Network Working Group J. Hause Internet-Draft Independent Intended status: Experimental 16 April 2026 Expires: 18 October 2026 ASIP: AS-Structured Internet Protocol (128-bit) draft-hause-asip-00 Abstract ASIP (AS-Structured Internet Protocol; IP version 8 on the wire) is a 128-bit network protocol that defines a new address family alongside IPv4. ASIP is NOT a wire-level superset of IPv4: an unmodified IPv4 device cannot send, receive, or forward an ASIP packet. Interoperation between ASIP-aware endpoints and legacy IPv4 networks is provided by a defined transition mechanism (stateless translation at AS boundaries and encapsulation across non-upgraded transit), not by wire compatibility. ASIP's addressing architecture arranges the 128-bit address as four 32-bit fields (ASN routing locator, zone, subnet, host). The ASN locator is used as a routing hint rather than a hard identity binding; multihoming, ASN transfer, and cross-ASN anycast remain possible through multi-address semantics defined in Sections 8, 11, and 14. This structure is intended to reduce operational friction during transition (familiar dotted-decimal notation, clean aggregation at the ASN boundary) rather than to achieve wire-level IPv4 compatibility. This document specifies the core protocol: address format, packet header, address classes, routing behavior, transition mechanisms, and security considerations. The Zone Server reference architecture (Section 16) is Informative and non-normative. The Cost Factor routing metric (Section 17) is OPTIONAL and is specified in a separate companion document (draft-asip-cf-00); Section 17 of this document is a one-paragraph forward reference. Interplanetary realm reservations (Section 3.12) are reserved allocations only; delay- tolerant transport is out of scope for this document. Operators MAY deploy ASIP addressing without any of the above. This specification extends the ASN-locator addressing model of [I-D.thain-ipv8] to a 128-bit four-field address format; see Section 1.3 for the relationship between the two proposals. Hause Expires 18 October 2026 [Page 1] Internet-Draft ASIP April 2026 Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 18 October 2026. Copyright Notice Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Table of Contents 1. 1. Introduction . . . . . . . . . . . . . . . . . . . . . . 5 1.1. 1.1. Requirements Language . . . . . . . . . . . . . . . 6 1.2. 1.2. Design Philosophy . . . . . . . . . . . . . . . . . 6 1.3. 1.3. Relationship to Prior Work . . . . . . . . . . . . 7 1.4. 1.4. What ASIP Is Not . . . . . . . . . . . . . . . . . 7 2. 2. Motivation and Problem Statement . . . . . . . . . . . . 7 2.1. 2.1. Address Exhaustion . . . . . . . . . . . . . . . . 8 2.2. 2.2. Routing Table Growth . . . . . . . . . . . . . . . 8 2.3. 2.3. Transition Model Failure . . . . . . . . . . . . . 8 2.4. 2.4. Requirements for a Viable Successor . . . . . . . . 8 3. 3. ASIP Address Format . . . . . . . . . . . . . . . . . . . 10 3.1. 3.1. Structure . . . . . . . . . . . . . . . . . . . . . 10 3.2. 3.2. Address Space . . . . . . . . . . . . . . . . . . . 11 3.3. 3.3. IPv4-Mapped ASIP Addresses . . . . . . . . . . . . 11 3.4. 3.4. ASN Encoding . . . . . . . . . . . . . . . . . . . 12 3.5. 3.5. Internal Zone Prefix (127.0.0.0/8 in r.r.r.r) . . . 12 3.6. 3.6. Inter-Organization Interop Prefix (127.127.0.0) . . 13 3.7. 3.7. RINE Peering Prefix (100.0.0.0/8 in r.r.r.r) . . . 13 Hause Expires 18 October 2026 [Page 2] Internet-Draft ASIP April 2026 3.8. 3.8. Interior Link Convention (222.0.0.0/8 in h.h.h.h) . . . . . . . . . . . . . . . . . . . . . . . . 14 3.9. 3.9. Private ASN Reservations . . . . . . . . . . . . . 14 3.10. 3.10. Link-Local Scope (169.254.0.0/16 in r.r.r.r) . . . 14 3.11. 3.11. Mesh and Ad-Hoc Scope (240.0.0.0/8 in r.r.r.r) . . 15 3.12. 3.12. Realm Architecture and Interplanetary Addressing (Informative) . . . . . . . . . . . . . . . . . . . . . 16 3.13. 3.13. Documentation and Testing Range (254.0.0.0/8 in r.r.r.r) . . . . . . . . . . . . . . . . . . . . . . . . 19 3.14. 3.14. Stateless Address Autoconfiguration (SLAAC-ASIP) . . . . . . . . . . . . . . . . . . . . . . 20 3.14.1. 3.14.1. Overview . . . . . . . . . . . . . . . . . 20 3.14.2. 3.14.2. Host Identifier Generation . . . . . . . . 20 3.14.3. 3.14.3. Duplicate Address Detection (DAD) . . . . . 21 3.14.4. 3.14.4. SLAAC-ASIP Sequence . . . . . . . . . . . . 22 3.15. 3.15. Address Usage Summary . . . . . . . . . . . . . . 22 4. 4. Address Classes . . . . . . . . . . . . . . . . . . . . . 23 4.1. 4.1. Scope Hierarchy . . . . . . . . . . . . . . . . . . 25 4.2. 4.2. Multicast Prefix Assignments (r.r.r.r = 255.255.255.x) . . . . . . . . . . . . . . . . . . . . . 26 5. 5. ASIP Packet Header . . . . . . . . . . . . . . . . . . . 26 5.1. 5.1. Header Format . . . . . . . . . . . . . . . . . . . 27 5.2. 5.2. Design Rationale: What Was Dropped from IPv4 . . . 29 5.3. 5.3. Extension Headers . . . . . . . . . . . . . . . . . 29 5.4. 5.4. Flow Label Usage . . . . . . . . . . . . . . . . . 31 5.5. 5.5. Socket API Compatibility . . . . . . . . . . . . . 32 5.6. 5.6. IPv4/ASIP Coexistence Processing . . . . . . . . . 33 6. 6. Notation and Address Compression . . . . . . . . . . . . 33 6.1. 6.1. Canonical Notation . . . . . . . . . . . . . . . . 33 6.2. 6.2. ASN Integer Notation . . . . . . . . . . . . . . . 34 6.3. 6.3. Zero-Field Compression (:: Notation) . . . . . . . 34 6.4. 6.4. Compression Examples . . . . . . . . . . . . . . . 35 6.5. 6.5. Expansion Algorithm . . . . . . . . . . . . . . . . 36 6.6. 6.6. Flat Dotted Notation (Wire/Debug Format) . . . . . 36 6.7. 6.7. CIDR Prefix Notation . . . . . . . . . . . . . . . 37 6.8. 6.8. Design Note on Notation Choices . . . . . . . . . . 37 7. 7. DNS Integration . . . . . . . . . . . . . . . . . . . . . 38 7.1. 7.1. A-ASIP Record Type . . . . . . . . . . . . . . . . 38 7.2. 7.2. Resolution Behavior . . . . . . . . . . . . . . . . 38 7.3. 7.3. Dual Record Example . . . . . . . . . . . . . . . . 39 8. 8. Routing Protocol Behavior . . . . . . . . . . . . . . . . 39 8.1. 8.1. Multi-Tier Routing Table . . . . . . . . . . . . . 39 8.2. 8.2. Routing Protocol Extensions . . . . . . . . . . . . 40 8.3. 8.3. eBGP-ASIP . . . . . . . . . . . . . . . . . . . . . 40 8.3.1. 8.3.1. Multihoming, Anycast, and ASN Transfer . . . 42 8.3.2. 8.3.2. Locator Rewriting . . . . . . . . . . . . . . 42 8.4. 8.4. WHOIS-ASIP Route Validation . . . . . . . . . . . . 43 8.5. 8.5. iBGP-ASIP and OSPF-ASIP . . . . . . . . . . . . . . 45 Hause Expires 18 October 2026 [Page 3] Internet-Draft ASIP April 2026 9. 9. ICMP-ASIP . . . . . . . . . . . . . . . . . . . . . . . . 45 9.1. 9.1. Core Messages . . . . . . . . . . . . . . . . . . . 45 9.2. 9.2. Neighbor Discovery . . . . . . . . . . . . . . . . 46 9.3. 9.3. ARP-ASIP Compatibility . . . . . . . . . . . . . . 47 10. 10. Multicast . . . . . . . . . . . . . . . . . . . . . . . 47 10.1. 10.1. Scoped Multicast Model . . . . . . . . . . . . . 48 10.2. 10.2. Intra-ASN Multicast (IPv4 Compatible) . . . . . . 49 10.3. 10.3. Cross-ASN Multicast . . . . . . . . . . . . . . . 50 10.4. 10.4. Well-Known Multicast Groups . . . . . . . . . . . 50 10.5. 10.5. Multicast Listener Discovery . . . . . . . . . . 50 10.6. 10.6. Composition of Multicast Scope with Realm and Mesh Scope . . . . . . . . . . . . . . . . . . . . . . . . . 51 11. 11. Anycast and Broadcast . . . . . . . . . . . . . . . . . 53 11.1. 11.1. Anycast . . . . . . . . . . . . . . . . . . . . . 53 11.2. 11.2. Broadcast . . . . . . . . . . . . . . . . . . . . 53 12. 12. Compatibility and Transition . . . . . . . . . . . . . . 54 12.1. 12.1. Deployment Model . . . . . . . . . . . . . . . . 54 12.2. 12.2. IPv4/ASIP Stateless Translation at AS Boundaries . . . . . . . . . . . . . . . . . . . . . . . 54 12.3. 12.3. ASIP-to-IPv4 Encapsulation Across IPv4 Transit . 56 12.4. 12.4. Transition Value . . . . . . . . . . . . . . . . 57 12.5. 12.5. IPv6 Coexistence . . . . . . . . . . . . . . . . 58 12.6. 12.6. CGNAT Behavior . . . . . . . . . . . . . . . . . 58 12.7. 12.7. Stateless Translation Reference: Packet-Level Walkthrough . . . . . . . . . . . . . . . . . . . . . . 59 12.7.1. 12.7.1. Simple TCP Data Packet (ASIP -> IPv4) . . . 59 12.7.2. 12.7.2. ICMP-ASIP Echo Request -> ICMPv4 Echo Request . . . . . . . . . . . . . . . . . . . . . . . 60 12.7.3. 12.7.3. ICMPv4 Destination Unreachable Carrying a Truncated IPv4 Inner Header (-> ICMP-ASIP) . . . . . 61 12.7.4. 12.7.4. ICMPv4 Type 3 Code 4 (Fragmentation Needed / DF Set) -> ICMP-ASIP Packet Too Big . . . . . . . . . 62 12.7.5. 12.7.5. Fragmented Inner Payload (-> IPv4) . . . . 63 12.7.6. 12.7.6. IPv4 DF Bit Handling (IPv4 -> ASIP) . . . . 63 12.7.7. 12.7.7. ICMP-ASIP Error Back to IPv4 Originator (Reverse Direction) . . . . . . . . . . . . . . . . . 64 12.7.8. 12.7.8. Port-Restricted Inner ICMP . . . . . . . . 65 12.8. 12.8. Path MTU Discovery and Encapsulation Budget . . . 65 13. 13. Application Compatibility . . . . . . . . . . . . . . . 67 13.1. 13.1. Legacy Applications . . . . . . . . . . . . . . . 67 13.2. 13.2. New Applications . . . . . . . . . . . . . . . . 67 13.3. 13.3. URL and URI Representation . . . . . . . . . . . 67 14. 14. Security Considerations . . . . . . . . . . . . . . . . 67 14.1. 14.1. ASN Locator Spoofing . . . . . . . . . . . . . . 68 14.2. 14.2. Internal Zone Prefix Protection . . . . . . . . . 70 14.3. 14.3. RINE Prefix Protection . . . . . . . . . . . . . 70 14.4. 14.4. Interior Link Convention Protection . . . . . . . 70 14.5. 14.5. RFC 1918 Address Privacy . . . . . . . . . . . . 70 Hause Expires 18 October 2026 [Page 4] Internet-Draft ASIP April 2026 14.6. 14.6. Prefix Granularity Enforcement . . . . . . . . . 71 14.7. 14.7. Header Overhead and DDoS . . . . . . . . . . . . 71 14.8. 14.8. Privacy Considerations . . . . . . . . . . . . . 71 14.9. 14.9. SLAAC-ASIP Security . . . . . . . . . . . . . . . 72 14.10. 14.10. Link-Local Scope Enforcement . . . . . . . . . . 72 14.11. 14.11. Scope Boundary Enforcement . . . . . . . . . . . 72 14.12. 14.12. Extension Header Security . . . . . . . . . . . 73 14.13. 14.13. Flow Label Security . . . . . . . . . . . . . . 74 14.14. 14.14. STRIDE Summary . . . . . . . . . . . . . . . . . 74 14.15. 14.15. Translator State and ICMP Error Attribution . . 77 15. 15. IANA Considerations . . . . . . . . . . . . . . . . . . 78 15.1. 15.1. IP Version Number . . . . . . . . . . . . . . . . 78 15.2. 15.2. Address Family . . . . . . . . . . . . . . . . . 78 15.3. 15.3. Reserved ASN Ranges . . . . . . . . . . . . . . . 79 15.4. 