomes a
 multiple of 8 bytes. This rule ensures proper alignment of data. If
 padding is added, the Length field MUST NOT include the padding. Any
 added padding bytes MUST be zeroed by the sender, and their values
 SHOULD NOT be checked by the receiver.</t>

 <t>Consequently, the Length field indicates the length of the Contents
 field (in bytes). The total length of the TLV parameter (including
 Type, Length, Contents, and Padding) is related to the Length field
 according to the following formula:</t>

 <t>Total Length = 11 + Length - (Length + 3) mod 8;</t>

 <t>The total length of the option is the smallest multiple of 8 bytes 
 that allows for the 4 bytes of the Option header and option, itself. The 
 amount of padding required can be calculated as follows:</t>

 <t>padding = 7 - ((Length + 3) mod 8)</t>
 <t>And:</t>

 <t>Total Length = 4 + Length + padding</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |             Type            |C|             Length            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                                                               ~
 ~                          Contents                             ~
 ~                                               +-+-+-+-+-+-+-+-+
 ~                                               |    Padding    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>

   <t hangText="Type:">15-bit identifier of the type of option. The
 options defined in this document are below.</t>
   <t hangText="C:">Critical. One, if this parameter is critical and
 MUST be recognized by the recipient; zero otherwise.
 An implementation might view the C-bit as part of the Type
 field by multiplying the type values in this specification by two.</t>
   <t hangText="Length:">Length of the Contents, in bytes.</t>
   <t hangText="Contents:">Parameter-specific, defined by Type.</t>
   <t hangText="Padding:">Padding, 0-7 bytes, added if needed.</t>
  </list>
 </t>
 <texttable anchor='option types'>
  <ttcol align='center'> Type</ttcol>
  <ttcol align='center'> Option Name</ttcol>
  <c> 1</c> <c>Responder Validator</c>
  <c> 2</c> <c>Locator List</c>
  <c> 3</c> <c>Locator Preferences</c>
  <c> 4</c> <c>CGA Parameter Data Structure</c>
  <c> 5</c> <c>CGA Signature</c>
  <c> 6</c> <c>ULID Pair</c>
  <c> 7</c> <c>Forked Instance Identifier</c>
  <c> 10</c> <c>Keepalive Timeout Option</c>
  </texttable>

 <t>Future protocol extensions might define additional options for 
 the Shim6 messages. The C-bit in the option format defines how such a new 
 option will be handled by an implementation.</t>

 <t>If a host receives an option that it does not understand (an option
 that was defined in some future extension to this protocol) or that is not 
 listed as a valid option for the different message types above, then 
 the Critical bit in the option determines the outcome. 
  <list style='symbols'>
    <t>If C=0, then the option is silently ignored, and the rest 
    of the message is processed.</t>
    <t>If C=1, then the host SHOULD send back a Shim6 Error message with Error Code=1, 
    with the Pointer field referencing the first octet in the 
    Option Type field. When C=1, the rest of the message MUST NOT be processed.</t>
  </list>
 </t>

 <section title="Responder Validator Option Format" anchor="validator">

 <t>The responder can choose exactly what input is used to compute the validator
 and what one-way function (such as MD5 or SHA1) it uses, as long as the responder can
 check that the validator it receives back in the I2 or I2bis
 message is indeed one that:
 <list style='hanging'>
	 <t hangText="1)">computed,</t>
	 <t hangText="2)">computed for the particular context, and</t>
	 <t hangText="3)">isn't a replayed I2/I2bis message.</t>
 </list>
 </t>

 <t>Some suggestions on how to generate the validators are captured in Sections
 <xref target="R1-validator" format="counter" /> and
 <xref target="R1bis-validator" format="counter" />.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |           Type = 1          |0|            Length             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                           Validator                           ~
 ~                                               +-+-+-+-+-+-+-+-+
 ~                                               |    Padding    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Validator:">Variable length content whose interpretation
 is local to the responder.</t>
   <t hangText="Padding:">Padding, 0-7 bytes, added if needed. See
 <xref target='option-formats' />.</t>
  </list>
 </t>

 </section>
 <section title="Locator List Option Format">

 <t>The Locator List option is used to carry all the locators of the sender.
 Note that the order of the locators is important, since the Locator
 Preferences option refers to the locators by using the index in the list.
 </t>

 <t>Note that we carry all the locators in this option even though some
 of them can be created automatically from the CGA Parameter Data Structure.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |           Type = 2          |0|            Length             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                     Locator List Generation                   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Num Locators |            N Octets of Verification Method    |
 +-+-+-+-+-+-+-+-+                                               |
 ~                                                               ~
 ~                                               +-+-+-+-+-+-+-+-+
 ~                                               |    Padding    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                     Locators 1 through N                      ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Locator List Generation:"> 32-bit unsigned integer. 
 Indicates a generation number that is increased by one for each new locator
 list. This is used to ensure that the index in the Locator Preferences 
 refers to the right version of the locator list.</t>
   <t hangText="Num Locators:"> 8-bit unsigned integer. The number of
 locators that are included in the option. We call this number "N" below.</t>
   <t hangText="Verification Method:"> N octets. The ith octet specifies the
 verification method for the ith locator.</t>
   <t hangText="Padding:">Padding, 0-7 bytes, added if needed so that
 the Locators start on a multiple-of-8-octet boundary. Note that for this
 option, there is never a need to pad at the end since the Locators are
 a multiple-of-8-octets in length. This internal padding is included in the
 Length field.</t>
   <t hangText="Locators:"> N 128-bit locators.</t>
  </list>
 </t>

 <t>The defined verification methods are:</t>
 <texttable anchor='verification methods'>
  <ttcol align='center'> Value</ttcol>
  <ttcol align='center'> Method</ttcol>
  <c>0</c><c>Reserved</c>
  <c>1</c><c>HBA</c>
  <c>2</c><c>CGA</c>
  <c>3-255</c><c>Reserved</c>
 </texttable>

 </section>
 <section title="Locator Preferences Option Format">

 <t>The Locator Preferences option can have some flags to indicate whether 
 or not a locator is known to work. In addition, the sender can include 
 a notion of preferences. It 
 might make sense to define "preferences" as a combination of priority and
 weight, the same way that DNS SRV records have such information. The priority
 would provide a way to rank the locators, and, within a given priority, the
 weight would provide a way to do some load sharing. See <xref target='RFC2782'/>
 for how SRV defines the interaction of priority and weight.</t>

 <t>The minimum notion of preferences we need is to be able to indicate that a 
 locator is "dead". We can handle this using a single octet flag for each 
 locator.</t>

 <t>We can extend that by carrying a larger "element" for each locator. This
 document presently also defines 2-octet and 3-octet elements, and we can
 add more information by having even larger elements if need be.</t>

 <t>The locators are not included in the preference list. Instead, the
 first element refers to the locator that was in the first element in the Locator
 List option. The generation number carried in this option and the Locator
 List option is used to verify that they refer to the same version of the
 locator list.</t>


 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |           Type = 3          |0|            Length             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                     Locator List Generation                   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Element Len  |  Element[1]   |  Element[2]   |  Element[3]   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                              ...                              ~
 ~                                               +-+-+-+-+-+-+-+-+
 ~                                               |    Padding    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 <postamble> Case of Element Len = 1 is depicted.</postamble>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Locator List Generation:"> 32-bit unsigned integer. 
 Indicates a generation number for the locator list to which the elements
 should apply.</t>
   <t hangText="Element Len:">8-bit unsigned integer. The length in octets of
 each element. This specification
 defines the cases when the length is 1, 2, or 3.</t>
   <t hangText="Element[i]:">A field with a number of octets defined by the
 Element Len field. Provides preferences for the ith
 locator in the Locator List option that is in use.</t>
   <t hangText="Padding:">Padding, 0-7 bytes, added if needed. See
 <xref target='option-formats' />.</t>
  </list>
 </t>
 <t>When the Element length equals one, then the element consists of only a
 one-octet Flags field. The currently defined set of flags are:
  <list>
   <t>BROKEN: 0x01</t>
   <t>TRANSIENT: 0x02</t>
  </list>
 The intent of the BROKEN flag is to inform the peer that a given locator is 
 known to be not working. The intent of TRANSIENT is to allow the distinction
 between more stable addresses and less stable addresses when Shim6 is combined
 with IP mobility, and when we might have more stable home locators and less stable
 care-of-locators.</t>

 <t>When the Element length equals two, then the element consists of a
 one-octet Flags field followed by a one-octet Priority field. This
 Priority field has the same semantics as the Priority field in DNS SRV records.</t>

 <t>When the Element length equals three, then the element consists of
 a one-octet Flags field followed by a one-octet Priority field and a
 one-octet Weight field. This Weight field has the same semantics as
 the Weight field in DNS SRV records.</t>

 <t>This document doesn't specify the format when the Element length is more 
 than three, except that any such formats MUST be defined so that the first
 three octets are the same as in the above case, that is,
 a one-octet Flags field followed by a one-octet Priority field, 
 and a one-octet Weight field.</t>

 </section>
 <section title="CGA Parameter Data Structure Option Format">

 <t>This option contains the CGA Parameter Data Structure (PDS). When
    HBA is used to verify the locators, the PDS contains the HBA
    multiprefix extension in addition to the PDS mandatory fields and 
    other extensions unrelated to Shim6 that the PDS might have.  
    When CGA is used to verify the locators, in
    addition to the PDS option, the host also needs to include the
    signature in the form of a CGA Signature option.

 </t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |           Type = 4          |0|            Length             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                   CGA Parameter Data Structure                ~
 ~                                               +-+-+-+-+-+-+-+-+
 ~                                               |    Padding    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="CGA Parameter Data Structure:">Variable length content. Content
 defined in <xref target="RFC3972"/> and 
 <xref target="RFC5535"/>.</t>
   <t hangText="Padding:">Padding, 0-7 bytes, added if needed. See
 <xref target='option-formats' />.</t>
  </list>
 </t>


 </section>
 <section title="CGA Signature Option Format">

 <t>When CGA is used for verification of one or more of the locators in the
 Locator List option, then the message in question will need to contain this 
 option.
 </t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |           Type = 5          |0|            Length             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ~                        CGA Signature                          ~
 ~                                               +-+-+-+-+-+-+-+-+
 ~                                               |    Padding    |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="CGA Signature:">A variable-length
 field containing a PKCS#1 v1.5 signature,
 constructed by using the sender's private key over the following
 sequence of octets:
    <list style='numbers' hangIndent='3'>
     <t>The 128-bit CGA Message Type tag [CGA] value for Shim6: 0x4A
 30 5662 4858 574B 3655 416F 506A 6D48. (The tag value has been
 generated randomly by the editor of this specification.).</t>

     <t>The Locator List Generation number of the correspondent Locator
 List option.</t>

     <t>The subset of locators included in the correspondent Locator
 List option whose verification method is set to CGA. The locators
 MUST be included in the order in which they are listed in the Locator
 List Option.</t>
    </list>
   </t>
   <t hangText="Padding:">Padding, 0-7 bytes, added if needed. See
 <xref target='option-formats' />.</t>
  </list>
 </t>


 </section>
 <section title="ULID Pair Option Format">

 <t>I1, I2, and I2bis messages MUST contain the ULID pair; normally, this is
 in the IPv6 Source and Destination fields. In case the ULID for the 
 context differs from the address pair included in the Source and Destination 
 Address fields of the IPv6 packet used to carry the I1/I2/I2bis message, 
 the ULID Pair option MUST be included in the I1/I2/I2bis message.</t>

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |           Type = 6          |0|        Length = 36            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       Reserved2                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                         Sender ULID                           +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                        Receiver ULID                          +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Reserved2:"> 32-bit field.
 Reserved for future use. Zero on transmit. MUST
 be ignored on receipt. (Needed to make the ULIDs start on a
 multiple-of-8-octet boundary.)</t>
   <t hangText="Sender ULID:"> A 128-bit IPv6 address.</t>
   <t hangText="Receiver ULID:"> A 128-bit IPv6 address.</t>
  </list>
 </t>

 </section>
 <section title="Forked Instance Identifier Option Format">

 <figure>
  <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |           Type = 7          |0|         Length = 4            |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                  Forked Instance Identifier                   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 ]]></artwork>
 </figure>
 <t>Fields:
  <list style='hanging' hangIndent='15'>
   <t hangText="Forked Instance Identifier:"> 32-bit field containing the
   identifier of the particular forked instance.</t>
  </list>
 </t>

 </section>
 <section title="Keepalive Timeout Option Format">

 <t>This option is defined in 
 <xref target="RFC5534"/>.</t>

 </section>


 </section>
 </section>


 <section title="Conceptual Model of a Host" anchor="conceptual">

 <t>This section describes a conceptual model of one possible data
 structure organization that hosts will
 maintain for the purposes of Shim6. The described
 organization is provided to facilitate the explanation of how the
 Shim6 protocol should behave. This document does not
 mandate that implementations adhere to this model as long as their
 external behavior is consistent with that described in this document.</t>

  <section title="Conceptual Data Structures">

 <t>The key conceptual data structure for the Shim6 protocol is the
 ULID-pair context. This is a data structure that contains the following
 information:
  <list style='symbols'>
 <t>The state of the context. See <xref target="context-states"/>.</t>

 <t>The peer ULID: ULID(peer).</t>

 <t>The local ULID: ULID(local).</t>

 <t>The Forked Instance Identifier: FII. This is zero for the default
 context, i.e., when there is no forking.</t>

 <t>The list of peer locators with their preferences: Ls(peer).</t>

 <t>The generation number for the most recently received, verified
 peer locator list.</t>

 <t>For each peer locator, the verification method to use (from the Locator 
 List option).</t>

 <t>For each peer locator, a flag specifying whether it has been
 verified using HBA or CGA, and a bit specifying whether the locator has been
 probed to verify that the ULID is present at that location.</t>

 <t>The current peer locator is the locator used as the destination address 
 when sending packets: Lp(peer).</t>

 <t>The set of local locators and the preferences: Ls(local).</t>

 <t>The generation number for the most recently sent Locator List option.</t>

 <t>The current local locator is the locator used as the source address when 
 sending packets: Lp(local).</t>

 <t>The Context Tag used to transmit control messages and Shim6 Payload Extension
 headers; this is allocated by the peer: CT(peer).</t>

 <t>The context to expect in received control messages and Shim6 Payload
 Extension headers; this is allocated by the local host: CT(local).</t>

 <t>Timers for retransmission of the messages during context-establishment
 and update messages.</t>

 <t>Depending how an implementation determines whether a context is still
 in use, there might be a need to track the last time a packet was
 sent/received using the context.</t>

 <t>Reachability state for the locator pairs as specified in 
 <xref target="RFC5534"/>.</t>

 <t>During pair exploration, information about the Probe messages that
 have been sent and received as specified in 
 <xref target="RFC5534"/>.</t>

 <t>During context-establishment phase, the Initiator Nonce, Responder Nonce, Responder 
 Validator, and timers related to the different packets sent (I1,I2, R2), as described in
 <xref target="establishment"/>.</t>

  </list>
 </t>

  </section>
  <section title="Context STATES" anchor="context-states">

 <figure>
  <preamble>The STATES that are used to describe the Shim6 protocol
 are as follows: </preamble>
  <artwork><![CDATA[
 +---------------------+---------------------------------------------+
 | STATE               | Explanation                                 |
 +---------------------+---------------------------------------------+
 | IDLE                | State machine start                         |
 |                     |                                             |
 | I1-SENT             | Initiating context-establishment exchange   |
 |                     |                                             |
 | I2-SENT             | Waiting to complete context-establishment   |
 |                     | exchange                                    |
 |                     |                                             |
 | I2BIS-SENT          | Potential context loss detected             |
 |                     |                                             |
 | ESTABLISHED         | SHIM context established                    |
 |                     |                                             |
 | E-FAILED            | Context-establishment exchange failed       |
 |                     |                                             |
 | NO-SUPPORT          | ICMP Unrecognized Next Header type          |
 |                     | (type 4, code 1) received, indicating       |
 |                     | that Shim6 is not supported                 |
 +---------------------+---------------------------------------------+
 ]]></artwork>
 </figure>

 <figure>
  <preamble>
 In addition, in each of the aforementioned STATES, the following 
 state information is stored:
 </preamble>
  <artwork><![CDATA[
 +---------------------+---------------------------------------------+
 | STATE               | Information                                 |
 +---------------------+---------------------------------------------+
 | IDLE                | None                                        |
 |                     |                                             |
 | I1-SENT             | ULID(peer), ULID(local), [FII], CT(local),  |
 |                     | INIT Nonce, Lp(local), Lp(peer), Ls(local)  |
 |                     |                                             |
 | I2-SENT             | ULID(peer), ULID(local), [FII], CT(local),  |
 |                     | INIT Nonce, RESP Nonce, Lp(local), Lp(peer),|
 |                     | Ls(local), Responder Validator              |
 |                     |                                             |
 | ESTABLISHED         | ULID(peer), ULID(local), [FII], CT(local),  |
 |                     | CT(peer), Lp(local), Lp(peer), Ls(local),   |
 |                     | Ls(peer), INIT Nonce?(to receive late R2)   |
 |                     |                                             |
 | I2BIS-SENT          | ULID(peer), ULID(local), [FII], CT(local),  |
 |                     | CT(peer), Lp(local), Lp(peer), Ls(local),   |
 |                     | Ls(peer), CT(R1bis), RESP Nonce,            |
 |                     | INIT Nonce, Responder Validator             |
 |                     |                                             |
 | E-FAILED            | ULID(peer), ULID(local)                     |
 |                     |                                             |
 | NO-SUPPORT          | ULID(peer), ULID(local)                     |
 +---------------------+---------------------------------------------+
 ]]></artwork>
 </figure>

  </section>

 </section>


 <section title="Establishing ULID-Pair Contexts" anchor="establishment">

 <t>ULID-pair contexts are established using a 4-way exchange, which
 allows the responder to avoid creating state on the first packet. As
 part of this exchange, each end allocates a Context Tag and shares this
 Context Tag and its set of locators with the peer.</t>

 <t>In some cases, the 4-way exchange is not necessary -- for instance, when
 both ends try to set up the context at the same time, or when recovering from
 a context that has been garbage collected or lost at one of the hosts.</t>

 <section title="Uniqueness of Context Tags" anchor="context-tag">

 <t>As part of establishing a new context, each host has to assign a unique 
 Context Tag. Since the Shim6 Payload Extension headers are demultiplexed based
 solely on the Context Tag value (without using the locators), the Context
 Tag MUST be unique for each context.
 </t>

 <t>It is important that Context Tags are hard to guess for off-path attackers.
 Therefore, if an implementation uses structure in the Context Tag to 
 facilitate efficient lookups, at least 30 bits of the Context Tag MUST be 
 unstructured and populated by random or pseudo-random bits.</t>

 <t>In addition, in order to minimize the reuse of Context Tags, the host 
 SHOULD randomly cycle through the unstructured tag name space that is
 reserved for randomly assigned Context Tag values (e.g., following the 
 guidelines described in <xref target='RFC4086'/>).</t>

 </section>
 <section title="Locator Verification" anchor="locator-verification">

 <t>The peer's locators might need to be verified during context establishment
 as well as when handling locator updates in <xref target='update'/>.</t>

