Add Search and Replace
This commit is contained in:
parent
d0b824bba4
commit
d1b6f62893
507
session-1/AMail.txt
Normal file
507
session-1/AMail.txt
Normal file
@ -0,0 +1,507 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Network Working Group Y. Rekhter
|
||||
Request for Comments: 1918 Cisco Systems
|
||||
Obsoletes: 1627, 1597 B. Moskowitz
|
||||
BCP: 5 Chrysler Corp.
|
||||
Category: Best Current Practice D. Karrenberg
|
||||
RIPE NCC
|
||||
G. J. de Groot
|
||||
RIPE NCC
|
||||
E. Lear
|
||||
Silicon Graphics, Inc.
|
||||
February 1996
|
||||
|
||||
|
||||
Address Allocation for Private Internets
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document specifies an Internet Best Current Practices for the
|
||||
Internet Community, and requests discussion and suggestions for
|
||||
improvements. Distribution of this memo is unlimited.
|
||||
|
||||
1. Introduction
|
||||
|
||||
For the purposes of this document, an enterprise is an entity
|
||||
autonomously operating a network using TCP/IP and in particular
|
||||
determining the addressing plan and address assignments within that
|
||||
network.
|
||||
|
||||
This document describes address allocation for private internets. The
|
||||
allocation permits full network layer connectivity among all hosts
|
||||
inside an enterprise as well as among all public hosts of different
|
||||
enterprises. The cost of using private internet address space is the
|
||||
potentially costly effort to renumber hosts and networks between
|
||||
public and private.
|
||||
|
||||
2. Motivation
|
||||
|
||||
With the proliferation of TCP/IP technology worldwide, including
|
||||
outside the Internet itself, an increasing number of non-connected
|
||||
enterprises use this technology and its addressing capabilities for
|
||||
sole intra-enterprise communications, without any intention to ever
|
||||
directly connect to other enterprises or the Internet itself.
|
||||
|
||||
The Internet has grown beyond anyone's expectations. Sustained
|
||||
exponential growth continues to introduce new challenges. One
|
||||
challenge is a concern within the community that globally unique
|
||||
address space will be exhausted. A separate and far more pressing
|
||||
concern is that the amount of routing overhead will grow beyond the
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 1]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
capabilities of Internet Service Providers. Efforts are in progress
|
||||
within the community to find long term solutions to both of these
|
||||
problems. Meanwhile it is necessary to revisit address allocation
|
||||
procedures, and their impact on the Internet routing system.
|
||||
|
||||
To contain growth of routing overhead, an Internet Provider obtains a
|
||||
block of address space from an address registry, and then assigns to
|
||||
its customers addresses from within that block based on each customer
|
||||
requirement. The result of this process is that routes to many
|
||||
customers will be aggregated together, and will appear to other
|
||||
providers as a single route [RFC1518], [RFC1519]. In order for route
|
||||
aggregation to be effective, Internet providers encourage customers
|
||||
joining their network to use the provider's block, and thus renumber
|
||||
their computers. Such encouragement may become a requirement in the
|
||||
future.
|
||||
|
||||
With the current size of the Internet and its growth rate it is no
|
||||
longer realistic to assume that by virtue of acquiring globally
|
||||
unique IP addresses out of an Internet registry an organization that
|
||||
acquires such addresses would have Internet-wide IP connectivity once
|
||||
the organization gets connected to the Internet. To the contrary, it
|
||||
is quite likely that when the organization would connect to the
|
||||
Internet to achieve Internet-wide IP connectivity the organization
|
||||
would need to change IP addresses (renumber) all of its public hosts
|
||||
(hosts that require Internet-wide IP connectivity), regardless of
|
||||
whether the addresses used by the organization initially were
|
||||
globally unique or not.
|
||||
|
||||
It has been typical to assign globally unique addresses to all hosts
|
||||
that use TCP/IP. In order to extend the life of the IPv4 address
|
||||
space, address registries are requiring more justification than ever
|
||||
before, making it harder for organizations to acquire additional
|
||||
address space [RFC1466].
|
||||
|
||||
Hosts within enterprises that use IP can be partitioned into three
|
||||
categories:
|
||||
|
||||
Category 1: hosts that do not require access to hosts in other
|
||||
enterprises or the Internet at large; hosts within
|
||||
this category may use IP addresses that are
|
||||
unambiguous within an enterprise, but may be
|
||||
ambiguous between enterprises.
|
||||
|
||||
Category 2: hosts that need access to a limited set of outside
|
||||
services (e.g., E-mail, FTP, netnews, remote login)
|
||||
which can be handled by mediating gateways (e.g.,
|
||||
application layer gateways). For many hosts in this
|
||||
category an unrestricted external access (provided
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 2]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
via IP connectivity) may be unnecessary and even
|
||||
undesirable for privacy/security reasons. Just like
|
||||
hosts within the first category, such hosts may use
|
||||
IP addresses that are unambiguous within an
|
||||
enterprise, but may be ambiguous between
|
||||
enterprises.
|
||||
|
||||
Category 3: hosts that need network layer access outside the
|
||||
enterprise (provided via IP connectivity); hosts in
|
||||
the last category require IP addresses that are
|
||||
globally unambiguous.