15.4. DNS A-ASIP Record Type . . . . . . . . . . . . . 80 15.5. 15.5. ICMP-ASIP Next-Header Value and Type Registry . . 80 15.6. 15.6. Cross-ASN Multicast Registry . . . . . . . . . . 81 15.7. 15.7. Broadcast Reservation . . . . . . . . . . . . . . 81 15.8. 15.8. Next Header Values . . . . . . . . . . . . . . . 81 15.9. 15.9. GENEVE Inner-Protocol Assignment for ASIP-to-IPv4 . . . . . . . . . . . . . . . . . . . . . 81 15.10. 15.10. WHOIS-ASIP Registry Domain Delegation . . . . . 81 16. 16. Zone Server Reference Architecture (Informative) . . . . 81 16.1. 16.1. Concept . . . . . . . . . . . . . . . . . . . . . 82 16.2. 16.2. Service Delivery Model . . . . . . . . . . . . . 82 16.3. 16.3. Authentication Model . . . . . . . . . . . . . . 82 16.4. 16.4. Why This Is Informative, Not Normative . . . . . 82 17. 17. Cost Factor Routing Metric (Informative) . . . . . . . . 83 18. 18. Acknowledgment of Trade-offs . . . . . . . . . . . . . . 83 18.1. 18.1. Header Overhead . . . . . . . . . . . . . . . . . 83 18.2. 18.2. Rigid Hierarchy . . . . . . . . . . . . . . . . . 84 18.3. 18.3. ASN Dependency . . . . . . . . . . . . . . . . . 84 18.4. 18.4. Transition Realism . . . . . . . . . . . . . . . 84 18.5. 18.5. Relationship to IPv6 . . . . . . . . . . . . . . 85 18.6. 18.5a. UNRESOLVED: Multihoming Under an ASN-Shaped Address . . . . . . . . . . . . . . . . . . . . . . . . 85 18.7. 18.5b. Server-Side Multi-Address Operational Impact . . 85 18.8. 18.6. WHOIS-ASIP Adoption . . . . . . . . . . . . . . . 88 18.9. 18.7. 32-Bit Host Field and SLAAC Constraints . . . . . 88 18.10. 18.8. Interplanetary Address Reservation . . . . . . . 89 18.11. 18.9. Complexity Budget . . . . . . . . . . . . . . . . 89 19. References . . . . . . . . . . . . . . . . . . . . . . . . . 89 19.1. Normative References . . . . . . . . . . . . . . . . . . 89 19.2. Informative References . . . . . . . . . . . . . . . . . 91 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 94 1. 1. Introduction Hause Expires 18 October 2026 [Page 5] Internet-Draft ASIP April 2026 1.1. 1.1. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 RFC2119 [RFC8174] when, and only when, they appear in all capitals, as shown here. 1.2. 1.2. Design Philosophy ASIP is built on three premises. *First,* ASIP is a new address family with a defined transition mechanism. It is not a wire-level superset of IPv4. Any packet carrying Version=8 in the IP header will be dropped by unmodified IPv4 routers, hosts, and middleboxes; conversely, ASIP-aware nodes receive IPv4 traffic only through the transition mechanisms defined in Section 12. The goal is not wire compatibility, which is unachievable without changing the framing layer. The goal is a transition path that minimizes operator-facing churn: familiar dotted-decimal notation, natural mapping of existing IPv4 host addresses into the ASIP host field, and stateless translation at AS boundaries so that legacy IPv4 endpoints remain reachable by ASIP- aware peers without application-layer changes. *Second,* the address format should reflect routing topology so that aggregation is natural and deaggregation is visible. Arranging the 128-bit address as ASN/Zone/Subnet/Host makes the default aggregation boundary obvious and provides a single-lookup inter-AS forwarding path for the common case. The ASN field is a routing locator used as a forwarding hint, not a globally binding identity; Sections 8, 11, and 14 define how multihomed, anycast, and transferred ASNs are handled through multi-address semantics rather than through a one- ASN-per-host rule. *Third,* a protocol specification must not exceed its scope. ASIP defines an address format, a packet header, and the routing behaviors those imply. Operational tooling, management platforms, authentication frameworks, and forward-looking realm designs are Informative only. An operator MAY adopt ASIP addressing without adopting any of them. Hause Expires 18 October 2026 [Page 6] Internet-Draft ASIP April 2026 1.3. 1.3. Relationship to Prior Work This specification extends the ASN-locator addressing concept of [I-D.thain-ipv8] from a 64-bit two-field address (ASN / Host) to a 128-bit four-field address (ASN / Zone / Subnet / Host). The dotted- decimal r.r.r.r notation for the ASN locator, the concept of encoding Autonomous System identity into the address prefix, and the Zone Server management architecture described in Section 16 (Informative) are derived from that prior work. The extensions contributed by this document are: the 128-bit address format with Zone and Subnet fields, the stateless translation mechanism defined in Section 12, the ingress-filter mechanism defined in Section 14.1, the byte-level encoding specifications in Section 12.7, and the security- considerations treatment in Section 14. [I-D.thain-ipv8] remains a distinct proposal with different addressing semantics; this document does not supersede it and does not claim to. The two specifications MAY coexist as parallel proposals in the IETF process. 1.4. 1.4. What ASIP Is Not ASIP is not a wire-compatible extension of IPv4. It is not a network management suite. It does not, at the protocol layer, mandate specific authentication mechanisms, logging formats, route-validation registries, or device firmware behaviors. Section 16 (Zone Server) is Informative, Section 17 (Cost Factor) is OPTIONAL and deferred to a companion document, and Section 3.12 (realm reservations beyond Earth) is reserved allocation only. The core protocol's correctness does not depend on any of them; a compliant ASIP implementation can ignore all three. The core address-layer specification stands alone: the packet header of §5, the address format of §3, and the link-local, mesh, and realm scopes of §§3.10-3.12 are self-contained and do not depend on any companion protocol. Inter-AS routing, route-ownership validation, and transit across non-upgraded IPv4 networks require the extensions named in Sections 8 and 12, and those extensions are REQUIRED for the use cases that depend on them; they are not part of the core address- layer specification. 2. 2. Motivation and Problem Statement Hause Expires 18 October 2026 [Page 7] Internet-Draft ASIP April 2026 2.1. 2.1. Address Exhaustion IANA completed allocation of the IPv4 unicast address space in February 2011. Regional Internet Registries exhausted their pools between 2011 and 2020. CGNAT has extended IPv4's operational life at the cost of added latency, broken peer-to-peer protocols, complicated troubleshooting, and centralized failure domains. The address exhaustion problem is architectural and cannot be resolved within a 32-bit address space. 2.2. 2.2. Routing Table Growth The BGP4 global routing table exceeded 1,000,000 prefixes by 2024 and grows without architectural bound. Prefix deaggregation for traffic engineering purposes is the primary growth driver. No BGP4 mechanism structurally prevents it. BGP4 has no binding relationship between what an ASN advertises and what it is authorized to advertise. Prefix hijacking, route leaks, and bogon injection remain possible because route ownership validation is not enforced as a condition of route acceptance. RPKI and BGPsec have seen limited deployment due to operational complexity and incomplete adoption incentives. 2.3. 2.3. Transition Model Failure IPv6 required dual-stack operation: every device, application, and network supporting both IPv4 and IPv6 simultaneously. This model imposed cost with no incremental benefit to early adopters. Organizations that deployed IPv6 still required full IPv4 support for the foreseeable future. The absence of a forcing function allowed indefinite deferral. Any viable successor must provide value to individual adopters before universal adoption occurs. 2.4. 2.4. Requirements for a Viable Successor These are the goals ASIP sets for itself. Wire-level IPv4 compatibility and zero-modification deployment are not among them: both are unachievable at the framing layer once Version=8 is used, because unmodified IPv4 forwarding elements discard packets whose Version field is not 4. Hause Expires 18 October 2026 [Page 8] Internet-Draft ASIP April 2026 * *R1.* Defined transition mechanism. ASIP-aware endpoints MUST be able to reach unmodified IPv4 endpoints through stateless translation and encapsulation mechanisms specified in Section 12. Wire-level IPv4 compatibility on the Version=8 code point is explicitly not claimed. * *R2.* Single-stack operation on the end host. An ASIP-aware host MUST be able to reach both IPv4 and ASIP destinations through a single ASIP socket API; dual stacks in the application layer are not required. Network paths in transition will carry both IPv4 and ASIP frames; that is unavoidable and is not called "dual stack" here. * *R3.* Expanded address space sufficient to eliminate exhaustion and CGNAT dependency and to reduce forced renumbering for the common case of upstream-provider change within a fixed ASN. The requirement is "reduce" rather than "eliminate" because the z:s:h identifier triple of §3.1 is stable across ASN transfer and locator rewrite, but the r.r.r.r field of any affected address changes per §8.3.2, and in that narrow sense some renumbering events persist. Residual renumbering events include (a) ASN transfer between organizations (§8.3.1), (b) multihoming add/drop where the set of r.r.r.r locators advertised for a host changes, (c) locator rewrite at an AS boundary (§8.3.2; not visible to most applications per §3.1's identifier/locator separation), (d) acquisition-driven merger of two ASNs into one, and (e) RIR policy revocation of an ASN. Common-case provider-change (an enterprise swapping upstream ISPs while keeping its own ASN) produces zero renumbering under ASIP, which is the benefit R3 claims. * *R4.* Structurally bounded global routing table in the common case, with multihoming, anycast, and traffic engineering preserved through the mechanisms defined in Sections 8.3, 11.1, and 14. * *R5.* Route ownership validation defined at the protocol layer (Section 8.4). Because route-ownership validation is a core guarantee, it is REQUIRED for any deployment that relies on the structural routing-table bound; it is RECOMMENDED but not REQUIRED for early deployments that accept BGP4-equivalent route hygiene. * *R6.* Implementable via software update on existing forwarding hardware (line cards, NICs, kernels, middleboxes). Hardware that cannot be updated to parse a 40-byte Version=8 header is incompatible with ASIP and MUST be replaced or bypassed via tunnels at the deployment boundary. * *R7.