 <t>There are two separate aspects of locator verification.
 One is to verify that the locator is tied to the ULID, i.e., that the
 host that "owns" the ULID is also the one that is claiming 
 the locator "ownership". The Shim6 protocol uses the HBA or CGA
 techniques for doing this verification.
 The other aspect is to verify that the host is indeed reachable at the claimed 
 locator. Such verification is needed not only to make sure communication can
 proceed but also to prevent 3rd party flooding attacks <xref target='RFC4218'/>.
 These different aspects of locator verification happen at different
 times since the first might need to be performed before packets can
 be received by the peer with the source locator in question, but the
 latter verification is only needed before packets are sent to the
 locator.</t>

 <t>Before a host can use a locator (different than the ULID) as the
 source locator, it must know that the peer will accept packets with that
 source locator as part of this context. Thus, the HBA/CGA
 verification SHOULD be performed by the host before the
 host acknowledges the new locator by sending either an Update Acknowledgement
 message or an R2 message.</t>

 <t>Before a host can use a locator (different than the ULID) as the destination
 locator, it MUST perform the HBA/CGA verification if this was not
 performed upon reception of the locator set.  In addition, it MUST
 verify that the ULID is indeed  present at that locator. This
 verification is performed by doing a return-routability test as part
 of the Probe  sub-protocol
 <xref target='RFC5534' />.</t>

 <t>If the verification method in the Locator List option
 is not supported by the host, or
 if the verification method is not consistent with the CGA 
 Parameter Data Structure (e.g., the Parameter Data Structure
 doesn't contain the multiprefix
 extension and the verification method says to use HBA), then the host
 MUST ignore the Locator List and the message in which it is contained.
 The host SHOULD generate a Shim6 Error message with Error Code=2 and
 with the Pointer referencing the octet in the verification method
 that was found inconsistent.</t>

 </section>

 <section title="Normal Context Establishment">

 <t>The normal context establishment consists of a 4-message exchange in the 
 order of I1, R1, I2, R2, as can be seen in <xref target='I1-R1'/>.</t>

 <figure anchor="I1-R1" title="Normal Context Establishment">
  <artwork><![CDATA[
      Initiator                          Responder

       IDLE                               IDLE
	    ------------- I1 -------------->
       I1-SENT                            
	    <------------ R1 ---------------
					  IDLE
	    ------------- I2 -------------->
       I2-SENT
	    <------------ R2 ---------------
       ESTABLISHED                        ESTABLISHED
 ]]></artwork>
 </figure>

 </section>
 <section title="Concurrent Context Establishment" 
 anchor='concurrent-context-establishment'>

 <t>When both ends try to initiate a context for the same ULID pair, then 
 we might end up with crossing I1 messages. Alternatively, since no state 
 is created when receiving the I1, a host might send an I1 after having 
 sent an R1 message.</t>

 <t>Since a host remembers that it has sent an I1, it can respond to an
 I1 from the peer (for the same ULID pair) with an R2, resulting in
 the message exchange shown in <xref target='crossing-I1'/>. 
 Such behavior is needed for reasons such as 
 correctly responding to retransmitted I1 messages, which occur when
 the R2 message has been lost.</t>

 <figure anchor="crossing-I1" title="Crossing I1 Messages">
  <artwork><![CDATA[
      Host A                             Host B

       IDLE                               IDLE
	    -\
       I1-SENT---\     
		  ---\                  /---
		      --- I1 ---\   /---  I1-SENT
				 ---\
		     /--- I1 ---/    ---\
		/---                     -->
	    <---

	    -\
       I1-SENT---\     
		  ---\                  /---
		      --- R2 ---\   /---  I1-SENT
				 ---\
		     /--- R2 ---/    ---\
		/---                     -->
	    <---                          ESTABLISHED
       ESTABLISHED
 ]]></artwork>
 </figure>

 <t>If a host has received an I1 and sent an R1, it has no state
 to remember this. Thus, if the ULP on the host sends down packets,
 this might trigger the host
 to send an I1 message itself. Thus, while one end is sending an I1, the other
 is sending an I2, as can be seen in <xref target='crossing-I2-I1'/>.</t>

 <figure anchor="crossing-I2-I1" title="Crossing I2 and I1">
  <artwork><![CDATA[
      Host A                             Host B

       IDLE                               IDLE
	    -\
	      ---\     
       I1-SENT    ---\            
		      --- I1 ---\
				 ---\
				     ---\
					 -->

					/---
				    /---  IDLE
				 ---
		     /--- R1--/          
		/---                        
	    <---

	    -\
       I2-SENT---\     
		  ---\                  /---
		      --- I2---\   /---   I1-SENT
				 ---\
		     /--- I1 ---/    ---\
		/---                     -->
	    <---                          ESTABLISHED

	    -\
       I2-SENT---\     
		  ---\                  /---
		      --- R2 ---\   /---
				 ---\
		     /--- R2 ---/    ---\
		/---                     -->
	    <---                          ESTABLISHED
       ESTABLISHED
 ]]></artwork>
 </figure>


 </section>
 <section title="Context Recovery" anchor='context-recovery'>

 <t>Due to garbage collection, we can end up with one end having and using the
 context state, and the other end not having any state. We need to be able to 
 recover this state at the end that has lost it before we can use it.</t>

 <t>This need can arise in the following cases:
  <list style='symbols'>
   <t>The communication is working using the ULID pair as the locator pair
 but a problem arises, and the end that has retained the context state 
 decides to probe alternate locator pairs.</t>
   <t>The communication is working using a locator pair that is not the ULID 
 pair; hence, the ULP packets sent from a peer that has retained the context 
 state use the Shim6 Payload Extension header.</t>
   <t>The host that retained the state sends a control message (e.g., an Update 
   Request message).</t>
  </list>
 In all cases, the result is that the peer without state receives a shim message
 for which it has no context for the Context Tag.
 </t>

 <t>We can recover the context by having the node that
 doesn't have a context state send back an R1bis message, and
 then complete the recovery with an I2bis and R2 message,
 as can be seen in <xref target='R1bis-I2bis'/>.</t>

 <figure anchor="R1bis-I2bis" title="Context Loss at Receiver">
  <artwork><![CDATA[
	Host A                             Host B

      Context for
      CT(peer)=X                         Discards context for
					 CT(local)=X

       ESTABLISHED                        IDLE

	    ---- payload, probe, etc. -----> No context state
					     for CT(local)=X

	    <------------ R1bis ------------
					  IDLE

	    ------------- I2bis ----------->
       I2BIS_SENT
	    <------------ R2 ---------------
       ESTABLISHED                        ESTABLISHED
 ]]></artwork>
 </figure>


 <t>If one end has garbage collected or lost the context state, it might
 try to create a new context state (for the same ULID pair), 
 by sending an I1 message. In this case,
 the peer (that still has the context state) will reply with an R1 message,
 and the full 4-way exchange will be performed again, as 
 can be seen in  <xref target='recovery-full'/>.</t>

 <figure anchor="recovery-full" title="Context Loss at Sender">
  <artwork><![CDATA[
	Host A                             Host B

      Context for
      CT(peer)=X                         Discards context for
      ULIDs A1, B1                       CT(local)=X

       ESTABLISHED                        IDLE

     Finds  <------------ I1 --------------- Tries to set up
     existing                                for ULIDs A1, B1
     context,
     but CT(peer)                         I1-SENT
     doesn't match
	    ------------- R1 --------------->
     Left old context
     in ESTABLISHED                       

	    <------------ I2 ---------------
     Re-create context 
     with new CT(peer)                    I2-SENT
     and Ls(peer).

       ESTABLISHED
	    ------------- R2 -------------->
       ESTABLISHED                        ESTABLISHED
 ]]></artwork>
 </figure>

 </section>
 <section title="Context Confusion" anchor='context-confusion'>

 <t>Since each end might garbage collect the context state, we can have the
 case where one end has retained the context state and tries to use it, while
 the other end has lost the state. We discussed this in the previous section
 on recovery. But, for the same reasons, when one host retains Context Tag
 X as CT(peer) for ULID pair &lt;A1, B1&gt;, the other end might end up allocating
 that Context Tag as CT(local) for another ULID pair (e.g., &lt;A3, B1&gt;) between
 the same hosts. In this case, we cannot use the recovery mechanisms since
 there needs to be separate Context Tags for the two ULID pairs.</t>

 <t>This type of "confusion" can be observed in two cases (assuming it
 is A that has retained the state and B that has dropped it):
  <list style='symbols'>
   <t>B decides to create a context for ULID pair &lt;A3, B1&gt;, allocates
 X as its Context Tag for this, and sends an I1 to A.</t>

   <t>A decides to create a context for ULID pair &lt;A3, B1&gt;
 and starts the exchange by sending I1 to B.&nbsp;&nbsp;When B receives the I2 message,
 it allocates X as the Context Tag for this context.</t>
  </list>
 In both cases, A can detect that B has allocated X for ULID pair &lt;A3, B1&gt;
 even though  A still has X as CT(peer) for ULID pair &lt;A1, B1&gt;. Thus,
 A can detect that B must have lost the context for &lt;A1, B1&gt;.
 </t>

 <t>The confusion can be detected when I2/I2bis/R2 is received, since we
 require that those messages MUST include a sufficiently large set of locators
 in a Locator List option that the peer can determine whether or not two
 contexts have the same host as the peer by comparing if there is any common
 locators in Ls(peer).</t>

 <t>The old context that used the Context Tag MUST
 be removed; it can no longer be used to send packets. Thus,
 A would forcibly remove the context state for &lt;A1, B1, X&gt; so that it
 can accept the new context for &lt;A3, B1, X&gt;. An implementation MAY
 re-create a context to replace the one that was removed -- in this case, for
 &lt;A1, B1&gt;. The normal I1, R1, I2, R2 establishment exchange would then
 pick unique Context Tags for that replacement context. This re-creation
 is OPTIONAL, but might be useful when there is ULP communication
 that is using the ULID  pair whose context was removed.</t>

 <t>Note that an I1 message with a duplicate Context Tag should not cause the 
 removal of the old context state; this operation needs to be deferred until
 the reception of the I2 message.</t>

 </section>
 <section title="Sending I1 Messages">

 <t>When the shim layer decides to set up a context for a ULID pair,
 it starts by allocating and initializing the context state for its end. As
 part of this, it assigns a random Context Tag to the context that is not being 
 used as CT(local) by any other context . In the case that 
 a new API is used and the ULP requests a forked context, the Forked Instance
 Identifier value will be set to a non-zero value. Otherwise, the
 FII value is zero. Then the initiator can send
 an I1 message and set the context STATE to I1-SENT. 
 The I1 message MUST include the ULID pair -- normally, in the
 IPv6 Source and Destination fields. But if the ULID pair 
 for the context is not used as a locator pair for the I1 message, 
 then a ULID option MUST be included in the I1 message. In addition, if
 a Forked Instance Identifier value is non-zero, the I1 
 message MUST include a Context Instance Identifier option containing 
 the correspondent value.</t>

 </section>
 <section title="Retransmitting I1 Messages">

 <t>If the host does not receive an I2 or R2 message in response to the I1
 message after I1_TIMEOUT time, then it needs to retransmit the I1 message. 
 The retransmissions should use a retransmission timer with binary exponential 
 backoff to avoid creating congestion issues for the network when lots of 
 hosts perform I1 retransmissions. Also, the actual timeout value should be
 randomized between 0.5 and 1.5 of the nominal value to avoid 
 self-synchronization.</t>

 <t>If, after I1_RETRIES_MAX retransmissions, there is no response, then most 
 likely the peer does not implement the Shim6 protocol (or there could be a 
 firewall that blocks the protocol). In this case, it makes sense for the host to
 remember not to try again to establish a context with that ULID.
 However, any such negative caching should be retained for at most
 NO_R1_HOLDDOWN_TIME, in order to be able to later set up a context should the problem
 have been that the host was not reachable at all when the shim tried
 to establish the context.</t>

 <t>If the host receives an ICMP error with "Unrecognized Next Header" type
 (type 4, code 1) and the included packet is the I1 message 
 it just sent, then this is a more reliable
 indication that the peer ULID does not implement Shim6. Again, in this case, 
 the host should remember not to try again to establish a context  with that ULID.
 Such negative caching should be retained for at most ICMP_HOLDDOWN_TIME, which 
 should be significantly longer than the previous case. </t>

 </section>
 <section title="Receiving I1 Messages">

 <t>A host MUST silently discard any received I1
 messages that do not satisfy all of the following validity checks in addition 
 to those specified in <xref target='receiving-shim-control'/>:
  <list style='symbols'>
   <t>The Hdr Ext Len field is at least 1, i.e., the length is at least 16 
 octets.</t>
  </list>
 </t>

 <t> Upon the reception of an I1 message, the host extracts the ULID pair
 and the Forked Instance Identifier from the message. If there is no ULID-pair
 option, then the ULID pair is taken from the Source and Destination
 fields in the IPv6 header. If there is no FII option in the message, then the
 FII value is taken to be zero.</t>

 <t>Next, the host looks for an existing context that matches the ULID
 pair and the FII.</t>

 <t>If no state is found (i.e., the STATE is IDLE), then the host 
 replies with an R1 message as specified below.</t>

 <t>If such a context exists in ESTABLISHED STATE, the host verifies that
 the locator of the initiator is included in Ls(peer). (This check is 
 unnecessary if there is no ULID-pair option in the I1 message.)</t>

 <t>If the state exists in ESTABLISHED STATE and the locators do not
 fall in the locator sets, then the host replies with an R1 message as
 specified below. This completes the I1 processing, with the context
 STATE being unchanged.</t>

 <t>If the state exists in ESTABLISHED STATE and the locators do fall in 
 the sets, then the host compares CT(peer) for the context with 
 the CT contained in the I1 message.
  <list style='symbols'>
   <t> If the Context Tags match, then this probably means that the R2 message 
 was lost and this I1 is a retransmission. In this case, the host replies with 
 an R2 message containing the information available for the existent context.</t>

   <t> If the Context Tags do not match, then it probably means that the 
 initiator has lost the context information for this context and 
 is trying to establish a new one for the same ULID pair. In this case, 
 the host replies with an R1 message as specified below. 
 This completes the I1 processing, with the context STATE being unchanged.</t>
  </list>
 </t>

 <t>If the state exists in other STATE (I1-SENT, I2-SENT, I2BIS-SENT), we 
 are in the  situation of concurrent context establishment, described in 
 <xref target='concurrent-context-establishment' />. In this case, 
 the host leaves CT(peer) unchanged and replies with an R2 message.
 This completes the I1 processing, with the context STATE being unchanged.</t>

 </section>
 <section title="Sending R1 Messages"  anchor='sending-R1'>

 <t>When the host needs to send an R1 message in response to the I1 message, 
 it copies the Initiator Nonce from the I1 message to the R1 message,
 generates a Responder Nonce, and calculates a Responder Validator
 option as suggested in the following  section. No state is created on
 the host in this case.  (Note that the information used to generate
 the R1 reply message is either contained in the received I1 message
 or is global information that is not associated with the
 particular requested context (the S and the Responder Nonce
 values.))</t>

 <t>When the host needs to send an R2 message in response to the I1 message, 
 it copies the Initiator Nonce from the I1 message to the R2 message, and
 otherwise follows the normal rules for forming an R2 message (see
 <xref target='sending-R2' />).</t>

 <section title="Generating the R1 Validator" anchor="R1-validator">

 <t>As it is stated in <xref target='validator' />, the validator-generation 
 mechanism is a local choice since the validator is generated and verified by 
 the same node, i.e., the responder. However, in order to provide the required 
 protection, the validator needs to be generated by fulfilling the
 conditions described in  <xref target='validator' />. One way for the
 responder to properly generate validators is to maintain a  single
 secret (S) and a running counter (C) for the Responder Nonce that is
 incremented in fixed periods of time (this allows the responder to
 verify the age of a Responder  Nonce, independently of the context in
 which it is used). </t>

 <t>When the validator is generated to be included in an R1 message
 sent in response to a specific I1 message, the responder can perform the 
 following procedure to generate the validator value:</t>

 <t>First, the responder uses the current counter C value as the Responder Nonce. </t>
 <t>Second, it uses the following information (concatenated) as input to the one-way function:
  <list style='symbols'>
   <t>The secret S</t>
   <t>That Responder Nonce</t>
   <t>The Initiator Context Tag from the I1 message</t>
   <t>The ULIDs from the I1 message</t>
   <t>The locators from the I1 message (strictly only needed 
      if they are different from the ULIDs)</t>
   <t>The Forked Instance Identifier, if such option was included in the I1 
   message</t>
  </list>
   </t>
 <t> 
 Third, it uses the output of the hash function as the validator value included in the R1 message.
 </t>


 </section>

 </section>
 <section title="Receiving R1 Messages and Sending I2 Messages">

 <t>A host MUST silently discard any received R1
 messages that do not satisfy all of the following validity checks in addition 
 to those specified in <xref target='receiving-shim-control'/>:
  <list style='symbols'>
   <t>The Hdr Ext Len field is at least 1, i.e., the length is at least 16 
 octets.</t>
  </list>
 </t>

 <t> Upon the reception of an R1 message, the host extracts the Initiator Nonce
 and the Locator Pair from the message (the latter from the Source and
 Destination fields in the IPv6 header). Next, the host looks for an existing 
 context that matches the Initiator Nonce and where the locators
 are contained in Ls(peer) and Ls(local), respectively. 
 If no such context is found, then the R1 message is 
 silently discarded.</t>

 <t>If such a context is found, then the host looks at the STATE:
  <list style='symbols'>
   <t> If the STATE is I1-SENT, then it sends 
 an I2 message as specified below.</t>

   <t> In any other STATE (I2-SENT, I2BIS-SENT, ESTABLISHED),
 then the host has already sent an I2 message and this is probably a
 reply to a retransmitted I1 message, so this R1  message MUST be
 silently discarded.</t>
  </list>
 </t>

 <t>When the host sends an I2 message,  it includes the Responder Validator option
 that was in the R1 message. The I2 message MUST include the ULID 
 pair -- normally, in the IPv6 Source and Destination fields. If a ULID-pair
 option was included in the I1 message, then it MUST be included in the I2
 message as well. In addition,
 if the Forked Instance Identifier value for this context is non-zero,
 the I2 message MUST contain a Forked Instance Identifier option 
 carrying the Forked Instance Identifier value. Besides, the I2
 message contains an Initiator Nonce. 
 This is not required to be the same as the one included in the previous I1 
 message.</t>

 <t>The I2 message may also include the initiator's locator list. If
 this is the case, then it must also include the CGA Parameter
 Data Structure. If CGA (and not HBA) is used to verify one or more of
 the locators included in the locator list, then the initiator must also
 include a CGA Signature option containing the signature.</t>

 <t>When the I2 message has been sent, the STATE is set to I2-SENT.</t>

 </section>
 <section title="Retransmitting I2 Messages">

 <t>If the initiator does not receive an R2 message after I2_TIMEOUT 
 time after sending an I2 message, it MAY retransmit the I2 message, using 
 binary exponential backoff and randomized timers. 
 The Responder Validator option might have a limited lifetime -- that
 is, the peer might reject Responder Validator options  that are older
 than VALIDATOR_MIN_LIFETIME to avoid replay attacks. In the case that
 the initiator decides not to retransmit I2 messages, or in the case
 that the initiator still does not receive an R2 message after 
 retransmitting I2 messages I2_RETRIES_MAX times, 
 the initiator SHOULD fall back to retransmitting the I1 message.</t>

 </section>
 <section title="Receiving I2 Messages">

 <t>A host MUST silently discard any received I2
 messages that do not satisfy all of the following validity checks in addition 
 to those specified in <xref target='receiving-shim-control'/>:
  <list style='symbols'>
   <t>The Hdr Ext Len field is at least 2, i.e., the length is at least 24
 octets.</t>
  </list>
 </t>

 <t> Upon the reception of an I2 message, the host extracts the ULID pair
 and the Forked Instance Identifier from the message. If there is no ULID-pair
 option, then the ULID pair is taken from the Source and Destination
 fields in the IPv6 header. If there is no FII option in the message, then the
 FII value is taken to be zero.</t>

 <t>Next, the host verifies that the Responder Nonce is a recent one (nonces 
 that are no older than VALIDATOR_MIN_LIFETIME SHOULD be considered recent)
 and that the Responder Validator option matches the validator the host would 
 have computed for the ULID, locators, Responder Nonce, Initiator Nonce, and FII.</t>

 <t>If a CGA Parameter Data Structure (PDS) is included in the message, then
 the host MUST verify if the actual PDS contained in the message corresponds to
 the ULID(peer).</t>

 <t>If any of the above verifications fail, then the host silently discards 
 the message; it has completed the I2 processing.</t>

 <t>If all the above verifications are successful, then the host proceeds to look for
 a context state for the initiator. The host looks for a 
 context with the extracted ULID pair and FII. If none exist, then STATE of
 the (non-existing) context is viewed as being IDLE; thus, the actions depend
 on the STATE as follows:
  <list style='symbols'>
   <t>If the STATE is IDLE (i.e., the context does not exist), the host
 allocates a Context Tag (CT(local)), creates the context state for the 
 context, and sets its STATE to ESTABLISHED. It records CT(peer) and
 the peer's locator set as well as its own 
 locator set in the context. It SHOULD perform the
 HBA/CGA verification of the peer's locator set at this point in time, as specified in
 <xref target="locator-verification"/>. Then, the host sends an R2
 message back as specified below. </t>


   <t> If the STATE is I1-SENT, 
 then the host verifies if the source locator is included in Ls(peer)
 or in the Locator List contained in the I2 message; the HBA/CGA
 verification for this specific locator is successful.

