<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc {"tocdepth"=>5}="yes"?>
<?rfc comments="yes"?>

<rfc ipr="pre5378Trust200902" docName="draft-ietf-pim-rfc1112bis-08" category="std" consensus="true" submissionType="IETF" obsoletes="1112" updates="791, 1122" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IP Multicast Host Extensions and ASM">Host Extensions for IP Multicasting and "Any Source Multicasting" (ASM) IP service</title>

    <author initials="T." surname="Eckert" fullname="Toerless Eckert" role="editor">
      <organization>Futurewei Technologies USA</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>tte@cs.fau.de</email>
      </address>
    </author>
    <author initials="S. E." surname="Deering" fullname="Stephen E. Deering">
      <organization>Retired</organization>
      <address>
        <postal>
          <city>Vancouver, British Columbia</city>
          <country>Canada</country>
        </postal>
        <email>deering@noreply.ietf.org</email>
      </address>
    </author>

    <date year="2026" month="February" day="27"/>

    
    <workgroup>PIM</workgroup>
    

    <abstract>


<?line 118?>

<t>This memo specifies the extensions required of a host implementation
of the Internet Protocol (IP) to support IP multicast with the IP service
interface "Any Source Multicast" (ASM). This specification applies
to both versions 4 and 6 of the Internet Protocol.
Distribution of this memo is unlimited.</t>

<t>This document replaces <xref target="RFC1112"/> for everything but its specification of
the IGMP version 1 protocol.</t>



    </abstract>



  </front>

  <middle>


<?line 129?>

<section anchor="status-of-this-memo"><name>STATUS OF THIS MEMO</name>

<t>[ To be removed before publication:
Summary of considerations for reviews by different groups:</t>

<t>This -bis is intended to replace RFC1112 maintaining it internet
standard designation, but extending it for IPv6, additional terminology (ASM/SSM),
and refining the specification with established industry practices.</t>

<t>The core parts of the document are changed as little as possible to maintain
all original rfc1112 text (except IGMPv1) as much as possible - given how it has very well
stood the test of time: all well-known IP multicast host stack implementations
including IPv6 - even though unspecified there - are based on the principles of
rfc1112. New sections and existing, minimally changed sections can easily
be recognized by using rfcdiff against RFC1112.</t>

<t>All changes/enhancements
are meticulously matched against implementation and operational practices
that have evolved and are detailled in this memo: this -bis should match
the ubiquitously deployed IP multicast service better than rfc1112.</t>

<t>SECDIR is asked primarily to review section 12 (Security Considerations).</t>

<t>INTDIR: This document would logically belong to INT as it extends the
IPv4/IPv6 host stack for IP Multicast (and references to SSM). It simply
evolved as a PIM document due to PIM-WG ongoing ownership of all of
IP multicast below application layer. IPv6 is added mostly "by-reference",
because in the absence of an earlier attempt to add IPv6 support into an
rfc1112bis, all normatively necessary aspects of IPv6 multicast where added
to a scattered set of RFCs, which are now comprehensively referenced in
this memo.</t>

<t>TSVDIR: Consider this document to be normative for all "UDP" independent
service and abstract API aspects of datagram IP multicast service. Its hence
related to the work by TAPS. The Security Considerations sections specifically
discusses challenges of adopting the socket model from unicast to multicast.</t>

<t>IOTDIR: IP multicast is widely in IOT, often without IP multicast routing just
locally in LANs, radio-LANs. This memo should be the best common reference
for the quirks of IP multcast host stacks, specifically with the added
discussion of link-local addresses and socket (security) challenges.</t>

<t>]</t>

<t>This memo specifies the extensions required of a host implementation
of the Internet Protocol (IP) to support IP multicast with the IP service
interface "Any Source Multicast" (ASM). This specification applies
to both versions 4 and 6 of the Internet Protocol.
Distribution of this memo is unlimited.</t>

<t>This document replaces <xref target="RFC1112"/> for everything except for its specification of
the IGMP version 1 protocol.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="introduction"><name>INTRODUCTION</name>

<section anchor="summary"><name>Summary</name>

<t>This memo specifies the extensions required of a host implementation
of the Internet Protocol (IP) to support IP multicast. It replaces <xref target="RFC791"/>
for everything except for the specification of the protocol IGMP version 1
in Appendix I. of <xref target="RFC1112"/>. This document declares <xref target="RFC1112"/> including
IGMP version 1 historic.</t>

<t><xref target="RFC1112"/> specified IP multicast for version 4 of the IP protocol (IPv4, <xref target="RFC791"/>),
and refers to that version as IP. This document applies both to version 4 of the IP protocol
and version 6 of the IP protocol (IPv6, <xref target="RFC8200"/>).</t>

<t>THE TERM IP IS USED IN THIS DOCUMENT FOR TEXT APPLYING EQUALLY TO IPv4 AND IPv6.</t>

<t>Where specifications in support of IP multicast
for version 6 of the IP protocol where already provided by other RFCs, this document
provides references to those pre-existing specifications, so that this document can
serve as a complete single point of reference for the host extensions for IP multicast
with either versions of IP.</t>

<t>"Source Specific Multicast", (SSM, <xref target="SSM"/>) introduced a complementary 
extension to the IP service from the one specified here.
It relies on all aspects of the host stack extensions  specified here,
such as <xref target="ethernet"/>, and uses or extends them.  The service specified here is called
"Any Source Multicast" (ASM) to distinguish it explicitly from SSM.
This document also describes, where SSM changes specifications from <xref target="RFC1112"/>.</t>

<t>Due to the existence of both ASM and SSM, the term "IP multicast" best refers to the
complete set of IP host extensions in support of either service options:
this specification for ASM plus <xref target="SSM"/>).  When the term IP multicast is used to
refer to the IP multicast service without further qualification, then ASM is to be implied.
See also <xref target="terminology"/>.</t>

<t>This specification aims to maintain all the original text of <xref target="RFC1112"/> where
technically appropriate. This incurs the use of some historic language, such as
"(internet) gateway" to sometimes refer to IP routers, and
capitalization of chapter headings.</t>

<t>[RFCeditor: please remove this remark before publication.
Reviewers: Please use rfcdiff to easier recognize the sections inherited from RFC1112
and distinguish them from new chapters and sections. The pre-existing text attempts
to include only necessary technical enhancements but not other editorial enhancements. ]</t>

<t>See <xref target="normative"/> and <xref target="changes"/> for a detailed list of changes from <xref target="RFC1112"/>.</t>

</section>
<section anchor="overview"><name>Overview</name>

<t>IP multicasting is the transmission of an IP datagram to a "host
group", a set of zero or more hosts identified by a single IP
destination address.  A multicast datagram is delivered to all
members of its destination host group with the same "best-efforts"
reliability as regular unicast IP datagrams, i.e., the datagram is
not guaranteed to arrive intact at all members of the destination
group or in the same order relative to other datagrams.</t>

<t>The membership of a host group is dynamic; that is, hosts may join
and leave groups at any time.  There is no restriction on the
location or number of members in a host group.  A host may be a
member of more than one group at a time.  A host need not be a member
of a group to send datagrams to it.</t>

<t>A host group may be permanent or transient.  A permanent group has a
well-known, administratively assigned IP address.  It is the address,
not the membership of the group, that is permanent; at any time a
permanent group may have any number of members, even zero.  Those IP
multicast addresses that are not reserved for permanent groups are
available for dynamic assignment to transient groups which exist only
as long as they have members.</t>

<t>Internetwork forwarding of IP multicast datagrams is handled by
"multicast routers" which may be co-resident with, or separate from,
internet gateways.  A host transmits an IP multicast datagram as a
local network multicast which reaches all immediately-neighboring
members of the destination host group.  If the datagram has an IPv4
time-to-live or IPv6 hop limit greater than 1, the multicast router(s) attached to the
local network take responsibility for forwarding it towards all other
networks that have members of the destination group.  On those other
member networks that are reachable within the IPv4 time-to-live or IPv6 hop limit, an
attached multicast router completes delivery by transmitting the
datagram as a local multicast.</t>

<t>This memo specifies the extensions required of a host IP
implementation to support IP multicasting, where a "host" is any
internet host or gateway other than those acting as multicast
routers.  The algorithms and protocols used within and between
multicast routers are transparent to hosts and are specified in
separate documents.  This memo also does not specify how local
network multicasting is accomplished for all types of network,
although it does specify the required service interface to an
arbitrary local network and gives an Ethernet specification as an
example.  Specifications for other types of network will be the
subject of future memos.</t>

</section>
</section>
<section anchor="conformance"><name>LEVELS OF CONFORMANCE</name>

<t>There are four levels of conformance to this specification. They
apply independently for IPv4 and IPv6.</t>

<t>All Internet hosts and gateways are <bcp14>RECOMMENDED</bcp14> to conform to
Level 2 for the versions of IP that they support.</t>

<t>Hosts or gateways supporting IPv4 that can not conform to Level 2
for it are <bcp14>RECOMMENDED</bcp14> to conform to Level 2L.</t>

<t>Hosts or gateways supporting IPv6
that can not conform to Level 2 for IPv6 are <bcp14>REQUIRED</bcp14> to conform to Level 2L.
This option is introduced in support of the requirements from <xref target="RFC4291"/>, section 2.8.</t>

<t>See also <xref target="ll-apdx"/> for further explanations of the use of link local addresses.</t>

<section anchor="level-0-no-support-for-ip-multicasting"><name>Level 0: no support for IP multicasting.</name>

<t>Level 0 hosts will, in general, be
unaffected by multicast activity.  The only exception arises on some
types of local network, where the presence of level 1 or 2 hosts may
cause misdelivery of multicast IP datagrams to level 0 hosts.  Such
datagrams can easily be identified by the presence of an IP multicast
address in their destination address field; they <bcp14>SHOULD</bcp14> be quietly
discarded by hosts that do not support IP multicasting.  Class D
addresses in support of multicasting with IPv4 are described in <xref target="host-groups"/>,
IPv6 addresses for IP multicasting are described in section 2.7 of <xref target="RFC4291"/> and <xref target="RFC7371"/>.</t>

</section>
<section anchor="level-1-support-for-sending-but-not-receiving-multicast-ip-datagrams"><name>Level 1: support for sending but not receiving multicast IP datagrams.</name>

<t>Level 1 allows a host to partake of some multicast-based services,
such as resource location or status reporting, but it does not allow
a host to join any host groups.  An IP implementation may be upgraded
from level 0 to level 1 very easily and with little new code.  Only
sections 4, 5, and 6 of this memo are applicable to level 1
implementations.</t>

</section>
<section anchor="level2"><name>Level 2: full support for IP multicasting.</name>

<t>Level 2 allows a host to join and leave host groups, as well as send
IP datagrams to host groups.  Most IPv6 hosts require Level 2 support
because IPv6 Neighbor Discovery (<xref target="RFC4861"/>, as used on most link types, see <xref target="RFC8504"/>, section 5.4),
depends on multicast and requires that nodes join Solicited Node multicast addresses.</t>

<t>Level 2 requires implementation of the host side of the Internet Group Management Protocol (IGMP)
for IPv4 and the equivalent host side of the Multicast Listener Discovery Protocol (MLD) for IPv6 
and extension of the IP and local network service interfaces within the host as specified or 
referred to in the following sections.</t>

<t>The current protocol versions for full Level 2 support of IP multicasting are
<xref target="IGMPv3"/> and <xref target="MLDv2"/> or lightweight versions of either protocol <xref target="RFC5790"/>.</t>

<t>All of the following sections of this memo are applicable to level 2
implementations.</t>

</section>
<section anchor="level-2l-support-for-only-link-local-ip-multicasting"><name>Level 2L: support for only link local IP multicasting.</name>

<t>Level 2L has the same functionality as Level 2 except that it does not include
the implementation of IGMP for IPv4 or MLD for IPv6. Level 2L hosts can only
send/receive IP multicast to their local network.</t>

<t>Level 2L hosts <bcp14>SHOULD</bcp14> only join/leave Link-Local host groups (see <xref target="host-groups"/>) and
send IP datagrams to Link-Local host groups - but not other host groups.</t>

</section>
</section>
<section anchor="host-groups"><name>HOST GROUP ADDRESSES</name>

<t>IPv4 Host groups are identified by class D IPv4 addresses, i.e., those with
"1110" as their high-order four bits.  Class E IPv4 addresses, i.e.,
those with "1111" as their high-order four bits, are reserved for
future addressing modes.</t>

<t>In Internet standard "dotted decimal" notation, IPv4 host group addresses
range from 224.0.0.0 to 239.255.255.255.  IPv4 host group addresses in the
"Local Network Control Block", 224.0.0.0 - 224.0.0.255 are
called Link-Local IPv4 host group addresses. IP datagrams with a Link-Local destination address
are called Link-Local multicast packets. The IPv4 link local address 224.0.0.0 is
guaranteed not to be assigned to any group, and 224.0.0.1 is assigned
to the permanent group of all IPv4 hosts (including gateways). It is called
the all-nodes group. This is used to address all IP multicast hosts (including gateways)
on the directly connected network.  There is no multicast address (or any other IP address) for
all hosts on the total Internet.</t>

<t>The addresses of well-known, permanent IPv4 multicast groups are to be published in
"Assigned Numbers", see <xref target="RFC3232"/>, currently through the IANA
"IPv4 Multicast Address Space Registry" <xref target="IANA.MASR"/>. <xref target="RFC5771"/> and <xref target="RFC6034"/> refine
more detailed allocation and uses of different sub-blocks of 224.0.0.0/4.</t>

<t>Allocation guidelines for Link-Local IPv6 multicast group addresses are specified in <xref target="RFC5771"/>.
The IPv6 Link-Local all-nodes group address is ff02::1.
IPv6 Host groups are identified by IPv6 addresses as defined in <xref target="RFC4291"/> section 2.7
and updated by <xref target="RFC7346"/>, <xref target="RFC7371"/>. The addresses of other groups
are currently published via the IANA "IPv6 Multicast Address Space Registry".</t>

<t>IP addresses as specified in <xref target="SSM"/> are not used for ASM IP multicast and
are not considered host groups by <xref target="SSM"/>, Terminology section, third paragraph.
They are instead only the destination address part G of Source Specific Multicast (SSM)
IP multicast (S,G) channels. The term IP multicast address covers both ASM host group addresses
and SSM destination addresses.</t>

<t>Appendix I contains some background discussion of several issues
related to host group addresses.</t>

</section>
<section anchor="interface"><name>MODEL OF A HOST IP IMPLEMENTATION</name>

<t>The multicast extensions to a host IP implementation are specified in
terms of the layered model illustrated below in <xref target="FIG1"/>.  In this model, ICMP/ICMPv6
and (for level 2 hosts) IGMP/MLD are considered to be implemented within
the IP module, and the mapping of IP addresses to local network
addresses is considered to be the responsibility of local network
modules.  This model is for expository purposes only, and should not
be construed as constraining an actual implementation.</t>

<figure title="multicast extensions to a host IP implementation" anchor="FIG1"><artwork><![CDATA[
   |                                                          |
   |              Upper-Layer Protocol Modules                |
   |__________________________________________________________|

--------------------- IP Service Interface -----------------------
    __________________________________________________________
   |                            |              |              |
   |                            | IPv4:        | IPv6:        |
   |                            | ICMP+IGMP    | ICMPv6+MLD   |
   |    IP [IPv4 and/or IPv6]   |______________|______________|
   |           Module(s)                                      |
   |                                                          |
   |__________________________________________________________|

---------------- Local Network Service Interface -----------------
    __________________________________________________________
   |                            |                             |
   |           Local            | IP-to-local address mapping |
   |          Network           |         (e.g., ARP/ND)      |
   |          Modules           |_____________________________|
   |      (e.g., Ethernet)                                    |
   |                                                          |
]]></artwork></figure>

<t>Note that as described in <xref target="level2"/>, ND (<xref target="RFC4861"/>) itself operates
on top of the IPv6 Service Interface as extended by this document because
it relies on sending/receiving IPv6 multicast packets. However, it is
shown as part of the Local Network Module because that is the component
in this host stack model that relies on ND to perform its operation.</t>

<t>To provide level 1 multicasting, a host IP implementation <bcp14>MUST</bcp14>
support the transmission of multicast IP datagrams.  To provide level
2 multicasting, a host <bcp14>MUST</bcp14> also support the reception of multicast
IP datagrams.  Each of these two new services is described in a
separate section, below.  For each service, extensions are specified
for the IP service interface, the IP module, the local network
service interface, and an Ethernet local network module.  Extensions
to local network modules other than Ethernet are mentioned briefly,
but are not specified in detail.</t>

</section>
<section anchor="sending"><name>SENDING MULTICAST IP DATAGRAMS</name>

<section anchor="extensions-to-the-ip-service-interface"><name>Extensions to the IP Service Interface</name>

<t>Multicast IP datagrams are sent using the same "Send IP" operation
used to send unicast IP datagrams; an upper-layer protocol module
merely specifies an IP host group address, rather than an individual
IP address, as the destination.  However, a number of extensions may
be necessary or desirable.</t>

<t>First, the service interface <bcp14>SHOULD</bcp14> provide a way for the upper-layer
protocol to specify the IPv4 time-to-live or IPv6 hop limit of an outgoing multicast
datagram, if such a capability does not already exist.  If the
upper-layer protocol chooses not to specify a time-to-live/hop limit, it <bcp14>SHOULD</bcp14>
default to 1 for all multicast IP datagrams, so that an explicit
choice is required to multicast beyond a single network.</t>