* Human-readable addressing consistent with IPv4 operator familiarity. Hause Expires 18 October 2026 [Page 9] Internet-Draft ASIP April 2026 * *R8.* Incremental adoption value at the AS boundary. An AS that deploys ASIP internally and at its borders benefits before universal adoption; transit across non-upgraded IPv4 networks uses the mechanisms of Section 12. * *R9.* No flag day for legacy IPv4 endpoints; they continue to operate unchanged and are reached via translation. There is, however, a per-device software-update flag day for any node that wishes to participate in ASIP forwarding or origination. * *R10.* Clear separation between protocol-layer requirements and operational recommendations (Sections 16, 17). 3. 3. ASIP Address Format 3.1. 3.1. Structure An ASIP address is a 128-bit value composed of four 32-bit fields: r.r.r.r . z.z.z.z . s.s.s.s . h.h.h.h | | | | | | | | ASN Zone Subnet Host Locator ID ID ID (32 bit) (32 bit) (32 bit) (32 bit) * *r.r.r.r* -- ASN Routing Locator. A 32-bit value drawn from the Autonomous System Number space and used as the inter-AS forwarding key. The ASN locator is a routing hint; it is NOT a globally binding identity. A single host MAY be reached via multiple addresses with different r.r.r.r values, and a single ASN MAY be advertised from multiple locations. Rewriting of r.r.r.r at ingress or egress is permitted under the conditions defined in Section 8.3 and Section 11.1. * *z.z.z.z* -- Zone Identifier. Identifies a network zone, region, or organizational division within the AS. Allocated by the AS operator. Locally significant. * *s.s.s.s* -- Subnet Identifier. Identifies a subnet within a zone. Allocated by the zone operator. Locally significant. * *h.h.h.h* -- Host Identifier. Identifies a host within a subnet. Its value space is the same as an IPv4 host address so that existing operational practice (well-known host addresses, DHCP pools, broadcast conventions) carries over without reinterpretation. *Identifier/locator separation:* r.r.r.r is a routing locator only, not a host-identity field. Binding ASN identity into the address as a hard property of the host would break multihoming, ASN transfer, and cross-ASN anycast: a multihomed host reachable through two ASes Hause Expires 18 October 2026 [Page 10] Internet-Draft ASIP April 2026 could not present a single identity, an ASN transfer would force every affected host to acquire a new identity, and a single anycast service could not be advertised from multiple ASNs. Under the locator-only semantics defined here, a multihomed host has one address per upstream AS it is reachable through; an anycast service has one address per ASN it is advertised from; an ASN transfer rewrites the r.r.r.r locator of the affected addresses without changing the underlying host. The z.z.z.z, s.s.s.s, and h.h.h.h fields collectively form a stable identifier within an operator's scope; r.r.r.r is allowed to change as reachability changes. Section 8 defines the routing-layer consequences; Section 14 defines the security consequences. 3.2. 3.2. Address Space Total: 2^128 = 340,282,366,920,938,463,463,374,607,431,768,211,456 Per ASN: 2^96 = 79,228,162,514,264,337,593,543,950,336 Per Zone: 2^64 = 18,446,744,073,709,551,616 Per Subnet: 2^32 = 4,294,967,296 This is identical in total size to IPv6 (2^128) but with a fixed hierarchical structure that directly encodes routing topology. 3.3. 3.3. IPv4-Mapped ASIP Addresses When the ASN Locator, Zone ID, and Subnet ID are all zero, the Host ID field encodes an IPv4 address: 0.0.0.0 . 0.0.0.0 . 0.0.0.0 . h.h.h.h This form is analogous to IPv6's ::ffff:0:0/96 IPv4-mapped address block [RFC4291]. It is a representation inside the ASIP address space of an IPv4 destination; it is NOT a wire-level IPv4 packet. An ASIP-aware host that wishes to reach an unmodified IPv4 endpoint constructs an IPv4-mapped destination and passes it to the ASIP stack, which either: 1. Forwards the traffic as a Version=8 frame to an ASIP/IPv4 translator at the AS boundary (Section 12.2), which emits Version=4 on the downstream IPv4 network; or 2. Encapsulates the Version=8 frame in a Version=4 packet for transit across non-upgraded IPv4 infrastructure (Section 12.3). An unmodified IPv4 device cannot send or receive a Version=8 frame directly. The IPv4-mapped address form exists so that the ASIP stack and application layer have a single address type for both ASIP and IPv4 destinations, not so that IPv4 hosts are silently reclassified as "ASIP compliant." Hause Expires 18 October 2026 [Page 11] Internet-Draft ASIP April 2026 An ASIP implementation that receives a Version=8 packet where r.r.r.r = 0.0.0.0, z.z.z.z = 0.0.0.0, and s.s.s.s = 0.0.0.0 MUST treat the h.h.h.h field as an IPv4 destination and forward it toward the IPv4/ ASIP translator selected by Section 12. *r=0 with z≠0 or s≠0.* The IPv4-mapped form above requires all three of r, z, s to be zero. The partial form (r.r.r.r = 0.0.0.0 with z.z.z.z or s.s.s.s non-zero) is not defined by this document and, consistent with the AS 0 reservation of [RFC7607], is not a valid origin or destination for ASIP traffic. ASIP implementations MUST drop any received Version=8 packet whose source or destination r.r.r.r = 0.0.0.0 is accompanied by a non-zero z.z.z.z or s.s.s.s, and SHOULD log the event. *Realm containment exception:* Section 4.1 defines strict scope containment: an address in realm X is not visible outside realm X. IPv4-mapped addresses (r=z=s=0) are an explicit exception to the terrestrial-realm containment rule because they represent a legacy IPv4 destination that has no realm of its own. IPv4-mapped traffic is handled by translators at the terrestrial/realm boundary and is never forwarded natively into a non-terrestrial realm. 3.4. 3.4. ASN Encoding The 32-bit ASN is encoded directly into the r.r.r.r field as a 32-bit unsigned integer in network byte order: ASN 64496 = 0.0.251.240 (documentation, per RFC 5398) ASN 64497 = 0.0.251.241 (documentation, per RFC 5398) ASN 15169 = 0.0.59.65 (example: Google) ASN 13335 = 0.0.52.23 (example: Cloudflare) 3.5. 3.5. Internal Zone Prefix (127.0.0.0/8 in r.r.r.r) The r.r.r.r range 127.0.0.0/8 is permanently reserved for internal zone prefixes. These addresses identify network zones within an organization's private addressing space and are never routed externally. 127.1.0.0 . z.z.z.z . s.s.s.s . h.h.h.h (Internal zone 1) 127.2.0.0 . z.z.z.z . s.s.s.s . h.h.h.h (Internal zone 2) 127.3.0.0 . z.z.z.z . s.s.s.s . h.h.h.h (Internal zone 3) Internal zone prefix rules: * MUST NOT be routed beyond the organization's AS boundary. * MUST NOT appear on WAN interfaces or public internet links. Hause Expires 18 October 2026 [Page 12] Internet-Draft ASIP April 2026 * MUST NOT appear in eBGP-ASIP advertisements. * MAY be used freely within an organization's routing infrastructure. * Provides 2^(24+32+32+32) = 2^120 effective internal addresses per organization (24 free bits in the r.r.r.r field after the fixed 127/8 prefix, plus the full Zone, Subnet, and Host fields). The same 127.0.0.0/8 prefix space is reused independently inside every organization; the 2^120 figure is a per-organization capacity, not a globally partitioned one. Organizations may build geographically distributed, multi-region private networks of arbitrary scale without external address coordination and with zero possibility of zone-to-zone address conflict. ASN numbers that encode to the 127.0.0.0/8 range (ASN 2,130,706,432 through ASN 2,147,483,647) are reserved for internal zone use and MUST NOT be allocated by IANA for public internet routing. 3.6. 3.6. Inter-Organization Interop Prefix (127.127.0.0) The prefix 127.127.0.0 in the r.r.r.r field is reserved as a standard inter-organization interconnect DMZ. When two organizations need to peer without exposing internal addressing: Org A Org B ----- ----- 127.1.0.0.z.s.h <-> XLATE <-> 127.127.0.0.z.s.h <-> XLATE <-> 127.2.0.0.z.s.h Neither organization exposes its internal zone topology to the other. Each controls exactly what it publishes into the shared 127.127.0.0 space. 3.7. 3.7. RINE Peering Prefix (100.0.0.0/8 in r.r.r.r) The r.r.r.r range 100.0.0.0/8 is reserved for Regional Inter-Network Exchange (RINE) peering fabric addressing. RINE addresses are used exclusively for AS-to-AS peering links at IXPs and private interconnect facilities. * MUST NOT be advertised in the global eBGP-ASIP routing table. * MUST NOT be assigned to end devices. * MUST be filtered at all eBGP-ASIP border routers. Hause Expires 18 October 2026 [Page 13] Internet-Draft ASIP April 2026 3.8. 3.8. Interior Link Convention (222.0.0.0/8 in h.h.h.h) The h.h.h.h range 222.0.0.0/8 is designated by convention for router- to-router interior link addressing within an AS. This is a soft convention, not a scope boundary. Two distinct filtering behaviors apply and MUST NOT be conflated: * *Route-advertisement filtering (Section 14.4):* eBGP-ASIP border routers MUST NOT advertise prefixes whose covered addresses have h.h.h.h in 222.0.0.0/8 as reachable interior links. This prevents interior-link addressing from being exported to other ASes. * *Data-plane filtering:* Border routers MUST NOT filter data packets solely on the basis of a 222.0.0.0/8 h.h.h.h value. The host field is locally significant; other ASes MAY use 222.x.x.x host addresses for any purpose and their traffic must transit normally. Filtering h.h.h.h values at border routers would break legitimate inter-AS traffic from operators who use this range internally. Conflating the two would cause legitimate external traffic to be dropped whenever a remote operator happened to use 222.x.x.x host values internally; the two behaviors are therefore kept distinct as a normative requirement. 3.9. 3.9. Private ASN Reservations Consistent with RFC 6996: * ASN 65534 (r.r.r.r = 0.0.255.254): Reserved for private inter- organization eBGP-ASIP peering. * ASN 65533 (r.r.r.r = 0.0.255.253): Reserved for documentation and testing. 3.10. 3.10. Link-Local Scope (169.254.0.0/16 in r.r.r.r) The r.r.r.r range 169.254.0.0/16 is reserved for link-local addressing, directly analogous to both IPv4's APIPA (169.254.0.0/16) and IPv6's fe80::/10. The familiar range was chosen deliberately so that operators immediately recognize the scope. 