    <list style='symbols'>
     <t> If this is not the case, then the message is silently discarded and 
 the context STATE remains unchanged.</t>

     <t> If this is the case, then the host updates the context information 
 (CT(peer), Ls(peer)) with the data contained in the I2 message, and
 the host MUST send an R2 message back as specified below. Note that before 
 updating Ls(peer) information, the host SHOULD perform the HBA/CGA 
 validation of the peer's locator set at this point in time, as 
 specified in <xref target="locator-verification"/>. The host moves 
 to ESTABLISHED STATE.</t>

    </list>
   </t>

   <t> If the STATE is ESTABLISHED, I2-SENT, or I2BIS-SENT, 
 then the host verifies if the source locator 
 is included in Ls(peer) or in the Locator List 
 contained in the I2 message; the HBA/CGA 
 verification for this specific locator is successful.
   <list style='symbols'>
     <t> If this is not the case, then the message is silently discarded and 
 the context STATE remains unchanged.</t>

     <t> If this is the case, then the host updates the context information 
 (CT(peer), Ls(peer)) with the data contained in the I2 message, and
 the host MUST send an R2 message back as specified in 
 <xref target='sending-R2'/>. Note that before 
 updating Ls(peer) information, the host SHOULD perform the HBA/CGA validation 
 of the peer's locator set at this point in time, as 
 specified in <xref target="locator-verification"/>. The context STATE remains
 unchanged.</t>

    </list>
   </t>
  </list>
 </t>

 </section>
 <section title="Sending R2 Messages"  anchor='sending-R2'>

 <t>Before the host sends the R2 message, it MUST look for a possible context
 confusion, i.e., where it would end up with multiple contexts using
 the same CT(peer) for the same peer host. See 
 <xref target='match-context-confusion' />.</t>

 <t>When the host needs to send an R2 message, the host forms the
 message its Context Tag and copies the Initiator Nonce
 from the triggering message (I2, I2bis, or I1). 

<!-- [rfced] Is there text missing in the sentence above?  The host
forms the message [??]?  Should this read, ... the host forms the
message and its Context Tag, and copies the Initiator Nonce ...?  -->

In addition, it may
 include alternative locators and necessary options so that
 the peer can verify them. In particular, the R2 message may include the responder's 
 locator list and the PDS option. If CGA  (and not HBA) is used to
 verify the locator list, then the responder also  signs the key parts
 of the message and includes a CGA Signature  option containing the signature.</t>

 <t>R2 messages are never retransmitted. If the R2 message is lost, then the
 initiator will retransmit either the I2/I2bis or I1 message.
 Either retransmission will cause the responder to find the context
 state and respond with an R2 message.</t>

 </section>
 <section title="Match for Context Confusion" anchor="match-context-confusion">

 <t>When the host receives an I2, I2bis, or R2, it MUST
 look for a possible context confusion, i.e., where it would end up with
 multiple contexts using the same CT(peer) for the same peer
 host. This can happen when the host has received the above messages,
 since they create a new context with a new CT(peer). The same issue
 applies when CT(peer) is updated for an existing context.</t>

 <t>The host takes CT(peer) for the newly created or updated context,
 and looks for other contexts which:
  <list style='symbols'>
   <t>Are in STATE ESTABLISHED or I2BIS-SENT</t>

   <t>Have the same CT(peer)</t>

   <t>Have an Ls(peer) that has at least one locator in common with the newly
 created or updated context</t>
  </list>
 </t>

 <t>If such a context is found, then the host checks if
 the ULID pair or the Forked Instance  Identifier are different than
 the ones in the newly created or updated context:

  <list style='symbols'>
   <t>If either or both are different, then the peer is reusing the Context 
 Tag for the creation of a context with different ULID pair or
 FII, which is an indication
 that the peer has lost the original context. In this case, 
 we are in a context confusion situation, and the host MUST NOT use
 the old context to send any packets. It MAY just discard the old context
 (after all, the peer has discarded it), or it MAY attempt to 
 re-establish the old context by sending a new I1 message and moving its
 STATE to I1-SENT. In any case, once that this situation is 
 detected, the host MUST NOT keep two contexts 
 with overlapping Ls(peer) locator sets and the same Context Tag in ESTABLISHED
 STATE, since this would result in demultiplexing problems on the peer.</t>

   <t>If both are the same, then this context is actually the context that
 is created or updated; hence, there is no confusion.</t>

  </list>
 </t>

 </section>
 <section title="Receiving R2 Messages">

 <t>A host MUST silently discard any received R2
 messages that do not satisfy all of the following validity checks in addition 
 to those specified in <xref target='receiving-shim-control'/>:
  <list style='symbols'>
   <t>The Hdr Ext Len field is at least 1, i.e., the length is at least 16
 octets.</t>
  </list>
 </t>

 <t> Upon the reception of an R2 message, the host extracts the Initiator Nonce
 and the Locator Pair from the message (the latter from the Source and
 Destination fields in the IPv6 header). Next, the host looks for an existing 
 context that matches the Initiator Nonce and where the locators
 are Lp(peer) and Lp(local), respectively. Based on the STATE:
  <list style='symbols'>
   <t>If no such context is found, i.e., the STATE is IDLE,
 then the message is silently dropped.</t>

   <t>If STATE is I1-SENT, I2-SENT, or I2BIS-SENT, then the host performs 
 the following actions.  If a CGA Parameter Data Structure (PDS) is included in 
 the message, then the host MUST verify that the actual PDS contained in 
 the message corresponds to the ULID(peer) as specified in
 <xref target="locator-verification"/>. If the verification fails, then the 
 message is silently dropped. If the verification succeeds, then the host 
 records the information from the R2 message in
 the context state; it records the peer's locator set and CT(peer).
 The host SHOULD perform the HBA/CGA verification
 of the peer's locator set at this point in time,
 as specified in <xref target="locator-verification"/>. 
 The host sets its STATE to ESTABLISHED.</t>

   <t>If the STATE is ESTABLISHED, the R2 message is silently ignored, (since this
   is likely to be a reply to a retransmitted I2 message).</t>
  </list>
 </t>

 <t>Before the host completes the R2 processing, it MUST look for a possible context
 confusion, i.e., where it would end up with multiple contexts using
 the same CT(peer) for the same peer host. See
 <xref target='match-context-confusion' />.</t>

 </section>


 <section title="Sending R1bis Messages" anchor='R1bis'>

 <t>Upon the receipt of a Shim6 Payload Extension header where there is no 
 current Shim6 context at the receiver, the receiver is to respond with an 
 R1bis message
 in order to enable a fast re-establishment of the lost Shim6 context. </t>

 <t>Also, a host is to respond with an R1bis upon receipt of any control 
 messages that have a message type in the range 64-127 (i.e., excluding the
 context-setup messages such as I1, R1, R1bis, I2, I2bis, R2, and future
 extensions), where the control message refers to a non-existent context.</t>

 <t>We assume that all the incoming packets that trigger the generation of
 an R1bis message contain a locator pair (in the address fields of the IPv6 
 header) and a Context Tag.</t>

 <t>Upon reception of any of the packets described above, the host will reply 
 with an R1bis including the following information:
  <list style="symbols">
   <t> The Responder Nonce is a number picked by the responder that
   the initiator will return in the I2bis message.</t>

  <t>Packet Context Tag is the Context Tag contained in the received
  packet that triggered the generation of the R1bis message.</t>

   <t>The Responder Validator option is included, with a validator that is 
 computed as suggested in the next section.</t>
  </list>
 </t>

 <section title="Generating the R1bis Validator" anchor="R1bis-validator">

 <t>One way for the responder to properly generate validators is to maintain a 
 single secret (S) and a running counter C for the Responder Nonce that is incremented
 in fixed periods of time (this allows the responder to verify the age of a Responder 
 Nonce, independently of the context in which it is used).</t>

 <t>When the validator is generated to be included in an R1bis message --
 that is, sent in response to a specific control packet or a packet containing the 
 Shim6 Payload Extension header message -- the responder can perform the 
 following procedure to generate the validator value:</t>

 <t>First, the responder uses the counter C value as the Responder Nonce.</t>
 <t>Second, it uses the following information (concatenated) as input to the one-way function:
  <list style='symbols'>
   <t>The secret S</t>
   <t>That Responder Nonce</t>
   <t>The Receiver Context Tag included in the received packet</t>
   <t>The locators from the received packet </t>
  </list>
 </t>
 <t> Third, it uses the output of the hash function as the validator string.
 </t>
 </section>

 </section>
 <section title="Receiving R1bis Messages and Sending I2bis Messages">

 <t>A host MUST silently discard any received R1bis
 messages that do not satisfy all of the following validity checks in addition 
 to those specified in <xref target='receiving-shim-control'/>:
  <list style='symbols'>
   <t>The Hdr Ext Len field is at least 1, i.e., the length is at least 16 
 octets.</t>
  </list>
 </t>

 <t> Upon the reception of an R1bis message, the host extracts the Packet 
 Context Tag
 and the Locator Pair from the message (the latter from the Source and
 Destination fields in the IPv6 header). Next, the host looks for an existing 
 context where the Packet Context Tag matches CT(peer) and where the locators
 match Lp(peer) and Lp(local), respectively. 
  <list style='symbols'>
   <t>If no such context is found, i.e., the STATE is IDLE, 
 then the R1bis message is silently discarded.</t>

   <t>If the STATE is I1-SENT, I2-SENT, or I2BIS-SENT, then the R1bis
 message is silently discarded.</t>

   <t>If the STATE is ESTABLISHED, then we are in the case where the peer 
 has lost the context, and the goal is to try to re-establish it. For that, 
 the host leaves CT(peer) unchanged in the context state, transitions
 to I2BIS-SENT STATE, and sends an I2bis message, including the computed 
 Responder Validator option, the Packet Context Tag, and 
 the Responder Nonce that were received in the R1bis message. This I2bis message is sent
 using the locator pair included in the R1bis message. In the case that 
 this locator pair differs from the ULID pair defined for this context, 
 then a ULID option MUST be included in the I2bis message. In addition,
 if the Forked Instance Identifier for this context is non-zero,
 then a Forked Instance Identifier option carrying the instance
 identifier 



 value for this context MUST be included in the I2bis message.
 The I2bis message may also include a locator list. If this is the
 case, then it must also include the CGA Parameter Data Structure. If
 CGA (and not HBA) is used to verify one or more of the locators
 included in the locator list, then the initiator must also include a CGA
 Signature option containing the signature.
 </t>
  </list>
 </t>

 </section>

 <section title="Retransmitting I2bis Messages">

 <t>If the initiator does not receive an R2 message after I2bis_TIMEOUT 
 time after sending an I2bis message, it MAY retransmit the I2bis message, using 
 binary exponential backoff and randomized timers.  The Responder
 Validator option might have a limited lifetime -- that is, the peer
 might reject Responder Validator options 
 that are older than VALIDATOR_MIN_LIFETIME to avoid replay attacks. In the case that
 the initiator decides not to retransmit I2bis messages, or in the case that the
 initiator still does not receive an R2 message after retransmitting I2bis messages 
 I2bis_RETRIES_MAX times,  the initiator SHOULD fall back to
 retransmitting the I1 message.</t>

 </section>

 <section title="Receiving I2bis Messages and Sending R2 Messages">

 <t>A host MUST silently discard any received I2bis
 messages that do not satisfy all of the following validity checks in addition 
 to those specified in <xref target='receiving-shim-control'/>:
  <list style='symbols'>
   <t>The Hdr Ext Len field is at least 3, i.e., the length is at least 32
 octets.</t>
  </list>
 </t>

 <t> Upon the reception of an I2bis message, the host extracts the ULID pair
 and the Forked Instance Identifier from the message. If there is no ULID-pair
 option, then the ULID pair is taken from the Source and Destination
 fields in the IPv6 header. If there is no FII option in the message, then the
 FII value is taken to be zero.</t>

 <t>Next, the host verifies that the Responder Nonce is a recent one (nonces 
 that are no older than VALIDATOR_MIN_LIFETIME SHOULD be considered recent)
 and that the Responder Validator option matches the validator the host would 
 have computed for the locators, Responder Nonce, and Receiver Context Tag as part
 of sending an R1bis message.</t>

 <t>If a CGA Parameter Data Structure (PDS) is included in the message, then
 the host MUST verify if the actual PDS contained in the message corresponds to
 the ULID(peer).</t>

 <t>If any of the above verifications fail, then the host silently discards
 the message; it has completed the I2bis processing.</t>

 <t>If both verifications are successful, then the host proceeds to look for
 a context state for the initiator. The host looks for a 
 context with the extracted ULID pair and FII. If none exist, then STATE of
 the (non-existing) context is viewed as being IDLE; thus, the actions depend
 on the STATE as follows:
  <list style='symbols'>
   <t>If the STATE is IDLE (i.e., the context does not exist), the host
 allocates a Context Tag (CT(local)), creates the context state for the 
 context, and sets its STATE to ESTABLISHED.
 The host SHOULD NOT use the Packet Context Tag in the I2bis
 message for CT(local); instead, it should pick a new random Context Tag
 just as when it processes an I2 message. It records CT(peer) and
 the peer's locator set as well as its own 
 locator set in the context. It SHOULD perform the HBA/CGA verification
 of the peer's locator set at this point in time, as specified 
 in <xref target="locator-verification"/>. Then the host sends an 
 R2 message back as specified in <xref target='sending-R2' />. </t>

<t>If the STATE is I1-SENT, then the host verifies if the source
     locator is included in Ls(peer) or in the Locator
     List contained in the I2bis message and if the HBA/CGA verification for
     this specific locator is successful.
<list style='symbols'>
     <t>If this is not the case, then the message is silently
        discarded.  The context STATE remains unchanged.</t>

     <t>If this is the case, then the host updates the context
        information (CT(peer), Ls(peer)) with the data contained in the
        I2bis message, and the host MUST send an R2 message back as
        specified below.  Note that before updating Ls(peer)
        information, the host SHOULD perform the HBA/CGA validation of
        the peer's locator set at this point in time, as specified in
        <xref target="locator-verification"/>.  The host moves to ESTABLISHED STATE.</t>
</list>
</t>
  <t>If the STATE is ESTABLISHED, I2-SENT, or I2BIS-SENT, then the host
     determines whether at least one of the two following conditions hold: i) if
     the source locator is included in Ls(peer) or, ii) if the source
     locator is included in the Locator List contained in the I2bis
     message and if the HBA/CGA verification for this specific locator is
     successful.
<list style='symbols'>
     <t>If none of the two aforementioned conditions hold, then the
        message is silently discarded.  The context STATE remains
        unchanged.</t>

     <t>If at least one of the two aforementioned conditions hold, then
        the host updates the context information (CT(peer), Ls(peer))
        with the data contained in the I2bis message, and the host MUST
        send an R2 message back, as specified in <xref target='sending-R2'/>.
         Note that before updating Ls(peer) information, the host SHOULD perform
        the HBA/CGA validation of the peer's locator set at this point
        in time, as specified in <xref target="locator-verification"/>.
        The context STATE remains unchanged.</t>

   </list>
   </t>
  </list>
 </t>

 </section>

 </section>


<section title="Handling ICMP Error Messages" anchor="icmp-errors">

<t>The routers in the path as well as the destination might generate
ICMP error messages. In some cases, the Shim6 can take action and 
solve the problem that resulted in the error. In other cases, the Shim6 layer
cannot solve the problem, and it is critical that these packets make it back up
to the ULPs so that they can take appropriate action. </t>

<t>This is an implementation issue in the sense that the mechanism
is completely local to the host itself. But the issue of how ICMP errors
are correctly dispatched to the ULP on the host are important; hence,
this section specifies the issue.</t>

<t>All ICMP messages MUST be delivered to the ULP in all cases, except when Shim6 
	successfully acts on the message (e.g., selects a new path). There SHOULD 
	be a configuration option to unconditionally deliver all ICMP messages 
	(including ones acted on by shim6) to the ULP. </t>


<t> According to that recommendation, the following ICMP error
  messages should be processed by the Shim6 layer and not passed to
  the ULP:
<list>
<t>ICMP error Destination Unreachable, with codes:
<?rfc subcompact="yes" ?>
<list>
<t>0 (No route to destination)</t>
<t>1 (Communication with destination administratively prohibited)</t>
<t>2 (Beyond scope of source address)</t>
<t>3 (Address unreachable)</t>
<t>5 (Source address failed ingress/egress policy)</t>
<t>6 (Reject route to destination)</t>
</list>
</t>
<?rfc subcompact="no" ?>
<t>ICMP Time exceeded error.</t>
<t>ICMP Parameter problem error, with the parameter that caused the
  error being a Shim6 parameter.</t>
</list>
</t>
<t> The following ICMP error messages report problems that cannot be addressed by the Shim6 layer
and that should be passed to the ULP (as described below): 
<list>
<t>ICMP Packet too big error.</t>
<t>ICMP Destination Unreachable with Code 4 (Port unreachable).</t>
<t>ICMP Parameter problem (if the parameter that caused the problem is
  not a Shim6 parameter).</t>
</list>
</t>


<figure anchor='icmp-error-noshim' 
title="ICMP Error Handling without the Shim6 Payload Extension Header">
 <artwork><![CDATA[
             +--------------+
             | IPv6 Header  |
             |              |
             +--------------+
             |    ICMPv6    |
             |    Header    |
      - -    +--------------+   - -
             | IPv6 Header  |
             | src, dst as  |   Can be dispatched
     IPv6    | sent by ULP  |   unmodified to ULP
             | on host      |   ICMP error handler
     Packet  +--------------+
             |     ULP      |
     in      |    Header    |
             +--------------+
     Error   |              |
             ~     Data     ~
             |              |
      - -    +--------------+   - -
]]></artwork>
</figure>