<t>Second, for hosts that may be attached to more than one network, the
service interface <bcp14>SHOULD</bcp14> provide a way for the upper-layer protocol
to identify which network interface is to be used for the multicast
transmission.  Only one interface is used for the initial
transmission; multicast routers are responsible for forwarding to any
other networks, if necessary.  If the upper-layer protocol chooses
not to identify an outgoing interface, a default interface <bcp14>SHOULD</bcp14> be
used, preferably under the control of system management.</t>

<t>Third (level 2/2L implementations only), for the case in which the host
is itself a member of a group to which a datagram is being sent, the
service interface <bcp14>SHOULD</bcp14> provide a way for the upper-layer protocol
to inhibit local delivery of the datagram; by default, a copy of the
datagram is looped back.  This is a performance optimization for
upper-layer protocols that restrict the membership of a group to one
process per host (such as a routing protocol), or that handle
loopback of group communication at a higher layer (such as a
multicast transport protocol).</t>

<t>IPv6 socket extensions supporting these functions are defined in <xref target="RFC3493"/>, section 5.2.</t>

</section>
<section anchor="send-extensions"><name>Extensions to the IP Module</name>

<t>To support the sending of multicast IP datagrams, the IP module <bcp14>MUST</bcp14>
be extended to recognize IP host group addresses when routing
outgoing datagrams.  Most IP implementations include the following
logic:</t>

<figure><artwork><![CDATA[
    if IP-destination is on the same local network,
       send datagram locally to IP-destination
    else
       send datagram locally to GatewayTo( IP-destination )
]]></artwork></figure>

<t>To allow multicast transmissions, the routing logic <bcp14>MUST</bcp14> be changed to:</t>

<figure><artwork><![CDATA[
    if IP-destination is on the same local network
    or IP-destination is a host group,
       send datagram locally to IP-destination
    else
       send datagram locally to GatewayTo( IP-destination )
]]></artwork></figure>

<t>If the sending host is itself a member of the destination group on
the outgoing interface, a copy of the outgoing datagram <bcp14>MUST</bcp14> be
looped-back for local delivery, unless inhibited by the sender.
(Level 2/2L implementations only.)</t>

<t>The IP source address of the outgoing datagram <bcp14>MUST</bcp14> be one of the
individual addresses corresponding to the outgoing interface.</t>

<t>An IP multicast address <bcp14>MUST</bcp14> never be placed in the source address field 
or anywhere in a source route or record route option of an outgoing
IP datagram. These packets are not IP multicast packets but simply
invalid packets.</t>

</section>
<section anchor="extensions-to-the-local-network-service-interface"><name>Extensions to the Local Network Service Interface</name>

<t>No change to the local network service interface is required to
support the sending of multicast IP datagrams.  The IP module merely
specifies an IP host group destination, rather than an individual IP
destination, when it invokes the existing "Send Local" operation.</t>

</section>
<section anchor="ethernet"><name>Extensions to an Ethernet Local Network Module</name>

<t>The Ethernet directly supports the sending of local multicast packets
by allowing multicast addresses in the destination field of Ethernet
packets.  All that is needed to support the sending of multicast IP
datagrams is a procedure for mapping IP host group addresses to
Ethernet multicast addresses.</t>

<t>An IPv4 host group address is mapped to an Ethernet multicast address
by placing the low-order 23-bits of the IPv4 address into the low-order
23 bits of the Ethernet multicast address 01-00-5E-00-00-00 (hex).
Because there are 28 significant bits in an IPv4 host group address,
more than one host group address may map to the same Ethernet
multicast address.</t>

<t>These address mappings for IP addresses do apply not only to
host group addresses, but also to IP multicast addresses which are SSM
destination addresses.</t>

<t>Mapping of IPv6 multicast addresses (both host group addresses and SSM
destination addresses) to Ethernet addresses is defined in
<xref target="RFC2464"/> and <xref target="RFC6085"/>. Note that <xref target="RFC9542"/> establishes an
"IANA OUI Ethernet Numbers" registry covering the IPv4 and IPv6 multicast
MAC address ranges.</t>

</section>
<section anchor="extensions-to-local-network-modules-other-than-ethernet"><name>Extensions to Local Network Modules other than Ethernet</name>

<t>Other networks that directly support multicasting, such as rings or
buses conforming to the IEEE 802.2 standard, may be handled the same
way as Ethernet for the purpose of sending multicast IP datagrams.
For a network that supports broadcast but not multicast, such as the
Experimental Ethernet, all IP host group addresses may be mapped to a
single local broadcast address (at the cost of increased overhead on
all local hosts).  For a point-to-point link joining two hosts (or a
host and a multicast router), multicasts <bcp14>SHOULD</bcp14> be transmitted
exactly like unicasts.  For a store-and-forward network like the
ARPANET or a public X.25 network, all IP host group addresses might
be mapped to the well-known local address of an IP multicast router;
a router on such a network would take responsibility for completing
multicast delivery within the network as well as among networks.</t>

</section>
</section>
<section anchor="receiving-multicast-ip-datagrams"><name>RECEIVING MULTICAST IP DATAGRAMS</name>

<section anchor="service"><name>Extensions to the IP Service Interface</name>

<t>Incoming multicast IP datagrams are received by upper-layer protocol
modules using the same "Receive IP" operation as normal, unicast
datagrams.  Selection of a destination upper-layer protocol is based
on the protocol field in the IPv4 header or the next header field in the
IPv6 header or IPv6 extension header preceeding the upper-layer protocol header
(when IPv6 extension headers are used).  This is regardless of the destination
IP address.  However, before any datagrams destined to a particular
group can be received, an upper-layer protocol must ask the IP module
to join that group.  Thus, the IP service interface <bcp14>MUST</bcp14> be extended
to provide two new operations:</t>

<figure><artwork><![CDATA[
    JoinHostGroup  ( group-address, interface )
    
    LeaveHostGroup ( group-address, interface )
]]></artwork></figure>

<t>The JoinHostGroup operation requests that this host become a member
of the host group identified by "group-address" on the given network
interface.  The LeaveGroup operation requests that this host give up
its membership in the host group identified by "group-address" on the
given network interface.  The interface argument may be omitted on
hosts that support only one interface.  For hosts that may be
attached to more than one network, the upper-layer protocol may
choose to leave the interface unspecified, in which case the request
will apply to the default interface for sending multicast datagrams
(see section 6.1).</t>

<t>It is permissible to join the same group on more than one interface,
in which case duplicate multicast datagrams may be received.  It is
also permissible for more than one upper-layer protocol to request
membership in the same group.</t>

<t>Both operations <bcp14>SHOULD</bcp14> return immediately (i.e., they are non-
blocking operations), indicating success or failure.  Either
operation may fail due to an invalid group address or interface
identifier.  JoinHostGroup may fail due to lack of local resources.
LeaveHostGroup may fail because the host does not belong to the given
group on the given interface.  LeaveHostGroup may succeed, but the
membership persist, if more than one upper-layer protocol has
requested membership in the same group.</t>

<t>IPv6 socket extensions supporting these functions are defined in
<xref target="RFC3493"/>, section 5.2.  <xref target="RFC3678"/> specifies socket options for
these functions for ASM and also includes socket options in support of SSM.
See also <xref target="security-considerations"/>.</t>

</section>
<section anchor="rcv-extensions"><name>Extensions to the IP Module</name>

<t>To support the reception of multicast IP datagrams, the IP module
<bcp14>MUST</bcp14> be extended to maintain a list of host group memberships
associated with each network interface.  An incoming datagram
destined to one of those groups is processed exactly the same way as
datagrams destined to one of the host's individual addresses.</t>

<t>Incoming datagrams destined to groups to which the host does not
belong are discarded without generating any error report or log
entry.  On hosts with more than one network interface, if a datagram
arrives via one interface, destined for a group to which the host
belongs only on a different interface, the datagram <bcp14>MUST</bcp14> be quietly
discarded.  (These cases should occur only as a result of inadequate
multicast address filtering in a local network module.)</t>

<t>An incoming datagram is not rejected for having an IPv4 time-to-live of
1 or IPv6 Hop Limit of 1. This field  <bcp14>MUST</bcp14> not automatically be decremented on
arriving datagrams that are not being forwarded.  An incoming
datagram with an IP multicast address in its source address field is
quietly discarded.  An ICMP/ICMPv6 error message (Destination Unreachable,
Time Exceeded, Parameter Problem, Source Quench, or Redirect) is
never generated in response to a datagram destined to an IP host
group or SSM range destination IP address.</t>

<t>The list of host group memberships is updated in response to
JoinHostGroup and LeaveHostGroup requests from upper-layer protocols.
Each membership should have an associated reference count or similar
mechanism to handle multiple requests to join and leave the same
group.  On the first request to join and the last request to leave a
group on a given interface, the local network module for that
interface is notified, so that it may update its multicast reception
filter (see section 7.3).</t>

<t>When supporting Level 2, the IP module <bcp14>MUST</bcp14> also be extended to implement the 
IGMP protocol for IPv4 and the MLD protocol for IPv6 depending on the version(s)
of IP to be supported.  IGMP/MLD are used to keep neighboring multicast
routers informed of the host group memberships present on a
particular local network.</t>

<t>Level 2 hosts and gateways <bcp14>MAY</bcp14> omit the sending of IGMP messages to report membership
for Link-Local IPv4 host group addresses, especially on networks known not to (be
able to) use any form of IGMP snooping. This does also apply for the IPv6 Link-Local
all-nodes group ff02::1, but not to other Link-Local IPv6 host group addresses.
See <xref target="level2l"/> and <xref target="ll-apdx"/>.</t>

<t>Level 2/2L hosts and gateways <bcp14>SHOULD</bcp14> permanently join to the Link-Local all-nodes group
for the version of IP they implement. See <xref target="special"/>.</t>

</section>
<section anchor="extensions-to-the-local-network-service-interface-1"><name>Extensions to the Local Network Service Interface</name>

<t>Incoming local network multicast packets are delivered to the IP
module using the same "Receive Local" operation as local network
unicast packets.  To allow the IP module to tell the local network
module which multicast packets to accept, the local network service
interface is extended to provide two new operations:</t>

<figure><artwork><![CDATA[
    JoinLocalGroup  ( group-address )
    
    LeaveLocalGroup ( group-address )
]]></artwork></figure>

<t>where "group-address" is an IP host group address.  The
JoinLocalGroup operation requests the local network module to accept
and deliver up subsequently arriving packets destined to the given IP
host group address.  The LeaveLocalGroup operation requests the local
network module to stop delivering up packets destined to the given IP
host group address.  The local network module is expected to map the
IP host group addresses to local network addresses as required to
update its multicast reception filter.  Any local network module is
free to ignore LeaveLocalGroup requests, and may deliver up packets
destined to more addresses than just those specified in
JoinLocalGroup requests, if it is unable to filter incoming packets
adequately.</t>

<t>The local network module <bcp14>MUST NOT</bcp14> deliver up any multicast packets
that were transmitted from that module; loopback of multicasts is
handled at the IP layer or higher.</t>

</section>
<section anchor="extensions-to-an-ethernet-local-network-module"><name>Extensions to an Ethernet Local Network Module</name>

<t>To support the reception of multicast IP datagrams, an Ethernet
module <bcp14>MUST</bcp14> be able to receive packets addressed to the Ethernet
multicast addresses that correspond to the host's IP multicast
addresses (host group addresses or SSM destination addresses).
It is highly desirable to take advantage of any address
filtering capabilities that the Ethernet hardware interface may have,
so that the host receives only those packets that are destined to it.</t>

<t>Unfortunately, many current Ethernet interfaces have a small limit on
the number of addresses that the hardware can be configured to
recognize.  Nevertheless, an implementation <bcp14>MUST</bcp14> be capable of
listening on an arbitrary number of Ethernet multicast addresses,
which may mean "opening up" the address filter to accept all
multicast packets during those periods when the number of addresses
exceeds the limit of the filter.</t>

<t>For interfaces with inadequate hardware address filtering, it may be
desirable (for performance reasons) to perform Ethernet address
filtering within the software of the Ethernet module.  This is not
mandatory, however, because the IP module performs its own filtering
based on IP destination addresses.</t>

</section>
<section anchor="extensions-to-local-network-modules-other-than-ethernet-1"><name>Extensions to Local Network Modules other than Ethernet</name>

<t>Other multicast networks, such as IEEE 802.2 networks, can be handled
the same way as Ethernet for the purpose of receiving multicast IP
datagrams.  For pure broadcast networks, such as the Experimental
Ethernet, all incoming broadcast packets can be accepted and passed
to the IP module for IP-level filtering.  On point-to-point or
store-and-forward networks, multicast IP datagrams will arrive as
local network unicasts, so no change to the local network module
should be necessary.</t>

</section>
</section>
<section anchor="lncb"><name>ROUTING MULTICAST IP DATAGRAMS</name>

<t>IP multicast routers are recommended to support the IP host stack extensions
as specified in this document especially to support applications using the
IP Service Interface <xref target="interface"/> to send/receive IP multicast packets
including those commonly required for IPv6 (<xref target="RFC4861"/>).</t>

<t>Given how IP multicast routers behavior and their behavior for 
IGMP/MLD differs from non IP multicast routers, Local Network Module layer
and IGMP/MLD protocol requirements <bcp14>MAY</bcp14> be optimized/changed from what is required
by this document. See <xref target="mcrouters"/> for more details/examples.</t>

<t>IPv4 datagrams with a Link-Local destination address <bcp14>MUST</bcp14> never be forwarded to
a different link by multicast routers, regardless of their time-to-live. See <xref target="lncb-exp"/>
for explanations.</t>

<t>The equivalent requirement are specified for IPv6 in <xref target="RFC4291"/>, section 2.5.6.</t>

<t>Rules for forwarding of non Link-Local IP multicast packets are outside the
scope of this document.</t>

</section>
<section anchor="normative"><name>Status changes</name>

<section anchor="moving-rfc1112-and-igmpv1-to-historic-status"><name>Moving RFC1112 and IGMPv1 to historic status</name>

<t>This document moves <xref target="RFC1112"/> to historic status which also moves the IGMP version
1 protocol as specified in Appendix 1 of <xref target="RFC1112"/> to historic status, as
it is not included into this document anymore.</t>

<t>All other aspects of <xref target="RFC1112"/> beside IGMPv1 are kept and updated by this document
and maintain their current Internet Standard designation from <xref target="RFC1112"/> through the
normative status of this document.</t>

</section>
<section anchor="backward-compatibility-with-igmpv1"><name>Backward compatibility with IGMPv1</name>

<t>Current versions of IGMP (<xref target="IGMPv2"/>, <xref target="IGMPv3"/>) and other protocols/mechanisms
including, but not limited to <xref target="RFC5790"/> or <xref target="IGMPsnooping"/> do include backward compatibility
with IGMPv1.  This requires them to refer to <xref target="RFC1112"/> as the specification for IGMPv1. 
Backward compatibility is when a specification also includes support for any newer
version of IGMP starting with <xref target="IGMPv2"/> and prefers it over IGMPv1.</t>

<t>This document does not ask for any change to any current or future specifications or
implementations that includes any form of support for IGMPv1 for backward compatibility
reasons.</t>

<t>Any new or updated specification that wants to maintain such backward compatibility with
IGMPv1 need to continue to reference <xref target="RFC1112"/> as the specification of IGMPv1.</t>

<t>Any future reference for new or updated work to any other definition from <xref target="RFC1112"/>
(host extensions for IP multicast and/or Any Source Multicast service) needs to refer
to this document instead of <xref target="RFC1112"/>.</t>

</section>
<section anchor="update"><name>Update to RFC 791</name>

<t>This document is an update to <xref target="RFC791"/> because none of the core procedures to send
and receive IP multicast packets described in this document match those defined for
IP unicast packets in <xref target="RFC791"/>. Instead, IP multicast is carving out parts of the IP address space
to trigger completely new forwarding for completely new entities: host groups in ASM, channels in SSM).
See <xref target="rfc791"/> for further discussions.</t>

</section>
<section anchor="update1122"><name>Update to RFC 1122</name>

<t>This document updates <xref target="RFC1122"/> section 3.2.3 by making support for Level 2 conformance
and hence support for IGMP recommended instead of optional as required by <xref target="RFC1122"/>. See <xref target="conformance"/>.</t>

</section>
<section anchor="update-to-std-5"><name>Update to STD 5</name>

<t>This document replaces <xref target="RFC1112"/> in <xref target="STD5"/> which defines IPv4 (<xref target="RFC791"/>) including its core extensions.</t>

<t>Note: As there is no precedent for STD86 (IPv6) to include any specifications for extension of IPv6,
this document is not asked to become part of STD86.</t>

</section>
</section>
<section anchor="changes"><name>Changes from RFC1112</name>

<t>Beyond the status changes described in <xref target="normative"/>, this document introduces
the following changes over <xref target="RFC1112"/>.</t>

<t>All requirements changes are intended to make
this specification aligned with long-term, most widely implemented, deployed and
standardised RFCs for IP multicast, so that this document does not create the need to
change existing implementations or deployments, as could be the case if <xref target="RFC1112"/> (without IGMPv1)
was to be implemented today.</t>

<section anchor="normative-language"><name>Normative language</name>

<t>This document introduces the use of normative language through capitalization. <xref target="RFC1112"/>
preceded <xref target="RFC2119"/> and hence did not include this language.</t>