169.254.0.0:0.0.0.0:0.0.0.0:h.h.h.h Compressed: 169.254.0.0::h.h.h.h Link-local rules: Hause Expires 18 October 2026 [Page 14] Internet-Draft ASIP April 2026 * MUST NOT be forwarded by any router. Link-local addresses are valid only on the physical or virtual link where they originate. * MUST be usable without any prior configuration, DHCP, or router contact. A device that has received no configuration of any kind MUST be able to generate and use a link-local address. * MUST be used for neighbor discovery, router solicitation, and SLAAC-ASIP bootstrapping (Section 3.14). * The h.h.h.h field is self-assigned by the device (see Section 3.14 for generation rules). * Multiple link-local addresses MAY exist on a single interface. Link-local addresses serve the same critical bootstrapping role as fe80:: in IPv6: they provide a communication channel that exists before any infrastructure (DHCP, DNS, routing) is available. Every ASIP interface MUST have at least one link-local address at all times. 3.11. 3.11. Mesh and Ad-Hoc Scope (240.0.0.0/8 in r.r.r.r) The r.r.r.r range 240.0.0.0/8 is reserved for mesh and ad-hoc network addressing. This range is used by devices participating in self- organizing networks where no AS infrastructure exists: disaster recovery, battlefield mesh, sensor networks, and similar environments. 240.x.x.x:z.z.z.z:s.s.s.s:h.h.h.h Mesh scope rules: * MUST NOT be routed beyond the mesh boundary. * MAY be bridged to AS-routed networks via a mesh gateway that performs address translation for unicast traffic. Multicast is NOT forwarded across a mesh gateway in either direction per §10.6 rule 5; application-layer relay is the only sanctioned path for cross-mesh multicast delivery. * Devices within a mesh self-assign addresses using SLAAC-ASIP (Section 3.14) with DAD. * The x.x.x portion of 240.x.x.x MAY be used to identify distinct mesh domains. Hause Expires 18 October 2026 [Page 15] Internet-Draft ASIP April 2026 3.12. 3.12. Realm Architecture and Interplanetary Addressing (Informative) This subsection is INFORMATIVE. The reservations described here set aside r.r.r.r ranges and nothing more; no delay-tolerant transport, no inter-realm relay, and no non-terrestrial routing protocol is defined by this document. A compliant ASIP implementation MAY ignore this section entirely except to filter the reserved ranges as unallocated. ASIP reserves ranges in the r.r.r.r field for network realms beyond the terrestrial internet. A realm is a physically or logically distinct routing domain where light-speed delay, intermittent connectivity, or governance boundaries make standard BGP convergence assumptions invalid. The rationale is forward-looking: deep-space networking (DTN) is already standardized via the Bundle Protocol [RFC9171] but has no native IP-layer addressing scheme. Reserving realm prefixes now costs nothing and avoids a renumbering event later. The reservations are held unallocated until a companion specification defines how they are to be used. *Realm Allocations:* +==========================+===========================+==========+ | r.r.r.r Range | Realm | Status | +==========================+===========================+==========+ | 0.0.0.1 - 96.255.255.255 | Terrestrial (Earth) | Active | +--------------------------+---------------------------+----------+ | 97.0.0.0/8 | Near-Earth Infrastructure | Reserved | +--------------------------+---------------------------+----------+ | 98.0.0.0/8 | Cislunar / Lunar | Reserved | +--------------------------+---------------------------+----------+ | 99.0.0.0/8 | Martian | Reserved | +--------------------------+---------------------------+----------+ | 241.0.0.0 - | Future Celestial Bodies | Reserved | | 249.255.255.255 | | | +--------------------------+---------------------------+----------+ | 250.0.0.0/8 | Delay-Tolerant (DTN) | Reserved | | | Relay | | +--------------------------+---------------------------+----------+ Table 1 *Realm properties:* Hause Expires 18 October 2026 [Page 16] Internet-Draft ASIP April 2026 (The bullets below are descriptive guidance on operating characteristics; the RFC 2119 keywords within them are normative only for operators who voluntarily deploy into the named realm per a future companion DTN profile. None of these bullets imposes a conformance requirement on ASIP core implementations, which per the section opener MAY ignore §3.12 entirely.) * *Near-Earth (97.0.0.0/8):* LEO and GEO satellite constellations, space stations, orbital infrastructure. Round-trip times up to ~600ms. Standard TCP is functional with tuning. eBGP-ASIP peering is viable with extended timers. * *Cislunar/Lunar (98.0.0.0/8):* Earth-Moon communication. ~2.5 second round-trip. TCP is marginal; DTN overlays are RECOMMENDED within the scope of a companion profile. eBGP-ASIP peering within that companion profile would require hold timers of 30+ seconds. * *Martian (99.0.0.0/8):* Earth-Mars communication. 4-24 minute one- way delay depending on orbital position. TCP is non-functional. Any companion deployment profile for this realm would necessarily use DTN store-and-forward; eBGP-ASIP is not applicable and a delay-tolerant routing protocol is needed (out of scope for this document). * *DTN Relay (250.0.0.0/8):* Addresses for DTN relay nodes that bridge between realms. In a future companion profile these nodes would participate in multiple realms and perform store-and-forward routing across light-speed boundaries; this document defines no such behavior. Each realm operates as an independent routing domain. Inter-realm traffic is forwarded by relay gateways that bridge the appropriate delay-tolerant transport. The realm prefix in r.r.r.r allows any router to determine the destination realm from a single 32-bit lookup and route to the appropriate relay gateway. The remainder of this subsection is Informative guidance for operators who elect to experiment with realm-scoped deployments; normative MUSTs and MUST NOTs below are normative only within such deployments and have no effect on implementations that ignore §3.12 entirely per the opening paragraph of this subsection. The normative core-protocol rules that cover cross-realm scope violations for any deployment are in §14.11 and §10.6. *Realm identification is implicit in r.r.r.r.* There is no separate realm-ID field in the ASIP header (§5.1). A border relay determines the destination realm by looking up the destination address's r.r.r.r value against the realm-allocation table above; the source realm is Hause Expires 18 October 2026 [Page 17] Internet-Draft ASIP April 2026 determined the same way from the source address. No packet-format changes are required to carry realm identity, and no companion protocol defines a realm-ID explicit field in this document. *Mesh/realm and mesh-as-relay interaction.* A mesh node (§3.11, 240.0.0.0/8 in r.r.r.r) is by construction scoped to its mesh domain and does not hold an address in any non-terrestrial realm range (97/8, 98/8, 99/8, 241/8–249/8, 250/8). A realm relay is, by definition, a border node that holds addresses in both the terrestrial realm and the non-terrestrial realm it bridges; a mesh node holds neither (its r.r.r.r is in 240/8) and therefore cannot be a realm relay. Operators who wish a physically-mesh deployment to participate in realm-crossing SHOULD front that deployment with a terrestrial AS boundary (a mesh gateway per §3.11) and attach that AS to a realm relay via standard terrestrial peering. A node SHOULD NOT simultaneously hold a mesh (240/8) and a non-terrestrial realm (any of 97/8, 98/8, 99/8, 241/8–249/8, 250/8, as enumerated earlier in this paragraph) r.r.r.r address on the same interface; dual-homing across the two scopes is NOT RECOMMENDED and should use a gateway node with two interfaces if attempted. *Delay-tolerant profile for core ASIP machinery.* Several pieces of core ASIP machinery have implicit sub-second-RTT assumptions that do not hold at interplanetary distances: * *SLAAC-ASIP DAD (§3.14.3)* expects a probe response within RetransTimer (IPv6 default 1000 ms); at cislunar RTT (~2.5 s) DAD timers require at minimum 4x extension and at Martian RTT (minutes) DAD as specified is inoperable. * *NDP neighbor-cache aging (§9.2)* inherits IPv6 defaults (ReachableTime on the order of 30 s); link-level reachability assumptions break when a "link" is a light-minute. * *PMTUD (§12.8)* assumes ICMP-ASIP Packet Too Big arrives within a data-flow RTT; at realm scale PMTU discovery would stall. * *Translator per-flow state (§14.15)* ages at TCP/UDP-scale defaults; per-flow state for a cross-realm flow would expire before the first round-trip completes. * *eBGP-ASIP hold timers (§8.3)* default in the single-digit-minutes range; cislunar is tractable with tuning, Martian is not. This document does NOT define a DTN profile that adjusts the above. Until a companion DTN profile is published, §3.12 realm reservations 98/8, 99/8, 241/8–249/8, and 250/8 are *reserved address space only* and should not be deployed over the public internet for real traffic. Hause Expires 18 October 2026 [Page 18] Internet-Draft ASIP April 2026 97/8 (Near-Earth) operates at sub-second RTT and is the only realm range for which the core ASIP timers above are tractable with standard tuning. This restricts interplanetary realm use to reserved-address status until a DTN profile exists; that restriction is a scope choice, not a protocol defect. *Cross-realm authentication (Informative guidance; core filtering rule is normative in §14.11).* A packet arriving at a terrestrial realm relay with a source r.r.r.r in a remote realm's range (e.g., 99.x.x.x claiming to originate on Mars) is trivially spoofable within the local realm unless the relay verifies the packet's origin through some mechanism outside the ASIP header. This document does not define a cross-realm authentication mechanism; the companion DTN profile should define one (e.g., BPSec [RFC9172] over the Bundle Protocol carrying ASIP as payload, or a relay-to-relay IPsec/ESP tunnel anchored to published realm-relay identity). Until that profile exists, a realm relay SHOULD treat packets sourced from a remote realm as authenticated only when received on a physical or cryptographic channel that is itself bound to the peer realm's relay (e.g., a preshared-key IPsec tunnel to a specific named Martian relay endpoint). Unauthenticated packets carrying remote-realm source addresses SHOULD be dropped at the terrestrial-realm ingress under this Informative guidance; the normative MUST-drop rule for scope- boundary violations in general lives in §14.11 and covers this case by the scope-containment principle. *Design note:* These allocations are deliberately generous. Reserving entire /8 blocks for bodies that currently have zero networked devices is intentional. The cost of reserving address space now is zero. The cost of not having it when Mars has a permanent settlement is a protocol revision. 