<t>When the ULP packets are sent without the Shim6 Payload Extension header
  -- that is, while the initial locators=ULIDs are working -- this introduces no new concerns; an 
implementation's existing mechanism for delivering these errors to the ULP
will work. See <xref target='icmp-error-noshim'/>. </t>

<t>But when the shim on the transmitting side inserts the Shim6 Payload Extension 
header and replaces the ULIDs
in the IP address fields with some other locators, then an ICMP error
coming back will have a "packet in error", which is not a packet that the
ULP sent. Thus, the implementation will have to apply reverse mapping
to the "packet in error" before passing the ICMP error up to the ULP, including 
the ICMP extensions defined in <xref target="RFC4884"/>.   
See <xref target='icmp-error-shim'/>.</t>

<figure anchor='icmp-error-shim' title="ICMP Error Handling with the Shim6 Payload Extension Header">
 <artwork><![CDATA[
             +--------------+
             | IPv6 Header  |
             |              |
             +--------------+
             |    ICMPv6    |
             |    Header    |
      - -    +--------------+   - -
             | IPv6 Header  |
             | src, dst as  |   Needs to be 
     IPv6    | modified by  |   transformed to
             | shim on host |   have ULIDs
             +--------------+   in src, dst fields,
     Packet  |  Shim6 ext.  |   and Shim6 Ext.
             |    Header    |   header removed
      in     +--------------+   before it can be
             |  Transport   |   dispatched to the ULP
     Error   |    Header    |   ICMP error handler.
             +--------------+
             |              |
             ~     Data     ~
             |              |
      - -    +--------------+   - -
]]></artwork>
</figure>

<t>Note that this mapping is different than when receiving packets from the 
peer with Shim6 Payload Extension headers because, in that case, the packets 
contain CT(local). But the ICMP errors
have a "packet in error" with a Shim6 Payload Extension header containing CT(peer).
This is because they were intended to be
received by the peer. In any case, since the &lt;Source Locator, Destination
Locator, CT(peer)&gt; has to be unique when received by the peer, the
local host should also only be able to find one context that matches this
tuple.</t>

<t>If the ICMP error is a "packet too big", the reported MTU must be
  adjusted
to be 8 octets less, since the shim will add 8 octets when sending
packets.</t>

<t>After the "packet in error" has had the original ULIDs inserted, 
then this Shim6 Payload Extension header can be removed. The result is a
"packet in error" that is passed to the ULP which looks as if the shim
did not exist.</t>

</section>


<section title="Teardown of the ULID-Pair Context" anchor="teardown">

<t>Each host can unilaterally decide when to tear down a ULID-pair context.
It is RECOMMENDED that hosts do not tear down the context when they know that
there is some upper-layer protocol that might use the context. For example,
an implementation might know this if there is an open socket that is
connected to the ULID(peer). However, there might be cases when the knowledge
is not readily available to the shim layer, for instance, for UDP applications
that do not connect their sockets or for any application that retains some
higher-level state across (TCP) connections and UDP packets.</t>

<t>Thus, it is RECOMMENDED that implementations minimize premature teardown
by observing the amount of traffic that is sent and received using the context,
and tear down the state only after it appears quiescent. A reasonable approach
would be to not tear down a context until at least 5 minutes have passed
since the last message was sent or received using the context. (Note that 
packets that use the ULID pair as a locator pair and that do not require
address rewriting by the Shim6 layer are also considered as packets
using the associated Shim6 context.)</t>

<t>Since there is no explicit, coordinated removal of the context state,
there are potential issues around Context Tag reuse.
One end might remove the state and potentially reuse that Context
Tag for some other communication, and the peer might later try to use
the old context (which it didn't remove). The protocol has mechanisms to
recover from this, which work whether the state removal was total and
accidental (e.g., crash and reboot of the host) or just a garbage collection
of shim state that didn't seem to be used. However, the host should try to
minimize the reuse of Context Tags by trying to randomly cycle through
the 2^47 Context Tag values. (See <xref target='context-tag-reuse' /> for
a summary of how the recovery works in the different cases.)</t>

</section>



<section title="Updating the Peer" anchor="update">

<t>The Update Request and Acknowledgement are used both
to update the list of locators (only possible when CGA is used to
verify the locator(s)) and to update the preferences associated
with each locator.</t>

<section title="Sending Update Request Messages">

<t>When a host has a change in the locator set, it can communicate this
to the peer by sending an Update Request. When a host has a change
in the preferences for its locator set, it can also communicate this
to the peer. The Update Request message can include just a Locator List
option (to convey the new set of locators), just a Locator Preferences
  option, or both a new Locator List and new Locator Preferences.</t>

<t>Should the host send a new Locator List, the host picks a new random,
local generation number, records this in the context, and puts it in
the Locator List option. Any Locator Preference option, whether sent in
the same Update Request or in some future Update Request, will use that 
generation number to make sure the preferences get applied to the 
correct version of the locator list.</t>

<t>The host picks a random Request Nonce for each update and keeps the
same nonce for any retransmissions of the Update Request. The nonce is
used to match the acknowledgement with the request.</t>

<t>The Update Request message can also include a CGA Parameter Data Structure (this is needed if 
the CGA PDS was not previously exchanged). If CGA 
(and not HBA) is used to verify one or more of the locators included in the locator list, then 
a CGA Signature option containing the signature must also be included
  in the Update Request message.</t>

</section>
<section title="Retransmitting Update Request Messages">

<t>If the host does not receive an Update Acknowledgement
R2 message in response to the Update Request
message after UPDATE_TIMEOUT time, then it needs to retransmit the Update
Request message. 
The retransmissions should use a retransmission timer with binary exponential 
backoff to avoid creating congestion issues for the network when lots of 
hosts perform Update Request retransmissions. Also, the actual timeout value should be
randomized between 0.5 and 1.5 of the nominal value to avoid 
self-synchronization.</t>

<t>Should there be no response, the retransmissions continue forever.
The binary exponential backoff stops at MAX_UPDATE_TIMEOUT.
But the only way the retransmissions would stop when there is no
acknowledgement is when Shim6, through the REAP protocol
or some other mechanism, decides to discard the context state due to
lack of ULP usage in combination with no responses to the REAP protocol.</t>

</section>
<section title="Newer Information while Retransmitting">

<t>There can be at most one outstanding Update Request message at
any time. Thus until, for example, an update with a new Locator List has been
acknowledged, any newer Locator List or new Locator Preferences
cannot just be sent. However, when there is newer information
and the older information has not yet been acknowledged, the host can,
instead of waiting for an acknowledgement, abandon the previous update
and construct a new Update Request (with a new Request Nonce) that
includes the new information as well as the information that hasn't yet been
acknowledged.</t>

<t>For example, if the original locator list was just (A1, A2), and
if an Update Request with the Locator List (A1, A3) is
outstanding, and the host determines that it should both add A4 to
the locator list and mark A1 as BROKEN, then it would need to:
 <list style='symbols'>
  <t>Pick a new random Request Nonce for the new Update Request.</t>
  <t>Pick a new random generation number for the new locator list.</t>
  <t>Form the new locator list: (A1, A3, A4).</t>
  <t>Form a Locator Preference option that uses the new generation number
and has the BROKEN flag for the first locator.</t>
  <t>Send the Update Request and start a retransmission timer.</t>
 </list>
</t>

<t>Any Update Acknowledgement that doesn't match the current Request Nonce
(for instance, an acknowledgement for the abandoned Update Request)
will be silently ignored.</t>

</section>
<section title="Receiving Update Request Messages">

<t>A host MUST silently discard any received Update Request
messages that do not satisfy all of the following validity checks in addition 
to those specified in <xref target='receiving-shim-control'/>:
 <list style='symbols'>
  <t>The Hdr Ext Len field is at least 1, i.e., the length is at least 16 
octets.</t>
 </list>
</t>

<t> Upon the reception of an Update Request message, the host extracts the 
Context Tag from the message. It then looks for a context that has a CT(local)
that matches the Context Tag. If no such context is found, it sends an R1bis
message as specified in <xref target='R1bis' />.</t>


<t>Since Context Tags can be reused, the host MUST verify that
the IPv6 Source Address field is part of Ls(peer) and that
the IPv6 Destination Address field is part of Ls(local). If this
is not the case, the sender of the Update Request has a stale context
that happens to match the CT(local) for this context.
In this case, the host MUST send an R1bis message and otherwise ignore
the Update Request message.</t>

<t>If a CGA Parameter Data Structure (PDS) is included in the message, then
the host MUST verify if the actual PDS contained in the packet corresponds to
the ULID(peer). If this verification fails, the message is silently discarded.</t>


<t>Then, depending on the STATE of the context:
 <list style='symbols'>
  <t>If ESTABLISHED, proceed to process message.</t>
  <t>If I1-SENT, discard the message and stay in I1-SENT.</t>
  <t>If I2-SENT, send I2 and proceed to process the message.</t>
  <t>If I2BIS-SENT, send I2bis and proceed to process the message.</t>
 </list>
</t>

<t>The verification issues for the locators carried in the Update Request
message are specified in <xref target="locator-verification"/>. If
the locator list cannot be verified, this procedure should send
a Shim6 Error message with Error Code=2. In any case, if it cannot be
verified, there is no further processing of the Update Request.</t>


<t>Once any Locator List option in the Update Request has been verified,
the peer generation number in the context is updated to be the one in
the Locator List option.</t>

<t>If the Update Request message contains a Locator Preference option,
then the generation number in the preference option is compared with
the peer generation number in the context. If they do not match, then
the host generates a Shim6 Error message with Error Code=3 and with
the Pointer field referring to the first octet in the Locator List Generation number
in the Locator Preference option. In addition, if the number of
elements in the Locator Preference option does not match the number of 
locators in Ls(peer), then a Shim6 Error message with Error Code=4 is sent with the
Pointer field referring to the first octet of the Length field in the
Locator Preference option. In both cases of failure, no
further processing is performed for the Update Request message.</t>

<t>If the generation numbers match, the locator preferences are
recorded in the context.</t>

<t>Once the Locator List option (if present) has been verified and any
new locator list or locator preferences have been recorded, the host
sends an Update Acknowledgement message, copying the nonce from the
request and using the CT(peer) as the Receiver Context Tag.</t>

<t>Any new locators (or, more likely, new locator preferences) might result
in the host wanting to select a different locator pair for the context
  -- for instance, if the Locator Preferences option lists the current Lp(peer)
as BROKEN. The host uses the reachability exploration procedure described in 
<xref target='RFC5534' /> to verify that
the new locator is reachable before changing Lp(peer).</t>

</section>
<section title="Receiving Update Acknowledgement Messages">

<t>A host MUST silently discard any received Update Acknowledgement
messages that do not satisfy all of the following validity checks in addition 
to those specified in <xref target='receiving-shim-control'/>:
 <list style='symbols'>
  <t>The Hdr Ext Len field is at least 1, i.e., the length is at least 16 
octets.</t>
 </list>
</t>

<t> Upon the reception of an Update Acknowledgement message, the host 
extracts the Context Tag and the Request Nonce from the message. 
It then looks for a context that has a CT(local)
that matches the Context Tag. If no such context is found, it sends an R1bis
message as specified in <xref target='R1bis' />.</t>


<t>Since Context Tags can be reused, the host MUST verify that
the IPv6 Source Address field is part of Ls(peer) and that
the IPv6 Destination Address field is part of Ls(local). If this
is not the case, the sender of the Update Acknowledgement has a stale context
that happens to match the CT(local) for this context.
In this case, the host MUST send an R1bis message and otherwise ignore
the Update Acknowledgement message.</t>

<t>Then, depending on the STATE of the context:
 <list style='symbols'>
  <t>If ESTABLISHED, proceed to process message.</t>
  <t>If I1-SENT, discard the message and stay in I1-SENT.</t>
  <t>If I2-SENT, send R2 and proceed to process the message.</t>
  <t>If I2BIS-SENT, send R2 and proceed to process the message.</t>
 </list>
</t>

<t>If the Request Nonce doesn't match the nonce for the last sent Update 
Request for the context, then the Update Acknowledgement is silently
ignored. If the nonce matches, then the update has been completed and
the Update retransmit timer can be reset.</t>

</section>

</section>


<section title="Sending ULP Payloads" anchor="sending-payload">

<t>When there is no context state for the ULID pair on the sender, 
there is no effect on how ULP packets are sent. If the host is using some
heuristic for determining when to perform a deferred context establishment,
then the host might need to do some accounting (count the number of
packets sent and received) even before there is a ULID-pair context.</t>

<t>If the context is not in ESTABLISHED or I2BIS-SENT STATE, then
there is also no effect on how the ULP packets are sent. Only in the
ESTABLISHED and I2BIS-SENT STATEs does the host have CT(peer) and Ls(peer)
set.</t>

<t>If there is a ULID-pair context for the ULID pair, then the sender
needs to verify whether the context uses the ULIDs as locators -- that is, whether
Lp(peer) == ULID(peer) and Lp(local) == ULID(local).</t>

<t>If this is the case, then packets can be sent unmodified by the shim.
If it is not the case, then the logic in <xref target="rehomed-payload"/>
will need to be used.</t>

<t>There will also be some maintenance activity relating to (un)reachability 
detection, whether or not packets are sent with the original locators.
The details of this are out of scope for this document and are specified in
<xref target='RFC5534'/>.</t>

<section title="Sending ULP Payload after a Switch" anchor="rehomed-payload">

<t>When sending packets, if there is a ULID-pair context for the ULID pair, 
and if the ULID pair is no longer used as the locator pair, then the sender
needs to transform the packet. Apart from replacing the IPv6 Source and
Destination fields with a locator pair, an 8-octet header is added
so that the receiver can find the context and inverse the transformation.</t>

<t>If there has been a failure causing a switch, and later the context
switches back to sending things using the ULID pair as the locator pair,
then there is no longer a need to do any packet transformation by the sender;
hence, there is no need to include the 8-octet Extension header.</t>

<t>First, the IP address fields are
replaced. The IPv6 Source Address field is set to Lp(local) and the Destination
Address field is set to
Lp(peer). Note that this MUST NOT cause any recalculation of the ULP checksums,
since the ULP checksums are carried end-to-end and the ULP pseudo-header
contains the ULIDs that are preserved end-to-end.</t>

<t>The sender skips any "Routing Sublayer Extension headers" that the ULP
might have included; thus, it
skips any Hop-by-Hop Extension header, any Routing header, and any Destination
Options header that is followed by a Routing header. After any such headers,
the Shim6 Extension header will be added. This might be before
a Fragment header, a Destination Options header, an ESP or AH header, or a
ULP header.</t>

<t>The inserted Shim6 Payload Extension header includes the peer's Context 
Tag. It takes on the Next Header value from the preceding Extension header, 
since that Extension header will have a Next Header value of Shim6.</t>

</section>

</section>


<section title="Receiving Packets" anchor="receive">

<t> The receive side of the communication can receive packets associated to a
Shim6 context, with or without the Shim6 Extension header. 
In case the ULID pair is being used as a locator pair, the packets received 
will not have the Shim6 Extension header and will be processed by the Shim6
layer as described below. If the received packet does carry the Shim6 Extension header, 
as in normal IPv6 receive-side packet processing, the receiver parses the
(extension) headers in order. Should it find
a Shim6 Extension header, it will look at the "P" field in that header. If
this bit is zero, then the packet must be passed to the Shim6
payload handling for rewriting. Otherwise, the packet is passed to the Shim6
control handling.</t>

<section title="Receiving Payload without Extension Headers">

<t>The receiver extracts the IPv6 Source and Destination fields and uses
this to find a ULID-pair context, such that the IPv6 address fields
match the ULID(local) and ULID(peer). If such a context is found, the
context appears not to be quiescent; this should be remembered in order to 
avoid tearing down the context and for reachability detection purposes as described in 
<xref target="RFC5534"/>. 
The host continues with the normal processing of the IP packet.
</t>
</section>

 <section title="Receiving Shim6 Payload Extension Headers" anchor="receive-payload">

<t>The receiver extracts the Context Tag from the Shim6 Payload Extension
header and uses this to find a ULID-pair context. If no context is found,
the receiver SHOULD generate an R1bis message (see <xref 
target="R1bis"/>).</t>

<t>Then, depending on the STATE of the context:
 <list style='symbols'>
  <t>If ESTABLISHED, proceed to process message.</t>
  <t>If I1-SENT, discard the message and stay in I1-SENT.</t>
  <t>If I2-SENT, send I2 and proceed to process the message.</t>
  <t>If I2BIS-SENT, send I2bis and proceed to process the message.</t>
 </list>
</t>

<t>With the context in hand, the receiver can now replace the IP address fields
with the ULIDs kept in the context. Finally, the Shim6 Payload Extension header
is removed from the packet (so that the ULP doesn't get confused by it), 
and the Next Header value in the preceding header is set to be the actual protocol number
for the payload. Then the packet can be passed to the protocol identified
by the Next Header value (which might be some function associated
with the IP endpoint sublayer or a ULP).</t>

<t>If the host is using some
heuristic for determining when to perform a deferred context establishment,
then the host might need to do some accounting (count the number of
packets sent and received) for packets that do not have a Shim6
Extension header and for which there is no context.
But the need for this depends on what heuristics the implementation has chosen.</t>

 </section>
 <section title="Receiving Shim Control Messages" 
anchor='receiving-shim-control'>

<t>A shim control message has the Checksum field verified. The Shim Header
Length field is also verified against the length of the IPv6 packet to make
sure that the shim message doesn't claim to end past the end of the IPv6 
packet. Finally, it checks that neither the IPv6 Destination field nor
the IPv6 Source field is a multicast address or an unspecified
  address. If any of those checks fail, the packet is silently
  dropped.</t>

<t>The message is then dispatched based on the shim message type. Each message
type is then processed as described elsewhere in this document.
If the packet contains a shim message type that is unknown to the
receiver, then a Shim6 Error message with Error Code=0 is generated and sent back.
The Pointer field is set to point at the first octet of the shim message type. </t>

<t>All the control messages can contain any options with C=0. If there is 
any option in the message with C=1 that isn't known to the host, then the 
host MUST send a Shim6 Error message with Error Code=1 with the Pointer field 
referencing the first octet of the Option Type.</t>

 </section>

 <section title="Context Lookup" anchor="context-lookup">

<t>We assume that each shim context has its own STATE machine. We assume that 
a dispatcher delivers incoming packets to the STATE machine that it belongs to.
Here, we describe the rules used for the dispatcher to deliver packets to the 
correct shim context STATE machine.</t>

<t>There is one STATE machine per identified context that is conceptually
identified by the ULID pair and Forked Instance Identifier (which is zero by
default) or identified by CT(local). However, the detailed lookup rules are
more complex, especially during context establishment.</t>

<t> Clearly, if the required context is not established, it will be in 
IDLE STATE.</t>

<t>During context establishment, the context is identified as follows:
 <list style="symbols">
  <t>I1 packets: Deliver to the context associated with the ULID 
pair and the Forked Instance Identifier.
  </t>

  <t>I2 packets: Deliver to the context associated with the ULID 
pair and the Forked Instance Identifier.
  </t>