</section>
<section anchor="references-to-igmpv1"><name>References to IGMPv1</name>

<t>References to IGMPv1 in <xref target="RFC1112"/> are replaced with references to <xref target="IGMPv3"/> in this text.</t>

</section>
<section anchor="new-summary"><name>New summary</name>

<t>The new <xref target="summary"/> summarizes the scope of this document and the core new
changes over <xref target="RFC1112"/>.</t>

</section>
<section anchor="any-source-multicast-asm"><name>Any-Source Multicast (ASM)</name>

<t>This update introduces the term "ASM IP multicast" (ASM) as a new term for
the IP service interface specified in this document (and previously
in <xref target="RFC1112"/>) as explained in <xref target="summary"/>.</t>

</section>
<section anchor="ssm"><name>SSM</name>

<t><xref target="summary"/> explains the relationship of this document to SSM (<xref target="SSM"/>).</t>

<t><xref target="host-groups"/> adds the specification that the term host groups specified in this
document does not apply to destination addresses used for SSM. IP multicast
address applies to both host group address and SSM destination addresses.</t>

<t>No functional changes to the IP multicast service are incurred by these changes,
except that it acknowledges the existence of SSM which reduces the range
of host group addresses used for ASM.</t>

</section>
<section anchor="applicability-to-both-ipv4-and-ipv6"><name>Applicability to both IPv4 and IPv6</name>

<t>This document is written to apply to both IPv4 and IPv6 by adding 
detail for IPv6 where <xref target="RFC1112"/> only covered IPv4. This includes addressing and protocols
in support of the service - Multicast Listener Discovery <xref target="MLDv2"/> for IPv6 versus
IGMP for IPv4.</t>

<t>IPv6 documents such as <xref target="RFC1883"/> and all its updates (e.g.: <xref target="RFC8200"/>) are defining
the necessary wire encoding aspects of IP multicast in the assumption of the service of
<xref target="RFC1112"/> for IPv6, but without being able to refer to <xref target="RFC1112"/>, as it was only defined
for IPv4. Future documents can refer to this document as the IP multicast / ASM service for
both IPv4 and IPv6.</t>

<t>Additional text provides references for IETF UDP socket API specifications that instantiate
the abstract APIs defined in this document.</t>

<t>No functional changes to the IP multicast service are incurred by these changes.</t>

</section>
<section anchor="level2l"><name>RFC1122 and Level 2L</name>

<t><xref target="RFC1122"/> did not require support for IPv4 multicasting ("there is at this time no requirement
that all IP implementations support IP multicasting"). Instead, <xref target="RFC1122"/> recommends support
for IPv4 multicast (according to <xref target="RFC1112"/>), but support for IGMP to be optional,
specifying that sending/receiving IPv4 multicast from/to the local networks
works without IGMP and that that is the recommended form to support IPv4 multicasting. See
also <xref target="ll-apdx"/>.</t>

<t>Whereas <xref target="RFC1122"/> was not even specifying the combination of supporting sending/receiving
IPv4 multicast but not supporting IGMP, this document now adds that option by specifying it as
conformance Level 2L. Introduction of this text does also not change long-term deployment practices but
only formalizes them.</t>

</section>
<section anchor="rfc4291-and-level-2l"><name>RFC4291 and Level 2L</name>

<t>According to <xref target="RFC4291"/>, IPv6 nodes must support a variety of Link-Local IPv6 multicast
address. This translates into the requirement for IPv6 hosts to at least support Level 2L,
which is sufficient to support Link-Local IPv6 multicast. Choosing to support only Level 2L is
also the only option in which an IPv6 host or gateway will not need to send MLD messages for Link-Local
groups because the <xref target="MLDv2"/> specification (unlike IGMP) choose to mandate the sending of MLD
messages even for Link-Local host groups. See <xref target="ll-apdx"/> for more details.</t>

</section>
<section anchor="ip-multicast-support"><name>IP multicast support</name>

<t>With <xref target="IGMPv3"/> now being Internet Standard, there is sufficient experience to also make
support for conformance Level 2 of IPv4 multicasting recommended through this document. This is also
documented as an update to the IGMP support requirement in <xref target="RFC1122"/> from optional to
recommended. See <xref target="update1122"/>).</t>

<t>Unlike <xref target="RFC1122"/>, <xref target="RFC8504"/> does not directly raise a requirement against support for
MLD for every node supporting IPv6. Instead, it explains the dependencies against IPv6 multicast
and hence MLD for core IPv6 protocols used on most link types (ND, SLAAC).</t>

<t>With <xref target="MLDv2"/> now being Internet standard, and over two decades of experience with IPv6 multicast
availability and use on almost all IPv6 implementations, this documents now also recommends
support for Level 2 conformance for IPv6 multicast, see <xref target="conformance"/>. Note that this is not declared as
an update to <xref target="RFC8504"/>, because it is outside that BCP documents scope.</t>

</section>
<section anchor="lncb-exp"><name>IPv4 Local Network Control Block</name>

<t><xref target="RFC1112"/> defines the requirement for IPv4 datagrams to the all-nodes group
224.0.0.1 to never be forwarded beyond a single network.  In later RFCs, this behavior
became the BCP for the whole IPv4 Local Network Control Block 224.0.0.0 - 224.0.0.255,
making it the Link-Local host group address block for IPv4 multicast. <xref target="RFC2365"/>
and <xref target="RFC5771"/>, section 4 are the BCPs covering this requirement.</t>

<t>This document formalizes this BCP behavior as a standard requirement in <xref target="lncb"/>, superseding
and encompassing the more specific requirement for just 224.0.0.1 from <xref target="RFC1112"/>,
and mirroring the same standardized behavior for IPv6 link local addresses. Because
this is actually a requirement against IP multicast routers and not hosts, this is now also
accordingly described in a separate section.</t>

<t>This requirement does not incur changes over how IP multicast is implemented or deployed.</t>

</section>
<section anchor="special"><name>Permanent membership for Link-Local all-nodes groups</name>

<t><xref target="RFC1112"/>, section 7.2 introduced the requirements for hosts to permanently
join 224.0.0.1. Its explains this requirement to be in support of IGMP (version 1).</t>

<t><xref target="IGMPv2"/>, section 6. and <xref target="IGMPv3"/>, section 5. inherits this requirement,
and <xref target="MLDv1"/>, section 6. and <xref target="MLDv2"/> section 6. also define the same requirement
for the IPv6 Link-Local all-nodes address ff02::1.</t>

<t><xref target="RFC1112"/> explains this choice by being "(1) it is simpler", and
"(3) the all-nodes address may serve other routing-oriented purposes, such as advertising the
presence of gateways or resolving local addresses."</t>

<t>Technically, there is no necessity to permanently join the Link-Local all-nodes group.
Like any other group, reception of packets could enabled through the
JoinHostGroup()/LeaveHostGroup(), as described in <xref target="service"/>. However, all known host
implementations that support IP multicast since <xref target="RFC1112"/> are based on its definitions
and there is no obvious benefit in changing this. Hence this functionality
is a should requirement in this document.</t>

<t>Note that one simplification that this requirement enables is to avoid supporting
the JoinHostGroup()/LeaveHostGroup() API inside an operating system kernel, but still
allow kernel level protocols to receive packets to the Link-Local all-nodes group.
This is for example common in support of ICMP/ICMPv6 echo: "ping 224.0.0.1" to discover
IP hosts with IP multicast support on the local network. However, this functionality
is not enabled by default anymore in modern systems for security reasons
(e.g.: linux: net.ipv4.icmp_echo_ignore_broadcasts=1 default configuration).</t>

<t>The requirements text in this spec therefore does not incur any requirements changes for implementations
of these existing versions of IGMP/MLD. By making the requirement only a should, it is also
clear that future versions of IGMP/MLD or new host stack implementations may change this
if they find good reasons to do so - without requiring to update this specification.</t>

<t>Note that <xref target="RFC5790"/> omits this requirement.</t>

</section>
<section anchor="igmpmld-messages-for-link-local-ip-host-group-addresses"><name>IGMP/MLD messages for Link-Local IP host group addresses</name>

<t><xref target="RFC1112"/>, Appendix I. (IGMPv1), <xref target="IGMPv2"/>, <xref target="IGMPv3"/>, <xref target="MLDv1"/>, <xref target="MLDv2"/>
require hosts to not send IGMP/MLD messages for the all-nodes group. This would
be in conflict with the general rules of <xref target="RFC1112"/> (outside of its IGMPv1 specific
definitions) and equally this specification if it was not enhanced. This specification
therefore contains new text that makes it compatible with existing IGMP/MLD specifications,
and with long term established and deployed implementation practices.</t>

<t>New text in <xref target="ll-apdx"/> explains how after <xref target="RFC1112"/>, it became a common place
implementation choice to not send IGMP messages for any IPv4 Link-Local host group
address, and explains how this was done with good technical reason at the time. This
behavior is so common, that <xref target="IGMPsnooping"/> mandates to explicit support it in IGMP
snooping implementations.</t>

<t>Referring to that explanation, a new <bcp14>MAY</bcp14> requirement in <xref target="rcv-extensions"/> allowing
(but not recommending) this behavior makes existing specifications and deployments
compatible with this documents specifications. It is only a <bcp14>MAY</bcp14> even though it is common in
IPv4, because the experience with IPv6 shows that it does work (of course) equally
well if this is not done, and can then support better MLD snooping than IGMP snooping.</t>

</section>
<section anchor="standard-for-ip-multicasting-in-controlled-networks"><name>Standard for IP multicasting in controlled networks</name>

<t>This document removes the claim in the abstract of <xref target="RFC1112"/>, that these host extensions are
"... the recommended standard for IP multicasting in the Internet."</t>

<t>The reason for this is that <xref target="RFC8815"/> deprecated the ASM service
across the Internet because there is no Internet Standard solution
for protocols to support interdomain ASM except for <xref target="RFC3956"/>, which
is only applicable to IPv6, and even that solution does not resolve
the challenges to source access control in interdomain deployments.</t>

<t>In result, ASM is today "only" a recommended solution for controlled networks
including controlled federated networks for applications for which SSM is
not preferable.</t>

<t>However, these limitations to the applicability of ASM do not impact the applicability
of any parts of the host stack described in this document for other IP multicast service
interfaces, specifically "Source Specific Multicast", <xref target="SSM"/>, which inherits all aspects of
ASM specified in this document, especially the sending (<xref target="sending"/>, <xref target="send-extensions"/>)
of IP multicast packets as well as the mapping to ethernet (<xref target="ethernet"/>). It only amends the
joining of IP multicast traffic on IP multicast receivers with additional procedures fitting
into the host stack described in this document.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>In <xref target="RFC1112"/>, all IPv4 multicast addresses where designated to be used with ASM and
where thus host group addresses. In result, the term multicast and host group address
could be used interchangeably. With the introduction of SSM in <xref target="SSM"/>, subsets of
IP multicast addresses where carved out for use with SSM instead of ASM.
Since then, not every multicast address is a host group address, but every
host group address is still a multicast address.</t>

<t>In <xref target="SSM"/>, the equivalent to a host group is the SSM channel. It is addressed by the
packets (S,G) - the combination of the unicast source and multicast destination address.
Multicast addresses used for SSM by themselves are called SSM destination address or
SSM multicast address.</t>

<t>Terms like "SSM channel address" or "SSM multicast address" are ambiguous and should
be avoided: They could either refer to a specific (S,G) channel, in which case it
should be called an SSM channel (S,G) address pair, or it could refer to a multicast destination address G
used for SSM, which can be part of many different SSM (Si,G) channels, in which case it should be called an
SSM destination address.</t>

<t>Specifications whose behavior does not differ between ASM and SSM can continue to
refer to multicast addresses, implying the meaning of multicast to be the superset
of ASM and SSM. This is for example true for <xref target="RFC4291"/> and <xref target="RFC8200"/>.</t>

<t>New documents should explicitly indicate whether they apply to only ASM and/or SSM
even if their behavior applies to both ASM and SSM identically. Else it is left to
the reader to guess whether the text does also apply to SSM. If the term
multicast is used to indicate behavior that only applies to ASM, this should
equally be called out explicitly. Behavior applying only to ASM may use the
terms host group address or ASM multicast address.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="protocol-numbers-registry"><name>Protocol Numbers registry</name>

<t>IANA is asked to replace the Reference field for the IGMP protocol in the Protocol Numbers registry (https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml) from <xref target="RFC1112"/> to [THIS-RFC].</t>

<t>Explanation: This protocol number is used by all versions of IGMP, including <xref target="IGMPv2"/> and <xref target="IGMPv3"/> and is unaffected by making IGMP version 1 historic.</t>

</section>
<section anchor="internet-group-management-protocol-igmp-type-numbers-registry"><name>Internet Group Management Protocol (IGMP) Type Numbers Registry</name>

<t>IANA is asked to replace the Reference to <xref target="RFC1112"/> for the 0x11 / "IGMP Membership Query" entry in the "Internet Group Management Protocol (IGMP) Type Numbers Registry" (https://www.iana.org/assignments/igmp-type-numbers/igmp-type-numbers.xhtml) with "<xref target="RFC1112"/>, [RFC2236], [RFC3376]".</t>

<t>Explanation: These type code messages where introduced by <xref target="RFC1112"/> but modified versions thereof where also introduced by [RFC2236] and [RFC3376], so that it is clearer if all three RFCs are indicated. All other references to <xref target="RFC1112"/> in this registry are specifically referring to that RFC in its role of defining IGMP version 1 and thus need to continue to refer to <xref target="RFC1112"/> and not [THIS-RFC].</t>

</section>
<section anchor="multicast-48-bit-mac-addresses-registry"><name>Multicast 48-bit MAC Addresses registry</name>

<t>IANA is asked to replace the Reference field for the IPv4 Multicast range entry in the "IANA Multicast 48-bit MAC Addresses" (https://www.iana.org/assignments/ethernet-numbers) from <xref target="RFC1112"/> to [THIS-RFC].</t>

</section>
<section anchor="ipv4-address-range-registries"><name>IPv4 Address range registries</name>

<t>IANA is asked to replace the Reference field for the 240.0.0.0/4 entry in the "IANA IPv4 Special-Purpose Address Registry" (https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml) from <xref target="RFC1112"/> to [THIS-RFC]. The Section 4 text stays unchanged.</t>

<t>IANA is asked to replace the Reference to <xref target="RFC1112"/> in the "IANA IPv4 Address Space Registry" (https://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xhtml) with [THIS-RFC].</t>

</section>
<section anchor="ipv4-multicast-address-space-registry"><name>IPv4 Multicast Address Space registry</name>

<t>IANA is asked to replace the three references to <xref target="RFC1112"/> in the "IPv4 Multicast Address Space Registry" (https://www.iana.org/assignments/multicast-addresses/multicast-addresses.xhtml) with [THIS-RFC].</t>

</section>
<section anchor="ip-flow-information-export-registry"><name>IP Flow Information Export registry</name>

<t>IANA is asked to replace the two references to <xref target="RFC1112"/> in the "IPFIX Information Elements" registry (https://www.iana.org/assignments/ipfix/ipfix.xhtml) with [THIS-RFC].</t>

</section>
<section anchor="iana-oui-ethernet-numbers"><name>IANA OUI Ethernet Numbers</name>

<t>IANA is asked to replace the RFC1112 reference in the IPv4 Multicast entry of the "IANA Multicast 48-bit MAC Addresses" registry table with [THIS-RFC].</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This section may repeat a few core observations from elsewhere in the document to make
it easier for security interested readers to understand the context without having
to understand the whole document.</t>

<t>Application Socket Security Considerations are outside the scope of this
document yet important for secure operations of an IP multicast host stack.
They are hence covered in <xref target="per-socket"/>.</t>

<section anchor="forwarding"><name>Network forwarding issues</name>

<t>Security issues exists in an internetwork when sending IP multicast
packets or when joining IP multicast groups leads to internetwork state.  Nevertheless, those issues
are not caused by the ASM service model itself but are the result of specific choices
of forwarding of ASM traffic across routers.</t>

<t>For example, these issues do not exist if the internetwork is simply a stateless broadcast domain
such as a (non-switched) ethernet or wifi network, or if the network uses a stateless
forwarding model in routers such as Bit Index Explicit Replication (<xref target="BIER"/>). Therefore the remainder
of this section focusses on isues directly linked to the aspects specified in this document:
ASM service model, host stack and some relevant L2 network technologies.</t>

</section>
<section anchor="receiver-control"><name>Receiver control</name>

<t>Senders in ASM can not control who receives their traffic because any host
can join the group that the sender sends to. The larger address space of IPv6
multicast groups may make it harder for an IPv6  multicast address from being
successfully discovered by undesired receivers, but many IPv6 multicast addresses
are not random but well-defined. Encryption of ASM traffic and sharing of keys
with only desired receivers is another solution against this challenge. For example,
<xref target="GDOI"/> specifies a key management mechanism for secure sharing of symmetric group
communication keys for ASM (which could also be applied to SSM).</t>

<t>Some types of deployed IP multicast based application services such as
multicasting of high-value content do not consider such group encryption keys
as secure enough alone, especially when they are shared between a large number
of legitimate but not necessarily trustworthy receivers.
A single impaired receiver may be set up to extract
the shared key and pass it on to illegitimate receivers in real-time.</t>

<t>This has wideley happened in deployed solutions in the past with multicast/broadcast media content
transmitted via IP multicast. In these cases, additional, per receiver, per host group
authorization can be used to limit what IP multicast traffic is forwarded by the network to each host.</t>