3.13. 3.13. Documentation and Testing Range (254.0.0.0/8 in r.r.r.r) The r.r.r.r range 254.0.0.0/8 is reserved for documentation, examples, and testing. This is analogous to IPv4's 192.0.2.0/24 (TEST-NET-1), 198.51.100.0/24 (TEST-NET-2), and 203.0.113.0/24 (TEST- NET-3), but provides a substantially larger space suitable for complex multi-AS test scenarios. Addresses within 254.0.0.0/8 MUST NOT appear on any production network and MUST be filtered at all border routers. Example: 254.0.0.1::192.168.1.1 (test ASN 1, host 192.168.1.1) 254.0.0.2:0.0.0.3::10.0.0.1 (test ASN 2, zone 3, host 10.0.0.1) Hause Expires 18 October 2026 [Page 19] Internet-Draft ASIP April 2026 3.14. 3.14. Stateless Address Autoconfiguration (SLAAC-ASIP) ASIP supports stateless address autoconfiguration, derived from IPv6 SLAAC [RFC4862] but adapted for the 32-bit host field. 3.14.1. 3.14.1. Overview SLAAC-ASIP allows a device to configure a routable ASIP address without contacting a DHCP server. The device learns the network prefix (r.r.r.r:z.z.z.z:s.s.s.s, 96 bits) from Router Advertisements and generates the h.h.h.h host portion locally. SLAAC-ASIP is OPTIONAL. Operators MAY require DHCP-ASIP-only addressing via a flag in Router Advertisements, identical to IPv6's M (Managed) flag. SLAAC-ASIP and DHCP-ASIP MAY coexist on the same network. 3.14.2. 3.14.2. Host Identifier Generation The h.h.h.h field (32 bits) is generated by one of three methods, in order of preference: *Method 1: Stable Opaque Identifier (RECOMMENDED)* A stable, pseudorandom 32-bit host ID derived from a hash of the interface identifier, network prefix, a secret key, and a counter [RFC7217 adapted]: h.h.h.h = truncate_32(SHA-256(prefix || interface_id || secret_key || counter)) This produces a stable address per network (the same device on the same network always gets the same address) without revealing hardware identity. This is the ASIP equivalent of IPv6's RFC 7217 stable privacy addresses. *Method 2: Temporary Random Identifier (Privacy Extension)* A cryptographically random 32-bit value, regenerated periodically (RECOMMENDED interval: 24 hours). Analogous to IPv6 temporary addresses [RFC8981]. Used for outbound connections where tracking prevention is desired. *Method 3: MAC-Derived Identifier (NOT RECOMMENDED)* The lower 24 bits of the MAC address (OUI stripped) with the upper 8 bits set to a hash of the full 48-bit MAC: Hause Expires 18 October 2026 [Page 20] Internet-Draft ASIP April 2026 h.h.h.h = hash_8(MAC[0:6]) || MAC[3:6] This method is NOT RECOMMENDED because it exposes hardware identity, analogous to the privacy concerns with IPv6's original EUI-64 scheme. It is defined for constrained devices that lack a cryptographic random number generator. *Reserved host values:* h.h.h.h = 0.0.0.0 (network identifier) and h.h.h.h = 255.255.255.255 (subnet broadcast) are reserved and MUST NOT be generated by SLAAC-ASIP. If Method 1's hash output or Method 2's random draw produces one of these reserved values, the implementation MUST discard the candidate and regenerate (for Method 1, by incrementing the counter and re-hashing; for Method 2, by drawing a new random value). The probability of this event is 2/2^32 per draw and does not meaningfully affect the DAD retry budget. 3.14.3. 3.14.3. Duplicate Address Detection (DAD) Before using a SLAAC-ASIP-generated address, a device MUST perform Duplicate Address Detection using ICMP-ASIP Neighbor Solicitation messages (analogous to IPv6 DAD [RFC4862]). The device sends an ICMP-ASIP Neighbor Solicitation to the tentative address using its link-local address as the source. If a response is received, the address is in use and the device MUST generate a new h.h.h.h (increment the counter for Method 1, regenerate for Method 2). *Collision bound and DHCP-ASIP fallback:* The 32-bit host field is smaller than IPv6's 64-bit interface identifier. Birthday-paradox analysis gives the following collision probabilities on a single subnet with N concurrent SLAAC-generated host IDs drawn uniformly at random from 2^32: P(collision) ~= 1 - exp(-N^2 / 2^33). At N=10,000: P ~= 1.16%. At N=50,000: P ~= 25.3%. At N=65,536 (2^16): P ~= 39.3%. The 50%-collision point is N ~= sqrt(2 ln 2 * 2^32) ~= 77,162 hosts. Modern datacenter leaf subnets routinely approach the tens of thousands. Accordingly: * On subnets expected to carry fewer than 10,000 concurrent devices, SLAAC-ASIP MAY be used as the sole addressing method. * On subnets that may exceed 10,000 concurrent devices, Router Advertisements MUST set the M (Managed) flag and devices MUST obtain addresses via DHCP-ASIP. SLAAC-ASIP MAY still be used for the link-local bootstrap address. * DAD retries MUST be bounded. After 3 collisions, a device MUST fall back to DHCP-ASIP or report failure to the operator rather than re-rolling indefinitely. Hause Expires 18 October 2026 [Page 21] Internet-Draft ASIP April 2026 Operators deploying very large flat L2 domains (>10k hosts) SHOULD segment those domains into smaller subnets rather than relying on 32-bit SLAAC uniqueness. The trade-off narrative motivating the 10k threshold, including the birthday-paradox curve and the relation to IPv6's 64-bit interface identifier, is summarized in §18.7. 3.14.4. 3.14.4. SLAAC-ASIP Sequence 1. Interface comes up 2. Generate link-local address: 169.254.0.0::h.h.h.h (SLAAC-ASIP Method 1 or 2) 3. Perform DAD on link-local address 4. Send Router Solicitation from link-local address 5. Receive Router Advertisement containing prefix (r:z:s) 6. Generate host ID h.h.h.h for the advertised prefix 7. Perform DAD on the full address r:z:s:h 8. Address is ready for use The entire sequence completes in under 2 seconds on a typical wired network, comparable to IPv6 SLAAC. 3.15. 3.15. Address Usage Summary +=================+==================+=========================+ | r.r.r.r Range | Usage | Scope | +=================+==================+=========================+ | 0.0.0.0 (with | IPv4-mapped | Translated/encapsulated | | z=0, s=0) | | per Section 12 | +-----------------+------------------+-------------------------+ | 0.0.0.1 - | Terrestrial ASN | Global (eBGP-ASIP) | | 96.255.255.255 | Unicast | | +-----------------+------------------+-------------------------+ | 97.0.0.0/8 | Near-Earth | Realm (reserved) | | | Infrastructure | | +-----------------+------------------+-------------------------+ | 98.0.0.0/8 | Cislunar / Lunar | Realm (reserved) | +-----------------+------------------+-------------------------+ | 99.0.0.0/8 | Martian | Realm (reserved) | +-----------------+------------------+-------------------------+ | 100.0.0.0/8 | RINE peering | Link (IXP only) | | | links | | +-----------------+------------------+-------------------------+ | 101.0.0.0 - | Terrestrial ASN | Global (eBGP-ASIP) | | 126.255.255.255 | Unicast | | +-----------------+------------------+-------------------------+ | 127.0.0.0/8 | Internal zone | Organization | | | prefixes | | +-----------------+------------------+-------------------------+ | 128.0.0.0 - | Terrestrial ASN | Global (eBGP-ASIP) | | 169.253.255.255 | Unicast | | +-----------------+------------------+-------------------------+ Hause Expires 18 October 2026 [Page 22] Internet-Draft ASIP April 2026 | 169.254.0.0/16 | Link-local | Link only | +-----------------+------------------+-------------------------+ | 169.255.0.0 - | Terrestrial ASN | Global (eBGP-ASIP) | | 239.255.255.255 | Unicast | | +-----------------+------------------+-------------------------+ | 240.0.0.0/8 | Mesh / Ad-hoc | Mesh domain | +-----------------+------------------+-------------------------+ | 241.0.0.0 - | Future celestial | Reserved | | 249.255.255.255 | bodies | | +-----------------+------------------+-------------------------+ | 250.0.0.0/8 | DTN Relay | Realm bridge | +-----------------+------------------+-------------------------+ | 251.0.0.0 - | Reserved | Future use | | 253.255.255.255 | | | +-----------------+------------------+-------------------------+ | 254.0.0.0/8 | Documentation / | Never routed | | | Testing | | +-----------------+------------------+-------------------------+ | 255.0.0.0 - | Reserved | Future use; MUST NOT be | | 255.255.254.255 | | routed | +-----------------+------------------+-------------------------+ | 255.255.255.0 - | Cross-ASN | Per-value assignment; | | 255.255.255.254 | Multicast | see Sections 4.2 and 10 | +-----------------+------------------+-------------------------+ | 255.255.255.255 | Broadcast | L2 broadcast only | +-----------------+------------------+-------------------------+ Table 2 Most devices on most networks use either internal zone addressing (127.x.x.x) or their organization's public ASN. Link-local (169.254.x.x) is always present on every interface as a bootstrap channel. 4. 4. Address Classes +=================+================+==========================+ | r.r.r.r Value | Class | Description | +=================+================+==========================+ | 0.0.0.0 (z=0, | IPv4-Mapped | Legacy IPv4 destination; | | s=0) | | translated/encapsulated | | | | per Section 12 | +-----------------+----------------+--------------------------+ | 0.0.0.1 - | Terrestrial | Earth internet, public | | 96.255.255.255 | ASN Unicast | routing via eBGP-ASIP | +-----------------+----------------+--------------------------+ | 97.0.0.0/8 | Near-Earth | LEO/GEO satellite | | | Realm | infrastructure | Hause Expires 18 October 2026 [Page 23] Internet-Draft ASIP April 2026 | | | (reserved) | +-----------------+----------------+--------------------------+ | 98.0.0.0/8 | Cislunar Realm | Earth-Moon | | | | infrastructure | | | | (reserved) | +-----------------+----------------+--------------------------+ | 99.0.0.0/8 | Martian Realm | Mars infrastructure | | | | (reserved) | +-----------------+----------------+--------------------------+ | 100.0.0.0/8 | RINE Peering | AS-to-AS link addressing | | | | only | +-----------------+----------------+--------------------------+ | 101.0.0.0 - | Terrestrial | Earth internet, public | | 126.255.255.255 | ASN Unicast | routing via eBGP-ASIP | +-----------------+----------------+--------------------------+ | 127.0.0.0/8 | Internal Zone | Organization-scoped, | | | | never routed externally | +-----------------+----------------+--------------------------+ | 128.0.0.0 - | Terrestrial | Earth internet, public | | 169.253.255.255 | ASN Unicast | routing via eBGP-ASIP | +-----------------+----------------+--------------------------+ | 169.254.0.0/16 | Link-Local | Single link only, never | | | | forwarded by routers | +-----------------+----------------+--------------------------+ | 169.255.0.0 - | Terrestrial | Earth internet, public | | 239.255.255.255 | ASN Unicast | routing via eBGP-ASIP | +-----------------+----------------+--------------------------+ | 240.0.0.0/8 | Mesh / Ad-Hoc | Self-organizing | | | | networks, mesh-scoped | +-----------------+----------------+--------------------------+ | 241.0.0.0 - | Interplanetary | Future celestial body | | 249.255.255.255 | (Reserved) | allocations | +-----------------+----------------+--------------------------+ | 250.0.0.0/8 | DTN Relay | Delay-tolerant relay | | | | nodes (reserved) | +-----------------+----------------+--------------------------+ | 251.0.0.0 - | Reserved | Future use | | 253.255.255.255 | | | +-----------------+----------------+--------------------------+ | 254.0.0.0/8 | Documentation | MUST NOT appear on | | | / Testing | production networks | +-----------------+----------------+--------------------------+ | 255.0.0.0 - | Reserved | Future use; MUST NOT be | | 255.255.254.255 | | routed | +-----------------+----------------+--------------------------+ | 255.255.255.0 - | Cross-ASN | Per-value assignment; | | 255.255.255.254 | Multicast | see Section 4.2 and | | | | Section 10 | Hause Expires 18 October 2026 [Page 24] Internet-Draft ASIP April 2026 +-----------------+----------------+--------------------------+ | 255.255.255.255 | Broadcast | L2 broadcast, MUST NOT | | | | be routed | +-----------------+----------------+--------------------------+ Table 3 4.1. 