  <t>R1 packets: Deliver to the context with the locator pair 
included in the packet and the Initiator Nonce included in the packet 
(R1 does not contain a ULID pair or the CT(local)). If no context 
exists with this locator pair and Initiator Nonce, then silently discard.
  </t>

  <t>R2 packets: Deliver to the context with the locator pair included 
in the packet and the Initiator Nonce included in the packet (R2 does not 
contain a ULID pair or the CT(local)). If no context exists with this 
locator pair and Initiator Nonce, then silently discard.
  </t>

  <t>R1bis packets: Deliver to the context that has the locator pair 
and the CT(peer) equal to the Packet Context Tag included in the R1bis
packet.
  </t> 

  <t>I2bis packets: Deliver to the context associated with the ULID 
pair and the Forked Instance Identifier.
  </t>

  <t>Shim6 Payload Extension headers: Deliver to the context 
with CT(local) equal to the Receiver Context Tag included in the packet.
  </t>

  <t>Other control messages (Update, Keepalive, Probe): Deliver to the context 
with CT(local) equal to the Receiver Context Tag included in the packet.
Verify that the IPv6 Source Address field is part of Ls(peer) and that
the IPv6 Destination Address field is part of Ls(local). If not, send
an R1bis message.
  </t>

  <t>Shim6 Error messages and ICMP errors that contain a Shim6 Payload Extension header
or other shim control packet in the "packet in error":
Use the "packet in error" for dispatching as follows. 
Deliver to the context with CT(peer) equal to the Receiver Context Tag
    -- Lp(local) being the IPv6 source address and Lp(peer) being the IPv6 
destination address.
  </t>
 </list>
</t>

<t>In addition, the shim on the sending side needs to be able to find the
context state when a ULP packet is passed down from the ULP. In that case,
the lookup key is the pair of ULIDs and FII=0. If we have a ULP API that 
allows the ULP to do context forking, then presumably the ULP would pass down
the Forked Instance Identifier.</t>

 </section>

</section>



<section title="Initial Contact" anchor="initial-contact">

<t>The initial contact is some non-shim communication
between two ULIDs, as described in <xref target='terminology' />.
At that point in time, there is no activity in the shim.</t>

<t>Whether or not the shim ends up being used (e.g., the peer might not support
Shim6), it is highly desirable that the initial contact can be established
even if there is a failure for one or more IP addresses.</t>

<t>The approach taken is to rely on the applications and the transport 
protocols to retry with different source and destination addresses, consistent
with what is already specified in "Default Address Selection for IPv6"
<xref target='RFC3484' /> as well as with some fixes to that specification 
<xref target='3484BIS'/>, to make it try 



different source addresses and not only different destination addresses.</t>

<t>The implementation of such an approach can potentially result in
long timeouts. For instance, consider a naive implementation at the socket API
that uses getaddrinfo() to retrieve all destination addresses and then
tries to bind() and connect() to try all source and destination address
combinations and waits for TCP to time out for each combination before
trying the next one.</t>

<t>However, if implementations encapsulate this in some new connect-by-name()
API and use non-blocking connect calls, it is possible to cycle through
the available combinations in a more rapid manner until a working
source and destination pair is found. Thus, the issues in this domain
are issues of implementations and the current socket API, and not issues of
protocol specification. In all honesty, while providing an easy to use 
connect-by-name() API for TCP and other connection-oriented transports is easy,
providing a similar capability at the API for UDP is hard due to the protocol
itself not providing any "success" feedback. Yet, even the UDP issue
is one of APIs and implementation.</t>

</section>


<section title="Protocol Constants" anchor="constants">

<t>The protocol uses the following constants:</t>

<t>I1_RETRIES_MAX = 4</t>
<t>I1_TIMEOUT = 4 seconds</t>
<t>NO_R1_HOLDDOWN_TIME = 1 min</t>
<t>ICMP_HOLDDOWN_TIME = 10 min</t>
<t>I2_TIMEOUT = 4 seconds</t>
<t>I2_RETRIES_MAX = 2</t>
<t>I2bis_TIMEOUT = 4 seconds</t>
<t>I2bis_RETRIES_MAX = 2</t>
<t>VALIDATOR_MIN_LIFETIME = 30 seconds</t>
<t>UPDATE_TIMEOUT = 4 seconds</t>
<t>MAX_UPDATE_TIMEOUT = 120 seconds</t>

<t>The retransmit timers (I1_TIMEOUT, I2_TIMEOUT, UPDATE_TIMEOUT) are
subject to binary exponential backoff as well as to randomization across
a range of 0.5 and 1.5 times the nominal (backed off) value. This
removes any risk of synchronization between lots of hosts performing 
independent shim operations at the same time.</t>

<t>The randomization is applied after the binary exponential backoff.
Thus, the first retransmission would happen based on a uniformly distributed
random number in the range of [0.5*4, 1.5*4] seconds; the second retransmission,
[0.5*8, 1.5*8] seconds after the first one, etc.</t>

</section>


<section title="Implications Elsewhere" anchor="implications">

<section title="Congestion Control Considerations">
<t>When the locator pair currently used for exchanging packets in a Shim6 context 
becomes unreachable, the Shim6 layer will divert the communication through 
an alternative locator pair, which in most cases will result in redirecting the
packet flow through an alternative network path. In this case, it is recommended that
the Shim6 follows the recommendation defined in <xref target="TCP-RES"/> and 
informs the upper layers about the path change, in order to allow
the congestion control mechanisms of the upper layers to react accordingly. 
</t>
</section>

<section title="Middle-Boxes Considerations">
<t>
Data packets belonging to a Shim6 context carrying the Shim6 Payload header 
contain alternative locators other than the ULIDs in the Source and Destination 
Address fields of the IPv6 header. On the other hand, the upper layers of the 
peers involved in the communication operate on the ULID pair presented
to them by the Shim6 layer, rather than on the locator pair contained in the IPv6 header 
of the actual packets. It should be noted that the Shim6 layer does not modify 
the data packets but, because a constant ULID pair is presented to upper layers 
irrespective of the locator pair changes, the relation between the upper-layer 
header (such as TCP, UDP, ICMP, ESP, etc) and the IPv6 header is modified. 
In particular, when the Shim6 Extension header is present in the packet, 
if those data packets are TCP, UDP, or ICMP packets, the 
pseudo-header used for the checksum calculation will contain the ULID pair, 
rather than the locator pair contained in the data packet.
</t>

<t>It is possible that some firewalls or other middle-boxes will try to verify the 
validity of upper-layer sanity checks of the packet on the fly. If they do that 
based on the actual source and destination addresses contained in the IPv6 
header without considering the Shim6 context information (in particular,
without replacing the locator pair by the ULID pair used by the Shim6 
context), such verifications may fail. Those middle-boxes need to be updated 
in order to be able to parse the Shim6 Payload header and find the
  next header.  It is recommended that firewalls and other middle-boxes do 
not drop packets that carry the Shim6 Payload header with apparently incorrect 
upper-layer validity checks that involve the addresses in the IPv6 header for 
their computation, unless they are able to determine the ULID pair of the Shim6 
context associated to the data packet and use the ULID pair for the verification
of the validity check.
</t>
<t>
In the particular case of TCP, UDP, and ICMP checksums, it is recommended that 
firewalls and other middle-boxes do not drop TCP, UDP, and ICMP packets that 
carry the Shim6 Payload header with apparently incorrect checksums when using 
the addresses in the IPv6 header for the pseudo-header computation, unless they 
are able to determine the ULID pair of the Shim6 context associated 
to the data packet and use the ULID pair to determine the checksum that must 
be present in a packet with addresses rewritten by Shim6.
</t>

  <t> In addition, firewalls that today pass limited traffic, e.g., outbound TCP connections,
would presumably block the Shim6 protocol. This means that even when
    Shim6-capable hosts are communicating, the I1 messages would be
    dropped; hence, the hosts would not discover that their peer is
    Shim6-capable. This is, in fact, a benefit since, if the hosts
    managed to establish a ULID-pair context, the firewall would
    probably drop the "different" packets that are sent after a
    failure (those using the Shim6 Payload Extension header with a TCP
    packet inside it). Thus, stateful firewalls that are modified to
    pass Shim6 messages should also be modified to pass the Shim6 Payload
    Extension header so that the shim can use the alternate locators
    to recover from failures. This presumably implies that the
    firewall needs to track the set of locators in use by looking at
    the Shim6 control exchanges. Such firewalls might even want to
    verify the locators using the HBA/CGA verification themselves, which they
can do without modifying any of the Shim6 packets through which they pass.</t>


</section>
<section title="Operation and Management Considerations">
<t>This section considers some aspects related to the operations and management of 
the Shim6 protocol.</t>
<t>Deployment of the Shim6 protocol: The Shim6 protocol is a host-based solution.
So, in order to be deployed, the stacks of the hosts using the Shim6 protocol need to be
updated to support it. This enables an incremental deployment of the
  protocol since it does not require a flag day for the deployment -- just single host updates.
If the Shim6 solution will be deployed in a site, the host can be gradually updated 
to support the solution. Moreover, for supporting the Shim6 protocol, only end hosts 
need to be updated and no router changes are required. However, it should be noted 
that, in order to benefit from the Shim6 protocol, both ends of a communication should 
support the protocol, meaning that both hosts must be updated to be able to use the 
Shim6 protocol. Nevertheless, the Shim6 protocol uses a deferred
  context-setup capability that allows end hosts to establish normal
  IPv6 communications and, later on, if both endpoints are Shim6-
  capable, establish the Shim6 context using the Shim6 protocol.
   This has an important deployment benefit, since Shim6-enabled nodes
  can talk perfectly to non-Shim6-capable nodes without introducing
  any problem into the communication.</t>

<t>Configuration of Shim6-capable nodes: The Shim6 protocol itself
  does not require any specific configuration to provide its basic
  features. The Shim6 protocol is designed to provide a default
  service to upper layers that should satisfy general
  applications. The Shim6 layer would automatically attempt to protect
  long-lived communications by triggering the establishment of the
  Shim6 context using some predefined heuristics. Of course, if some
  special tunning is required by some applications, this may require



  additional configuration. Similar considerations apply to a site
  attempting to perform some forms of traffic engineering by using
  different preferences for different locators.</t>

<t>Address and prefix configuration: The Shim6 protocol assumes that, in a multihomed site,
multiple prefixes will be available. Such configuration can increase the operation 
work in a network. However, it should be noted that the capability of
  having multiple prefixes in 
a site and multiple addresses assigned to an interface is an IPv6 capability that goes beyond the 
Shim6 case, and it is expected to be widely used. So, even though this
  is the case for Shim6, we consider that the implications of such a
  configuration is beyond the particular case of Shim6 and must be
  addressed for the generic IPv6 case. Nevertheless, Shim6 also
  assumes the usage of CGA/HBA addresses by Shim6 hosts. This implies
  that Shim6-capable hosts should configure addresses using HBA/CGA
  generation mechanisms. Additional consideration about this  issue
  can be found at <xref target="SHIM6-APP" />.</t>

</section>

<section title="Other Considerations">

<t>The general Shim6 approach as well as the specifics of this proposed
solution have implications elsewhere, including:
 <list style='symbols'>
  <t>Applications that perform referrals or callbacks using IP addresses 
as the 'identifiers' can still function in limited ways, as described
in <xref target='APP-REF'/>. But, in order for such applications to be able
to take advantage of the multiple locators for redundancy, the
applications need to be modified to either use Fully Qualified Domain Names as the 
'identifiers' or they need to pass all the locators as the
    'identifiers', i.e., the 'identifier' from the application's
    perspective becomes a set of IP addresses instead of a single IP
    address.</t>


  <t>Signaling protocols for QoS or for other things that involve having
  devices in the network path look at IP addresses and port numbers
(or at IP addresses and Flow Labels) need to be invoked on the hosts
  when the locator pair changes due to a failure. At that point in
  time, those protocols need to inform the devices that a new pair of
  IP addresses will be used for the flow. Note that this is the case
  even though this protocol, unlike some earlier proposals, does not
  overload the Flow Label as a Context Tag; the in-path devices need
  to know about the use of the new locators even though the Flow Label
  stays the same.</t>

  <t>MTU implications. By computing a minimum over the recently
    observed path MTUs, the path MTU mechanisms we use are robust against
different packets taking different paths through the Internet. When Shim6 fails over from
using one locator pair to another, this means that packets might travel
over a different path through the Internet; hence, the path MTU might be
quite different. In order to deal with this change in the MTU, the usage of 
Packetization Layer Path MTU Discovery as defined in <xref target='RFC4821'/>
is recommended.
  <vspace blankLines='1' />
The fact that the shim will add an
8-octet Shim6 Payload Extension header to the ULP packets after a locator switch
can also affect the usable path MTU for the ULPs. In this case, the MTU
change is local to the sending host; thus, conveying the change to the ULPs
is an implementation matter. By conveying the information to the transport layer,
it can adapt and reduce the Maximum Segment Size (MSS) accordingly. </t>


 </list>
</t>
</section>
</section>


<section title="Security Considerations" anchor="security">

<t>This document satisfies the concerns specified in
<xref target='RFC4218'/>
as follows:
 <list style='symbols'>
  <t>The HBA <xref target="RFC5535"/> and CGA <xref target="RFC3972"/> techniques
  for verifying the locators to prevent an
  attacker from redirecting the packet stream to somewhere else, prevent
  threats described in Sections 4.1.1, 4.1.2, 4.1.3, and 4.2 of <xref target='RFC4218'/>.  
  These two techniques provide a similar level of protection but also provide
  different functionality with different computational costs.
<vspace blankLines="1" />
  The HBA mechanism relies on the capability of generating all 
  the addresses of a multihomed host as an unalterable set of 
  intrinsically bound IPv6 addresses, known as an HBA set. In 
  this approach, addresses incorporate a cryptographic one-way hash of
the prefix set available into the interfae identifier part. 
  The result is that the binding between all the available addresses 
  is encoded within the addresses themselves, providing 
  hijacking protection. Any peer using the shim protocol node 
  can efficiently verify that the alternative addresses proposed 
  for continuing the communication are bound to the initial 
  address through a simple hash calculation.
<vspace blankLines="1" />
  In a CGA-based approach, the address used as the ULID is a CGA 
  that contains a hash of a public key in its interface identifier. 
  The result is a secure binding between the ULID and the associated 
  key pair. This allows each peer to use the corresponding private 
  key to sign the shim messages that convey locator set information. 
  The trust chain in this case is the following: the ULID used for the 
  communication is securely bound to the key pair because it contains 
  the hash of the public key, and the locator set is bound to the public 
  key through the signature.
<vspace blankLines="1" />
  Either of these two mechanisms, HBA and CGA, provides time-shifted 
  attack protection (as described in Section 4.1.2 of <xref target='RFC4218'/>), 
  since the ULID is securely bound to a locator set 
  that can only be defined by the owner of the ULID.
  The minimum acceptable key length for RSA keys used in the
  generation of CGAs MUST be at least 1024 bits. Any
  implementation should follow prudent cryptographic practice in
  determining the appropriate key lengths.
  </t>

  <t>3rd party flooding attacks, described in Section 4.3 of 
  <xref target='RFC4218'/>, are prevented by requiring a Shim6 peer to perform a
  successful Reachability probe + reply exchange
  before accepting a new locator for use as a packet destination.</t>

  <t>The first message does not create any state on the responder. Essentially,
  a 3-way exchange is required before the responder creates any state. This
  means that a state-based DoS attack (trying to use up all memory on
  the responder) at least requires the attacker to create state, consuming his 
  own resources; it also provides an IPv6 address that the attacker was 
  using.</t>

  <t>The context-establishment messages use nonces to prevent replay 
  attacks, which are described in Section 4.1.4 of <xref target='RFC4218'/>, 
  and to prevent off-path attackers from interfering with the
  establishment.</t>

  <t>Every control message of the Shim6 protocol, past the 
  context establishment, carry the Context Tag assigned to the particular context.
  This implies that an attacker needs to discover that
  Context Tag before being able to spoof any Shim6 control
  message as described in Section 4.4 of <xref target='RFC4218'/>.
  Such discovery probably requires an attacker to be along the
  path in order to sniff the Context Tag value. The result
  is that, through this technique, the Shim6 protocol is
  protected against off-path attackers.</t>
 </list>
</t>

<section title="Interaction with IPSec" anchor="ipsec">

<t>	Shim6 has two modes of processing data packets. If the ULID
	pair is also the locator pair being used, then the data packet
	is not modified by Shim6. In this case, the interaction with
	IPSec is exactly the same as if the Shim6 layer was not
	present in the host.</t>

<t>	If the ULID pair differs from the current locator pair for that Shim6 context,
	then Shim6 will take the data packet, replace the ULIDs contained in the
	IP Source and Destination Address fields with the current
	locator pair, and add the
	Shim6 extension with the corresponding Context
	Tag.&nbsp;&nbsp;In this case, as is
	mentioned in Section 1.6, Shim6 conceptually works as a tunnel
	mechanism, where the inner header contains the ULID and the outer header
	contains the locators. 