<t>These receiver control options are often available in IP multicast implementations in network equipment
but are not IETF standardized. Likewise, hardware and/or software solutions on hosts to prohibit such
key extraction can be used. These are commonly called "Trusted Execution Environments" (TEE) and
solutions applying them to prohibit content leakage are called "Digital Rights Managmeent" (DRM).</t>

</section>
<section anchor="sender-control"><name>Sender control</name>

<t>Receivers in ASM can not control who is sending traffic to them.</t>

<t>Especially in IPv6 with its larger address space, random multicast group addresses
(see <xref target="receiver-control"/>) may help to limit undesired senders if all allowed senders
and receivers can be trusted not to leak the secret address, and the network towards
such legitimate senders and receivers can not easily be observed by attackers to determine
the secret random address.</t>

<t>If deployed, network filtering may aid in restricting unexpected or unauthorized traffic.</t>

<t>This sender control problem is the same in unicast except that the methods or
likelyhoods to keep destination host unicast addresses and ASM group addresses private
vary significantly. There is no analysis of ASM group
address privacy comparable to <xref target="RFC7721"/>.</t>

<t>The <xref target="SSM"/> service model
eliminates the sender control challenge by requiring receivers to explicitly indicate the desired
sender of the multicast traffic. Using an appropriate forwarding method across the network,
<xref target="SSM"/> is better than unicast in protecting against undesired traffic as it can often stop
unwanted SSM traffic from even entering the network, whereas in unicast undesired traffic can only be
discarded at the receiver. Note too, that an <xref target="SSM"/> host stack is an extension of
the host-stack specified in this document. It only enhances further what is specified here
but does not replace it.</t>

</section>
<section anchor="packet-spoofing"><name>Packet spoofing</name>

<t>Unless sender control is performed, packet spoofing may not even be necessary to perform
equivalent attacks as outlined in <xref target="sender-control"/>. The ease of spoofing a sender
IP source address and its layer 2 sender address (like sender MAC-address on ethernet)
highly depends on the (inter)network between sender and receiver.</t>

<t>In a simple broadcast domain without active switches between sender and receiver,
IP multicast packets are as easily spoofed as IP packets. If switches are introduced,
without <xref target="IGMPsnooping"/>, then IP multicast packets are equally easy to be spoofed
because they are still broadcast, whereas IP packets become more difficult to spoof
because attackers may not even see IP exchanges between a sender to spoof and its receivers,
nor may it know their IP addresses.</t>

<t>Introducing <xref target="IGMPsnooping"/> somewhat levels the playing field and makes spoofing IP multicast
packets more difficult, but as long as an attacker can be a valid receiver of IP multicast
packets from a sender it wants to spoof and can guess the IP multicast group(s), it can also
learn the source IP address and layer 2 address of the sender it wants to spoof by simply
joining to its IP multicast traffic.</t>

<t>[ Note: In internetworks, routers do typically perform RPF check for IP multicast packets
as part of stateful forwarding of IP multicast packets, but this varies by the IP multicast
routing / tree building protocol and is, as mentioned in <xref target="forwarding"/> out of scope. ]</t>

<t>Authentication of ASM/SSM traffic with mechanisms relying on symmetric group keys, such as <xref target="GDOI"/>,
can protect against many cases of spoofing, but it can not effectively prohibit sender spoofing by
any of the legitimate receivers which could potentially be millions. This is, because each legitimate
receiver knows the symmetric key required to become a sender. Asymmetric (public)
key cryptography resolves this issue but is significantly more compute expensive than 
symmetric key cryptography.  More advanced mechanisms tackling this issue, include TESLA <xref target="RFC4082"/>
and its followup documents in <xref target="MSEC"/> as well as <xref target="I-D.ietf-mboned-ambi"/>, <xref target="I-D.krose-mboned-alta"/>
and <xref target="I-D.moskowitz-tesla-update-gnss-sbas"/>.</t>

</section>
<section anchor="address-management"><name>Address management</name>

<t>Receiving IP multicast packets from undersired senders may not be malicious but can simply
be a result of absent or incorrect IP multicast group address management that needs to assign
unique group addresses to every application instance that needs them.  Static allocation of
IP multicast groups is the most widely used option in deployment today. Early proposals for
dynamic address allocation protocols, including <xref target="MASC"/> and <xref target="MADCAP"/> have not gained traction
and most options do not consider IPv6. See <xref target="RFC2908"/>, <xref target="RFC6308"/>.</t>

<section anchor="waste-traffic-in-the-absence-of-address-management"><name>Waste traffic in the absence of address management</name>

<t>While it is possible to forego address management and (randomnly) share IP multicast groups
across multiple application instances simply by de-multiplexing at higher layers such as UDP
ports and/or encryption layer selectors, relying solely on those higher layers for traffic separation is
highly undesirable.</t>

<t>Assume an IP multicast application on host H1 joins to IP Multicast group G with traffic on UDP port
P1. Other applications on other hosts are receivers for other IP Multicast applications that
all (randomnly) also use G, but each uses a separate UDP Port P2, ... PN. H1 will receive traffic
for all applications and discard the received packets in the UDP/socket layer because of their
UDP ports.</t>

<t>This "waste traffic" can result in overload of resources in H1 and possible unexpected discarding of packets
due to such overload. In switched networks with IGMP/MLD snooping and internetworks with IP multicast routers
it can even lead to overload of network path segments towards H1 and discarding of packets to other hosts
when traffic is admission controlled and this waste traffic is not taken into account.</t>

</section>
<section anchor="waste-traffic-due-to-layer-2-to-layer-3-mapping"><name>Waste traffic due to layer 2 to layer 3 mapping</name>

<t>Hosts may need to receive and discard IP multicast packets in their IP module (typically in software) for
host groups that they have not joined because of possible N:1 mapping issues
in the layer 2 mapping of IP multicast. As described in <xref target="ethernet"/>, in IPv4
224.x.y.z, 224.(x+128).y.z, ..., 239.x.y.z, 239.(x+128).y.z will map to the same
MAC address 01-00-5E-xx-yy-zz for x=0..127/xx=hex(x), y=0..255/yy=hex(y), z=0..255/zz=hex(z).
For IPv6 over ethernet, similar mapping issues exist.</t>

<t>An only slightly overstated example is a broadcast network where few high-speed hosts receive
a high bitrate IPv4 multicast video stream to address 239.128.0.251 and a very small,
low-end CPU alarm siren has to be discovered via <xref target="mDNS"/> on 239.0.0.251. Both addresses
map to Ethernet address 01-00-5E-00-00-FB. The software infrastructure (CPU, buffers) on the alarm siren
gets overloaded by the high-bitrate IP multicast video stream because those packets are not filtered
in the MAC hardware filter, and <xref target="mDNS"/> fails to discover the alarm siren when a fire
in the building is discovered by a fire sensor.</t>

<t>These issues are resolved by avoiding the use of multiple IP multicast group addresses that
map to the same ethernet MAC addresses. In practice, industry recommendations primarily
focus on avoiding the use of IP multicast group addresses that map to statically assigned
link-local IP multicast group addresses to avoid impacting key protocols such as <xref target="mDNS"/> in the example.</t>

</section>
<section anchor="unexpected"><name>Multiple application instances</name>

<t>If two or more instances of the same (or similar enough in packet format) applications that
do not well enough distinguish their instances through higher layer methods (transport layer
ports, security selectors, application layer identification of instance) are instantiated 
and (erroneously) re-use the same IP multicast group, then this will not only cause the
aforementioned waste traffic problems, that waste traffic can also leak into the application
where it causes malfunction or other application security issues.</t>

<t>An example of this issue are protocols like <xref target="OSPFv2"/> which do not have instance differentiation
in their packet format, so when supposedly separate instances of OSPF are incorrectly wired
together, routing problems occur.</t>

<t>In <xref target="OSPFv2"/>, the common solution against this issue is to rely on the
authentication option and simply distinguish instances through
separate passwords. This is a practical separation strategy,
providing an instance identification to protect against accidental
incorrect wiring.</t>

<t>Applications using well-known transport layer ports
are likewise easily subject to this issue.</t>

</section>
</section>
<section anchor="mac-filters"><name>MAC filters</name>

<t>Joining to ASM multicast groups uses ressources in the host. The challenges in managing
resource exhaustion and/or fair share across multiple applications are similar to those
for unicast sockets except that filtering of packet reception at layer 2 will typically
consume additional hardware limited filtering resources ("MAC filters").</t>

</section>
</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Many thanks to Stig Veenas for his thorough review (WG chair). Many thanks to Brian Haberman,
Dino Farinnacci, Alvaro Retana (RTG AD) and Jim Stevens, Pascal Thubert (INTDIR), Zheng Zhang (RTGDIR),
Erik Nordmark (IOTDIR). Special thanks to Rob Hinden.  Many thanks to Brian Weis (SECDIR), Kyle Rose
and Rob Moskowitz for multicast security input.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC791">
  <front>
    <title>Internet Protocol</title>
    <author fullname="J. Postel" initials="J." surname="Postel"/>
    <date month="September" year="1981"/>
  </front>
  <seriesInfo name="STD" value="5"/>
  <seriesInfo name="RFC" value="791"/>
  <seriesInfo name="DOI" value="10.17487/RFC0791"/>
</reference>

<reference anchor="RFC1122">
  <front>
    <title>Requirements for Internet Hosts - Communication Layers</title>
    <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
    <date month="October" year="1989"/>
    <abstract>
      <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="3"/>
  <seriesInfo name="RFC" value="1122"/>
  <seriesInfo name="DOI" value="10.17487/RFC1122"/>
</reference>

<referencegroup anchor="STD5" target="https://www.rfc-editor.org/info/std5">
  <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791">
    <front>
      <title>Internet Protocol</title>
      <author fullname="J. Postel" initials="J." surname="Postel"/>
      <date month="September" year="1981"/>
    </front>
    <seriesInfo name="STD" value="5"/>
    <seriesInfo name="RFC" value="791"/>
    <seriesInfo name="DOI" value="10.17487/RFC0791"/>
  </reference>
  <reference anchor="RFC0792" target="https://www.rfc-editor.org/info/rfc792">
    <front>
      <title>Internet Control Message Protocol</title>
      <author fullname="J. Postel" initials="J." surname="Postel"/>
      <date month="September" year="1981"/>
    </front>
    <seriesInfo name="STD" value="5"/>
    <seriesInfo name="RFC" value="792"/>
    <seriesInfo name="DOI" value="10.17487/RFC0792"/>
  </reference>
  <reference anchor="RFC0919" target="https://www.rfc-editor.org/info/rfc919">
    <front>
      <title>Broadcasting Internet Datagrams</title>
      <author fullname="J.C. Mogul" initials="J.C." surname="Mogul"/>
      <date month="October" year="1984"/>
      <abstract>
        <t>This RFC proposes simple rules for broadcasting Internet datagrams on local networks that support broadcast, for addressing broadcasts, and for how gateways should handle them. This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements.</t>
      </abstract>
    </front>
    <seriesInfo name="STD" value="5"/>
    <seriesInfo name="RFC" value="919"/>
    <seriesInfo name="DOI" value="10.17487/RFC0919"/>
  </reference>
  <reference anchor="RFC0922" target="https://www.rfc-editor.org/info/rfc922">
    <front>
      <title>Broadcasting Internet datagrams in the presence of subnets</title>
      <author fullname="J.C. Mogul" initials="J.C." surname="Mogul"/>
      <date month="October" year="1984"/>
      <abstract>
        <t>We propose simple rules for broadcasting Internet datagrams on local networks that support broadcast, for addressing broadcasts, and for how gateways should handle them. This RFC suggests a proposed protocol for the ARPA-Internet community, and requests discussion and suggestions for improvements.</t>
      </abstract>
    </front>
    <seriesInfo name="STD" value="5"/>
    <seriesInfo name="RFC" value="922"/>
    <seriesInfo name="DOI" value="10.17487/RFC0922"/>
  </reference>
  <reference anchor="RFC0950" target="https://www.rfc-editor.org/info/rfc950">
    <front>
      <title>Internet Standard Subnetting Procedure</title>
      <author fullname="J.C. Mogul" initials="J.C." surname="Mogul"/>
      <author fullname="J. Postel" initials="J." surname="Postel"/>
      <date month="August" year="1985"/>
      <abstract>
        <t>This memo discusses the utility of "subnets" of Internet networks, which are logically visible sub-sections of a single Internet network. For administrative or technical reasons, many organizations have chosen to divide one Internet network into several subnets, instead of acquiring a set of Internet network numbers. This memo specifies procedures for the use of subnets. These procedures are for hosts (e.g., workstations). The procedures used in and between subnet gateways are not fully described. Important motivation and background information for a subnetting standard is provided in RFC-940. This RFC specifies a protocol for the ARPA-Internet community. If subnetting is implemented it is strongly recommended that these procedures be followed.</t>
      </abstract>
    </front>
    <seriesInfo name="STD" value="5"/>
    <seriesInfo name="RFC" value="950"/>
    <seriesInfo name="DOI" value="10.17487/RFC0950"/>
  </reference>
  <reference anchor="RFC1112" target="https://www.rfc-editor.org/info/rfc1112">
    <front>
      <title>Host extensions for IP multicasting</title>
      <author fullname="S.E. Deering" initials="S.E." surname="Deering"/>
      <date month="August" year="1989"/>
      <abstract>
        <t>This memo specifies the extensions required of a host implementation of the Internet Protocol (IP) to support multicasting. Recommended procedure for IP multicasting in the Internet. This RFC obsoletes RFCs 998 and 1054. [STANDARDS-TRACK]</t>
      </abstract>
    </front>
    <seriesInfo name="STD" value="5"/>
    <seriesInfo name="RFC" value="1112"/>
    <seriesInfo name="DOI" value="10.17487/RFC1112"/>
  </reference>
</referencegroup>

<reference anchor="IGMPv2">
  <front>
    <title>Internet Group Management Protocol, Version 2</title>
    <author fullname="W. Fenner" initials="W." surname="Fenner"/>
    <date month="November" year="1997"/>
    <abstract>
      <t>This memo documents IGMPv2, used by IP hosts to report their multicast group memberships to routers. It updates STD 5, RFC 1112. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2236"/>
  <seriesInfo name="DOI" value="10.17487/RFC2236"/>
</reference>

<reference anchor="RFC2464">
  <front>
    <title>Transmission of IPv6 Packets over Ethernet Networks</title>
    <author fullname="M. Crawford" initials="M." surname="Crawford"/>
    <date month="December" year="1998"/>
    <abstract>
      <t>This document specifies the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on Ethernet networks. It also specifies the content of the Source/Target Link-layer Address option used in Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement and Redirect messages when those messages are transmitted on an Ethernet. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2464"/>
  <seriesInfo name="DOI" value="10.17487/RFC2464"/>
</reference>

<reference anchor="RFC4291">
  <front>
    <title>IP Version 6 Addressing Architecture</title>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <date month="February" year="2006"/>
    <abstract>
      <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
      <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4291"/>
  <seriesInfo name="DOI" value="10.17487/RFC4291"/>
</reference>

<reference anchor="SSM">
  <front>
    <title>Source-Specific Multicast for IP</title>
    <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
    <author fullname="B. Cain" initials="B." surname="Cain"/>
    <date month="August" year="2006"/>
    <abstract>
      <t>IP version 4 (IPv4) addresses in the 232/8 (232.0.0.0 to 232.255.255.255) range are designated as source-specific multicast (SSM) destination addresses and are reserved for use by source-specific applications and protocols. For IP version 6 (IPv6), the address prefix FF3x::/32 is reserved for source-specific multicast use. This document defines an extension to the Internet network service that applies to datagrams sent to SSM addresses and defines the host and router requirements to support this extension. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4607"/>
  <seriesInfo name="DOI" value="10.17487/RFC4607"/>
</reference>

<reference anchor="RFC8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="86"/>
  <seriesInfo name="RFC" value="8200"/>
  <seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>

<reference anchor="RFC8504">
  <front>
    <title>IPv6 Node Requirements</title>
    <author fullname="T. Chown" initials="T." surname="Chown"/>
    <author fullname="J. Loughney" initials="J." surname="Loughney"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="January" year="2019"/>
    <abstract>
      <t>This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.</t>
      <t>This document obsoletes RFC 6434, and in turn RFC 4294.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="220"/>
  <seriesInfo name="RFC" value="8504"/>
  <seriesInfo name="DOI" value="10.17487/RFC8504"/>
</reference>

<reference anchor="IGMPv3">
  <front>
    <title>Internet Group Management Protocol, Version 3</title>
    <author fullname="B. Haberman" initials="B." role="editor" surname="Haberman"/>
    <date month="March" year="2025"/>
    <abstract>
      <t>The Internet Group Management Protocol (IGMP) is the protocol used by IPv4 systems to report their IP multicast group memberships to neighboring multicast routers. Version 3 of IGMP (IGMPv3) adds support for source filtering, that is, the ability for a system to report interest in receiving packets only from specific source addresses, or from all but specific source addresses, sent to a particular multicast address. That information may be used by multicast routing protocols to avoid delivering multicast packets from specific sources to networks where there are no interested receivers.</t>
      <t>This document specifies IGMPv3. It is a revised version of RFC 3376 that includes clarifications and fixes for errata, and it is backward compatible with RFC 3376.</t>
      <t>This document updates RFC 2236 and obsoletes RFC 3376.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="100"/>
  <seriesInfo name="RFC" value="9776"/>
  <seriesInfo name="DOI" value="10.17487/RFC9776"/>
</reference>