|
||||
|
||||
We will refer to the hosts in the first and second categories as
|
||||
"private". We will refer to the hosts in the third category as
|
||||
"public".
|
||||
|
||||
Many applications require connectivity only within one enterprise and
|
||||
do not need external (outside the enterprise) connectivity for the
|
||||
majority of internal hosts. In larger enterprises it is often easy to
|
||||
identify a substantial number of hosts using TCP/IP that do not need
|
||||
network layer connectivity outside the enterprise.
|
||||
|
||||
Some examples, where external connectivity might not be required,
|
||||
are:
|
||||
|
||||
- A large airport which has its arrival/departure displays
|
||||
individually addressable via TCP/IP. It is very unlikely
|
||||
that these displays need to be directly accessible from
|
||||
other networks.
|
||||
|
||||
- Large organizations like banks and retail chains are
|
||||
switching to TCP/IP for their internal communication. Large
|
||||
numbers of local workstations like cash registers, money
|
||||
machines, and equipment at clerical positions rarely need
|
||||
to have such connectivity.
|
||||
|
||||
- For security reasons, many enterprises use application
|
||||
layer gateways to connect their internal network to the
|
||||
Internet. The internal network usually does not have
|
||||
direct access to the Internet, thus only one or more
|
||||
gateways are visible from the Internet. In this case, the
|
||||
internal network can use non-unique IP network numbers.
|
||||
|
||||
- Interfaces of routers on an internal network usually do not
|
||||
need to be directly accessible from outside the enterprise.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 3]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
3. Private Address Space
|
||||
|
||||
The Internet Assigned Numbers Authority (IANA) has reserved the
|
||||
following three blocks of the IP address space for private internets:
|
||||
|
||||
10.0.0.0 - 10.255.255.255 (10/8 prefix)
|
||||
172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
|
||||
192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
|
||||
|
||||
We will refer to the first block as "24-bit block", the second as
|
||||
"20-bit block", and to the third as "16-bit" block. Note that (in
|
||||
pre-CIDR notation) the first block is nothing but a single class A
|
||||
network number, while the second block is a set of 16 contiguous
|
||||
class B network numbers, and third block is a set of 256 contiguous
|
||||
class C network numbers.
|
||||
|
||||
An enterprise that decides to use IP addresses out of the address
|
||||
space defined in this document can do so without any coordination
|
||||
with IANA or an Internet registry. The address space can thus be used
|
||||
by many enterprises. Addresses within this private address space will
|
||||
only be unique within the enterprise, or the set of enterprises which
|
||||
choose to cooperate over this space so they may communicate with each
|
||||
other in their own private internet.
|
||||
|
||||
As before, any enterprise that needs globally unique address space is
|
||||
required to obtain such addresses from an Internet registry. An
|
||||
enterprise that requests IP addresses for its external connectivity
|
||||
will never be assigned addresses from the blocks defined above.
|
||||
|
||||
In order to use private address space, an enterprise needs to
|
||||
determine which hosts do not need to have network layer connectivity
|
||||
outside the enterprise in the foreseeable future and thus could be
|
||||
classified as private. Such hosts will use the private address space
|
||||
defined above. Private hosts can communicate with all other hosts
|
||||
inside the enterprise, both public and private. However, they cannot
|
||||
have IP connectivity to any host outside of the enterprise. While not
|
||||
having external (outside of the enterprise) IP connectivity private
|
||||
hosts can still have access to external services via mediating
|
||||
gateways (e.g., application layer gateways).
|
||||
|
||||
All other hosts will be public and will use globally unique address
|
||||
space assigned by an Internet Registry. Public hosts can communicate
|
||||
with other hosts inside the enterprise both public and private and
|
||||
can have IP connectivity to public hosts outside the enterprise.
|
||||
Public hosts do not have connectivity to private hosts of other
|
||||
enterprises.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 4]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
Moving a host from private to public or vice versa involves a change
|
||||
of IP address, changes to the appropriate DNS entries, and changes to
|
||||
configuration files on other hosts that reference the host by IP
|
||||
address.
|
||||
|
||||
Because private addresses have no global meaning, routing information
|
||||
about private networks shall not be propagated on inter-enterprise
|
||||
links, and packets with private source or destination addresses
|
||||
should not be forwarded across such links. Routers in networks not
|
||||
using private address space, especially those of Internet service
|
||||
providers, are expected to be configured to reject (filter out)
|
||||
routing information about private networks. If such a router receives
|
||||
such information the rejection shall not be treated as a routing
|
||||
protocol error.
|
||||
|
||||
Indirect references to such addresses should be contained within the
|
||||
enterprise. Prominent examples of such references are DNS Resource
|
||||
Records and other information referring to internal private
|
||||
addresses. In particular, Internet service providers should take
|
||||
measures to prevent such leakage.
|
||||
|
||||
4. Advantages and Disadvantages of Using Private Address Space
|
||||
|
||||
The obvious advantage of using private address space for the Internet
|
||||
at large is to conserve the globally unique address space by not
|
||||
using it where global uniqueness is not required.
|
||||
|
||||
Enterprises themselves also enjoy a number of benefits from their
|
||||
usage of private address space: They gain a lot of flexibility in
|
||||
network design by having more address space at their disposal than
|
||||
they could obtain from the globally unique pool. This enables
|
||||
operationally and administratively convenient addressing schemes as
|
||||
well as easier growth paths.