        The main difference is that the inner header is
	"compressed" and a compression tag, namely the Context Tag, is added to
	decompress the inner header at the receiving end.</t>

<t>	In this case, the interaction between IPSec and Shim6 is then similar to the interaction
	between IPSec and a tunnel mechanism. When the packet is generated
	by the upper-layer protocol, it is passed to the IP layer containing
	the ULIDs in the IP Source and Destination field. IPSec is then
	applied to this packet. Then the packet is passed to the Shim6
	sublayer, which "encapsulates" the received packet and includes
	a new IP header containing the locator pair in the IP Source and
	Destination field. This new IP packet is in turn passed to IPSec
	for processing, just as in the case of a tunnel. This can be viewed
	as if IPSec is located both above and below the Shim6 sublayer
	and as if IPSec policies apply both to ULIDs and locators.
</t>
<t>	When IPSec processed the packet after the Shim6 sublayer has processed it
	(i.e., the packet carrying the locators in the IP Source and Destination
	Address field), the Shim6 sublayer may have added the Shim6 Extension header.
	In that case, IPSec needs to skip the Shim6 Extension header to find the
	selectors for the next layer's protocols (e.g., TCP, UDP, Stream Control
	Transmission Protocol (SCTP)).
</t>
<t>	When a packet is received at the other end, it is processed based on the
	order of the extension headers. Thus, if an ESP or AH header precedes a
	Shim6 header, that determines the order. Shim6 introduces the need
    to do policy checks, analogous to how they are done for tunnels, when
    Shim6 receives a packet and the ULID pair for that packet is not identical to
    the locator pair in the packet.
</t>

</section>

<section title="Residual Threats">

<t>Some of the residual threats in this proposal are:
 <list style='symbols'>
  <t>An attacker that arrives late on the path (after the context has
been established) can use the R1bis message to cause one peer to
re-create the context and, at that point in time, can observe all
of the exchange. But this doesn't seem to open any new doors for the attacker
since such an attacker can observe the Context Tags that are being used
and, once known, can use those to send bogus messages.</t>

  <t>An attacker present on the path in order to find out the
Context Tags can generate an R1bis message after it has moved off the
path. For this packet to be effective, it needs to have a source locator that
belongs to the context; thus, there cannot be "too much" ingress filtering
between the attacker's new location and the communicating peers.
But this doesn't seem to be that severe because, once the R1bis causes the
context to be re-established, a new pair of Context Tags will be
used, which will not be known to the attacker. If this is still a concern,
we could require a 2-way handshake, "did you really lose the state?", in 
response to the error message.</t>

  <t>It might be possible for an attacker to try random 47-bit Context Tags
and see if they can cause disruption for communication between two hosts.
In particular, in the case of payload packets, the effects of such an attack 
would be similar to those of an attacker sending packets with a
spoofed source address. In the case of control packets, it is not enough to 
find the correct Context Tag -- additional information is required (e.g.,
nonces, proper source addresses; see previous bullet for the case of R1bis).
If a 47-bit tag, which is the largest that fits in an 8-octet Extension
header, isn't sufficient, one could use an even larger tag in the Shim6
control messages and use the low-order 47 bits in the Shim6 Payload Extension header.</t>

   <t>When the Shim6 Payload Extension header is used, an attacker that can guess
the 47-bit random Context Tag can inject packets into the context with
any source locator. Thus, if there is ingress filtering between the
     attacker and its target, this could potentially allow the
     attacker to bypass the ingress filtering.
However, in addition to guessing the 47-bit Context Tag, the attacker
also needs to find a context where, after the receiver's replacement of
the locators with the ULIDs, the ULP checksum is correct. But even
this wouldn't be sufficient with ULPs like TCP, since the TCP port numbers
and sequence numbers must match an existing connection.
Thus, even though the issues for off-path attackers injecting packets
are different than today with ingress filtering, it is still very hard
for an off-path attacker to guess. If IPsec is applied, then the issue
goes away completely.</t>

   <t> The validator included in the R1 and R1bis packets is generated
   as a hash of several input parameters. While most of the inputs are
   actually determined by the sender, and only the secret value S is unknown 
   to the sender, the resulting protection is deemed to be enough
   since it would be easier for the attacker to just obtain a new 
   validator by sending an I1 packet than to perform all the computations 
   required to determine the secret S.&nbsp;&nbsp;Nevertheless, it is recommended that the host
   change the secret S periodically.
   </t>

 </list>
</t>
</section>
</section>

<section title="IANA Considerations" anchor="iana">

<t>IANA allocated a new IP Protocol Number value (140) for the 
Shim6 Protocol.</t>

<t>IANA recorded a CGA message type for the Shim6 protocol in the
CGA Extension Type Tags registry with the value 0x4A30 5662 4858 574B 3655 416F 
506A 6D48.</t>

<t>
IANA established a Shim6 Parameter Registry with four
  components: Shim6 Type registrations, Shim6 Options registrations,
  Shim6 Error Code registrations, and Shim6 Verification Method
  registrations.</t>


<t>The initial contents of the Shim6 Type registry are as follows:</t>

<texttable>
 <ttcol align='center'> Type Value</ttcol>
 <ttcol align='center'> Message</ttcol>
 <c>0</c> <c>RESERVED</c>
 <c>1</c> <c>I1 (first establishment message from the initiator)</c>
 <c>2</c> <c>R1 (first establishment message from the responder)</c>
 <c>3</c> <c>I2 (2nd establishment message from the initiator)</c>
 <c>4</c> <c>R2 (2nd establishment message from the responder)</c>
 <c>5</c> <c>R1bis (Reply to reference to non-existent context) </c>
 <c>6</c> <c>I2bis (Reply to a R1bis message) </c>
 <c>7-59</c> <c>Allocated using Standards action</c>
 <c>60-63</c> <c>For Experimental use</c>
 <c>64</c> <c>Update Request</c>
 <c>65</c> <c>Update Acknowledgement</c>
 <c>66</c> <c>Keepalive</c>
 <c>67</c> <c>Probe Message</c>
 <c>68</c> <c>Error Message</c>
 <c>69-123</c> <c>Allocated using Standards action</c>
 <c>124-127</c> <c>For Experimental use</c>
</texttable>

<t>The initial contents of the Shim6 Options registry are as follows:</t>

<texttable>
 <ttcol align='center'> Type</ttcol>
 <ttcol align='center'> Option Name</ttcol>
 <c> 0</c> <c>RESERVED</c>
 <c> 1</c> <c>Responder Validator</c>
 <c> 2</c> <c>Locator List</c>
 <c> 3</c> <c>Locator Preferences</c>
 <c> 4</c> <c>CGA Parameter Data Structure</c>
 <c> 5</c> <c>CGA Signature</c>
 <c> 6</c> <c>ULID Pair</c>
 <c> 7</c> <c>Forked Instance Identifier</c>
 <c> 8-9 </c> <c>Allocated using Standards action</c>
 <c> 10</c> <c>Keepalive Timeout Option</c>
 <c> 11-16383</c> <c>Allocated using Standards action</c>
 <c> 16384-32767</c> <c>For Experimental use</c>
 </texttable>

 <t>The initial contents of the Shim6 Error Code registry are as follows:</t>

 <texttable>
 <ttcol align='center'> Code Value</ttcol>
 <ttcol align='center'> Description</ttcol>
 <c>0</c> <c>Unknown Shim6 message type</c>
 <c>1</c> <c>Critical Option not recognized </c>
 <c>2</c> <c>Locator verification method failed</c>
 <c>3</c> <c>Locator List Generation number out of sync</c>
 <c>4</c> <c>Error in the number of locators</c>
 <c>5-19</c> <c>Allocated using Standards action</c>
 <c>120-127</c> <c>Reserved for debugging purposes</c>
</texttable>

 <t>The initial contents of the Shim6 Verification Method registry are as
follows:</t>

 <texttable>
 <ttcol align='center'> Value</ttcol>
 <ttcol align='center'> Verification Method</ttcol>
 <c>0</c> <c>RESERVED</c>
 <c>1</c> <c>CGA </c>
 <c>2</c> <c>HBA</c>
 <c>7-200</c> <c>Allocated using Standards action</c>
 <c>201-254</c> <c>For Experimental use</c>
 <c>255</c> <c>RESERVED</c>
</texttable>

<!-- [rfced] We note that the IANA site has the following, which
differ from the table above. 

1       HBA     [RFC-ietf-shim6-proto-12]
2       CGA     [RFC-ietf-shim6-proto-12]
3-200   Unassigned      

Which is correct? -->

</section>


<section title="Acknowledgements">

<t>Over the years, many people active in the multi6 and shim6 WGs have 
contributed ideas and suggestions that are reflected in this specification.
Special thanks to the careful comments from Sam Hartman, Cullen Jennings, 
Magnus Nystrom, Stephen Kent, Geoff Huston, Shinta Sugimoto, Pekka 
Savola, Dave Meyer, Deguang Le, Jari Arkko, Iljitsch van Beijnum,
Jim Bound, Brian Carpenter, Sebastien Barre, Matthijs Mekking, Dave Thaler, Bob Braden,
Wesley Eddy, Pasi Eronen,

 and Tom Henderson on earlier versions of this document.</t>

</section>

    </middle>

    <back>
        <references title='Normative References'>
	&rfc2119;
	&rfc3972;

<reference anchor="RFC5535">
	<front>
<title>Hash-Based Addresses (HBA)</title>
	<author initials="M" surname="Bagnulo" fullname="Marcelo Bagnulo">
<organization/>
</author>
<date month="May" year="2009"/>
</front>
<seriesInfo name="RFC" value="5535"/>
</reference>

<reference anchor="RFC5534">
	<front>
	<title>
Failure Detection and Locator Pair Exploration Protocol for IPv6 Multihoming
</title>
	<author initials="J" surname="Arkko" fullname="Jari Arkko">
<organization/>
</author>
	<author initials="I" surname="van Beijnum" fullname="Iljitsch van Beijnum">
<organization/>
</author>
<date month="May" year="2009"/>
</front>
<seriesInfo name="RFC" value="5534"/>
</reference>

        </references>
        
	<references title='Informative References'>
	&rfc2782;
	&rfc2827;
	&rfc3484;

<reference anchor="NOID">
<front>
<title>Multihoming without IP Identifiers</title>
<author initials="E" surname="Nordmark" fullname="Erik Nordmark">
<organization/>
</author>
<date month="July" year="2004"/>
</front>
<seriesInfo name="Work in" value="Progress"/>
</reference>

<reference anchor="3484BIS">
	<front>
<title>Updating RFC 3484 for multihoming support</title>

	<author initials="M" surname="Bagnulo" fullname="Marcelo Bagnulo">
<organization/>
</author>
<date month="November" day="13" year="2007"/>
</front>
<seriesInfo name="Work in" value="Progress"/>
</reference>

	&rfc3550;
	&rfc3582;
	&rfc3697;
	&rfc4086;
	&rfc4193;
	&rfc4218;

<reference anchor="ING-FIL">
	<front>
<title>Ingress filtering compatibility for IPv6 multihomed sites</title>

	<author initials="C" surname="Huitema" fullname="C. Huitema">
<organization/>
</author>
<date month="September" day="1" year="2005"/>
</front>
<seriesInfo name="Work in" value="Progress"/>
</reference>


<reference anchor="SHIM6-MIP">
	<front>
<title>SHIM - MIPv6 Interaction</title>
	<author initials="M" surname="Bagnulo" fullname="Marcelo Bagnulo">
<organization/>
</author>
	<author initials="E" surname="Nordmark" fullname="Erik Nordmark">
<organization/>
</author>
<date month="July" day="13" year="2005"/>
</front>
<seriesInfo name="Work in" value="Progress"/>
</reference>

<reference anchor="APP-REF">
	<front>
<title>Shim6-Application Referral Issues</title>
	<author initials="E" surname="Nordmark" fullname="E. Nordmark">
<organization/>
</author>
<date month="July" day="13" year="2005"/>
</front>
<seriesInfo name="Work in" value="Progress"/>
</reference>

<reference anchor="SHIM6-APP">
	<front>
	<title>
Applicability Statement for the Level 3 Multihoming Shim Protocol (Shim6)
</title>
	<author initials="M" surname="Bagnulo" fullname="Marcelo Bagnulo">
<organization/>
</author>
	<author initials="J" surname="Abley" fullname="Joe Abley">
<organization/>
</author>
<date month="July" day="9" year="2007"/>
</front>
<seriesInfo name="Work in" value="Progress"/>
</reference>

<?rfc include="reference.RFC.5201" ?>


<reference anchor="TCP-RES">
	<front>
	<title>
TCP Response to Lower-Layer Connectivity-Change Indications
</title>
	<author initials="S" surname="Schuetz" fullname="Simon Schuetz">
<organization/>
</author>
	<author initials="N" surname="Koutsianas" fullname="Nikolaos Koutsianas">
<organization/>
</author>
	<author initials="L" surname="Eggert" fullname="Lars Eggert">
<organization/>
</author>
	<author initials="W" surname="Eddy" fullname="Wesley Eddy">
<organization/>
</author>
	<author initials="Y" surname="Swami" fullname="Yogesh Swami">
<organization/>
</author>
	<author initials="K" surname="Le" fullname="Khiem Le">
<organization/>
</author>
<date month="February" day="22" year="2008"/>
</front>
<seriesInfo name="Work in" value="Progress"/>
</reference>

<?rfc include="reference.RFC.5386" ?>

	<reference anchor="SHIM-API">
	<front>
	<title>
Socket Application Program Interface (API) for Multihoming Shim
</title>
	<author initials="M" surname="Komu" fullname="Miika  Komu">
<organization/>
</author>
	<author initials="M" surname="Bagnulo" fullname="Marcelo Bagnulo">
<organization/>
</author>
	<author initials="K" surname="Slavov" fullname="Kristian Slavov">
<organization/>
</author>
	<author initials="S" surname="Sugimoto" fullname="Shinta Sugimoto">
<organization/>
</author>
<date month="November" day="2" year="2008"/>
</front>
<seriesInfo name="Work in" value="Progress"/>
</reference>

	&rfc4821;
	&rfc4884;
	</references> 




<section title="Possible Protocol Extensions" anchor="possible-extensions">

<t>During the development of this protocol, several issues have been brought
up that are important to address but that do not need to be in the
base protocol itself; instead, these can be done as extensions to the protocol.
The key ones are:
 <list style='symbols'>
  <t>As stated in the assumptions in <xref target='assumptions'/>, in order
for the Shim6 protocol to be able to recover from a wide range of
    failures (for instance, when one of the communicating hosts is 
single-homed) and to cope with a site's ISPs that do ingress filtering based on the source
IPv6 address, there is a need for the host to be able to influence the
egress selection from its site. 
Further discussion of this issue is captured in 
<xref target='ING-FIL' />.</t>

  <t>Is there need for keeping the list of locators private between the
two communicating endpoints? We can potentially accomplish that when using CGA
(not when using HBA), but only at the cost of doing some public key encryption
and decryption operations as part of the context establishment. The suggestion
is to leave this for a future extension to the protocol.</t>

  <t>Defining some form of end-to-end "compression" mechanism that removes the
need to include the Shim6 Payload Extension header when the locator pair
is not the ULID pair.</t>

  <t>Supporting the dynamic setting of locator preferences on a site-wide
basis and using the Locator Preference option in the Shim6 protocol to
convey these preferences to remote communicating hosts. This could mirror
the DNS SRV record's notion of priority and weight.</t>

  <t>Specifying APIs in order for the ULPs to be aware of the locators
    that the shim is using and to be able to influence the choice of
    locators (controlling preferences as well as triggering a
    locator-pair switch). This includes providing APIs that the ULPs
    can use to fork a shim context.</t>

  <t>Determining whether it is feasible to relax the suggestions for when context 
state is removed so that one can end up with an asymmetric distribution of the context state 
and still get (most of) the shim benefits. For example, the busy server
would go through the context setup but would quickly remove the context state
after this (in order to save memory); however, the not-so-busy client would
retain the context state. The context-recovery mechanism presented in 
<xref target='context-recovery'/> would then re-create the state should 
the client send either a shim control message (e.g., Probe message
because it sees a problem) or a ULP packet in a Shim6 Payload Extension header 
(because it had earlier failed over to an alternative locator pair but
had been silent for a while). This seems to provide the benefits of the shim
as long as the client can detect the failure. If the client doesn't send
anything and it is the server that tries to send, then it will not be able
to recover because the shim on the server has no context state and hence
doesn't know any alternate locator pairs.</t>


   <t>Study what it would take to make the Shim6 control protocol not
rely at all on a stable source locator in the packets. This can probably be
accomplished by having all the shim control messages include the ULID-pair
option.</t>

  <t>If each host might have lots of locators, then the current requirement
to include essentially all of them in the I2 and R2 messages might be
constraining. If this is the case, we can look into using the CGA Parameter
Data Structure for the comparison, instead of the prefix sets, to be able
to detect context confusion. This would place some constraint on a
    (logical)



only using, for example, one CGA public key; it would also require some carefully crafted
rules on how two PDSs are compared for "being the same host". But if we don't
expect more than a handful of locators per host, then we don't need this
added complexity.</t>

  <t>ULP-specified timers for the reachability detection mechanism (which can
be particularly useful when there are forked contexts).</t>

  <t>Pre-verify some "backup" locator pair, so that the failover time can
be shorter.</t>

  <t>Study how Shim6 and Mobile IPv6 might interact <xref target='SHIM6-MIP' />.</t>
 </list>
</t>

</section>


<section title="Simplified STATE Machine">

<t>The STATEs are defined in <xref target="context-states" />. The intent is
for the stylized description below to be consistent with the textual description
in the specification; however, should they conflict, the textual description
is normative.</t>

<figure>
 <preamble>
The following table describes the possible actions in STATE IDLE and their
respective triggers:
</preamble>
 <artwork><![CDATA[
+---------------------+---------------------------------------------+
| Trigger             | Action                                      |
+---------------------+---------------------------------------------+
| Receive I1          | Send R1 and stay in IDLE                    |
|                     |                                             |
| Heuristics trigger  | Send I1 and move to I1-SENT                 |
| a new context       |                                             |
| establishment       |                                             |
|                     |                                             |
| Receive I2, verify  | If successful, send R2 and move to          |
| validator and       | ESTABLISHED                                 |
| RESP Nonce          |                                             |
|                     | If fail, stay in IDLE                       |
|                     |                                             |
| Receive I2bis,      | If successful, send R2 and move to          |
| verify validator    | ESTABLISHED                                 |
| and RESP Nonce      |                                             |
|                     | If fail, stay in IDLE                       |
|                     |                                             |
| R1, R1bis, R2       | N/A (This context lacks the required info   |
|                     | for the dispatcher to deliver them)         | 
|                     |                                             |
| Receive Payload     | Send R1bis and stay in IDLE                 |
| Extension header    |                                             |
| or other control    |                                             |
| packet              |                                             |
+---------------------+---------------------------------------------+
]]></artwork>
</figure>

<figure>
 <preamble>
The following table describes the possible actions in STATE I1-SENT 
and their respective triggers:
</preamble>
 <artwork><![CDATA[
+---------------------+---------------------------------------------+
| Trigger             | Action                                      |
+---------------------+---------------------------------------------+
| Receive R1, verify  | If successful, send I2 and move to I2-SENT  |
| INIT Nonce          |                                             |
|                     | If fail, discard and stay in I1-SENT        |
|                     |                                             |
| Receive I1          | Send R2 and stay in I1-SENT                 | 
|                     |                                             |
| Receive R2, verify  | If successful, move to ESTABLISHED          |
| INIT Nonce          |                                             |
|                     | If fail, discard and stay in I1-SENT        |
|                     |                                             |
| Receive I2, verify  | If successful, send R2 and move to          |
| validator and RESP  | ESTABLISHED                                 |
| Nonce               |                                             |
|                     | If fail, discard and stay in I1-SENT        |
|                     |                                             |
| Receive I2bis,      | If successful, send R2 and move to          |
| verify validator    | ESTABLISHED                                 |
| and RESP Nonce      |                                             |
|                     | If fail, discard and stay in I1-SENT        |
|                     |                                             |
| Timeout, increment  | If counter =< I1_RETRIES_MAX, send I1 and   |
| timeout counter     | stay in I1-SENT                             |
|                     |                                             |
|                     | If counter > I1_RETRIES_MAX, go to E-FAILED |
|                     |                                             |
| Receive ICMP payload| Move to E-FAILED                            |
| unknown error       |                                             |
|                     |                                             |
| R1bis               | N/A (Dispatcher doesn't deliver since       |
|                     | CT(peer) is not set)                        |
|                     |                                             |
| Receive Payload     | Discard and stay in I1-SENT                 |
| Extension header    |                                             |
| or other control    |                                             |
| packet              |                                             |
+---------------------+---------------------------------------------+
]]></artwork>
</figure>