<reference anchor="MLDv2">
  <front>
    <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
    <author fullname="B. Haberman" initials="B." role="editor" surname="Haberman"/>
    <date month="March" year="2025"/>
    <abstract>
      <t>This document specifies the Multicast Listener Discovery version 2 (MLDv2) protocol. MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses.</t>
      <t>This document updates RFC 2710 and obsoletes RFC 3810.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="101"/>
  <seriesInfo name="RFC" value="9777"/>
  <seriesInfo name="DOI" value="10.17487/RFC9777"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="UDP">
  <front>
    <title>Mail Transfer Protocol: ISI TOPS20 MTP-NIMAIL interface</title>
    <author fullname="S. Sluizer" initials="S." surname="Sluizer"/>
    <author fullname="J. Postel" initials="J." surname="Postel"/>
    <date month="July" year="1981"/>
  </front>
  <seriesInfo name="RFC" value="786"/>
  <seriesInfo name="DOI" value="10.17487/RFC0786"/>
</reference>

<reference anchor="RFC1045">
  <front>
    <title>VMTP: Versatile Message Transaction Protocol: Protocol specification</title>
    <author fullname="D.R. Cheriton" initials="D.R." surname="Cheriton"/>
    <date month="February" year="1988"/>
    <abstract>
      <t>This memo specifies the Versatile Message Transaction Protocol (VMTP) [Version 0.7 of 19-Feb-88], a transport protocol specifically designed to support the transaction model of communication, as exemplified by remote procedure call (RPC). The full function of VMTP, including support for security, real-time, asynchronous message exchanges, streaming, multicast and idempotency, provides a rich selection to the VMTP user level. Subsettability allows the VMTP module for particular clients and servers to be specialized and simplified to the services actually required. Examples of such simple clients and servers include PROM network bootload programs, network boot servers, data sensors and simple controllers, to mention but a few examples. This RFC describes a protocol proposed as a standard for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1045"/>
  <seriesInfo name="DOI" value="10.17487/RFC1045"/>
</reference>

<reference anchor="RIPv2">
  <front>
    <title>RIP Version 2 - Carrying Additional Information</title>
    <author fullname="G. Malkin" initials="G." surname="Malkin"/>
    <date month="November" year="1994"/>
    <abstract>
      <t>This document specifies an extension of the Routing Information Protocol (RIP), o expand the amount of useful information carried in RIP messages and to add a measure of security. This memo obsoletes RFC 1388, which specifies an update to the "Routing Information Protocol" STD 34, RFC 1058. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1723"/>
  <seriesInfo name="DOI" value="10.17487/RFC1723"/>
</reference>

<reference anchor="RFC1883">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="December" year="1995"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6), also sometimes referred to as IP Next Generation or IPng. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1883"/>
  <seriesInfo name="DOI" value="10.17487/RFC1883"/>
</reference>

<reference anchor="RFC1884">
  <front>
    <title>IP Version 6 Addressing Architecture</title>
    <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
    <author fullname="S. Deering" initials="S." role="editor" surname="Deering"/>
    <date month="December" year="1995"/>
    <abstract>
      <t>This specification defines the addressing architecture of the IP Version 6 protocol [IPV6]. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1884"/>
  <seriesInfo name="DOI" value="10.17487/RFC1884"/>
</reference>

<reference anchor="OSPFv2">
  <front>
    <title>OSPF Version 2</title>
    <author fullname="J. Moy" initials="J." surname="Moy"/>
    <date month="April" year="1998"/>
    <abstract>
      <t>This memo documents version 2 of the OSPF protocol. OSPF is a link- state routing protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="54"/>
  <seriesInfo name="RFC" value="2328"/>
  <seriesInfo name="DOI" value="10.17487/RFC2328"/>
</reference>

<reference anchor="RFC2365">
  <front>
    <title>Administratively Scoped IP Multicast</title>
    <author fullname="D. Meyer" initials="D." surname="Meyer"/>
    <date month="July" year="1998"/>
    <abstract>
      <t>This document defines the "administratively scoped IPv4 multicast space" to be the range 239.0.0.0 to 239.255.255.255. In addition, it describes a simple set of semantics for the implementation of Administratively Scoped IP Multicast. Finally, it provides a mapping between the IPv6 multicast address classes [RFC1884] and IPv4 multicast address classes. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="23"/>
  <seriesInfo name="RFC" value="2365"/>
  <seriesInfo name="DOI" value="10.17487/RFC2365"/>
</reference>

<reference anchor="MADCAP">
  <front>
    <title>Multicast Address Dynamic Client Allocation Protocol (MADCAP)</title>
    <author fullname="S. Hanna" initials="S." surname="Hanna"/>
    <author fullname="B. Patel" initials="B." surname="Patel"/>
    <author fullname="M. Shah" initials="M." surname="Shah"/>
    <date month="December" year="1999"/>
    <abstract>
      <t>This document defines a protocol, Multicast Address Dynamic Client Allocation Protocol (MADCAP), that allows hosts to request multicast addresses from multicast address allocation servers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2730"/>
  <seriesInfo name="DOI" value="10.17487/RFC2730"/>
</reference>

<reference anchor="MASC">
  <front>
    <title>The Multicast Address-Set Claim (MASC) Protocol</title>
    <author fullname="P. Radoslavov" initials="P." surname="Radoslavov"/>
    <author fullname="D. Estrin" initials="D." surname="Estrin"/>
    <author fullname="R. Govindan" initials="R." surname="Govindan"/>
    <author fullname="M. Handley" initials="M." surname="Handley"/>
    <author fullname="S. Kumar" initials="S." surname="Kumar"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <date month="September" year="2000"/>
    <abstract>
      <t>This document describes the Multicast Address-Set Claim (MASC) protocol which can be used for inter-domain multicast address set allocation. This memo defines an Experimental Protocol for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2909"/>
  <seriesInfo name="DOI" value="10.17487/RFC2909"/>
</reference>

<reference anchor="RFC2908">
  <front>
    <title>The Internet Multicast Address Allocation Architecture</title>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Handley" initials="M." surname="Handley"/>
    <author fullname="D. Estrin" initials="D." surname="Estrin"/>
    <date month="September" year="2000"/>
    <abstract>
      <t>This document proposes a multicast address allocation architecture (MALLOC) for the Internet. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2908"/>
  <seriesInfo name="DOI" value="10.17487/RFC2908"/>
</reference>

<reference anchor="MLDv1">
  <front>
    <title>Multicast Listener Discovery (MLD) for IPv6</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="W. Fenner" initials="W." surname="Fenner"/>
    <author fullname="B. Haberman" initials="B." surname="Haberman"/>
    <date month="October" year="1999"/>
    <abstract>
      <t>This document specifies the protocol used by an IPv6 router to discover the presence of multicast listeners (that is, nodes wishing to receive multicast packets) on its directly attached links, and to discover specifically which multicast addresses are of interest to those neighboring nodes. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2710"/>
  <seriesInfo name="DOI" value="10.17487/RFC2710"/>
</reference>

<reference anchor="RFC2974">
  <front>
    <title>Session Announcement Protocol</title>
    <author fullname="M. Handley" initials="M." surname="Handley"/>
    <author fullname="C. Perkins" initials="C." surname="Perkins"/>
    <author fullname="E. Whelan" initials="E." surname="Whelan"/>
    <date month="October" year="2000"/>
    <abstract>
      <t>This document describes version 2 of the multicast session directory announcement protocol, Session Announcement Protocol (SAP), and the related issues affecting security and scalability that should be taken into account by implementors. This memo defines an Experimental Protocol for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2974"/>
  <seriesInfo name="DOI" value="10.17487/RFC2974"/>
</reference>

<reference anchor="RFC3171">
  <front>
    <title>IANA Guidelines for IPv4 Multicast Address Assignments</title>
    <author fullname="Z. Albanna" initials="Z." surname="Albanna"/>
    <author fullname="K. Almeroth" initials="K." surname="Almeroth"/>
    <author fullname="D. Meyer" initials="D." surname="Meyer"/>
    <author fullname="M. Schipper" initials="M." surname="Schipper"/>
    <date month="August" year="2001"/>
    <abstract>
      <t>This memo provides guidance for the Internet Assigned Numbers Authority (IANA) in assigning IPv4 multicast addresses. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3171"/>
  <seriesInfo name="DOI" value="10.17487/RFC3171"/>
</reference>

<reference anchor="PGM">
  <front>
    <title>PGM Reliable Transport Protocol Specification</title>
    <author fullname="T. Speakman" initials="T." surname="Speakman"/>
    <author fullname="J. Crowcroft" initials="J." surname="Crowcroft"/>
    <author fullname="J. Gemmell" initials="J." surname="Gemmell"/>
    <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
    <author fullname="S. Lin" initials="S." surname="Lin"/>
    <author fullname="D. Leshchiner" initials="D." surname="Leshchiner"/>
    <author fullname="M. Luby" initials="M." surname="Luby"/>
    <author fullname="T. Montgomery" initials="T." surname="Montgomery"/>
    <author fullname="L. Rizzo" initials="L." surname="Rizzo"/>
    <author fullname="A. Tweedly" initials="A." surname="Tweedly"/>
    <author fullname="N. Bhaskar" initials="N." surname="Bhaskar"/>
    <author fullname="R. Edmonstone" initials="R." surname="Edmonstone"/>
    <author fullname="R. Sumanasekera" initials="R." surname="Sumanasekera"/>
    <author fullname="L. Vicisano" initials="L." surname="Vicisano"/>
    <date month="December" year="2001"/>
    <abstract>
      <t>Pragmatic General Multicast (PGM) is a reliable multicast transport protocol for applications that require ordered or unordered, duplicate- free, multicast data delivery from multiple sources to multiple receivers. PGM guarantees that a receiver in the group either receives all data packets from transmissions and repairs, or is able to detect unrecoverable data packet loss. PGM is specifically intended as a workable solution for multicast applications with basic reliability requirements. Its central design goal is simplicity of operation with due regard for scalability and network efficiency. This memo defines an Experimental Protocol for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3208"/>
  <seriesInfo name="DOI" value="10.17487/RFC3208"/>
</reference>

<reference anchor="RFC3232">
  <front>
    <title>Assigned Numbers: RFC 1700 is Replaced by an On-line Database</title>
    <author fullname="J. Reynolds" initials="J." role="editor" surname="Reynolds"/>
    <date month="January" year="2002"/>
    <abstract>
      <t>This memo obsoletes RFC 1700 (STD 2) "Assigned Numbers", which contained an October 1994 snapshot of assigned Internet protocol parameters. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3232"/>
  <seriesInfo name="DOI" value="10.17487/RFC3232"/>
</reference>

<reference anchor="RFC3376">
  <front>
    <title>Internet Group Management Protocol, Version 3</title>
    <author fullname="B. Cain" initials="B." surname="Cain"/>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="I. Kouvelas" initials="I." surname="Kouvelas"/>
    <author fullname="B. Fenner" initials="B." surname="Fenner"/>
    <author fullname="A. Thyagarajan" initials="A." surname="Thyagarajan"/>
    <date month="October" year="2002"/>
  </front>
  <seriesInfo name="RFC" value="3376"/>
  <seriesInfo name="DOI" value="10.17487/RFC3376"/>
</reference>

<reference anchor="RFC3493">
  <front>
    <title>Basic Socket Interface Extensions for IPv6</title>
    <author fullname="R. Gilligan" initials="R." surname="Gilligan"/>
    <author fullname="S. Thomson" initials="S." surname="Thomson"/>
    <author fullname="J. Bound" initials="J." surname="Bound"/>
    <author fullname="J. McCann" initials="J." surname="McCann"/>
    <author fullname="W. Stevens" initials="W." surname="Stevens"/>
    <date month="February" year="2003"/>
    <abstract>
      <t>The de facto standard Application Program Interface (API) for TCP/IP applications is the "sockets" interface. Although this API was developed for Unix in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP applications written using the sockets API have in the past enjoyed a high degree of portability and we would like the same portability with IPv6 applications. But changes are required to the sockets API to support IPv6 and this memo describes these changes. These include a new socket address structure to carry IPv6 addresses, new address conversion functions, and some new socket options. These extensions are designed to provide access to the basic IPv6 features required by TCP and UDP applications, including multicasting, while introducing a minimum of change into the system and providing complete compatibility for existing IPv4 applications. Additional extensions for advanced IPv6 features (raw sockets and access to the IPv6 extension headers) are defined in another document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3493"/>
  <seriesInfo name="DOI" value="10.17487/RFC3493"/>
</reference>

<reference anchor="RTP">
  <front>
    <title>RTP: A Transport Protocol for Real-Time Applications</title>
    <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
    <author fullname="S. Casner" initials="S." surname="Casner"/>
    <author fullname="R. Frederick" initials="R." surname="Frederick"/>
    <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
    <date month="July" year="2003"/>
    <abstract>
      <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="64"/>
  <seriesInfo name="RFC" value="3550"/>
  <seriesInfo name="DOI" value="10.17487/RFC3550"/>
</reference>

<reference anchor="RFC3678">
  <front>
    <title>Socket Interface Extensions for Multicast Source Filters</title>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="B. Fenner" initials="B." surname="Fenner"/>
    <author fullname="B. Quinn" initials="B." surname="Quinn"/>
    <date month="January" year="2004"/>
    <abstract>
      <t>The Internet Group Management Protocol (IGMPv3) for IPv4 and the Multicast Listener Discovery (MLDv2) for IPv6 add the capability for applications to express source filters on multicast group memberships, which allows receiver applications to determine the set of senders (sources) from which to accept multicast traffic. This capability also simplifies support of one-to-many type multicast applications. This document specifies new socket options and functions to manage source filters for IP Multicast group memberships. It also defines the socket structures to provide input and output arguments to these new application program interfaces (APIs). These extensions are designed to provide access to the source filtering features, while introducing a minimum of change into the system and providing complete compatibility for existing multicast applications.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3678"/>
  <seriesInfo name="DOI" value="10.17487/RFC3678"/>
</reference>

<reference anchor="RFC3810">
  <front>
    <title>Multicast Listener Discovery Version 2 (MLDv2) for IPv6</title>
    <author fullname="R. Vida" initials="R." role="editor" surname="Vida"/>
    <author fullname="L. Costa" initials="L." role="editor" surname="Costa"/>
    <date month="June" year="2004"/>
    <abstract>
      <t>This document updates RFC 2710, and it specifies Version 2 of the ulticast Listener Discovery Protocol (MLDv2). MLD is used by an IPv6 router to discover the presence of multicast listeners on directly attached links, and to discover which multicast addresses are of interest to those neighboring nodes. MLDv2 is designed to be interoperable with MLDv1. MLDv2 adds the ability for a node to report interest in listening to packets with a particular multicast address only from specific source addresses or from all sources except for specific source addresses. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3810"/>
  <seriesInfo name="DOI" value="10.17487/RFC3810"/>
</reference>

<reference anchor="RFC3956">
  <front>
    <title>Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address</title>
    <author fullname="P. Savola" initials="P." surname="Savola"/>
    <author fullname="B. Haberman" initials="B." surname="Haberman"/>
    <date month="November" year="2004"/>
    <abstract>
      <t>This memo defines an address allocation policy in which the address of the Rendezvous Point (RP) is encoded in an IPv6 multicast group address. For Protocol Independent Multicast - Sparse Mode (PIM-SM), this can be seen as a specification of a group-to-RP mapping mechanism. This allows an easy deployment of scalable inter-domain multicast and simplifies the intra-domain multicast configuration as well. This memo updates the addressing format presented in RFC 3306. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3956"/>
  <seriesInfo name="DOI" value="10.17487/RFC3956"/>
</reference>

<reference anchor="RFC4082">
  <front>
    <title>Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction</title>
    <author fullname="A. Perrig" initials="A." surname="Perrig"/>
    <author fullname="D. Song" initials="D." surname="Song"/>
    <author fullname="R. Canetti" initials="R." surname="Canetti"/>
    <author fullname="J. D. Tygar" initials="J. D." surname="Tygar"/>
    <author fullname="B. Briscoe" initials="B." surname="Briscoe"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>This document introduces Timed Efficient Stream Loss-tolerant Authentication (TESLA). TESLA allows all receivers to check the integrity and authenticate the source of each packet in multicast or broadcast data streams. TESLA requires no trust between receivers, uses low-cost operations per packet at both sender and receiver, can tolerate any level of loss without retransmissions, and requires no per-receiver state at the sender. TESLA can protect receivers against denial of service attacks in certain circumstances. Each receiver must be loosely time-synchronized with the source in order to verify messages, but otherwise receivers do not have to send any messages. TESLA alone cannot support non-repudiation of the data source to third parties.</t>
      <t>This informational document is intended to assist in writing standardizable and secure specifications for protocols based on TESLA in different contexts. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4082"/>
  <seriesInfo name="DOI" value="10.17487/RFC4082"/>
</reference>

<reference anchor="IGMPsnooping">
  <front>
    <title>Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping Switches</title>
    <author fullname="M. Christensen" initials="M." surname="Christensen"/>
    <author fullname="K. Kimball" initials="K." surname="Kimball"/>
    <author fullname="F. Solensky" initials="F." surname="Solensky"/>
    <date month="May" year="2006"/>
    <abstract>
      <t>This memo describes the recommendations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) snooping switches. These are based on best current practices for IGMPv2, with further considerations for IGMPv3- and MLDv2-snooping. Additional areas of relevance, such as link layer topology changes and Ethernet-specific encapsulation issues, are also considered. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4541"/>
  <seriesInfo name="DOI" value="10.17487/RFC4541"/>
</reference>