|
||||
|
||||
For a variety of reasons the Internet has already encountered
|
||||
situations where an enterprise that has not been connected to the
|
||||
Internet had used IP address space for its hosts without getting this
|
||||
space assigned from the IANA. In some cases this address space had
|
||||
been already assigned to other enterprises. If such an enterprise
|
||||
would later connects to the Internet, this could potentially create
|
||||
very serious problems, as IP routing cannot provide correct
|
||||
operations in presence of ambiguous addressing. Although in principle
|
||||
Internet Service Providers should guard against such mistakes through
|
||||
the use of route filters, this does not always happen in practice.
|
||||
Using private address space provides a safe choice for such
|
||||
enterprises, avoiding clashes once outside connectivity is needed.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 5]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
A major drawback to the use of private address space is that it may
|
||||
actually reduce an enterprise's flexibility to access the Internet.
|
||||
Once one commits to using a private address, one is committing to
|
||||
renumber part or all of an enterprise, should one decide to provide
|
||||
IP connectivity between that part (or all of the enterprise) and the
|
||||
Internet. Usually the cost of renumbering can be measured by
|
||||
counting the number of hosts that have to transition from private to
|
||||
public. As was discussed earlier, however, even if a network uses
|
||||
globally unique addresses, it may still have to renumber in order to
|
||||
acquire Internet-wide IP connectivity.
|
||||
|
||||
Another drawback to the use of private address space is that it may
|
||||
require renumbering when merging several private internets into a
|
||||
single private internet. If we review the examples we list in Section
|
||||
2, we note that companies tend to merge. If such companies prior to
|
||||
the merge maintained their uncoordinated internets using private
|
||||
address space, then if after the merge these private internets would
|
||||
be combined into a single private internet, some addresses within the
|
||||
combined private internet may not be unique. As a result, hosts with
|
||||
these addresses would need to be renumbered.
|
||||
|
||||
The cost of renumbering may well be mitigated by development and
|
||||
deployment of tools that facilitate renumbering (e.g. Dynamic Host
|
||||
Configuration Protocol (DHCP)). When deciding whether to use private
|
||||
addresses, we recommend to inquire computer and software vendors
|
||||
about availability of such tools. A separate IETF effort (PIER
|
||||
Working Group) is pursuing full documentation of the requirements and
|
||||
procedures for renumbering.
|
||||
|
||||
5. Operational Considerations
|
||||
|
||||
One possible strategy is to design the private part of the network
|
||||
first and use private address space for all internal links. Then plan
|
||||
public subnets at the locations needed and design the external
|
||||
connectivity.
|
||||
|
||||
This design does not need to be fixed permanently. If a group of one
|
||||
or more hosts requires to change their status (from private to public
|
||||
or vice versa) later, this can be accomplished by renumbering only
|
||||
the hosts involved, and changing physical connectivity, if needed. In
|
||||
locations where such changes can be foreseen (machine rooms, etc.),
|
||||
it is advisable to configure separate physical media for public and
|
||||
private subnets to facilitate such changes. In order to avoid major
|
||||
network disruptions, it is advisable to group hosts with similar
|
||||
connectivity needs on their own subnets.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 6]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
If a suitable subnetting scheme can be designed and is supported by
|
||||
the equipment concerned, it is advisable to use the 24-bit block
|
||||
(class A network) of private address space and make an addressing
|
||||
plan with a good growth path. If subnetting is a problem, the 16-bit
|
||||
block (class C networks), or the 20-bit block (class B networks) of
|
||||
private address space can be used.
|
||||
|
||||
One might be tempted to have both public and private addresses on the
|
||||
same physical medium. While this is possible, there are pitfalls to
|
||||
such a design (note that the pitfalls have nothing to do with the use
|
||||
of private addresses, but are due to the presence of multiple IP
|
||||
subnets on a common Data Link subnetwork). We advise caution when
|
||||
proceeding in this area.
|
||||
|
||||
It is strongly recommended that routers which connect enterprises to
|
||||
external networks are set up with appropriate packet and routing
|
||||
filters at both ends of the link in order to prevent packet and
|
||||
routing information leakage. An enterprise should also filter any
|
||||
private networks from inbound routing information in order to protect
|
||||
itself from ambiguous routing situations which can occur if routes to
|
||||
the private address space point outside the enterprise.
|
||||
|
||||
It is possible for two sites, who both coordinate their private
|
||||
address space, to communicate with each other over a public network.
|
||||
To do so they must use some method of encapsulation at their borders
|
||||
to a public network, thus keeping their private addresses private.
|
||||
|
||||
If two (or more) organizations follow the address allocation
|
||||
specified in this document and then later wish to establish IP
|
||||
connectivity with each other, then there is a risk that address
|
||||
uniqueness would be violated. To minimize the risk it is strongly
|
||||
recommended that an organization using private IP addresses choose
|
||||
randomly from the reserved pool of private addresses, when allocating
|
||||
sub-blocks for its internal allocation.