4.1. Scope Hierarchy ASIP defines a formal scope hierarchy for addresses, drawn from IPv6's multicast scope model but applied universally: +==============+==================+===========================+ | Scope Level | Boundary | Example r.r.r.r Ranges | +==============+==================+===========================+ | Link | Single physical/ | 169.254.0.0/16 (link- | | | virtual link | local) | +--------------+------------------+---------------------------+ | Mesh | Self-organizing | 240.0.0.0/8 | | | network domain | | +--------------+------------------+---------------------------+ | Organization | AS boundary | 127.0.0.0/8 (internal | | | | zones) | +--------------+------------------+---------------------------+ | Terrestrial | Earth internet | 0.0.0.1 - 96.x, 101.x - | | | | 126.x, 128.x - 239.x | +--------------+------------------+---------------------------+ | Realm | Celestial body / | 97.x, 98.x, 99.x, 241.x - | | | region | 249.x, 250.x | +--------------+------------------+---------------------------+ | Universal | All realms | Not yet defined; requires | | | | inter-realm relay | +--------------+------------------+---------------------------+ Table 4 With the one exception called out immediately below for mesh, each strictly-nested scope level in the table contains the ones below it. A link-local address is never visible at organization scope. An organization-internal address is never visible at terrestrial scope. A terrestrial address is never visible in another realm without explicit relay. This containment is enforced by routers at each boundary. *Mesh scope (240.0.0.0/8) is orthogonal rather than strictly nested.* A mesh domain is not contained within a terrestrial AS and is not a non-terrestrial realm; it is a self-organizing scope reachable only via the mesh-gateway bridge of §3.11. For scope-boundary enforcement Hause Expires 18 October 2026 [Page 25] Internet-Draft ASIP April 2026 (§14.11) it is treated as a peer of "terrestrial" and "realm": mesh addresses MUST NOT leave the mesh domain natively, and terrestrial or realm addresses MUST NOT enter a mesh domain natively; a mesh gateway that performs address translation is the only sanctioned bridge. IPv4-mapped addresses (r=z=s=0, Section 3.3) are the single explicit exception: they represent a legacy IPv4 destination that has no realm, are handled by the translators defined in Section 12, and MUST NOT be forwarded natively into any non-terrestrial realm. 4.2. 4.2. Multicast Prefix Assignments (r.r.r.r = 255.255.255.x) +=================+==============================================+ | r.r.r.r | Assignment | +=================+==============================================+ | 255.255.255.0 | General cross-ASN multicast (includes all | | | well-known protocol groups; see §10.4) | +-----------------+----------------------------------------------+ | 255.255.255.1 | RESERVED for a future per-protocol OSPF-ASIP | | | group encoding; MUST NOT be used by current | | | implementations (see §10.4) | +-----------------+----------------------------------------------+ | 255.255.255.2 | RESERVED for a future per-protocol eBGP-ASIP | | | peer-discovery group encoding; MUST NOT be | | | used by current implementations (see §10.4) | +-----------------+----------------------------------------------+ | 255.255.255.3 | RESERVED for a future per-protocol IS-IS- | | | ASIP group encoding; MUST NOT be used by | | | current implementations (see §10.4) | +-----------------+----------------------------------------------+ | 255.255.255.4 - | Available for IANA assignment | | 255.255.255.127 | | +-----------------+----------------------------------------------+ | 255.255.255.128 | Reserved, future use | | - | | | 255.255.255.254 | | +-----------------+----------------------------------------------+ | 255.255.255.255 | Broadcast | +-----------------+----------------------------------------------+ Table 5 5. 5. ASIP Packet Header Hause Expires 18 October 2026 [Page 26] Internet-Draft ASIP April 2026 5.1. 5.1. Header Format ASIP uses IP version number 8 in the Version field. The base header is fixed-length (40 bytes), drawing from IPv6's design decision to eliminate variable-length options from the base header. Additional functionality (fragmentation, routing options, hop-by-hop processing) is provided via extension headers identified by the Next Header field, identical in mechanism to IPv6 [RFC8200]. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Version| Traffic Class | Flow Label | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Payload Length | Next Header | Hop Limit | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source ASN Prefix (r.r.r.r) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Zone ID (z.z.z.z) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Subnet ID (s.s.s.s) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Host ID (h.h.h.h) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination ASN Prefix (r.r.r.r) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Zone ID (z.z.z.z) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Subnet ID (s.s.s.s) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Host ID (h.h.h.h) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ *Field definitions:* Hause Expires 18 October 2026 [Page 27] Internet-Draft ASIP April 2026 +=============+======+=============================================+ | Field | Bits | Description | +=============+======+=============================================+ | Version | 4 | Always 8 for ASIP | +-------------+------+---------------------------------------------+ | Traffic | 8 | Differentiated services (DSCP + ECN), | | Class | | identical to IPv6 Traffic Class and | | | | backward compatible with IPv4 ToS/DSCP | +-------------+------+---------------------------------------------+ | Flow Label | 20 | Per-flow identifier for QoS and ECMP | | | | hashing, identical semantics to IPv6 | | | | [RFC6437]. Enables routers to identify | | | | packets belonging to the same flow without | | | | deep packet inspection. Source-assigned; | | | | zero if unused. | +-------------+------+---------------------------------------------+ | Payload | 16 | Length of payload after the base header, in | | Length | | octets. Does not include the 40-byte base | | | | header itself. (IPv6 semantics.) | +-------------+------+---------------------------------------------+ | Next Header | 8 | Identifies the type of the immediately | | | | following header. Values are drawn from | | | | the IPv6 Next Header registry for protocols | | | | that are identical under ASIP (6 = TCP, 17 | | | | = UDP, 43 = Routing, 44 = Fragment, 59 = No | | | | Next Header, 60 = Destination Options, | | | | 50/51 = ESP/AH). ASIP-specific protocols | | | | receive distinct assignments; see | | | | Section 5.3 and Section 15.5. ICMP-ASIP = | | | | 143 (to be assigned by IANA). | +-------------+------+---------------------------------------------+ | Hop Limit | 8 | Decremented by 1 at each forwarding node. | | | | Packet is discarded when it reaches 0. | | | | (Identical to IPv6 Hop Limit and IPv4 TTL | | | | in function.) | +-------------+------+---------------------------------------------+ | Source | 128 | Full 128-bit ASIP source address (r.r.r.r : | | Address | | z.z.z.z : s.s.s.s : h.h.h.h) | +-------------+------+---------------------------------------------+ | Destination | 128 | Full 128-bit ASIP destination address | | Address | | | +-------------+------+---------------------------------------------+ Table 6 *Total base header size: 40 bytes.* This is identical to IPv6 and 20 bytes larger than IPv4's minimum header. Hause Expires 18 October 2026 [Page 28] Internet-Draft ASIP April 2026 5.2. 5.2. Design Rationale: What Was Dropped from IPv4 The ASIP header deliberately omits several IPv4 fields: * *IHL (Internet Header Length):* Unnecessary. The ASIP base header is fixed at 40 bytes. Variable-length options are handled via extension headers, not inline. * *Identification, Flags, Fragment Offset:* Moved to a Fragment Extension Header (Next Header = 44), identical to IPv6's approach. Fragmentation is performed only by the source, not by intermediate routers. This eliminates the performance penalty of router-path fragmentation and the reassembly-based attacks that plagued IPv4. *Fragmentation happens at the inner ASIP layer only, not at any outer encapsulation (§12.3).* ASIP-to-IPv4 encapsulators MUST set the outer IPv4 DF bit (§12.8) so that outer fragmentation is suppressed; any too-big condition is reported upstream and fragmentation, if needed, is performed by the ASIP source. This eliminates the ambiguity of where fragmentation occurs in a translate-plus-encapsulate path. * *Header Checksum:* Dropped, identical to IPv6's rationale. Link- layer (L2) and transport-layer (L4) checksums provide integrity verification. The per-hop header checksum in IPv4 was a performance bottleneck on high-speed routers (recomputed at every hop due to TTL decrement) with no security benefit. 5.3. 