<reference anchor="RFC4861">
  <front>
    <title>Neighbor Discovery for IP version 6 (IPv6)</title>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <author fullname="H. Soliman" initials="H." surname="Soliman"/>
    <date month="September" year="2007"/>
    <abstract>
      <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4861"/>
  <seriesInfo name="DOI" value="10.17487/RFC4861"/>
</reference>

<reference anchor="RFC5771">
  <front>
    <title>IANA Guidelines for IPv4 Multicast Address Assignments</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
    <author fullname="D. Meyer" initials="D." surname="Meyer"/>
    <date month="March" year="2010"/>
    <abstract>
      <t>This document provides guidance for the Internet Assigned Numbers Authority (IANA) in assigning IPv4 multicast addresses. It obsoletes RFC 3171 and RFC 3138 and updates RFC 2780. This memo documents an Internet Best Current Practice.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="51"/>
  <seriesInfo name="RFC" value="5771"/>
  <seriesInfo name="DOI" value="10.17487/RFC5771"/>
</reference>

<reference anchor="RFC5790">
  <front>
    <title>Lightweight Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Version 2 (MLDv2) Protocols</title>
    <author fullname="H. Liu" initials="H." surname="Liu"/>
    <author fullname="W. Cao" initials="W." surname="Cao"/>
    <author fullname="H. Asaeda" initials="H." surname="Asaeda"/>
    <date month="February" year="2010"/>
    <abstract>
      <t>This document describes lightweight IGMPv3 and MLDv2 protocols (LW- IGMPv3 and LW-MLDv2), which simplify the standard (full) versions of IGMPv3 and MLDv2. The interoperability with the full versions and the previous versions of IGMP and MLD is also taken into account. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5790"/>
  <seriesInfo name="DOI" value="10.17487/RFC5790"/>
</reference>

<reference anchor="NTP">
  <front>
    <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
    <author fullname="D. Mills" initials="D." surname="Mills"/>
    <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
    <author fullname="J. Burbank" initials="J." surname="Burbank"/>
    <author fullname="W. Kasch" initials="W." surname="Kasch"/>
    <date month="June" year="2010"/>
    <abstract>
      <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5905"/>
  <seriesInfo name="DOI" value="10.17487/RFC5905"/>
</reference>

<reference anchor="RFC6034">
  <front>
    <title>Unicast-Prefix-Based IPv4 Multicast Addresses</title>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <date month="October" year="2010"/>
    <abstract>
      <t>This specification defines an extension to the multicast addressing architecture of the IP Version 4 protocol. The extension presented in this document allows for unicast-prefix-based assignment of multicast addresses. By delegating multicast addresses at the same time as unicast prefixes, network operators will be able to identify their multicast addresses without needing to run an inter-domain allocation protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6034"/>
  <seriesInfo name="DOI" value="10.17487/RFC6034"/>
</reference>

<reference anchor="RFC6085">
  <front>
    <title>Address Mapping of IPv6 Multicast Packets on Ethernet</title>
    <author fullname="S. Gundavelli" initials="S." surname="Gundavelli"/>
    <author fullname="M. Townsley" initials="M." surname="Townsley"/>
    <author fullname="O. Troan" initials="O." surname="Troan"/>
    <author fullname="W. Dec" initials="W." surname="Dec"/>
    <date month="January" year="2011"/>
    <abstract>
      <t>When transmitting an IPv6 packet with a multicast destination address, the IPv6 destination address is mapped to an Ethernet link-layer multicast address. This document clarifies that a mapping of an IPv6 packet with a multicast destination address may in some circumstances map to an Ethernet link-layer unicast address. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6085"/>
  <seriesInfo name="DOI" value="10.17487/RFC6085"/>
</reference>

<reference anchor="RFC6308">
  <front>
    <title>Overview of the Internet Multicast Addressing Architecture</title>
    <author fullname="P. Savola" initials="P." surname="Savola"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The lack of up-to-date documentation on IP multicast address allocation and assignment procedures has caused a great deal of confusion. To clarify the situation, this memo describes the allocation and assignment techniques and mechanisms currently (as of this writing) in use. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6308"/>
  <seriesInfo name="DOI" value="10.17487/RFC6308"/>
</reference>

<reference anchor="RPL">
  <front>
    <title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</title>
    <author fullname="T. Winter" initials="T." role="editor" surname="Winter"/>
    <author fullname="P. Thubert" initials="P." role="editor" surname="Thubert"/>
    <author fullname="A. Brandt" initials="A." surname="Brandt"/>
    <author fullname="J. Hui" initials="J." surname="Hui"/>
    <author fullname="R. Kelsey" initials="R." surname="Kelsey"/>
    <author fullname="P. Levis" initials="P." surname="Levis"/>
    <author fullname="K. Pister" initials="K." surname="Pister"/>
    <author fullname="R. Struik" initials="R." surname="Struik"/>
    <author fullname="JP. Vasseur" initials="JP." surname="Vasseur"/>
    <author fullname="R. Alexander" initials="R." surname="Alexander"/>
    <date month="March" year="2012"/>
    <abstract>
      <t>Low-Power and Lossy Networks (LLNs) are a class of network in which both the routers and their interconnect are constrained. LLN routers typically operate with constraints on processing power, memory, and energy (battery power). Their interconnects are characterized by high loss rates, low data rates, and instability. LLNs are comprised of anything from a few dozen to thousands of routers. Supported traffic flows include point-to-point (between devices inside the LLN), point-to-multipoint (from a central control point to a subset of devices inside the LLN), and multipoint-to-point (from devices inside the LLN towards a central control point). This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point-to-multipoint traffic from the central control point to the devices inside the LLN are supported. Support for point-to-point traffic is also available. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6550"/>
  <seriesInfo name="DOI" value="10.17487/RFC6550"/>
</reference>

<reference anchor="mDNS">
  <front>
    <title>DNS-Based Service Discovery</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6763"/>
  <seriesInfo name="DOI" value="10.17487/RFC6763"/>
</reference>

<reference anchor="RFC7346">
  <front>
    <title>IPv6 Multicast Address Scopes</title>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <date month="August" year="2014"/>
    <abstract>
      <t>This document updates the definitions of IPv6 multicast scopes and therefore updates RFCs 4007 and 4291.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7346"/>
  <seriesInfo name="DOI" value="10.17487/RFC7346"/>
</reference>

<reference anchor="RFC7371">
  <front>
    <title>Updates to the IPv6 Multicast Addressing Architecture</title>
    <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
    <author fullname="S. Venaas" initials="S." surname="Venaas"/>
    <date month="September" year="2014"/>
    <abstract>
      <t>This document updates the IPv6 multicast addressing architecture by redefining the reserved bits as generic flag bits. The document also provides some clarifications related to the use of these flag bits.</t>
      <t>This document updates RFCs 3956, 3306, and 4291.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7371"/>
  <seriesInfo name="DOI" value="10.17487/RFC7371"/>
</reference>

<reference anchor="RFC7721">
  <front>
    <title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
    <author fullname="A. Cooper" initials="A." surname="Cooper"/>
    <author fullname="F. Gont" initials="F." surname="Gont"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <date month="March" year="2016"/>
    <abstract>
      <t>This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized. It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7721"/>
  <seriesInfo name="DOI" value="10.17487/RFC7721"/>
</reference>

<reference anchor="MPL">
  <front>
    <title>Multicast Protocol for Low-Power and Lossy Networks (MPL)</title>
    <author fullname="J. Hui" initials="J." surname="Hui"/>
    <author fullname="R. Kelsey" initials="R." surname="Kelsey"/>
    <date month="February" year="2016"/>
    <abstract>
      <t>This document specifies the Multicast Protocol for Low-Power and Lossy Networks (MPL), which provides IPv6 multicast forwarding in constrained networks. MPL avoids the need to construct or maintain any multicast forwarding topology, disseminating messages to all MPL Forwarders in an MPL Domain.</t>
      <t>MPL has two modes of operation. One mode uses the Trickle algorithm to manage control-plane and data-plane message transmissions and is applicable for deployments with few multicast sources. The other mode uses classic flooding. By providing both modes and parameterization of the Trickle algorithm, an MPL implementation can be used in a variety of multicast deployments and can trade between dissemination latency and transmission efficiency.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7731"/>
  <seriesInfo name="DOI" value="10.17487/RFC7731"/>
</reference>

<reference anchor="PIM-SM">
  <front>
    <title>Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)</title>
    <author fullname="B. Fenner" initials="B." surname="Fenner"/>
    <author fullname="M. Handley" initials="M." surname="Handley"/>
    <author fullname="H. Holbrook" initials="H." surname="Holbrook"/>
    <author fullname="I. Kouvelas" initials="I." surname="Kouvelas"/>
    <author fullname="R. Parekh" initials="R." surname="Parekh"/>
    <author fullname="Z. Zhang" initials="Z." surname="Zhang"/>
    <author fullname="L. Zheng" initials="L." surname="Zheng"/>
    <date month="March" year="2016"/>
    <abstract>
      <t>This document specifies Protocol Independent Multicast - Sparse Mode (PIM-SM). PIM-SM is a multicast routing protocol that can use the underlying unicast routing information base or a separate multicast-capable routing information base. It builds unidirectional shared trees rooted at a Rendezvous Point (RP) per group, and it optionally creates shortest-path trees per source.</t>
      <t>This document obsoletes RFC 4601 by replacing it, addresses the errata filed against it, removes the optional (*,*,RP), PIM Multicast Border Router features and authentication using IPsec that lack sufficient deployment experience (see Appendix A), and moves the PIM specification to Internet Standard.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="83"/>
  <seriesInfo name="RFC" value="7761"/>
  <seriesInfo name="DOI" value="10.17487/RFC7761"/>
</reference>

<reference anchor="RFC8085">
  <front>
    <title>UDP Usage Guidelines</title>
    <author fullname="L. Eggert" initials="L." surname="Eggert"/>
    <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
    <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
    <date month="March" year="2017"/>
    <abstract>
      <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms. This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
      <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. They may also need to implement additional mechanisms, depending on how they use UDP.</t>
      <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
      <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="145"/>
  <seriesInfo name="RFC" value="8085"/>
  <seriesInfo name="DOI" value="10.17487/RFC8085"/>
</reference>

<reference anchor="RFC8313">
  <front>
    <title>Use of Multicast across Inter-domain Peering Points</title>
    <author fullname="P. Tarapore" initials="P." role="editor" surname="Tarapore"/>
    <author fullname="R. Sayko" initials="R." surname="Sayko"/>
    <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
    <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
    <author fullname="R. Krishnan" initials="R." surname="Krishnan"/>
    <date month="January" year="2018"/>
    <abstract>
      <t>This document examines the use of Source-Specific Multicast (SSM) across inter-domain peering points for a specified set of deployment scenarios. The objectives are to (1) describe the setup process for multicast-based delivery across administrative domains for these scenarios and (2) document supporting functionality to enable this process.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="213"/>
  <seriesInfo name="RFC" value="8313"/>
  <seriesInfo name="DOI" value="10.17487/RFC8313"/>
</reference>

<reference anchor="RFC8815">
  <front>
    <title>Deprecating Any-Source Multicast (ASM) for Interdomain Multicast</title>
    <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
    <author fullname="T. Chown" initials="T." surname="Chown"/>
    <author fullname="L. Giuliano" initials="L." surname="Giuliano"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <date month="August" year="2020"/>
    <abstract>
      <t>This document recommends deprecation of the use of Any-Source Multicast (ASM) for interdomain multicast. It recommends the use of Source-Specific Multicast (SSM) for interdomain multicast applications and recommends that hosts and routers in these deployments fully support SSM. The recommendations in this document do not preclude the continued use of ASM within a single organization or domain and are especially easy to adopt in existing deployments of intradomain ASM using PIM Sparse Mode (PIM-SM).</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="229"/>
  <seriesInfo name="RFC" value="8815"/>
  <seriesInfo name="DOI" value="10.17487/RFC8815"/>
</reference>

<reference anchor="BIER">
  <front>
    <title>Multicast Using Bit Index Explicit Replication (BIER)</title>
    <author fullname="IJ. Wijnands" initials="IJ." role="editor" surname="Wijnands"/>
    <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
    <author fullname="A. Dolganow" initials="A." surname="Dolganow"/>
    <author fullname="T. Przygienda" initials="T." surname="Przygienda"/>
    <author fullname="S. Aldrin" initials="S." surname="Aldrin"/>
    <date month="November" year="2017"/>
    <abstract>
      <t>This document specifies a new architecture for the forwarding of multicast data packets. It provides optimal forwarding of multicast packets through a "multicast domain". However, it does not require a protocol for explicitly building multicast distribution trees, nor does it require intermediate nodes to maintain any per-flow state. This architecture is known as "Bit Index Explicit Replication" (BIER). When a multicast data packet enters the domain, the ingress router determines the set of egress routers to which the packet needs to be sent. The ingress router then encapsulates the packet in a BIER header. The BIER header contains a bit string in which each bit represents exactly one egress router in the domain; to forward the packet to a given set of egress routers, the bits corresponding to those routers are set in the BIER header. The procedures for forwarding a packet based on its BIER header are specified in this document. Elimination of the per-flow state and the explicit tree-building protocols results in a considerable simplification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8279"/>
  <seriesInfo name="DOI" value="10.17487/RFC8279"/>
</reference>

<reference anchor="RFC8866">
  <front>
    <title>SDP: Session Description Protocol</title>
    <author fullname="A. Begen" initials="A." surname="Begen"/>
    <author fullname="P. Kyzivat" initials="P." surname="Kyzivat"/>
    <author fullname="C. Perkins" initials="C." surname="Perkins"/>
    <author fullname="M. Handley" initials="M." surname="Handley"/>
    <date month="January" year="2021"/>
    <abstract>
      <t>This memo defines the Session Description Protocol (SDP). SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. This document obsoletes RFC 4566.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8866"/>
  <seriesInfo name="DOI" value="10.17487/RFC8866"/>
</reference>

<reference anchor="RFC9466">
  <front>
    <title>PIM Assert Message Packing</title>
    <author fullname="Y. Liu" initials="Y." role="editor" surname="Liu"/>
    <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
    <author fullname="M. McBride" initials="M." surname="McBride"/>
    <author fullname="Z. Zhang" initials="Z." surname="Zhang"/>
    <date month="October" year="2023"/>
    <abstract>
      <t>When PIM Sparse Mode (PIM-SM), including PIM Source-Specific Multicast (PIM-SSM), is used in shared LAN networks, there is often more than one upstream router. This can lead to duplicate IP multicast packets being forwarded by these PIM routers. PIM Assert messages are used to elect a single forwarder for each IP multicast traffic flow between these routers.</t>
      <t>This document defines a mechanism to send and receive information for multiple IP multicast flows in a single PackedAssert message. This optimization reduces the total number of PIM packets on the LAN and can therefore speed up the election of the single forwarder, reducing the number of duplicate IP multicast packets incurred.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9466"/>
  <seriesInfo name="DOI" value="10.17487/RFC9466"/>
</reference>

<reference anchor="RFC9542">
  <front>
    <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="J. Abley" initials="J." surname="Abley"/>
    <author fullname="Y. Li" initials="Y." surname="Li"/>
    <date month="April" year="2024"/>
    <abstract>
      <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="141"/>
  <seriesInfo name="RFC" value="9542"/>
  <seriesInfo name="DOI" value="10.17487/RFC9542"/>
</reference>

<reference anchor="GDOI">
  <front>
    <title>Group Key Management Using the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
    <author fullname="B. Weis" initials="B." surname="Weis"/>
    <date month="November" year="2025"/>
    <abstract>
      <t>This document presents an extension to the Internet Key Exchange Protocol Version 2 (IKEv2) for the purpose of group key management. The protocol is in conformance with the Multicast Security (MSEC) Group Key Management architecture, which contains two components: member registration and group rekeying. Both components are required for a Group Controller/Key Server (GCKS) to provide authorized Group Members (GMs) with IPsec Group Security Associations (GSAs). The GMs then exchange IP multicast or other group traffic as IPsec packets.</t>
      <t>This document obsoletes RFC 6407.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9838"/>
  <seriesInfo name="DOI" value="10.17487/RFC9838"/>
</reference>


<reference anchor="I-D.ietf-pim-zeroconf-mcast-addr-alloc-ps">
   <front>
      <title>Zeroconf Multicast Address Allocation Problem Statement and Requirements</title>
      <author fullname="Nathan Karstens" initials="N." surname="Karstens">
         <organization>Garmin International, Inc.</organization>
      </author>
      <author fullname="Dino Farinacci" initials="D." surname="Farinacci">
         <organization>lispers.net</organization>
      </author>
      <author fullname="Mike McBride" initials="M." surname="McBride">
         <organization>Futurewei</organization>
      </author>
      <date day="17" month="February" year="2026"/>
      <abstract>
	 <t>   This document surveys current problems with existing protocols for
   automatically assigning multicast IP addresses in zero-configuration
   (&quot;zeroconf&quot;) networking environments.  It addresses key challenges,
   such as link-layer address collisions, hardware limitations,
   multicast snooping inefficiencies, and the need to avoid manual
   configuration.  Based on these challenges, it derives requirements
   for a lightweight, decentralized solution for dynamically allocating
   unique multicast group addresses without central coordination.