|
||||
|
||||
If an enterprise uses the private address space, or a mix of private
|
||||
and public address spaces, then DNS clients outside of the enterprise
|
||||
should not see addresses in the private address space used by the
|
||||
enterprise, since these addresses would be ambiguous. One way to
|
||||
ensure this is to run two authority servers for each DNS zone
|
||||
containing both publically and privately addressed hosts. One server
|
||||
would be visible from the public address space and would contain only
|
||||
the subset of the enterprise's addresses which were reachable using
|
||||
public addresses. The other server would be reachable only from the
|
||||
private network and would contain the full set of data, including the
|
||||
private addresses and whatever public addresses are reachable the
|
||||
private network. In order to ensure consistency, both servers should
|
||||
be configured from the same data of which the publically visible zone
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 7]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
only contains a filtered version. There is certain degree of
|
||||
additional complexity associated with providing these capabilities.
|
||||
|
||||
6. Security Considerations
|
||||
|
||||
Security issues are not addressed in this memo.
|
||||
|
||||
7. Conclusion
|
||||
|
||||
With the described scheme many large enterprises will need only a
|
||||
relatively small block of addresses from the globally unique IP
|
||||
address space. The Internet at large benefits through conservation of
|
||||
globally unique address space which will effectively lengthen the
|
||||
lifetime of the IP address space. The enterprises benefit from the
|
||||
increased flexibility provided by a relatively large private address
|
||||
space. However, use of private addressing requires that an
|
||||
organization renumber part or all of its enterprise network, as its
|
||||
connectivity requirements change over time.
|
||||
|
||||
8. Acknowledgments
|
||||
|
||||
We would like to thank Tony Bates (MCI), Jordan Becker (ANS), Hans-
|
||||
Werner Braun (SDSC), Ross Callon (BayNetworks), John Curran (BBN
|
||||
Planet), Vince Fuller (BBN Planet), Tony Li (cisco Systems), Anne
|
||||
Lord (RIPE NCC), Milo Medin (NSI), Marten Terpstra (BayNetworks),
|
||||
Geza Turchanyi (RIPE NCC), Christophe Wolfhugel (Pasteur Institute),
|
||||
Andy Linton (connect.com.au), Brian Carpenter (CERN), Randy Bush
|
||||
(PSG), Erik Fair (Apple Computer), Dave Crocker (Brandenburg
|
||||
Consulting), Tom Kessler (SGI), Dave Piscitello (Core Competence),
|
||||
Matt Crawford (FNAL), Michael Patton (BBN), and Paul Vixie (Internet
|
||||
Software Consortium) for their review and constructive comments.
|
||||
|
||||
9. References
|
||||
|
||||
[RFC1466] Gerich, E., "Guidelines for Management of IP Address
|
||||
Space", RFC 1466, Merit Network, Inc., May 1993.
|
||||
|
||||
[RFC1518] Rekhter, Y., and T. Li, "An Architecture for IP Address
|
||||
Allocation with CIDR", RFC 1518, September 1993.
|
||||
|
||||
[RFC1519] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Classless
|
||||
Inter-Domain Routing (CIDR): an Address Assignment and
|
||||
Aggregation Strategy", RFC 1519, September 1993.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 8]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
10. Authors' Addresses
|
||||
|
||||
Yakov Rekhter
|
||||
Cisco systems
|
||||
170 West Tasman Drive
|
||||
San Jose, CA, USA
|
||||
Phone: +1 914 528 0090
|
||||
Fax: +1 408 526-4952
|
||||
AMail: yakov@cisco.com
|
||||
|
||||
|
||||
Robert G Moskowitz
|
||||
Chrysler Corporation
|
||||
CIMS: 424-73-00
|
||||
25999 Lawrence Ave
|
||||
Center Line, MI 48015
|
||||
Phone: +1 810 758 8212
|
||||
Fax: +1 810 758 8173
|
||||
AMail: rgm3@is.chrysler.com
|
||||
|
||||
|
||||
Daniel Karrenberg
|
||||
RIPE Network Coordination Centre
|
||||
Kruislaan 409
|
||||
1098 SJ Amsterdam, the Netherlands
|
||||
Phone: +31 20 592 5065
|
||||
Fax: +31 20 592 5090
|
||||
AMail: Daniel.Karrenberg@ripe.net
|
||||
|
||||
|
||||
Geert Jan de Groot
|
||||
RIPE Network Coordination Centre
|
||||
Kruislaan 409
|
||||
1098 SJ Amsterdam, the Netherlands
|
||||
Phone: +31 20 592 5065
|
||||
Fax: +31 20 592 5090
|
||||
AMail: GeertJan.deGroot@ripe.net
|
||||
|
||||
|
||||
Eliot Lear
|
||||
Mail Stop 15-730
|
||||
Silicon Graphics, Inc.
|
||||
2011 N. Shoreline Blvd.
|
||||
Mountain View, CA 94043-1389
|
||||
Phone: +1 415 960 1980
|
||||
Fax: +1 415 961 9584
|
||||
AMail: lear@sgi.com
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 9]
|
||||
|
||||
507
session-1/rfc1819.txt
Normal file
507
session-1/rfc1819.txt
Normal file
@ -0,0 +1,507 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Network Working Group Y. Rekhter
|
||||
Request for Comments: 1918 Cisco Systems
|
||||
Obsoletes: 1627, 1597 B. Moskowitz
|
||||
BCP: 5 Chrysler Corp.