<figure>
 <preamble>
The following table describes the possible actions in STATE I2-SENT 
and their respective triggers:
</preamble>
 <artwork><![CDATA[
+---------------------+---------------------------------------------+
| Trigger             | Action                                      |
+---------------------+---------------------------------------------+
| Receive R2, verify  | If successful, move to ESTABLISHED          |
| INIT Nonce          |                                             |
|                     | If fail, stay in I2-SENT                    |
|                     |                                             |
| Receive I1          | Send R2 and stay in I2-SENT                 |
|                     |                                             |
| Receive I2,         | Send R2 and stay in I2-SENT                 |
| verify validator    |                                             |
| and RESP Nonce      |                                             |
|                     |                                             |
| Receive I2bis,      | Send R2 and stay in I2-SENT                 |
| verify validator    |                                             |
| and RESP Nonce      |                                             |
|                     |                                             |
| Receive R1          | Discard and stay in I2-SENT                 |
|                     |                                             |
| Timeout, increment  | If counter =< I2_RETRIES_MAX, send I2 and   |
| timeout counter     | stay in I2-SENT                             |
|                     |                                             |
|                     | If counter > I2_RETRIES_MAX, send I1 and go | 
|                     | to I1-SENT                                  |
|                     |                                             |       
| R1bis               | N/A (Dispatcher doesn't deliver since       |
|                     | CT(peer) is not set)                        |
|                     |                                             |   
| Receive Payload     | Accept and send I2 (probably R2 was sent    | 
| Extension header    | by peer and lost)                           |
| or other control    |                                             |
| packet              |                                             |       
+---------------------+---------------------------------------------+
]]></artwork>
</figure>
<figure>
 <preamble>
The following table describes the possible actions in STATE I2BIS-SENT 
and their respective triggers:
</preamble>
 <artwork><![CDATA[
+---------------------+---------------------------------------------+
| Trigger             | Action                                      |
+---------------------+---------------------------------------------+
| Receive R2, verify  | If successful, move to ESTABLISHED          |
| INIT Nonce          |                                             |
|                     | If fail, stay in I2BIS-SENT                 |
|                     |                                             |
| Receive I1          | Send R2 and stay in I2BIS-SENT              |
|                     |                                             |
| Receive I2,         | Send R2 and stay in I2BIS-SENT              |
| verify validator    |                                             |
| and RESP Nonce      |                                             |
|                     |                                             |
| Receive I2bis,      | Send R2 and stay in I2BIS-SENT              |
| verify validator    |                                             |
| and RESP Nonce      |                                             |
|                     |                                             |
| Receive R1          | Discard and stay in I2BIS-SENT              |
|                     |                                             |
| Timeout, increment  | If counter =< I2_RETRIES_MAX, send I2bis    |
| timeout counter     | and stay in I2BIS-SENT                      |
|                     |                                             |
|                     | If counter > I2_RETRIES_MAX, send I1 and    | 
|                     | go to I1-SENT                               |
|                     |                                             |       
| R1bis               | N/A (Dispatcher doesn't deliver since       |
|                     | CT(peer) is not set)                        |
|                     |                                             |   
| Receive Payload     | Accept and send I2bis (probably R2 was      | 
| Extension header    | sent by peer and lost)                      |
| or other control    |                                             |
| packet              |                                             |       
+---------------------+---------------------------------------------+
]]></artwork>
</figure>

<figure>
 <preamble>
The following table describes the possible actions in STATE ESTABLISHED 
and their respective triggers:
</preamble>
 <artwork><![CDATA[
+---------------------+---------------------------------------------+
| Trigger             | Action                                      |
+---------------------+---------------------------------------------+
| Receive I1, compare | If no match, send R1 and stay in ESTABLISHED|
| CT(peer) with       |                                             |
| received CT         | If match, send R2 and stay in ESTABLISHED   |
|                     |                                             |
|                     |                                             |
| Receive I2, verify  | If successful, send R2 and stay in          |   
| validator and RESP  | ESTABLISHED                                 |
| Nonce               |                                             |
|                     | Otherwise, discard and stay in ESTABLISHED  |
|                     |                                             |
| Receive I2bis,      | If successful, send R2 and stay in          |   
| verify validator    | ESTABLISHED                                 |
| and RESP Nonce      |                                             |
|                     | Otherwise, discard and stay in ESTABLISHED  |
|                     |                                             |
| Receive R2          | Discard and stay in ESTABLISHED             |
|                     |                                             |
| Receive R1          | Discard and stay in ESTABLISHED             |
|                     |                                             |
| Receive R1bis       | Send I2bis and move to I2BIS-SENT           |
|                     |                                             |
|                     |                                             |
| Receive Payload     | Process and stay in ESTABLISHED             |
| Extension header    |                                             |
| or other control    |                                             |
| packet              |                                             |
|                     |                                             |
| Implementation-     | Discard state and go to IDLE                |
| specific heuristic  |                                             |
| (e.g., No open ULP  |                                             |
| sockets and idle    |                                             | 
| for some time )     |                                             | 
+---------------------+---------------------------------------------+
]]></artwork>
</figure>

<figure>
 <preamble>
The following table describes the possible actions in STATE E-FAILED 
and their respective triggers:
</preamble>
 <artwork><![CDATA[
+---------------------+---------------------------------------------+
| Trigger             | Action                                      |
+---------------------+---------------------------------------------+
| Wait for            | Go to IDLE                                  |
| NO_R1_HOLDDOWN_TIME |                                             |   
|                     |                                             |
| Any packet          | Process as in IDLE                          |
+---------------------+---------------------------------------------+
]]></artwork>
</figure>

<figure>
 <preamble>
The following table describes the possible actions in STATE NO-SUPPORT 
and their respective triggers:
</preamble>
 <artwork><![CDATA[
+---------------------+---------------------------------------------+
| Trigger             | Action                                      |
+---------------------+---------------------------------------------+
| Wait for            | Go to IDLE                                  |
| ICMP_HOLDDOWN_TIME  |                                             |   
|                     |                                             |
| Any packet          | Process as in IDLE                          |
+---------------------+---------------------------------------------+
]]></artwork>
</figure>

<section title="Simplified STATE Machine Diagram">
<figure>
 <artwork><![CDATA[
                                       Timeout/Null    +------------+
                         I1/R1      +------------------| NO SUPPORT |       
         Payload or Control/R1bis   |                  +------------+
                     +---------+    |                              ^
                     |         |    |               ICMP Error/Null|
                     |         V    V                              |
                   +-----------------+  Timeout/Null  +----------+ |
                   |                 |<---------------| E-FAILED | |
                 +-|      IDLE       |                +----------+ |
  I2 or I2bis/R2 | |                 |                          ^  |
                 | +-----------------+       (Tiemout#>MAX)/Null|  |
                 |    ^            |                            |  |
                 |    |            +------+                     |  |
I2 or I2bis/R2   |    |       Heuristic/I1|            I1/R2    |  | 
  Payload/Null   |    |                   |       Control/Null  |  |
   I1/R1 or R2   | +--+                   |       Payload/Null  |  |
 R1 or R2/Null   | |Heuristic/Null        |  (Tiemout#<MAX)/I1  |  |
   +----------+  | |                      |         +--------+  |  |
   |          V  V |                      |         |        V  |  |
 +-------------------+   R2/Null          |        +----------------+
 |                   |   I2 or I2bis/R2   +------->|                |
 |   ESTABLISHED     |<----------------------------|    I1-SENT     |
 |                   |                             |                |
 +-------------------+                             +----------------+
    |     ^        ^                                   |   ^       ^
    |     |        |R2/Null              +-------------+   |       |
    |     |        +----------+          |R1/I2            |       |
    |     |                   |          V                 |       |
    |     |               +------------------+             |       |
    |     |               |                  |-------------+       |
    |     |               |     I2-SENT      | (Timeout#>Max)/I1   |
    |     |               |                  |                     |
    |     |               +------------------+                     |
    |     |                 |              ^                       |
    |     |                 +--------------+                       |
    |     |                I1 or I2bis or I2/R2                    |
    |     |           (Timeout#<Max) or Payload/I2                 | 
    |     |                 R1 or R1bis/Null                       |
    |     +-------+                              (Timeout#>Max)/I1 |
    |      R2/Null|     +------------------------------------------+ 
    |             V     |
    |         +-------------------+
    |         |                   |<-+ (Timeout#<Max)/I2bis
    +-------->|   I2bis-SENT      |  | I1 or I2 or I2bis/R2
  R1bis/I2bis |                   |--+ R1 or R1bis/Null
              +-------------------+    Payload/I2bis
]]></artwork>
</figure>


</section>

</section>


<section title="Context Tag Reuse" anchor='context-tag-reuse'>


<t>The Shim6 protocol doesn't have a mechanism for coordinated state
removal between the peers because such state removal doesn't seem to
help, given that a host can crash and reboot at any time. A result of
this is that the protocol needs to be robust against a Context Tag being
reused for some other context. This section summarizes the different cases
in which a Tag can be reused, and how the recovery works.</t>

<t>The different cases are exemplified by the following case.
Assume hosts A and B were communicating using a context with the ULID pair
&lt;A1, B2&gt;, and that B had assigned Context Tag X to this context.
We assume that B uses only the Context Tag to demultiplex the received
Shim6 Payload Extension headers, since this is the more general case. Further, we
assume that B removes this context state, while A retains it.
B might then at a later time assign CT(local)=X to some other context,
  at which time, we have several possible cases:


 <list style='symbols'>
  <t>The Context Tag is reassigned to a context for the same ULID pair 
&lt;A1, B2&gt;. We've called this "context recovery" in this document.</t>

  <t>The Context Tag is reassigned to a context for a different ULID pair 
between the same two hosts, e.g., &lt;A3, B3&gt;. We've called this 
"context confusion" in this document.</t>

  <t>The Context Tag is reassigned to a context between B and another host C,
for instance, for the ULID pair 
&lt;C3, B2&gt;. That is a form of three-party context confusion.</t>
 </list>
</t>

<section title="Context Recovery">

<t>This case is relatively simple and is discussed in 
<xref target='context-recovery' />.
The observation is that since the ULID pair is the same, when either A or B
tries to establish the new context, A can keep the old context while
B re-creates the context with the same Context Tag CT(B) = X.</t>

</section>
<section title="Context Confusion">

<t>This case is a bit more complex and is discussed in 
<xref target='context-confusion' />. When the new context is created,
whether A or B initiates it, host A can detect when it receives B's locator
set (in the I2 or R2 message) in that it ends up with two contexts to the
same peer host (overlapping Ls(peer) locator sets) that have the same
Context Tag: CT(peer) = X.&nbsp;&nbsp;At this point in time, host A can clear up any
possibility of causing confusion by not using the old context to send
any more packets. It either just discards the old context (it might not
be used by any ULP traffic, since B had discarded it) or it re-creates
a different context for the old ULID pair (&lt;A1, B2&gt;), for which
B will assign a unique CT(B) as part of the normal context-establishment
mechanism.</t>

</section>
<section title="Three-Party Context Confusion">

<t>The third case does not have a place where the old state on A can
be verified since the new context is established between B and C.&nbsp;&nbsp;Thus,
when B receives Shim6 Payload Extension headers with X as the Context Tag,
it will find the context for &lt;C3, B2&gt; and, hence, will rewrite the
packets to have C3 in the Source Address field and B2 in the Destination
Address field before passing them up to the ULP.
This rewriting is correct when the packets are in fact sent by host C,
but if host A ever happens to send a packet using the old context,
then the ULP on A sends a packet with ULIDs &lt;A1, B2&gt; and the packet
arrives at the ULP on B with ULIDs &lt;C3, B2&gt;.</t>

<t>This is clearly an error, and the packet will most likely be rejected
by the ULP on B due to a bad pseudo-header checksum. Even if the checksum
is okay (probability 2^-16), the ULP isn't likely to have a connection
for those ULIDs and port numbers. And if the ULP is connection-less, 
processing the packet is most likely harmless; such a ULP must be able to
copy with random packets being sent by random peers in any case.</t>

<t>This broken state, where packets are sent from A to B using the old
context on host A, might persist for some time but will not remain
for very long. The unreachability detection on host A will kick in because it
does not see any return traffic (payload or Keepalive messages) for
the context. This will result in host A sending Probe messages to host B
to find a working locator pair. The effect of this is that host B will
notice that it does not have a context for the ULID pair &lt;A1, B2&gt; and
CT(B) = X, which will make host B send an R1bis packet to re-establish that
context. The re-established context, just like in the previous section,
will get a unique CT(B) assigned by host B; thus, there will no
longer be any confusion.</t>

</section>

<section title="Summary">

<t>In summary, there are cases where a Context Tag might be reused
while some peer retains the state, but the protocol can recover from
it. The probability of these events is low, given the 47-bit Context Tag
size. However, it is important that these recovery mechanisms be tested. 
Thus, during development and testing, it is recommended that implementations
not use the full 47-bit space but instead keep, for example, the top 40 bits as zero,
only leaving the host with 128 unique Context Tags. This will help test
the recovery mechanisms.</t>

</section>

</section>


<section title="Design Alternatives" anchor="alternatives">


<t>This document has picked a certain set of design choices in order to
try to work out a bunch of the details and to stimulate discussion.
But, as has been discussed on the mailing list, there are other
choices that make sense. This appendix tries to enumerate some
alternatives.
</t>

<section title="Context Granularity"> 

<t>
Over the years, various suggestions have been made whether the shim
should, even if it operates at the IP layer, be aware of ULP connections 
and sessions and, as a result, be able to make separate shim contexts for 
separate ULP connections and sessions. A few different options
have been discussed:
 <list style='symbols'>
  <t>Each ULP connection maps to its own shim context.</t>
  <t>The shim is unaware of the ULP notion of connections and
just operates on a host-to-host (IP address) granularity.</t>
  <t>Hybrids in which the shim is aware of some ULPs (such as TCP) and handles
other ULPs on a host-to-host basis.</t>
 </list>
</t>

<t>Having shim state for every ULP connection potentially means higher overhead
since the state-setup overhead might become significant; there is utility
in being able to amortize this over multiple connections.</t>

<t>But being completely unaware of the ULP connections might hamper ULPs that
want different communication to use different locator pairs, for instance,
for quality or cost reasons.</t>

<t>The protocol has a shim that operates with host-level granularity (strictly
speaking, with ULID-pair granularity) to be able to amortize the context
establishment over multiple ULP connections. This is combined with the
ability for Shim6-aware ULPs to request context forking so that
different ULP traffic can use different locator pairs.</t>

</section>
<section title="Demultiplexing of Data Packets in Shim6 Communications">

<t>Once a ULID-pair context is established between two hosts, packets
may carry locators that differ from the ULIDs presented to the 
ULPs using the established context. One of the main functions of the 
Shim6 layer is to perform the mapping between the locators used 
to forward packets through the network and the ULIDs presented to 
the ULP. In order to perform that translation for incoming packets, 
the Shim6 layer needs to first identify which of the incoming 
packets need to be translated and then perform the mapping 
between locators and ULIDs using the associated context. Such 
operation is called "demultiplexing". It should be noted that, because 
any address can be used both as a locator and as a ULID, 
additional information, other than the addresses carried in packets,
needs to be taken into account for this operation.
</t>
<t>
For example, if a host has addresses A1 and A2 and starts communicating
with a peer with addresses B1 and B2, then some communication
(connections) might use the pair &lt;A1, B1&gt; as ULID and others might
use, for example, &lt;A2, B2&gt;. Initially there are no failures, so these address
pairs are used as locators, i.e., in the IP address fields in the
packets on the wire. But when there is a failure, the Shim6 layer on
A might decide to send packets that used &lt;A1, B1&gt; as ULIDs using &lt;A2,
B2&gt; as the locators. In this case, B needs to be able to rewrite the
IP address field for some packets and not others, but the packets all
have the same locator pair.
</t>
<t>
In order to accomplish the demultiplexing operation successfully, 
data packets carry a Context Tag that allows the receiver of the 
packet to determine the shim context to be used to perform the operation.
</t>
<t>
Two mechanisms for carrying the Context Tag information have 
been considered in depth during the shim protocol design: those
carrying the Context Tag in the Flow Label field of the IPv6 header 
and those using a new Extension header to carry the Context Tag. 
In this appendix, we will describe the pros and cons of each 
mechanism and justify the selected option.
</t>

<section title="Flow Label">

<t>
A possible approach is to carry the Context Tag in the Flow Label
field of the IPv6 header. This means that when a Shim6 context is
established, a Flow Label value is associated with this context (and
perhaps a separate Flow Label for each direction).
</t>
<t>
The simplest way to do this is to have the triple &lt;Flow
Label, Source Locator, Destination Locator&gt; identify the context at
the receiver.
</t>
<t>
The problem with this approach is that, because the locator sets 
are dynamic, it is not possible at any given moment to be sure 
that two contexts for which the same Context Tag is allocated will 
have disjoint locator sets during the lifetime of the contexts.
</t>
<t>
Suppose that Node A has addresses IPA1, IPA2, IPA3, and IPA4 
and that Host B has addresses IPB1 and IPB2.
</t>
<t>
Suppose that two different contexts are established between 
Host A and Host B. 
</t>
<t>
Context #1 is using IPA1 and IPB1 as ULIDs. The locator set 
associated to IPA1 is IPA1 and IPA2, while the locator set 
associated to IPB1 is just IPB1. 
</t>
<t>
Context #2 uses IPA3 and IPB2 as ULIDs. The locator set 
associated to IPA3 is IPA3 and IPA4, while the locator set 
associated to IPB2 is just IPB2.
</t>
<t>
Because the locator sets of Context #1 and Context #2 are
disjoint, hosts could think that the same Context Tag value can 
be assigned to both of them. The problem arrives when, later on, 
IPA3 is added as a valid locator for IPA1 in Context #2 and IPB2 is added as 
a valid locator for IPB1 in Context #1. In this case, the triple 
&lt;Flow Label, Source Locator, Destination Locator&gt; would 
not identify a unique context anymore, and correct 
demultiplexing is no longer possible.
</t>
<t>
A possible approach to overcome this limitation is to simply not 
repeat the Flow Label values for any communication 
established in a host. This basically means that each time a 
new communication that is using different ULIDs is established, 
a new Flow Label value is assigned to it. By these means, each 
communication that is using different ULIDs can be 
differentiated because each has a different Flow Label value. 
</t>
<t>
The problem with such an approach is that it requires the 
receiver of the communication to allocate the Flow Label value 
used for incoming packets, in order to assign them uniquely. 
For this, a shim negotiation of the Flow Label value to use in 
the communication is needed before exchanging data packets. 
This poses problems with non-Shim6-capable hosts, since they 
would not be able to negotiate an acceptable value for the Flow 
Label. This limitation can be lifted by marking the packets that 
belong to shim sessions from those that do not. These markings 
would require at least a bit in the IPv6 header that is not 
currently available, so more creative options would be required, 
for instance, using new Next Header values to indicate that the 
packet belongs to a Shim6-enabled communication and that 
the Flow Label carries context information as proposed in
<xref target="NOID"/>.