   The document presents explicit requirements covering discovery,
   allocation, conflict detection and resolution, and lease management.
   It also evaluates considerations specific to IPv6 and IPv4 multicast
   address ranges, and identifies approaches that are unsuited for
   zeroconf deployment.  This foundation serves as a reference for
   developing future solutions for multicast address allocation that
   operate autonomously within local networks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-pim-zeroconf-mcast-addr-alloc-ps-13"/>
   
</reference>


<reference anchor="I-D.ietf-pim-gaap">
   <front>
      <title>Group Address Allocation Protocol (GAAP)</title>
      <author fullname="Dino Farinacci" initials="D." surname="Farinacci">
         <organization>lispers.net</organization>
      </author>
      <author fullname="Mike McBride" initials="M." surname="McBride">
         <organization>Futurewei</organization>
      </author>
      <date day="25" month="February" year="2026"/>
      <abstract>
	 <t>   This document describes a design for a lightweight decentralized
   multicast group address allocation protocol (named GAAP and
   pronounced &quot;gap&quot; as in &quot;mind the gap&quot;).  The protocol requires no
   configuration setup and no centralized services.  The protocol runs
   among group participants which need a unique group address to send
   and receive multicast packets.  Tailored for IPv4 and IPv6 networks,
   this design offers a simple, lightweight option rather than extending
   an existing protocol.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-pim-gaap-10"/>
   
</reference>


<reference anchor="TAPS" >
  <front>
    <title>TAPS WG documents</title>
    <author >
      <organization></organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://datatracker.ietf.org/wg/taps/documents/"/>
</reference>
<reference anchor="MSEC" >
  <front>
    <title>MSEC WG documents</title>
    <author >
      <organization></organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://datatracker.ietf.org/wg/msec/documents/"/>
</reference>
<reference anchor="IANA.MASR" >
  <front>
    <title>IPv6 Multicast Address Space Registry</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
  <seriesInfo name="Web" value="https://www.iana.org/assignments/ipv6-multicast-addresses/ipv6-multicast-addresses.xhtml"/>
</reference>



<reference anchor="I-D.ietf-mboned-ambi">
   <front>
      <title>Asymmetric Manifest Based Integrity</title>
      <author fullname="Jake Holland" initials="J." surname="Holland">
         <organization>Akamai Technologies, Inc.</organization>
      </author>
      <author fullname="Kyle Rose" initials="K." surname="Rose">
         <organization>Akamai Technologies, Inc.</organization>
      </author>
      <author fullname="Max Franke" initials="M." surname="Franke">
         <organization>TU Berlin</organization>
      </author>
      <date day="17" month="October" year="2025"/>
      <abstract>
	 <t>   This document defines Asymmetric Manifest-Based Integrity (AMBI).
   AMBI allows each receiver or forwarder of a stream of multicast
   packets to check the integrity of the contents of each packet in the
   data stream.  AMBI operates by passing cryptographically verifiable
   hashes of the data packets inside manifest messages, and sending the
   manifests over authenticated out-of-band communication channels.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-mboned-ambi-05"/>
   
</reference>


<reference anchor="I-D.krose-mboned-alta">
   <front>
      <title>Asymmetric Loss-Tolerant Authentication</title>
      <author fullname="Kyle Rose" initials="K." surname="Rose">
         <organization>Akamai Technologies, Inc.</organization>
      </author>
      <author fullname="Jake Holland" initials="J." surname="Holland">
         <organization>Akamai Technologies, Inc.</organization>
      </author>
      <date day="8" month="July" year="2019"/>
      <abstract>
	 <t>   Establishing authenticity of a stream of datagrams in the presence of
   multiple receivers is naively achieved through the use of per-packet
   asymmetric digital signatures, but at high computational cost for
   both senders and receivers.  Timed Efficient Stream Loss-Tolerant
   Authentication (TESLA) instead employs relatively cheap symmetric
   authentication, achieving asymmetry via time-delayed key disclosure,
   while adding latency to verification and imposing requirements on
   time synchronization between receivers and the sender to prevent
   forgery.  This document introduces Asymmetric Loss-Tolerant
   Authentication (ALTA), which employs an acyclic graph of message
   authentication codes (MACs) transmitted alongside data payloads, with
   redundancy to enable authentication of all received payloads in the
   presence of certain patterns of loss, along with regularly paced
   digital signatures.  ALTA requires no time synchronization and
   enables authentication of payloads as soon as sufficient
   authentication material has been received.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-krose-mboned-alta-01"/>
   
</reference>


<reference anchor="I-D.moskowitz-tesla-update-gnss-sbas">
   <front>
      <title>TESLA Update for GNSS SBAS Authentication</title>
      <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
         <organization>HTT Consulting</organization>
      </author>
      <author fullname="Ran Canetti" initials="R." surname="Canetti">
         <organization>Boston University</organization>
      </author>
      <date day="2" month="November" year="2025"/>
      <abstract>
	 <t>   This document updates TESLA [RFC4082] to current cryptographic
   methods for use by the International Civil Aviation Organization
   (ICAO) in their Global Navigation Satellite System (GNSS) Satellite-
   based augmentation system (SBAS) authentication protocol.  The TESLA
   updates are to align it with current best practices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-moskowitz-tesla-update-gnss-sbas-01"/>
   
</reference>




    </references>


<?line 1272?>

<section anchor="host-group-address-issues"><name>HOST GROUP ADDRESS ISSUES</name>

<t>This appendix is not part of the IP multicasting specification, but
provides background discussion of several issues related to IP host
group addresses.</t>

<section anchor="group-address-binding"><name>Group Address Binding</name>

<t>The binding of IP host group addresses to physical hosts may be
considered a generalization of the binding of IP unicast addresses.
An IP unicast address is statically bound to a single local network
interface on a single IP network.  An IP host group address is
dynamically bound to a set of local network interfaces on a set of IP
networks.</t>

<t>It is important to understand that an IP host group address is NOT
bound to a set of IP unicast addresses.  The multicast routers do not
need to maintain a list of individual members of each host group.
For example, a multicast router attached to an Ethernet need
associate only a single Ethernet multicast address with each host
group having local members, rather than a list of the members'
individual IP or Ethernet addresses.</t>

</section>
<section anchor="allocation-of-transient-host-group-addresses"><name>Allocation of Transient Host Group Addresses</name>

<section anchor="original-rfc1112-text"><name>Original RFC1112 text</name>

<t>This memo does not specify how transient group address are allocated.
It is anticipated that different portions of the IP transient host
group address space will be allocated using different techniques.
For example, there may be a number of servers that can be contacted
to acquire a new transient group address.  Some higher-level
protocols (such as VMTP, specified in <xref target="RFC1045"/>) may generate higher-
level transient "process group" or "entity group" addresses which are
then algorithmically mapped to a subset of the IP transient host
group addresses, similarly to the way that IP host group addresses
are mapped to Ethernet multicast addresses.  A portion of the IP
group address space may be set aside for random allocation by
applications that can tolerate occasional collisions with other
multicast users, perhaps generating new addresses until a suitably
"quiet" one is found.</t>

<t>In general, a host cannot assume that datagrams sent to any host
group address will reach only the intended hosts, or that datagrams
received as a member of a transient host group are intended for the
recipient.  Misdelivery must be detected at a level above IP, using
higher-level identifiers or authentication tokens.  Information
transmitted to a host group address should be encrypted or governed
by administrative routing controls if the sender is concerned about
unwanted listeners. See <xref target="security-considerations"/> for more details.</t>

</section>
<section anchor="evolution-since-rfc1112"><name>Evolution since RFC1112</name>

<t>Historically (1990th), SDP <xref target="RFC8866"/> over SAP (<xref target="RFC2974"/> was used to
multicast the session information of application sessions
with transient IPv4 multicast addresses via the MBone's sdr tool. When
creating a new application instance, sdr would simply avoid picking
any of the already assigned IPv4 multicast addresses as known from other
SDP/SAP announcements.</t>

<t><xref target="RFC6308"/> section 3.5 summaries and explains the lack of adoption of
mechanisms specified in RFCs since <xref target="RFC1112"/> for allocation of transient 
host group addresses.</t>

<t>Current evolving mechanisms for zeroconf dynamic host group addreses are based on
<xref target="I-D.ietf-pim-zeroconf-mcast-addr-alloc-ps"/>. It specifically requires
solutions to allocate addresses so that different application do not
use IP multicast addresses that map to the same MAC address. Such mapping would
defeat the filtering of most IGMP/MLD snooping switches which most often only
operate on MAC level. One protocol supporting these requirements is
<xref target="I-D.ietf-pim-gaap"/>.</t>

</section>
</section>
<section anchor="ll-apdx"><name>Link local considerations</name>

<t>IGMP/MLD are required for Level 2 hosts on a subnet so that IP multicast routers
on the same subnet can forward traffic from sender on another subnet.
IGMP/MLD are technically not required for IP multicast packets
with link local addresses on a broadcast subnet. Such link local
IP multicast can not have senders from a different subnets (<xref target="lncb"/>), and
IP multicast traffic from senders on the same subnet is forwarded to all hosts on the
subnet on a broadcast subnet.</t>

<t>If IGMP/MLD snooping are used in a subnet, it looses its broadcast nature
for IP multicast traffic and sending of IGMP/MLD messages is often also
required to receive IP multicast traffic from local senders in the same subnet.
Subject to how the IGMP/MLD snooping switch operates.</t>

<t>For IPv4 link local addresses, IGMP snooping must not filter traffic due to
the historic non-implementation of IGMP in early hosts (such as IP routers
using <xref target="OSPFv2"/>) and the limited number of link local groups in IPv4 make
it quite unimportant to improve.</t>

<t>In IPv6, there are as many link local addresses as there are in other scopes.
Therefore link local IPv6 is well usable for non network control traffic,
such as any IP multicast application that wants its traffic to be constrained
to a single subnet (such as large, single-subnet campus networks with MLD snooping switches).
Hence the requirement in <xref target="MLDv2"/> to also signal MLD for link local IPv6 multicast addresses.</t>

<t>However, subnets can be known to never have IGMP/MLD snooping switches,
such as radio subnets in IoT mesh networks. And those subnets can also
be known to never require any IP multicast traffic other than link local
IP multicast protocol packets that use the host stack. An example of this
are radio subnets solely between <xref target="RPL"/> nodes.</t>

<t>For such subnets, nodes can act as Level 2L hosts, hence avoiding the unnecessary
complexity of IGMP/MLD and the radio energy it would cost.</t>

</section>
<section anchor="mcrouters"><name>IP multicast router considerations</name>

<t>Nodes that are IP multicast routers do typically not use IGMP/MLD to
indicate the multicast groups or channels that they need to receive from
a subnet. Nor could they in many cases.</t>

<t>IGMP/MLD snooping can not constrain IP multicast traffic to any port
with such an IP multicast router connected to it because of this. This
is true even in the most simple subnet setup with only IP multicast hosts
and just one IP multicast router acting as the IGMP/MLD querier. That
gateway needs to see all IP multicast traffic sent by any host onto the
subnet - to determine which of that traffic to forward to receivers on other 
subnets.</t>

<t>However, IP multicast routers may also use the IP multicast host stack
specified in this document.  Consider the case where an IP multicast router
sends and/or receives IP multicast packets not because of its IP multicast
forwarding function as an IP multicast router, but because these IP
multicast packets are sent or received by an application on the gateway,
including but not limited to IGMP/MLD protocol packets or IP multicast
routing protocol packets such as <xref target="PIM-SM"/> IP multicast protocol packets.
Without further gateway considerations, these packets are logically subject
to the host stack requirements of this document.</t>

<t>For example, an IP multicast router running IGMPv3 would need to indicate
to its own IP host stack the desire to receive packets for 224.0.0.22,
resulting in it also sending IGMP membership reports for that address.</t>

<t>However, as explained before, even in the presence of IGMP/MLD snooping switches,
IP multicast routers need to receive any IP multicast packet on a subnet
without itself sending IGMP/MLD messages to join the traffic. And IGMP/MLD
snoopping switches support this by manualor automatic detection of ports connected
to IP multicast routers. Hence an IP multicast router can safely forego
sending IGMP/MLD membership messages for any IP multicast addresses it is
joined to as a host: It will receive the traffic anyhow, even in the presence
of IGMP/MLD snooping switches, and it will anyhow use its non-IGMP/MLD multicast
routing protocol to ensure traffic from other subnets gets forwarded to the subnet.</t>

<t>In summary: For hosts (or gateways) that are also IP multicast routers the Level 2 host stack may skip
sending IGMP/MLD membership reports to receive IP multicast packets when this is deemed
specifically beneficial. This can simply be justified as a case where the behavior
of an IP multicast router (which is outside of scope of this document) superceeds the requirements
of the host stack as specified here, even if the host stack of the gateway is
devices from the specification of this document.</t>

<t>Note that this document gives no recommendations to do this, this appendix purely
explains how this could work and be justified when needed - without violating this
specifications requirements. Given how most IP multicast routers are just
optionally configurable as IP gateways, they would need to conform
to the full L2 host stack reqiurements whenever they do not act as an IP multicast
gateway, hence optimizing the host stack purely to reduce the amount of code is not an option
in those cases.</t>

</section>
<section anchor="per-socket"><name>Application Socket Security Considerations</name>

<t>The following section addresses socket security issues beyond the scope of this document.
While they are in general independent of the transport protocol used, they most often
happen for UDP because of the prevalence of using IP multicast with UDP and because
even if other applications for IP multicast exist on hosts (such as <xref target="OSPFv2"/>), in
most hosts, only UDP can be used for IP multicast by unprivileged and hence more likely
malicious applications. The following considerations are not covered by <xref target="RFC8085"/> or
resolved trough the requirements specified by <xref target="TAPS"/> RFCs.</t>

<t>Even with correct IP multicast group address management (<xref target="address-management"/>),
or when using SSM: with just the methods specified in this document for the host stack,
application sockets may still receive unexpected IP multicast traffic destined to other
IP multicast addresses than they joined to.</t>

<t>This problem can exist because like <xref target="RFC1112"/>, this memo only specifies the host stack
up to the IP layer and hence does not include the specification that ASM group
membership (or SSM channel membership) has to be per (transport layer) application socket.</t>

<t>In result, early host stacks for IPv4 multicast did indeed have the problem that two
UDP sockets each joining to a different IPv4 multicast address but the same UDP port would
receive traffic destined to either IPv4 multicast addresses. And could accordingly
cause application malfunctions or other security issues. Such port re-use can easily
happen when applications define the use of a well-known UDP port number and just
expect (like they should), that different application instances can just use 
different IP multicast addresses.</t>

<section anchor="igmpv3mldv2"><name>IGMPv3/MLDv2</name>

<t>In current host stacks for Level 2 hosts, this problem is usually eliminated when
implementations correctly implement the following sentence present in IGMP/MLD specifications
since <xref target="RFC3376"/>/<xref target="RFC3810"/>.</t>

<t><em>After a multicast packet has been accepted from an interface by the
 IP layer, its subsequent delivery to the application or process that
 listens on a particular socket depends on the multicast listening
 state of that socket...</em></t>

</section>
<section anchor="level-2l"><name>Level 2L</name>

<t>Level 2L implementation would equally have to implement their host stack using such
per-socket membership even in the absence of IGMP to support equivalent
demultiplexing replication and filtering on a per socket basis for received IP multicast packets.
Otherwise this filtering would be left up to the application, not only violating
reasonable per-socket expectations but also incurring unnecessary overhead: Unnecessary
replication and process-level processing of such unnecessary packet copies.</t>

</section>
</section>
<section anchor="application-socket-issues"><name>Application socket issues</name>

<t>The following issues relate to the current behavior of known (transport layer) application
sockets across various operating systems. These behaviors evolved by simply not improving
the behavior of BSD sockets for IP multicast from a security perspective and proliferation
of that socket model across other operating systems and POSIX standard.</t>

<t>Host stacks by default do not allow multiple application sockets to bind() to the same
transport layer port (TCP, UDP or other). This is highly desirable in IP unicast because
it guarantees the application with the socket that no other application can be a responder/"server"
for that port on the same host/IP-address(es). Likewise, any responder/"client" application can 
(implicitly or explicitly) bind() to a dynamic, unused port due to the nature of IP unicast
initiator/responder protocol exchanges.</t>

<t>In IP multicast the default for socket operations is the same, but the impact on IP multicast
applications is different. In <xref target="UDP"/>, <xref target="PGM"/> or any other IP multicast capable transport
protocols using the notion of Source Port and Destination Port, the port that a socket binds
to is like for IP unicast traffic the Source Port for packets sent and the Destination Port
for packets received.</t>

<t>When an IP multicast receiver application binds to a port, by default no other application
on the same host can receive the same IP multicast traffic. This is not only undesirable when
multiple receiver applications for the IP multicast application instance are desired
to be to run on the same host simultaneously, but a malicious attacker application started before a
legitimate receiver application can perform a DoS attack against these IP multicast receiver ("client")
applications by binding to the known transport layer port that the sender(s) sends to.</t>

<t>The comparable attack is not possible in IP (unicast) because the as mentioned above, the client
application (unicast initiator) can bind to any free port and then negotiate with the sender
that it sends to that Destination Port. In IP multicast the sender of course can not negotiate with
every receiver a separate receiver Destination Port. It must send IP multicast to one port common
for all receivers, which then makes that port subject to the attack.</t>