|
||||
Category: Best Current Practice D. Karrenberg
|
||||
RIPE NCC
|
||||
G. J. de Groot
|
||||
RIPE NCC
|
||||
E. Lear
|
||||
Silicon Graphics, Inc.
|
||||
February 1996
|
||||
|
||||
|
||||
Address Allocation for Private Internets
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document specifies an Internet Best Current Practices for the
|
||||
Internet Community, and requests discussion and suggestions for
|
||||
improvements. Distribution of this memo is unlimited.
|
||||
|
||||
1. Introduction
|
||||
|
||||
For the purposes of this document, an enterprise is an entity
|
||||
autonomously operating a network using TCP/IP and in particular
|
||||
determining the addressing plan and address assignments within that
|
||||
network.
|
||||
|
||||
This document describes address allocation for private internets. The
|
||||
allocation permits full network layer connectivity among all hosts
|
||||
inside an enterprise as well as among all public hosts of different
|
||||
enterprises. The cost of using private internet address space is the
|
||||
potentially costly effort to renumber hosts and networks between
|
||||
public and private.
|
||||
|
||||
2. Motivation
|
||||
|
||||
With the proliferation of TCP/IP technology worldwide, including
|
||||
outside the Internet itself, an increasing number of non-connected
|
||||
enterprises use this technology and its addressing capabilities for
|
||||
sole intra-enterprise communications, without any intention to ever
|
||||
directly connect to other enterprises or the Internet itself.
|
||||
|
||||
The Internet has grown beyond anyone's expectations. Sustained
|
||||
exponential growth continues to introduce new challenges. One
|
||||
challenge is a concern within the community that globally unique
|
||||
address space will be exhausted. A separate and far more pressing
|
||||
concern is that the amount of routing overhead will grow beyond the
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 1]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
capabilities of Internet Service Providers. Efforts are in progress
|
||||
within the community to find long term solutions to both of these
|
||||
problems. Meanwhile it is necessary to revisit address allocation
|
||||
procedures, and their impact on the Internet routing system.
|
||||
|
||||
To contain growth of routing overhead, an Internet Provider obtains a
|
||||
block of address space from an address registry, and then assigns to
|
||||
its customers addresses from within that block based on each customer
|
||||
requirement. The result of this process is that routes to many
|
||||
customers will be aggregated together, and will appear to other
|
||||
providers as a single route [RFC1518], [RFC1519]. In order for route
|
||||
aggregation to be effective, Internet providers encourage customers
|
||||
joining their network to use the provider's block, and thus renumber
|
||||
their computers. Such encouragement may become a requirement in the
|
||||
future.
|
||||
|
||||
With the current size of the Internet and its growth rate it is no
|
||||
longer realistic to assume that by virtue of acquiring globally
|
||||
unique IP addresses out of an Internet registry an organization that
|
||||
acquires such addresses would have Internet-wide IP connectivity once
|
||||
the organization gets connected to the Internet. To the contrary, it
|
||||
is quite likely that when the organization would connect to the
|
||||
Internet to achieve Internet-wide IP connectivity the organization
|
||||
would need to change IP addresses (renumber) all of its public hosts
|
||||
(hosts that require Internet-wide IP connectivity), regardless of
|
||||
whether the addresses used by the organization initially were
|
||||
globally unique or not.
|
||||
|
||||
It has been typical to assign globally unique addresses to all hosts
|
||||
that use TCP/IP. In order to extend the life of the IPv4 address
|
||||
space, address registries are requiring more justification than ever
|
||||
before, making it harder for organizations to acquire additional
|
||||
address space [RFC1466].
|
||||
|
||||
Hosts within enterprises that use IP can be partitioned into three
|
||||
categories:
|
||||
|
||||
Category 1: hosts that do not require access to hosts in other
|
||||
enterprises or the Internet at large; hosts within
|
||||
this category may use IP addresses that are
|
||||
unambiguous within an enterprise, but may be
|
||||
ambiguous between enterprises.
|
||||
|
||||
Category 2: hosts that need access to a limited set of outside
|
||||
services (e.g., E-mail, FTP, netnews, remote login)
|
||||
which can be handled by mediating gateways (e.g.,
|
||||
application layer gateways). For many hosts in this
|
||||
category an unrestricted external access (provided
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 2]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
via IP connectivity) may be unnecessary and even
|
||||
undesirable for privacy/security reasons. Just like
|
||||
hosts within the first category, such hosts may use
|
||||
IP addresses that are unambiguous within an
|
||||
enterprise, but may be ambiguous between
|
||||
enterprises.
|
||||
|
||||
Category 3: hosts that need network layer access outside the
|
||||
enterprise (provided via IP connectivity); hosts in
|
||||
the last category require IP addresses that are
|
||||
globally unambiguous.
|
||||
|
||||
We will refer to the hosts in the first and second categories as
|
||||
"private". We will refer to the hosts in the third category as
|
||||
"public".
|
||||
|
||||
Many applications require connectivity only within one enterprise and
|
||||
do not need external (outside the enterprise) connectivity for the
|
||||
majority of internal hosts. In larger enterprises it is often easy to
|
||||
identify a substantial number of hosts using TCP/IP that do not need
|
||||
network layer connectivity outside the enterprise.