5.3. Extension Headers ASIP uses the same extension header mechanism as IPv6. Extension headers are chained via the Next Header field and processed in order. The following extension headers are defined: Hause Expires 18 October 2026 [Page 29] Internet-Draft ASIP April 2026 +============+=============+====================================+ | Next | Extension | Description | | Header | Header | | | Value | | | +============+=============+====================================+ | 0 | Hop-by-Hop | Options examined by every node | | | Options | along the path | +------------+-------------+------------------------------------+ | 43 | Routing | Source routing and related | | | | functions | +------------+-------------+------------------------------------+ | 44 | Fragment | Fragmentation and reassembly | +------------+-------------+------------------------------------+ | 50 | ESP | Encapsulating Security Payload | | | | (IPsec) | +------------+-------------+------------------------------------+ | 51 | AH | Authentication Header (IPsec) | +------------+-------------+------------------------------------+ | 59 | No Next | Nothing follows this header | | | Header | | +------------+-------------+------------------------------------+ | 60 | Destination | Options examined only by the | | | Options | destination | +------------+-------------+------------------------------------+ | 143 | ICMP-ASIP | ASIP ICMP messages (to be assigned | | | | by IANA; distinct from IPv6 NH=58 | | | | to prevent dispatcher ambiguity | | | | across header-stripping | | | | middleboxes) | +------------+-------------+------------------------------------+ | (reserved, | Mobility | Explicitly out of scope for this | | no | | document. No Next Header value is | | assignment | | requested in §15 for ASIP | | requested) | | mobility. A future specification | | | | MAY define Mobile ASIP and request | | | | an IANA assignment at that time; | | | | this document does not reserve or | | | | request any code point for it. | +------------+-------------+------------------------------------+ Table 7 By reusing IPv6's extension header numbering and semantics, ASIP benefits from the extensive implementation experience and security analysis already applied to IPv6 extension header processing [RFC8200, RFC7045]. Hause Expires 18 October 2026 [Page 30] Internet-Draft ASIP April 2026 *IPsec (AH/ESP) over ASIP.* AH (NH=51) and ESP (NH=50) inherit IPv6's semantics [RFC4301, RFC4302, RFC4303] verbatim, except that the AH Integrity Check Value computation covers the full 128-bit ASIP source and destination addresses as written on the wire. Because the r.r.r.r locator is allowed to be rewritten at AS boundaries (§8.3.2), AH's immutable-field assumption does not hold for r.r.r.r across a locator rewrite; AH-protected traffic MUST NOT traverse a boundary that rewrites r.r.r.r, or the ICV check will fail at the far end. ESP is unaffected because it does not sign the outer IP header. Operators who require locator rewriting on AH-protected flows MUST use tunnel-mode ESP or re-establish the SA after the rewriting boundary. *Enforcement at rewriting nodes.* The "MUST NOT traverse" rule above is a prevention rule, not a suggestion. A router that would otherwise rewrite r.r.r.r per §8.3.2 MUST first parse the extension- header chain of the inbound packet; if any AH header (NH=51) is present anywhere in the chain, the router MUST NOT rewrite and MUST drop the packet, emitting ICMP-ASIP Destination Unreachable (Type=1, Code=10 "Administratively Prohibited by AH-rewrite policy"; exact Code per the §15.5 registry). Silently rewriting an AH-protected packet produces an ICV-failure symptom at the destination that is indistinguishable from an on-path attack and MUST be avoided. A middlebox that strips AH before rewrite to avoid this check is a downgrade attacker; endpoints that require AH integrity SHOULD additionally verify via an ESP-protected channel or out-of-band attestation that no rewrite-capable intermediary is on the path. This is a classical downgrade-attack concern inherited from IPsec and is not unique to ASIP. *Ordering with ingress filtering.* At a border router that both implements §14.1 ingress filtering and performs §8.3.2 locator rewrite, the ingress filter MUST run on the received packet as it arrived on the wire, before any rewrite. The rewrite MUST occur after the ingress filter has validated the original source r.r.r.r against the peer's authorized-origin set. Performing rewrite before ingress filtering would either (i) validate the rewritten value against the wrong peer set, or (ii) fail to validate at all; both outcomes break BCP 38 semantics. 5.4. 5.4. Flow Label Usage The 20-bit Flow Label enables per-flow identification without transport-layer inspection. Semantics are identical to IPv6 Flow Label [RFC6437]: the value is opaque to the network, source-assigned, and used as an input to hash-based path-selection functions. Hause Expires 18 October 2026 [Page 31] Internet-Draft ASIP April 2026 * *ECMP hashing:* Routers MAY use the flow label (combined with source and destination addresses) as input to ECMP hash functions, ensuring all packets of a flow traverse the same path. This is the primary intended use. * *QoS classification:* Middleboxes MAY classify traffic by flow label as a hint only. A source that does not use flow-based path selection MUST set the flow label to zero. Routers MUST NOT parse structure inside the flow label, MUST NOT make security decisions based on its value, and MUST NOT rewrite it in the forwarding path. *Relationship to external path-selection metrics.* Any path-selection metric external to this specification (e.g., the OPTIONAL Cost Factor of §17 / draft-asip-cf-00, or a future operator-defined metric) MUST NOT be encoded into the flow label and MUST NOT cause a router to parse structure inside it. The flow label remains opaque regardless of whether such a metric is deployed. Where an external metric drives path selection, the flow label MAY be used as an ECMP hash input that pins a flow to whichever path that metric selected — this is an emergent property of hash-based forwarding, not a structural use of the flow label. 5.5. 5.5. Socket API Compatibility Existing IPv4 applications use the standard BSD socket API with AF_INET and sockaddr_in. The ASIP compatibility layer intercepts these calls transparently. The application requires zero ASIP awareness. New applications MAY use AF_ASIP with sockaddr_asip: c struct sockaddr_asip { sa_family_t asip_family; /* AF_ASIP */ in_port_t asip_port; /* Port number */ uint32_t asip_asn; /* r.r.r.r ASN locator */ uint32_t asip_zone; /* z.z.z.z Zone ID */ uint32_t asip_subnet; /* s.s.s.s Subnet ID */ uint32_t asip_host; /* h.h.h.h Host ID */ uint32_t asip_flowlabel; /* Flow label (20 bits) */ uint32_t asip_scope_id; /* Interface index for link-local and mesh scopes; zero for all other scopes */ }; All numeric fields except asip_family are in network byte order. The flow label occupies the low-order 20 bits of asip_flowlabel; the upper 12 bits MUST be zero on transmission and MUST be ignored on reception. The asip_scope_id field is in host byte order and carries the interface index disambiguating which link a link-local (169.254.0.0/16 in r.r.r.r, §3.10) or mesh (240.0.0.0/8 in r.r.r.r, §3.11) address refers to; it serves the same role as Hause Expires 18 October 2026 [Page 32] Internet-Draft ASIP April 2026 sockaddr_in6.sin6_scope_id [RFC4291]. asip_scope_id MUST be zero for non-link-local, non-mesh addresses and MUST be ignored by the stack for those scopes. An application operating on link-local or mesh addresses across multiple interfaces MUST set asip_scope_id to the correct interface index; a bind or sendto with asip_scope_id=0 on a multi-interface host for a link-local address is implementation- defined and MAY fail with EINVAL. 5.6. 5.6. IPv4/ASIP Coexistence Processing When an ASIP-aware router receives a packet with Version = 4, it processes it as standard IPv4. When an ASIP-aware router receives a packet with Version = 8, it processes the 128-bit source and destination addresses as specified in Sections 3 and 8. If the destination has r=z=s=0 (IPv4-mapped form, Section 3.3), the packet's endpoint is an IPv4 host and the router forwards it toward an IPv4/ ASIP translator at the AS boundary (Section 12.2) rather than attempting to dispatch it on h.h.h.h alone; the source may be either a native ASIP address (the common case, §12.7.1) or itself IPv4-mapped (the IPv4-to-IPv4-over-ASIP relay case, rare). A Version=8 packet is always a Version=8 frame on the wire; the r=z=s=0 condition on either address is an addressing form, not an alternate forwarding mode. Routers, hosts, and middleboxes that are not ASIP-aware see a Version=8 frame as an unrecognized IP version and drop it. This is not a quiet no-op; it is a hard break. Every forwarding element in the path between two ASIP-aware endpoints must either be ASIP-aware or be bypassed by the transition mechanisms in Section 12. This cost is the reason ASIP is specified as a new address family with a transition mechanism rather than as a wire-level IPv4 superset. 6. 6. Notation and Address Compression ASIP defines a colon-separated field notation as the canonical text representation, with compression rules that eliminate consecutive all-zero fields. All compliant implementations MUST accept both compressed and uncompressed forms and MUST be able to produce compressed output. 6.1. 6.1. Canonical Notation The canonical ASIP text representation uses colons to separate the four 32-bit fields. Each field is written in standard dotted decimal: r.r.r.r:z.z.z.z:s.s.s.s:h.h.h.h Hause Expires 18 October 2026 [Page 33] Internet-Draft ASIP April 2026 Examples (uncompressed): 0.0.59.65:0.0.0.1:0.0.0.10:192.0.2.1 (ASN 15169, Zone 1, Subnet 10, Host) 0.0.251.240:0.0.0.0:0.0.0.0:10.0.0.1 (ASN 64496, flat network) 0.0.0.0:0.0.0.0:0.0.0.0:8.8.8.8 (IPv4 compatible: 8.8.8.8) 127.1.0.0:0.0.0.5:0.0.1.0:10.0.0.1 (Internal zone 1, zone 5, subnet 256) 6.2. 6.2. ASN Integer Notation The r.r.r.r field MAY be written as a plain decimal ASN integer instead of dotted decimal. This is the RECOMMENDED human-facing format for public addresses: {ASN}:z.z.z.z:s.s.s.s:h.h.h.h Examples (uncompressed): 15169:0.0.0.1:0.0.0.10:192.0.2.1 (same as first example above) 64496:0.0.0.0:0.0.0.0:10.0.0.1 (same as second example above) 0:0.0.0.0:0.0.0.0:8.8.8.8 (IPv4 compatible) All compliant implementations MUST accept both dotted-decimal and integer forms for the ASN field. Implementations SHOULD produce ASN integer notation in user-facing output. 