<t>Enabling re-binding to the same UDP port on sockets used to receive IP multicast traffic (SO_REUSEADDR/SO_REUSEPORT)
allows benevolent applications on the same host to receive the same IP multicast traffic, but known host stacks 
have no option to force this option on all (receiver) IP multicast sockets to prohibit the aforementioned
attack. Simply because there is no concept of an IP multicast receiver only socket, and forcing
re-use of ports would in most cases be wrong for other type of sockets.</t>

<t>For an IP multicast sender application, the attack is different.
A malicious application binding to a socket can not prohibit a legitimate sender
application to send to the same port. Which it could do in IP (unicast).  However, an IP multicast
sender binding to a port can not rely on the fact that there is no malicious application on the
same host sending to the same IP multicast group and Destination Port because the bind only guarantees
exclusive use of the Source Port, which is irrelevant in most IP multicast application stacks,
for example when using <xref target="RTP"/>. Arguably, the IP multicast problem is bigger because an IP server application
will know at bind() time when it can not exclusively use the relevent port because of
the prior presence of a malicious application on the same host, whereas in IP multicast, the
server can not prohibit that a later started malicious application on the same host is
impersonating packets with the same Source IP address, IP multicast address and Destination Port
number as the legitimate server application.</t>

<t>IP multicast applications could recognize the attacking application based on its
Source Port instead of only its Source IP address, but that is not common in IP multicast
applications / specifications today, such as when using <xref target="RTP"/>. Even worse, the legitimate
sender applications itself may not even be able to recognize packets from the malicious sender
on the same host if the socket interface allows to prohibit looping back of IP multicast packets from
one socket to any other socket on the local host (IP_MULTICAST_LOOP). Which is a commonly supported
option in todays socket APIs.</t>

<t>In summary, malicious local applications do pose different and potentially more severe risks to 
IP multicast sender and receiver applications than malicious IP multicast applications running
on other hosts with todays application socket semantics.</t>

</section>
</section>
<section anchor="discussion-and-explanations-to-be-removed"><name>Discussion and Explanations (TO BE REMOVED)</name>

<t>[RFC-editor: Please remove this Appendix after observing the following section addressed to you]</t>

<t>Please refer to <xref target="changes"/> for the non-process discussion of the goals of this document.</t>

<section anchor="rfc-editor-notes"><name>RFC-Editor notes</name>

<t>The kramdown tooling did not allow to have references for both STD5 and RFC1112,
those fail because the STD5 reference creates an "RFC1112" anchor. Thus there
is no separate reference for RFC1112 in this version of the document. This
needs to be fixed in XML by adding a full reference to RFC1112 and removing the
RFC1112 anchor from the STD5 reference.</t>

</section>
<section anchor="goals-and-evolution-of-this-document"><name>Goals and evolution of this document</name>

<t>The initial goal of this document was to allow for IETF to declare the IGMPv1
protocol historic which today is a Full Internet Standard due to it being defined
in RFC1112. This should be achieved without changing the Full Internet Standard status
of the IP Host Extensions for IP multicast and ASM IP service interface specified in
RFC1112 because those specification are as fundamental to the definition of IP
multicast as RFC791 is for IP (unicast).</t>

<t>The best way to achieve this seemed to be an update to RFC1112 which
removes all of IGMPv1, but maintains the rest of the document. None of these
removal of IGMPv1 changes changed the applicability or requirements to existing 
IP multicast (plus its protocols) implementations or other specifications.</t>

<t>The next refinement was to rectify the situation that there is no specification
explaining the same details as RFC1112 for IPv6 multicast even though RFC8200
(full internet standard) even explicitly includes IPv6 multicast, and a range of
other RFC define necessary code-points (such as for ethernet mapping) for IPv6 multicast.</t>

<t>Most of the text of this specification can hence can simply talk about "IP" which in this
specification implies both IPv4 and IPv6, and only in places where IPv6 differs, does the
document now include new explicit text, most often pointing to pre-existing RFCs specifying
the necessary details for IPv6. Again, none of these changes impact other specs or
deployments.</t>

<t>The third step of refinement was add the necessary verbiage to explain
the differences between SSM and the specifications in this document. None of
these text enhancements incur any functional changes of long-term established
practices. Instead, they are only resulting in references to SSM RFCs, introduction
of the term ASM (which was previously only defined in SSM RFCs), and the limitation
of applicability of terms in this document (such as host group) to their use with
ASM.</t>

<t>The last round of changes added and refined details to be in-line with long-term established
practices and removing any possible contradictions between the original RFC1112 text
and newer standards track specification such as IGMPv2/MLDv3 or long term established
implementation practices. This includes the limitation of scope of ASM to controlled
networks and the definition of the IPv4 Link-Local
address range, which so far had only been defined through BCP RFC, unlike in IPv6, where
it's part of the architecture, as well as permitting (but not recommending) non-use of IGMP for them.</t>

<t>In summary, all changes in the document will make this document a replacement of rfc1112
which much more reflects the full internet standard nature of the technology than
rfc1112 did as of recent.</t>

</section>
<section anchor="rfc791"><name>Update to RFC791</name>

<t>This version of the text proposes that this spec is declared to be an
update to RFC791.</t>

<t>The argument made in <xref target="update"/> to support this classification 
may not be persuasive enough (because the according rfc791 text
may be read as a perfectly good extension point specification), in which
case the update status and related text should be deleted.</t>

<t>However, If anyone where to come up with a re-use of 224.0.0.0/4 for any non-IP
multicast purposes,  havoc might ensure with devices that do assume IP multicast
semantics, so it may simply be prudent to include this declaration. It would
also make the relationship between IPv4 and IPv4 multicast be more aligned
with IPv6, where IPv6 multicast is included in RFC8200.</t>

</section>
<section anchor="changelog"><name>Changelog</name>

<t>This document is hosted at https://github.com/toerless/rfc1112bis. Please submit issues
with this text as issues to that github and report them on pim@ietf.org.</t>

<section anchor="draft-ietf-pim-rfc1112bis-08"><name>draft-ietf-pim-rfc1112bis-08</name>

<t>Revision including fixes for nits uncovered by directorate reviews.
Eric Nordmark (INTDIR), Brian Weis feedback (SECDIR), Sandy Zhang (RTGDIR), Pascal Thubert (INTDIR)</t>

<t>Several textual nits fixed, not detailling.</t>

<t>Section 6.4: Extensions to Ethernet module</t>

<t>Reordered expand last two paragraphs. Added reference to very recent relevant RFC9542 IANA registry
for MAC addresses (from Pascal).</t>

<t>Section 9.2: Compatibility with IGMPv1</t>

<t>Added definition for "backward compatibility" (with IGMPv1) and refined wording.</t>

<t>Section 10: changes over RFC1112:</t>

<t>10.8 removed second paragraph, just pointing to A.3</t>

<t>10.14: Added sub section 10.14 to more comprehensively discuss the correct terms
"host group" / "host group address" vs "SSM destination address" vs (ambiguous "SSM multicast address").
RFCs applying equally to ASM/SSM can just use "IP multicast address". RFCs applying to only ASM should use
"IP host group address" - etc. pp.</t>

<t>11.7 (IANA asks)</t>

<t>added request to replace rfc1112 with thisRFC for the new RFC9542 registry for MAC addresses.</t>

<t>12.3 security considerations</t>

<t>clarified/refined/expanded sender control text (Eric, Brian).</t>

<t>A.2 appendix for discussion about transient IP multicast addresses</t>

<t>moved existing text from Steve Deering (mostly never realized ideas) to historic subsection,
added subsection for best decade-long solution SAP/SDP and paragraph about new evolving
solution GAAP.</t>

<t>Various textual nits.</t>

<t>Added text/reference for recent new IANA Multicast / 802x address registries</t>

<t>Added explanation for ND in Figure 1.</t>

<t>Other:</t>

<t>Changed TO_BE_REMOVED_SECTION to indicate keeping it also for IETF/IESG review as it seems usefulto help such further broader reviewers.</t>

</section>
<section anchor="draft-ietf-pim-rfc1112bis-07"><name>draft-ietf-pim-rfc1112bis-07</name>

<t>Revision for early reviews from directorates. Added to-be-removed contextual explanations
for those reviews.</t>

</section>
<section anchor="draft-ietf-pim-rfc1112bis-06"><name>draft-ietf-pim-rfc1112bis-06</name>

<t>Added To-Be-Removed note for reviewers to compare with rfc1112 to find pre-existing
sections.</t>

<t>Removed erroneous reference to UDP in 7.1 (socket calls in referenced docs are not specific to UDP).</t>

<t>Changed order of authors.</t>

<t>Included fixes from Stig Veenas' review:</t>

<t>Variety of typos.</t>

<t>Expanded "protocol field in IP header" to be explicit about the complex IPv6 options.</t>

<t>Clarified that "IP multicast address" covers host group and SSM channel destination addresses
and fixed text that applies to both ASM and SSM touse "IP multicast address" instead of host group (address).</t>

<t>removed IGMPv3lite term</t>

<t>Added 6 pages of Security Considerations and two pages of Appendix for application socket security considerations.</t>

</section>
<section anchor="draft-ietf-pim-rfc1112bis-05"><name>draft-ietf-pim-rfc1112bis-05</name>

<t>Brian pointing to the requirement to support link-local IPv6 multicast in RFC4291, section 2.8,
accordingly changed the requirement to <bcp14>MUST</bcp14> for Level 2L and explanation about that.</t>

</section>
<section anchor="draft-ietf-pim-rfc1112bis-04"><name>draft-ietf-pim-rfc1112bis-04</name>

<t><list style="numbers">
  <t>Some textual nit improvements - introduced "all-nodes also for IPv6 (but be
careful to only call it Link-Local, as there are scope relative ones too), adding
references to RFC8504, referring to "host-side" impleemntation of IGMP/MLD.
Shoveling sentence in 4. to make reading more logical.</t>
  <t>"Levels of Conformance": Made support for IP multicast (Level 2 = sending/receiving)
<bcp14>RECOMMENDED</bcp14> for all IPv4 / IPv6 host stack. For the past 36 years, there was only the RFC1122
requirement (see below) for IPv4. For IPv6 there was no requirement to support IPv6 multicast at all.
Instead, there was only a dependency to support it when implementing widespread
IPv6 protocols (SLAAC, ND).</t>
  <t>Section 3.4: Introduction of conformance Level 2L to describe IPv4 multicast
with link-local only sending/receiving. Primarily because RFC1122 specified it, but also
because there are sufficiently many devices that do implement this at their core - e.g.:
router operating systems in suport of OSPF etc (most have been updated to also support
IGMP.</t>
  <t>Section 7.2: (re-)introduced permanent joining of all-groups as a <bcp14>SHOULD</bcp14> requirement.</t>
  <t>Section 9.4 and header: Defining this doc as update to RFC1122 to override the
36 year long recommendation of only implementing IP multicast without IGMP.</t>
  <t>New sections 10.7 to explain RFC1122 and Level 2L</t>
  <t>New section 10.8 to explain/justify recommendation to <bcp14>SHOULD</bcp14> support IP multicast on all hosts.</t>
  <t>Rewrote Section 10.10 for permanently join all-nodes group.</t>
</list></t>

</section>
<section anchor="draft-ietf-pim-rfc1112bis-03"><name>draft-ietf-pim-rfc1112bis-03</name>

<t><list style="numbers">
  <t>Changed document text to make the term "ASM" apply only to the IP service interface
(extensions) specified by the document (and shown and explained in existing text),
instead of the whole host extensions specified in this document (as it was written up to
up to -02). This is the only correct semantic, given how all the host exensions
specified in this document are shared by SSM, only the IP service interface is changed/amended by SSM.</t>
  <t>Subdivided section 2 (INTRODUCTION) into sections 2.1 (Summary), which contains new
text from this spec, and 2.2 (Overview), which is unchanged RFC1112 text.
Newly written section 2.1 to summarize the key content of this document. This was
so far only explained in the much later changes from rfc1112 section. Includes
IPv4/IPv6 applicability, ASM/SSM naming and maintaining most of RFC1112 text as a goal.</t>
  <t>Introduced text to define and explain link local IPv4 host group addresses
224.0.0.0 - 224.0.0.255. This was triggered by trying to fix the rfc1112 text
sections that Brian Haberman was concerned about, which did cover behavior for 224.0.0.1.</t>
</list></t>

<t>As it turns out, the behavior for 224.0.0.1 was quickly adopted by other
protocols getting 224.0.0.0/24 addresses and there has been no functional
specification to explain the non-forwarding behavior for these link-local addresses.
Instead, only IANA allocation guideline RFCs where introducing them. This is
now rectified with new explanatory text in this spec. and a new <bcp14>MAY</bcp14> requirement
to permit non-use of IGMP for those groups. See <xref target="rcv-extensions"/>.</t>

<t><list style="numbers">
  <t>Changed references to IGMPv3 and MLDv2 to the -bis drafts currently in RFC-editor 
queue. Also triggered by Brian Haberman mentioning them.</t>
  <t>Improved wording in "(Normative) Status Change" section 9.</t>
</list></t>

<t>5.1 Removed "Update to rfc791" as an open issue and instead claimed it as fact
in section 9.3. Added discussion about this point to the discussion appendix
that is to be removed by RFC-editor.</t>

<t>5.1 Also added subsection to declare that this document replaces RFC1112 in STD5.</t>

<t><list style="numbers">
  <t>Enhanced/New text in section 10., "changes from RFC1112"</t>
</list></t>

<t>Especially explaining the changes in the normative section explained above and
below, triggered by Brian's review.</t>

<t><list style="numbers">
  <t>Applying changes proposed by Brian Haberman during WGLC.</t>
</list></t>

<t>7.1 Changed meaning of IP from "IPv4" to "IPv4 and IPv6", accordingly updated all text.
Makes a lot of sense given the goal of showing how most of the IP multicast host stack
operates the same for IPv4 and IPv6.</t>

<t>7.2 Re-added requirement for routers not to forward link-local multicast</t>

<t>7.3 adding <bcp14>MAY</bcp14> requirement to allow non-signaling of Link-Local scope IPv4 multicast
and IPv6 all-nodes group, and explanations how this is better than the prior
definitions from rfc1112. Also includes new (length) Appendix A.3 to justify this
for IPv4.</t>

<t>7.4 text nits (thanks, Brian).</t>

</section>
<section anchor="draft-ietf-pim-rfc1112bis-02"><name>draft-ietf-pim-rfc1112bis-02</name>

<t>Removed unused references, fefresh - waiting for more reviews.
Added IANA section for updates from RFC1112 to RFC1112bis.
Added  references to RFC5771 and RFC6034 because
they actually are the references for the IANA 224.0.0.0/4 registrations,
which seems a bit undocumented given how RFC1112 did introduce the
definition (before IANA).</t>

</section>
<section anchor="draft-ietf-pim-rfc1112bis-01"><name>draft-ietf-pim-rfc1112bis-01</name>

<t>Fix up reference for IGMPv3. Refined candidate open issues. Removed author discussion.</t>

</section>
<section anchor="draft-eckert-pim-rfc1112bis-02"><name>draft-eckert-pim-rfc1112bis-02</name>

<t>Changed core references from numbered style to name style .</t>

<t>Changed copyright clause to pre5378Trust200902, which is the same as used for RFC8200
due to the presence of text with similar early status.</t>

<t>To resolve Dino's concerns at IETF116 with -01:
Added hopefully extensive explanation wrt. to how to treat IGMPv1 based on Dino's feedback
from IETF117: This document does not ask for any removal of IGMPv1 in any IETF specs
which include it for backward compatibility reasons, it only effectively causes it to
become historic once RFC1112 would be declared historic.</t>

<t>To resolve Alvaros concerns at IETF1116 with -01:
Added normative language (<bcp14>MUST</bcp14>/<bcp14>SHOULD</bcp14>). Seems as if this is quite easy given how "must" was written appropriately in the original text. The logic of applying <bcp14>MUST</bcp14>/<bcp14>MUST</bcp14>-NOT was based on understanding by the author how none of the <bcp14>MUST</bcp14> would actually put existing working implementations out of compliance.</t>

<t>Added explicit text to move rfc1112 to historic status.</t>

<t>Moved explanation of changes from rfc1112 from appendix to main text as this seem to the
common practice for document updates.</t>

<t>Added claim for this document to be an update to rfc791. See open issues section though.</t>

</section>
<section anchor="draft-ietf-pim-rfc1112bis-00"><name>draft-ietf-pim-rfc1112bis-00</name>

<t>Just changed title, added github pointer.</t>

</section>
<section anchor="draft-eckert-pim-rfc1112bis-01"><name>draft-eckert-pim-rfc1112bis-01</name>

<t>Changed all use of IPv4 back to IP. Seems standard in IETF specs. Only IPv6 has
in IETF specs the distinction of including the version.</t>

<t>Changed Steve Deerings address to a pseudo-email address at IETF. See prior section.</t>

<t>Converted document into kramdownrfc2629 format for easier editing.</t>

<t>Claims that rfc2119 language is not desired/used (to maintain maximum original text without changes).</t>

<t>Rewrote section for updates to rfc1112 to hopefully better motivate/explain the reason for this document and detail what its changes are.</t>

</section>
<section anchor="draft-eckert-pim-rfc1112bis-00"><name>draft-eckert-pim-rfc1112bis-00</name>

<t>Initial version based on <xref target="RFC1112"/> text version, edited.</t>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