|
||||
|
||||
Some examples, where external connectivity might not be required,
|
||||
are:
|
||||
|
||||
- A large airport which has its arrival/departure displays
|
||||
individually addressable via TCP/IP. It is very unlikely
|
||||
that these displays need to be directly accessible from
|
||||
other networks.
|
||||
|
||||
- Large organizations like banks and retail chains are
|
||||
switching to TCP/IP for their internal communication. Large
|
||||
numbers of local workstations like cash registers, money
|
||||
machines, and equipment at clerical positions rarely need
|
||||
to have such connectivity.
|
||||
|
||||
- For security reasons, many enterprises use application
|
||||
layer gateways to connect their internal network to the
|
||||
Internet. The internal network usually does not have
|
||||
direct access to the Internet, thus only one or more
|
||||
gateways are visible from the Internet. In this case, the
|
||||
internal network can use non-unique IP network numbers.
|
||||
|
||||
- Interfaces of routers on an internal network usually do not
|
||||
need to be directly accessible from outside the enterprise.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 3]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
3. Private Address Space
|
||||
|
||||
The Internet Assigned Numbers Authority (IANA) has reserved the
|
||||
following three blocks of the IP address space for private internets:
|
||||
|
||||
10.0.0.0 - 10.255.255.255 (10/8 prefix)
|
||||
172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
|
||||
192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
|
||||
|
||||
We will refer to the first block as "24-bit block", the second as
|
||||
"20-bit block", and to the third as "16-bit" block. Note that (in
|
||||
pre-CIDR notation) the first block is nothing but a single class A
|
||||
network number, while the second block is a set of 16 contiguous
|
||||
class B network numbers, and third block is a set of 256 contiguous
|
||||
class C network numbers.
|
||||
|
||||
An enterprise that decides to use IP addresses out of the address
|
||||
space defined in this document can do so without any coordination
|
||||
with IANA or an Internet registry. The address space can thus be used
|
||||
by many enterprises. Addresses within this private address space will
|
||||
only be unique within the enterprise, or the set of enterprises which
|
||||
choose to cooperate over this space so they may communicate with each
|
||||
other in their own private internet.
|
||||
|
||||
As before, any enterprise that needs globally unique address space is
|
||||
required to obtain such addresses from an Internet registry. An
|
||||
enterprise that requests IP addresses for its external connectivity
|
||||
will never be assigned addresses from the blocks defined above.
|
||||
|
||||
In order to use private address space, an enterprise needs to
|
||||
determine which hosts do not need to have network layer connectivity
|
||||
outside the enterprise in the foreseeable future and thus could be
|
||||
classified as private. Such hosts will use the private address space
|
||||
defined above. Private hosts can communicate with all other hosts
|
||||
inside the enterprise, both public and private. However, they cannot
|
||||
have IP connectivity to any host outside of the enterprise. While not
|
||||
having external (outside of the enterprise) IP connectivity private
|
||||
hosts can still have access to external services via mediating
|
||||
gateways (e.g., application layer gateways).
|
||||
|
||||
All other hosts will be public and will use globally unique address
|
||||
space assigned by an Internet Registry. Public hosts can communicate
|
||||
with other hosts inside the enterprise both public and private and
|
||||
can have IP connectivity to public hosts outside the enterprise.
|
||||
Public hosts do not have connectivity to private hosts of other
|
||||
enterprises.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 4]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
Moving a host from private to public or vice versa involves a change
|
||||
of IP address, changes to the appropriate DNS entries, and changes to
|
||||
configuration files on other hosts that reference the host by IP
|
||||
address.
|
||||
|
||||
Because private addresses have no global meaning, routing information
|
||||
about private networks shall not be propagated on inter-enterprise
|
||||
links, and packets with private source or destination addresses
|
||||
should not be forwarded across such links. Routers in networks not
|
||||
using private address space, especially those of Internet service
|
||||
providers, are expected to be configured to reject (filter out)
|
||||
routing information about private networks. If such a router receives
|
||||
such information the rejection shall not be treated as a routing
|
||||
protocol error.
|
||||
|
||||
Indirect references to such addresses should be contained within the
|
||||
enterprise. Prominent examples of such references are DNS Resource
|
||||
Records and other information referring to internal private
|
||||
addresses. In particular, Internet service providers should take
|
||||
measures to prevent such leakage.
|
||||
|
||||
4. Advantages and Disadvantages of Using Private Address Space
|
||||
|
||||
The obvious advantage of using private address space for the Internet
|
||||
at large is to conserve the globally unique address space by not
|
||||
using it where global uniqueness is not required.
|
||||
|
||||
Enterprises themselves also enjoy a number of benefits from their
|
||||
usage of private address space: They gain a lot of flexibility in
|
||||
network design by having more address space at their disposal than
|
||||
they could obtain from the globally unique pool. This enables
|
||||
operationally and administratively convenient addressing schemes as
|
||||
well as easier growth paths.
|
||||
|
||||
For a variety of reasons the Internet has already encountered
|
||||
situations where an enterprise that has not been connected to the
|
||||
Internet had used IP address space for its hosts without getting this
|
||||
space assigned from the IANA. In some cases this address space had
|
||||
been already assigned to other enterprises. If such an enterprise
|
||||
would later connects to the Internet, this could potentially create
|
||||
very serious problems, as IP routing cannot provide correct
|
||||
operations in presence of ambiguous addressing. Although in principle
|
||||
Internet Service Providers should guard against such mistakes through
|
||||
the use of route filters, this does not always happen in practice.