However, even if new Next Header values are used in this way, such an approach is 
incompatible with the deferred-establishment capability of the 
shim protocol, which is a preferred function since it suppresses delay
due to shim context establishment prior to the initiation of communication. 
Such capability also allows nodes to 
define at which stage of the communication they decide, 
based on their own policies, that a given communication 
requires protection by the shim.
</t>
<t>
In order to cope with the identified limitations, an alternative 
approach that does not constrain the Flow Label values that are used 
by communications using ULIDs equal to the locators 
(i.e., no shim translation) is to only require that different Flow 
Label values are assigned to different shim contexts. In such an
approach, communications start with unmodified Flow Label 
usage (could be zero or as suggested in <xref target='RFC3697'/>). The 
packets sent after a failure when a different locator pair is used 
would use a completely different Flow Label, and this Flow Label 
could be allocated by the receiver as part of the shim context 
establishment. Since it is allocated during the context 
establishment, the receiver of the "failed over" packets can pick 
a Flow Label of its choosing (that is unique in the sense that no 
other context is using it as a Context Tag), without any 
performance impact, respecting that, for each locator pair, 
the Flow Label value used for a given locator pair doesn't 
change due to the operation of the multihoming shim.
</t>
<t>
In this approach, the constraint is that Flow Label values being 
used as context identifiers cannot be used by other 
communications that use non-disjoint locator sets. This means 
that once a given Flow Label value has been assigned to 
a shim context that has a certain locator sets associated, the 
same value cannot be used for other communications that 
use an address pair that is contained in the locator sets of the 
context. This is a constraint in the potential Flow Label 
allocation strategies. 
</t>
<t>
A possible workaround to this constraint is to mark shim 
packets that require translation, in order to differentiate 
them from regular IPv6 packets, using the artificial Next 
Header values described above. In this case, the Flow 
Label values constrained are only those of the packets that 
are being translated by the shim. This last approach would 
be the preferred approach if the Context Tag is to be carried 
in the Flow Label field. This is the case not only because it imposes 
the minimum constraints to the Flow Label allocation 
strategies, limiting the restrictions only to those packets that 
need to be translated by the shim, but also because context-loss 
detection mechanisms greatly benefit from the fact 
that shim data packets are identified as such, allowing the 
receiving end to identify if a shim context associated to a 
received packet is supposed to exist, as will be discussed 
in the context-loss detection appendix below. 
</t>

</section>
<section title="Extension Header">

<t>
Another approach, which is the one selected for this protocol,
is to carry the Context Tag in a new 
Extension header. These Context Tags are allocated by the 
receiving end during the Shim6 protocol initial negotiation, 
implying that each context will have two Context Tags, one 
for each direction. Data packets will be demultiplexed using 
the Context Tag carried in the Extension header. This seems 
a clean approach since it does not overload existing fields.
However, it introduces additional overhead in the packet 
due to the additional header. The additional overhead 
introduced is 8 octets. However, it should be noted that the 
Context Tag is only required when a locator other than the 
one used as ULID is contained in the packet. Packets 
where both the Source and Destination Address fields contain 
the ULIDs do not require a Context Tag, since no rewriting 
is necessary at the receiver. This approach would reduce 
the overhead because the additional header is only 
required after a failure. On the other hand, this approach 
would cause changes in the available MTU for some 
packets, since packets that include the Extension header 
will have an MTU that is 8 octets shorter. However, path changes through
the network can result in a different MTU in any case; thus, having a locator
change, which implies a path change, affect the MTU doesn't introduce
any new issues.
</t>

</section>

</section>
<section title="Context-Loss Detection">

<t>
In this appendix, we will present different approaches considered 
to detect context loss and potential context-recovery strategies.
The scenario being considered is the following: Node A and 
Node B are communicating using IPA1 and IPB1. Sometime 
later, a shim context is established between them, with IPA1 
and IPB1 as ULIDs and with IPA1,...,IPAn and IPB1,...,IPBm as 
locator sets, respectively.
</t>
<t>
It may happen that, later on, one of the hosts (e.g., Host A)
loses the shim context. The reason for this can be that Host A 
has a more aggressive garbage collection policy than Host B or 
that an error occurred in the shim layer at Host A and resulted in 
the loss of the context state.
</t>
<t>
The mechanisms considered in this appendix are aimed at dealing 
with this problem. There are essentially two tasks that need to 
be performed in order to cope with this problem: first, the 
context loss must be detected and, second, the context needs to 
be recovered/re-established.
</t>
<t>
Mechanisms for detecting context loss.
</t>
<t>
These mechanisms basically consist in each end of the 
context that periodically sends a packet containing context-specific 
information to the other end. Upon reception of such packets, 
the receiver verifies that the required context exists. In the case 
that the context does not exist, it sends a packet notifying the
sender of the problem.
</t>
<t>
An obvious alternative for this would be to create a specific 
context keepalive exchange, which consists in periodically 
sending packets with this purpose. This option was considered 
and discarded because it seemed an overkill to define a new 
packet exchange to deal with this issue.
</t>
<t>
Another alternative is to piggyback the context-loss detection 
function in other existent packet exchanges. In particular, 
both shim control and data packets can be used for this.
</t>
<t>
Shim control packets can be trivially used for this because 
they carry context-specific information. This way, when a node 
receives one such packet, it will verify if the context 
exists. However, shim control frequency may not be adequate 
for context-loss detection since control packet exchanges can 
be very limited for a session in certain scenarios. 
</t>
<t>
Data packets, on the other hand, are expected to be 
exchanged with a higher frequency but do not 
necessarily carry context-specific information. In 
particular, packets flowing before a locator change 
(i.e., a packet carrying the ULIDs in the address fields) 
do not need context information since they do not need 
any shim processing. Packets that carry locators that 
differ from the ULIDs carry context information. 
</t>
<t>
However, we need to make a distinction here between 
the different approaches considered to carry the Context 
Tag -- in particular, between those approaches where packets 
are explicitly marked as shim packets and those approaches 
where packets are not marked as such. For instance, in the 
case where the Context Tag is carried in the Flow Label and 
packets are not marked as shim packets (i.e., no new Next 
Header values are defined for shim), a receiver that has 
lost the associated context is not able to detect that the 
packet is associated with a missing context. The result is 
that the packet will be passed unchanged to the upper-layer 
protocol, which in turn will probably silently discard it due 
to a checksum error. The resulting behavior is that the 
context loss is undetected. This is one additional reason 
to discard an approach that carries the Context Tag in the 
Flow Label field and does not explicitly mark the shim 
packets as such. On the other hand, approaches that mark 
shim data packets (like those that use the Extension header or the Flow 
Label with new Next Header values) allow 
the receiver to detect if the context associated to the 
received packet is missing. In this case, data packets 
also perform the function of a context-loss detection 
exchange. However, it must be noted that only those 
packets that carry a locator that differs from the ULID 
are marked. This basically means that context loss will 
be detected after an outage has occurred, i.e., alternative 
locators are being used.
</t>
<t>
Summarizing, the proposed context-loss detection mechanisms 
use shim control packets and Shim6 Payload Extension headers to detect context 
loss. Shim control packets detect context loss during the whole 
lifetime of the context, but the expected frequency in some 
cases is very low. On the other hand, Shim6 Payload Extension headers have a 
higher expected frequency in general, but they only detect 
context loss after an outage. This behavior implies that it will 
be common that context loss is detected after a failure, i.e., once 
it is actually needed. Because of that, a mechanism for 
recovering from context loss is required if this approach is used.
</t>
<t>
Overall, the mechanism for detecting lost context would work 
as follows: the end that still has the context available sends a 
message referring to the context. Upon the reception of such 
message, the end that has lost the context identifies the 
situation and notifies the other end of the context-loss event
by sending a packet containing the lost context information 
extracted from the received packet. 
</t>
<t>
One option is to simply send an error message containing the received packets (or 
at least as much of the received packet that the MTU allows 
to fit). One of the goals of this notification is to allow the 
other end that still retains context state to re-establish the lost 
context. The mechanism to re-establish the lost context consists 
in performing the 4-way initial handshake. This is a time-consuming 
exchange and, at this point, time may be critical 
since we are re-establishing a context that is currently needed 
(because context-loss detection may occur after a failure). 
So another option, which is the one used in this protocol,
is to replace the error message with a 
modified R1 message so that the time required to perform 
the context-establishment exchange can be reduced. Upon 
the reception of this modified R1 message, the end that 
still has the context state can finish the context-establishment 
exchange and restore the lost context.
</t>

</section>
<section title="Securing Locator Sets">

<t>
The adoption of a protocol like SHIM, which allows the binding 
of a given ULID with a set of locators, opens the door for 
different types of redirection attacks as described 
in <xref target='RFC4218'/>. 
The goal, in terms of security, for the design of the shim 
protocol is to not introduce any new vulnerability into the 
Internet architecture. It is a non-goal to provide additional 
protection other than what is currently available in the single-homed IPv6 Internet.
</t>
<t>
Multiple security mechanisms were considered to protect the 
shim protocol. In this appendix we will present some of them.
</t>
<t>
The simplest option to protect the shim protocol is to use 
cookies, i.e., a randomly generated bit string that is negotiated 
during the context-establishment phase and then is included 
in subsequent signaling messages. By these means, it would be 
possible to verify that the party that was involved in the initial 
handshake is the same party that is introducing new locators. 
Moreover, before using a new locator, an exchange is performed 
through the new locator, verifying that the party located at the 
new locator knows the cookie, i.e., that it is the same party that 
performed the initial handshake.


</t>
<t>
While this security mechanism does indeed provide a fair 
amount of protection, it leaves the door open for so-called 
time-shifted attacks. In these attacks, an attacker on 
the path discovers the cookie by sniffing any signaling message. 
After that, the attacker can leave the path and still perform a 
redirection attack since, as he is in possession of the cookie, he 
can introduce a new locator into the locator set and can also 
successfully perform the reachability exchange if he is able to 
receive packets at the new locator. The difference with the 
current single-homed IPv6 situation is that in the current 
situation the attacker needs to be on-path during the whole 
lifetime of the attack, while in this new situation (where only 
cookie protection is provided), an attacker that was once on 
the path can perform attacks after he has left the on-path location.
</t>
<t>
Moreover, because the cookie is included in signaling 
messages, the attacker can discover the cookie by sniffing 
any of them, making the protocol vulnerable during the 
whole lifetime of the shim context. A possible approach to 
increase security is to use a shared secret, i.e., a bit 
string that is negotiated during the initial handshake but 
that is used as a key to protect following messages. With 
this technique, the attacker must be present on the path 
and sniffing packets during the initial handshake, since this is the 
only moment when the shared secret is exchanged. Though it imposes that the attacker must be on 
path at a very specific moment (the establishment phase), and though
it improves security, this approach is still vulnerable to
time-shifted attacks. It should be noted that, 
depending on protocol details, an attacker may be able to 
force the re-creation of the initial handshake (for instance,
by blocking messages and making the parties think that 
the context has been lost); thus, the resulting situation may 
not differ that much from the cookie-based approach.
</t>

<t>
Another option that was discussed during the design of this
protocol was the possibility of using IPsec for protecting the 
shim protocol. Now, the problem under consideration in this 
scenario is how to securely bind an address that is being used 
as ULID with a locator set that can be used to exchange packets. 
The mechanism provided by IPsec to securely bind the address 
that is used with cryptographic keys is the usage of digital certificates. 
This implies that an IPsec-based solution would require a common and
mutually trusted third party to generate digital certificates that bind
the key and the ULID. Considering that the scope of application of the 
shim protocol is global, this would imply a global public key 
infrastructure (PKI). The major issues with this approach are the 
deployment difficulties associated with a global PKI. The other possibility 
would be to use some form of opportunistic IPSec, 
like Better-Than-Nothing-Security (BTNS)
<xref target='RFC5386'/>. However, this would still present 
some issues. In particular, this approach requires a leap-of-faith in order to bind
a given address to the public key that is being used, which would actually prevent 
the most critical security feature that a Shim6 security solution 
needs to achieve from being provided: proving identifier ownership. On top of that, using IPsec
would require to turn on per-packet AH/ESP just for multihoming to occur.
</t>

<t>
In general, SHIM6 was expected to work between pairs of hosts
   that have no prior arrangement, security association, or
   common, trusted third party. It was also seen as undesirable
   to have to turn on per-packet AH/ESP just for the multihoming
   to occur. However, Shim6 should work and  have an additional
   level of security where two hosts choose to use IPsec.</t>

<t>
   Another design alternative would have employed some form 
   of opportunistic or Better-Than-Nothing Security (BTNS)
   IPsec to perform these tasks with IPsec instead. 
   Essentially, HIP in opportunistic mode is very similar 
   to SHIM6, except that HIP uses IPsec, employs 
   per-packet ESP, and introduces another set of 
   identifiers.</t>


<t>
Finally, two different technologies were selected to protect the 
shim protocol: HBA <xref target='RFC5535'/> 
and CGA <xref target='RFC3972'/>. 
 These two techniques provide a similar level of protection but 
also provide different functionality with different computational costs.
</t>
<t>
The HBA mechanism relies on the capability of generating all 
  the addresses of a multihomed host as an unalterable set of 
  intrinsically bound IPv6 addresses, known as an HBA set. In 
  this approach, addresses incorporate a cryptographic one-way hash of
the prefix set available into the interface identifier part. 
  The result is that the binding between all the available addresses 
  is encoded within the addresses themselves, providing 
  hijacking protection. Any peer using the shim protocol node 
  can efficiently verify that the alternative addresses proposed 
  for continuing the communication are bound to the initial 
  address through a simple hash calculation.



A limitation of 
the HBA technique is that, once generated, the address set is 
fixed and cannot be changed without also changing all the 
addresses of the HBA set. In other words, the HBA technique 
does not support dynamic addition of address to a previously 
generated HBA set. An advantage of this approach is that it 
requires only hash operations to verify a locator set, 
imposing very low computational cost to the protocol.
</t>
<t>
In a CGA-based approach, the address used as ULID is a CGA 
  that contains a hash of a public key in its interface identifier. 
  The result is a secure binding between the ULID and the associated 
  key pair. This allows each peer to use the corresponding private 
  key to sign the shim messages that convey locator set information. 
  The trust chain in this case is the following: the ULID used for the 
  communication is securely bound to the key pair because it contains 
  the hash of the public key, and the locator set is bound to the public 
  key through the signature. 
The CGA approach then supports dynamic 
addition of new locators in the locator set, since in order to do that
the node only needs to sign the new locator with the private key 
associated with the CGA used as ULID. A limitation of this 
approach is that it imposes systematic usage of public key 
cryptography with its associate computational cost.
</t>
<t>
Either of these two mechanisms, HBA and CGA, provides time-shifted 
  attack protection, since the ULID is securely bound to a locator set 
  that can only be defined by the owner of the ULID.
</t>


<t>
So the design decision adopted was that both mechanisms, HBA and 
CGA, are supported. This way, when only stable address sets are 
required, the nodes can benefit from the low computational cost 
offered by HBA, while when dynamic locator sets are required, this 
can be achieved through CGAs with an additional cost. Moreover, 
because HBAs are defined as a CGA extension, the addresses 
available in a node can simultaneously be CGAs and HBAs, 
allowing the usage of the HBA and CGA functionality when 
needed, without requiring a change in the addresses used.
</t>

</section>
<section title="ULID-Pair Context-Establishment Exchange">

<t>
Two options were considered for the ULID-pair context-establishment
exchange: a 2-way handshake and a 4-way handshake.
</t>

<t>
A key goal for the design of this exchange was protection 
against DoS attacks. The attack under consideration was 
basically a situation where an attacker launches a great 
amount of ULID-pair establishment-request packets, exhausting 
the victim's resources similarly to TCP SYN flooding attacks. 
</t>
<t>
A 4-way handshake exchange protects against these attacks 
because the receiver does not create any state associated to a 
given context until the reception of the second packet, which 
contains prior-contact proof in the form of a token. At this 
point, the receiver can verify that at least the address used by 
the initiator is valid to some extent, since the initiator is able 
to receive packets at this address. In the worst case, the 
responder can track down the attacker using this address. 
The drawback of this approach is that it imposes a 4-packet 
exchange for any context establishment. This would be a 
great deal if the shim context needed to be established up 
front, before the communication can proceed. However, 
thanks to the deferred context-establishment capability of the 
shim protocol, this limitation has a reduced impact in the 
performance of the protocol. (However, it may have a greater 
impact in the situation of context recovery, as discussed earlier. 
However, in this case, it is possible to perform optimizations to 
reduce the number of packets as described above.)
</t>
<t>
The other option considered was a 2-way handshake with 
the possibility to fall back to a 4-way handshake in case of 
attack. In this approach, the ULID-pair establishment exchange 
normally consists of a 2-packet exchange and does not verify 
that the initiator has performed a prior contact before creating 
context state. In case a DoS attack is detected, the 
responder falls back to a 4-way handshake similar to the one 
described previously, in order to prevent the detected attack from
proceeding. The main difficulty with this attack is how to detect 
that a responder is currently under attack. It should be noted
that, because this is a 2-way exchange, it is not possible to use 
the number of half-open sessions (as in TCP) to detect an 
ongoing attack; different heuristics need to be considered. 
</t>
<t>
The design decision taken was that, considering the current 
impact of DoS attacks and the low impact of the 4-way 
exchange in the shim protocol (thanks to the deferred
context-establishment capability), a 4-way exchange would be adopted
for the base protocol. 
</t>

</section>
<section title="Updating Locator Sets">
<t>
There are two possible approaches to the addition and removal of
locators: atomic and differential approaches. The atomic approach
essentially sends the complete locator set each time a variation
in the locator set occurs. The differential approach sends the
differences between the existing locator set and the new one. 
The atomic approach imposes additional overhead since
all of the locator set has to be exchanged each time, while the
differential approach requires re-synchronization of both ends
through changes (i.e., requires that both ends have the same idea about what the
current locator set is).
</t>
<t>
Because of the difficulties imposed by the synchronization
requirement, the atomic approach was selected.
</t>

</section>
<section title="State Cleanup">

<t>
There are essentially two approaches for discarding an existing state
about locators, keys, and identifiers of a correspondent node: a
coordinated approach and an unilateral approach.
</t>
<t>
In the unilateral approach, each node discards information about
the other node without coordination with the other node, based on some
local timers and heuristics. No packet exchange is required for
this. In this case, it would be possible that one of the nodes has
discarded the state while the other node still hasn't. In this case,
a No Context Error message may be required to inform the other node about the 
situation; possibly a recovery mechanism is also needed.
</t>
<t>
A coordinated approach would use an explicit CLOSE mechanism, akin to
the one specified in HIP <xref target='RFC5201'/>.
If an explicit CLOSE handshake and associated timer 
is used, then there would no longer be a need for
the No Context Error message due to a peer having garbage collected
at its end of the context. However, there is still potentially a need
to have a No Context Error message in the case of a complete state
loss of the peer (also known as a crash followed by a reboot). Only
if we assume that the reboot takes at least the time of the CLOSE timer, or that
it is okay to not provide complete service until CLOSE-timer minutes
after the crash, can we completely do away with the No Context Error
message.
</t>
<t>In addition, another aspect that is relevant for this design choice
is the context confusion issue. In particular, using a unilateral approach
to discard context state clearly opens up the possibility of context confusion,
where one of the ends unilaterally discards the context state, while the other
does not. In this case, the end that has discarded the state can re-use the 
Context Tag value used for the discarded state for another context,
creating potential context confusion.
In order to illustrate the cases where problems would arise, consider the 
following scenario:
 <list style='symbols'>
  <t>Hosts A and B establish context 1 using CTA and CTB as Context Tags. </t>

  <t>Later on, A discards context 1 and the Context Tag value CTA becomes 
available for reuse.</t>

  <t>However, B still keeps context 1.</t>
 </list>
</t>

<t>This would create context confusion in the following two cases:
 <list style="symbols">
  <t>A new context 2 is established between A and B with a different ULID 
pair (or Forked Instance Identifier), and A uses CTA as the Context Tag. If the 
locator sets used for both contexts are not disjoint, we have context confusion.</t>

  <t>A new context is established between A and C, and A uses CTA as
the Context Tag value for this new context. Later on, B sends Payload Extension header 
and/or control messages containing CTA, which could be interpreted by A 
as belonging to context 2 (if no proper care is taken). Again we have context confusion.</t>
 </list>
One could think that using a coordinated approach would eliminate such
context confusion, making the protocol much simpler. However, this 
is not the case, because even in the case of a coordinated approach using a 
CLOSE/CLOSE ACK exchange, there is still the possibility of a host rebooting 
without having the time to perform the CLOSE exchange. So, it is true that 
the coordinated approach eliminates the possibility of context confusion 
 due to premature garbage collection, but it does not prevent the 
same situations due to a crash and reboot of one of the involved hosts. The 
result is that, even if we went for a coordinated approach, we would still 
need to deal with context confusion and provide the means to detect and 
recover from these situations.</t>

</section>

</section>
</back>
</rfc>