|
||||
Using private address space provides a safe choice for such
|
||||
enterprises, avoiding clashes once outside connectivity is needed.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 5]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
A major drawback to the use of private address space is that it may
|
||||
actually reduce an enterprise's flexibility to access the Internet.
|
||||
Once one commits to using a private address, one is committing to
|
||||
renumber part or all of an enterprise, should one decide to provide
|
||||
IP connectivity between that part (or all of the enterprise) and the
|
||||
Internet. Usually the cost of renumbering can be measured by
|
||||
counting the number of hosts that have to transition from private to
|
||||
public. As was discussed earlier, however, even if a network uses
|
||||
globally unique addresses, it may still have to renumber in order to
|
||||
acquire Internet-wide IP connectivity.
|
||||
|
||||
Another drawback to the use of private address space is that it may
|
||||
require renumbering when merging several private internets into a
|
||||
single private internet. If we review the examples we list in Section
|
||||
2, we note that companies tend to merge. If such companies prior to
|
||||
the merge maintained their uncoordinated internets using private
|
||||
address space, then if after the merge these private internets would
|
||||
be combined into a single private internet, some addresses within the
|
||||
combined private internet may not be unique. As a result, hosts with
|
||||
these addresses would need to be renumbered.
|
||||
|
||||
The cost of renumbering may well be mitigated by development and
|
||||
deployment of tools that facilitate renumbering (e.g. Dynamic Host
|
||||
Configuration Protocol (DHCP)). When deciding whether to use private
|
||||
addresses, we recommend to inquire computer and software vendors
|
||||
about availability of such tools. A separate IETF effort (PIER
|
||||
Working Group) is pursuing full documentation of the requirements and
|
||||
procedures for renumbering.
|
||||
|
||||
5. Operational Considerations
|
||||
|
||||
One possible strategy is to design the private part of the network
|
||||
first and use private address space for all internal links. Then plan
|
||||
public subnets at the locations needed and design the external
|
||||
connectivity.
|
||||
|
||||
This design does not need to be fixed permanently. If a group of one
|
||||
or more hosts requires to change their status (from private to public
|
||||
or vice versa) later, this can be accomplished by renumbering only
|
||||
the hosts involved, and changing physical connectivity, if needed. In
|
||||
locations where such changes can be foreseen (machine rooms, etc.),
|
||||
it is advisable to configure separate physical media for public and
|
||||
private subnets to facilitate such changes. In order to avoid major
|
||||
network disruptions, it is advisable to group hosts with similar
|
||||
connectivity needs on their own subnets.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 6]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
If a suitable subnetting scheme can be designed and is supported by
|
||||
the equipment concerned, it is advisable to use the 24-bit block
|
||||
(class A network) of private address space and make an addressing
|
||||
plan with a good growth path. If subnetting is a problem, the 16-bit
|
||||
block (class C networks), or the 20-bit block (class B networks) of
|
||||
private address space can be used.
|
||||
|
||||
One might be tempted to have both public and private addresses on the
|
||||
same physical medium. While this is possible, there are pitfalls to
|
||||
such a design (note that the pitfalls have nothing to do with the use
|
||||
of private addresses, but are due to the presence of multiple IP
|
||||
subnets on a common Data Link subnetwork). We advise caution when
|
||||
proceeding in this area.
|
||||
|
||||
It is strongly recommended that routers which connect enterprises to
|
||||
external networks are set up with appropriate packet and routing
|
||||
filters at both ends of the link in order to prevent packet and
|
||||
routing information leakage. An enterprise should also filter any
|
||||
private networks from inbound routing information in order to protect
|
||||
itself from ambiguous routing situations which can occur if routes to
|
||||
the private address space point outside the enterprise.
|
||||
|
||||
It is possible for two sites, who both coordinate their private
|
||||
address space, to communicate with each other over a public network.
|
||||
To do so they must use some method of encapsulation at their borders
|
||||
to a public network, thus keeping their private addresses private.
|
||||
|
||||
If two (or more) organizations follow the address allocation
|
||||
specified in this document and then later wish to establish IP
|
||||
connectivity with each other, then there is a risk that address
|
||||
uniqueness would be violated. To minimize the risk it is strongly
|
||||
recommended that an organization using private IP addresses choose
|
||||
randomly from the reserved pool of private addresses, when allocating
|
||||
sub-blocks for its internal allocation.
|
||||
|
||||
If an enterprise uses the private address space, or a mix of private
|
||||
and public address spaces, then DNS clients outside of the enterprise
|
||||
should not see addresses in the private address space used by the
|
||||
enterprise, since these addresses would be ambiguous. One way to
|
||||
ensure this is to run two authority servers for each DNS zone
|
||||
containing both publically and privately addressed hosts. One server
|
||||
would be visible from the public address space and would contain only
|
||||
the subset of the enterprise's addresses which were reachable using
|
||||
public addresses. The other server would be reachable only from the
|
||||
private network and would contain the full set of data, including the
|
||||
private addresses and whatever public addresses are reachable the
|
||||
private network. In order to ensure consistency, both servers should
|
||||
be configured from the same data of which the publically visible zone
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 7]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
only contains a filtered version. There is certain degree of
|
||||
additional complexity associated with providing these capabilities.
|
||||
|
||||
6. Security Considerations
|
||||
|
||||
Security issues are not addressed in this memo.
|
||||
|
||||
7. Conclusion
|
||||
|
||||
With the described scheme many large enterprises will need only a
|
||||
relatively small block of addresses from the globally unique IP
|
||||
address space. The Internet at large benefits through conservation of
|
||||
globally unique address space which will effectively lengthen the
|
||||
lifetime of the IP address space. The enterprises benefit from the
|
||||
increased flexibility provided by a relatively large private address
|
||||
space. However, use of private addressing requires that an
|
||||
organization renumber part or all of its enterprise network, as its
|
||||
connectivity requirements change over time.
|
||||
|
||||
8. Acknowledgments
|
||||
|
||||
We would like to thank Tony Bates (MCI), Jordan Becker (ANS), Hans-
|
||||
Werner Braun (SDSC), Ross Callon (BayNetworks), John Curran (BBN
|
||||
Planet), Vince Fuller (BBN Planet), Tony Li (cisco Systems), Anne
|
||||
Lord (RIPE NCC), Milo Medin (NSI), Marten Terpstra (BayNetworks),
|
||||
Geza Turchanyi (RIPE NCC), Christophe Wolfhugel (Pasteur Institute),
|
||||
Andy Linton (connect.com.au), Brian Carpenter (CERN), Randy Bush
|
||||
(PSG), Erik Fair (Apple Computer), Dave Crocker (Brandenburg
|
||||
Consulting), Tom Kessler (SGI), Dave Piscitello (Core Competence),
|
||||
Matt Crawford (FNAL), Michael Patton (BBN), and Paul Vixie (Internet
|
||||
Software Consortium) for their review and constructive comments.
|
||||
|
||||
9. References
|
||||
|
||||
[RFC1466] Gerich, E., "Guidelines for Management of IP Address
|
||||
Space", RFC 1466, Merit Network, Inc., May 1993.
|
||||
|
||||
[RFC1518] Rekhter, Y., and T. Li, "An Architecture for IP Address
|
||||
Allocation with CIDR", RFC 1518, September 1993.
|
||||
|
||||
[RFC1519] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Classless
|
||||
Inter-Domain Routing (CIDR): an Address Assignment and
|
||||
Aggregation Strategy", RFC 1519, September 1993.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 8]
|
||||
|
||||
RFC 1918 Address Allocation for Private Internets February 1996
|
||||
|
||||
|
||||
10. Authors' Addresses
|
||||
|
||||
Yakov Rekhter
|
||||
Cisco systems
|
||||
170 West Tasman Drive
|
||||
San Jose, CA, USA
|
||||
Phone: +1 914 528 0090
|
||||
Fax: +1 408 526-4952
|
||||
EMail: yakov@cisco.com
|
||||
|
||||
|
||||
Robert G Moskowitz
|
||||
Chrysler Corporation
|
||||
CIMS: 424-73-00
|
||||
25999 Lawrence Ave
|
||||
Center Line, MI 48015
|
||||
Phone: +1 810 758 8212
|
||||
Fax: +1 810 758 8173
|
||||
EMail: rgm3@is.chrysler.com
|
||||
|
||||
|
||||
Daniel Karrenberg
|
||||
RIPE Network Coordination Centre
|
||||
Kruislaan 409
|
||||
1098 SJ Amsterdam, the Netherlands
|
||||
Phone: +31 20 592 5065
|
||||
Fax: +31 20 592 5090
|
||||
EMail: Daniel.Karrenberg@ripe.net
|
||||
|
||||
|
||||
Geert Jan de Groot
|
||||
RIPE Network Coordination Centre
|
||||
Kruislaan 409
|
||||
1098 SJ Amsterdam, the Netherlands
|
||||
Phone: +31 20 592 5065
|
||||
Fax: +31 20 592 5090
|
||||
EMail: GeertJan.deGroot@ripe.net
|
||||
|
||||
|
||||
Eliot Lear
|
||||
Mail Stop 15-730
|
||||
Silicon Graphics, Inc.
|
||||
2011 N. Shoreline Blvd.
|
||||
Mountain View, CA 94043-1389
|
||||
Phone: +1 415 960 1980
|
||||
Fax: +1 415 961 9584
|
||||
EMail: lear@sgi.com
|
||||
|
||||
|
||||
|
||||
|
||||
Rekhter, et al Best Current Practice [Page 9]
|
||||
|
||||
10
session-1/search-and-replace.py
Normal file
10
session-1/search-and-replace.py
Normal file
@ -0,0 +1,10 @@
|
||||
infile = open("session-1/rfc1819.txt")
|
||||
text = infile.readlines()
|
||||
infile.close()
|
||||
text = "".join(text)
|
||||
text = text.replace("EMail", "AMail")
|
||||
print(text)
|
||||
|
||||
outfile = open("session-1/AMail.txt","w")
|
||||
outfile.write(text)
|
||||
outfile.close()
|
||||
Loading…
Reference in New Issue
Block a user