6.3. 6.3. Zero-Field Compression (:: Notation) One or more consecutive fields whose value is 0.0.0.0 MAY be replaced by ::, analogous to IPv6 zero compression [RFC5952]. Since ASIP has exactly four fields, the compression rules are simpler and less ambiguous than IPv6. *Rules:* 1. :: replaces one or more consecutive all-zero fields (a field is all-zero when its 32-bit value is 0x00000000, i.e., 0.0.0.0). 2. :: MUST NOT appear more than once in a single address. 3. When multiple runs of consecutive zero fields exist and are of equal length, :: SHOULD replace the leftmost run. 4. :: MAY replace a single all-zero field. (Unlike RFC 5952's recommendation for IPv6, single-field compression is permitted in ASIP because each field is 32 bits and eliminating even one saves substantial notation length.) Hause Expires 18 October 2026 [Page 34] Internet-Draft ASIP April 2026 5. The host field (h.h.h.h) MUST always be written explicitly. :: MUST NOT compress the rightmost field. (Rationale: the host field is the most operationally significant for debugging, and omitting it creates dangerous ambiguity with IPv4-compatible addresses.) 6. The ASN field (r.r.r.r) written as integer 0 is valid. Both 0::10.0.0.1 and ::10.0.0.1 expand to ASN=0, zone=0, subnet=0, host=10.0.0.1 and are semantically identical; the leading 0 before :: is an explicit-field form that the expansion algorithm (§6.5) collapses to the same wire value as the ::-only form. Implementations MUST treat the two as equivalent. *Compression table* (all possible positions for four fields where h.h.h.h is never compressed): +============================+==========+==========================+ | Fields Present | Notation | Meaning | +============================+==========+==========================+ | All four explicit | A:Z:S:H | No compression | +----------------------------+----------+--------------------------+ | Zone is zero | A::S:H | z = 0.0.0.0 | +----------------------------+----------+--------------------------+ | Subnet is zero | A:Z::H | s = 0.0.0.0 | +----------------------------+----------+--------------------------+ | Zone and Subnet are zero | A::H | z = 0.0.0.0, s = 0.0.0.0 | +----------------------------+----------+--------------------------+ | ASN and Zone are zero | ::S:H | r = 0, z = 0.0.0.0 | +----------------------------+----------+--------------------------+ | ASN, Zone, Subnet are zero | ::H | r = 0, z = 0.0.0.0, s = | | | | 0.0.0.0 | +----------------------------+----------+--------------------------+ Table 8 *Note:* Because :: can only appear once, an address where only the ASN and Subnet are zero (but the Zone is non-zero) cannot compress both. In this case, write the ASN explicitly as 0:Z:0.0.0.0:H or compress only the longer run. In practice this pattern is rare. 6.4. 6.4. Compression Examples ``` UNCOMPRESSED COMPRESSED ----------- ---------- Public host, flat network: 64496:0.0.0.0:0.0.0.0:192.0.2.1 64496::192.0.2.1 Hause Expires 18 October 2026 [Page 35] Internet-Draft ASIP April 2026 Public host, zone 1, subnet 10: 15169:0.0.0.1:0.0.0.10:192.0.2.1 15169:0.0.0.1:0.0.0.10:192.0.2.1 (no zero fields, no compression) IPv4 compatible: 0:0.0.0.0:0.0.0.0:8.8.8.8 ::8.8.8.8 Internal zone, flat: 127.1.0.0:0.0.0.0:0.0.0.0:10.0.0.1 127.1.0.0::10.0.0.1 Internal zone, with zone and subnet: 127.1.0.0:0.0.0.5:0.0.1.0:10.0.0.1 127.1.0.0:0.0.0.5:0.0.1.0:10.0.0.1 (no zero fields, no compression) Internal zone, zone set, subnet zero: 127.2.0.0:0.0.0.3:0.0.0.0:172.16.0.1 127.2.0.0:0.0.0.3::172.16.0.1 RINE peering link: 100.0.0.1:0.0.0.0:0.0.0.0:10.255.0.1 100.0.0.1::10.255.0.1 Loopback (all zeros except host): 0:0.0.0.0:0.0.0.0:127.0.0.1 ::127.0.0.1 Multicast: 255.255.255.0:0.0.0.0:0.0.0.0:224.0.0.1 255.255.255.0::224.0.0.1 ``` 6.5. 6.5. Expansion Algorithm To expand a compressed address, an implementation: 1. Splits the string on :: to obtain a left part and a right part. 2. Splits each part on : to count explicit fields. 3. Inserts enough 0.0.0.0 fields between left and right to bring the total to exactly four (ASN, Zone, Subnet, Host). 4. If the ASN field is a plain integer, converts it to a 32-bit unsigned value in network byte order. 5. If no :: is present, all four fields must be explicit. This algorithm is deterministic and requires no lookahead. 6.6. 6.6. Flat Dotted Notation (Wire/Debug Format) For diagnostic output, packet dumps, and wire-level representations, implementations MAY use flat dotted notation with all 16 octets dot- separated: Hause Expires 18 October 2026 [Page 36] Internet-Draft ASIP April 2026 0.0.59.65.0.0.0.1.0.0.0.10.192.0.2.1 This format is unambiguous but not human-friendly for routine use. It MUST be accepted by all parsers. Implementations SHOULD NOT produce this format in user-facing output; use canonical or compressed notation instead. 6.7. 6.7. CIDR Prefix Notation ASIP CIDR notation appends a prefix length to the compressed address, separated by /: 15169::/32 (ASN 15169, all addresses within that ASN) 15169:0.0.0.1::/64 (ASN 15169, Zone 1, all subnets/hosts) 127.1.0.0::/32 (Internal zone 1, all addresses) ::0.0.0.0/0 (Default route) The prefix length counts bits from the most significant bit of the r.r.r.r field. Common prefix boundaries: +===============+==============+===================================+ | Prefix Length | Boundary | Meaning | +===============+==============+===================================+ | /32 | After ASN | All addresses within one AS | +---------------+--------------+-----------------------------------+ | /64 | After Zone | All subnets/hosts within one zone | +---------------+--------------+-----------------------------------+ | /96 | After Subnet | All hosts within one subnet | +---------------+--------------+-----------------------------------+ | /128 | Full address | Single host | +---------------+--------------+-----------------------------------+ | /0 | None | Default route | +---------------+--------------+-----------------------------------+ Table 9 6.8. 6.8. Design Note on Notation Choices The choice to retain dotted decimal and use colons only as field separators is deliberate. IPv6's hexadecimal colon notation (2001:0db8::1) is compact but unfamiliar to many operators and a common source of transcription errors. ASIP notation is immediately readable by anyone who can read an IPv4 address. The :: compression symbol is borrowed from IPv6 because it is the one piece of IPv6 notation that operators already understand and that solves a real readability problem. Hause Expires 18 October 2026 [Page 37] Internet-Draft ASIP April 2026 The requirement that h.h.h.h always be explicit is a deliberate safety constraint. In IPv4 troubleshooting, the host address is the most commonly referenced field. Allowing it to be compressed away would make compressed ASIP addresses actively hostile to operational debugging. The upper fields (ASN, Zone, Subnet) are structural and rarely change during a troubleshooting session; the host field changes constantly. This is an explicit trade-off: ASIP addresses are longer to write than IPv6 addresses but shorter to understand, and common compressed forms (like ::8.8.8.8 for IPv4-compatible addresses or 64496::192.0.2.1 for flat-network hosts) are concise enough for routine use. 7. 7. DNS Integration 7.1. 7.1. A-ASIP Record Type A new DNS resource record type, A-ASIP, is defined for ASIP addresses. * *Type:* A-ASIP (IANA assignment pending) * *Wire format:* 128-bit ASIP address in network byte order * *Presentation format:* Canonical notation with compression (Section 6) 7.2. 7.2. Resolution Behavior An ASIP-aware resolver SHOULD request both A and A-ASIP records. Resolution behavior by address-family hint: * *AF_INET (IPv4-only):* Return A records only. A-ASIP records MUST NOT be returned through an AF_INET query. Legacy applications that call gethostbyname() or getaddrinfo() with AF_INET receive the A record unchanged. * *AF_ASIP (ASIP-only):* Return A-ASIP records preferentially. When no A-ASIP record exists but an A record does, synthesize an IPv4-mapped A-ASIP (r=z=s=0, h = the A record, §3.3) and return it; the stack routes such traffic via §12 translation or encapsulation. The stack does not synthesize an ASN locator for an IPv4-only destination. * *AF_UNSPEC (both):* Return both A and A-ASIP records if present, with A-ASIP records ordered first. Applications using Happy Eyeballs [RFC8305] or equivalent MUST treat the returned set as an Hause Expires 18 October 2026 [Page 38] Internet-Draft ASIP April 2026 ordered preference list and MAY attempt connections in parallel. The resolver MUST NOT silently drop A records when A-ASIP records exist; doing so breaks dual-availability semantics. When only an A record is available for an AF_ASIP or AF_UNSPEC query, the synthesis described above applies. An A-ASIP record MUST NOT be returned to an AF_INET application. RFC 1918 addresses MUST NOT be published as A-ASIP records in public DNS. 7.3. 7.3. Dual Record Example ns1.example.com. IN A 192.0.2.1 ns1.example.com. IN A-ASIP 15169:0.0.0.1:0.0.0.10:192.0.2.1 8. 8. Routing Protocol Behavior 8.1. 8.1. Multi-Tier Routing Table ASIP routing uses a tiered lookup model derived directly from the address structure: +======+=========+===================+=====================+ | Tier | Field | Scope | Function | +======+=========+===================+=====================+ | 1 | r.r.r.r | Global (inter-AS) | Routes packet to | | | | | correct AS border | +------+---------+-------------------+---------------------+ | 2 | z.z.z.z | AS-internal | Routes packet to | | | | (inter-zone) | correct zone | +------+---------+-------------------+---------------------+ | 3 | s.s.s.s | Zone-internal | Routes packet to | | | | (intra-zone) | correct subnet | +------+---------+-------------------+---------------------+ | 4 | h.h.h.h | Subnet-local | Delivers to host | | | | | (identical to IPv4) | +------+---------+-------------------+---------------------+ Table 10 When r.r.r.r = 0.0.0.0, z.z.z.z = 0.0.0.0, and s.s.s.s = 0.0.0.0, the packet is IPv4-mapped (§3.3) and the lookup yields a route toward an IPv4/ASIP translator (§12.2); the Version=8 frame remains a Version=8 frame on the wire until it reaches the translator (§5.6). The tier structure above describes the lookup ordering for ASIP-native packets, not an alternate wire format. Hause Expires 18 October 2026 [Page 39] Internet-Draft ASIP April 2026 In practice, most backbone routers perform a single Tier 1 lookup (32-bit ASN match) and forward. The remaining tiers are resolved only within the destination AS. In the common single-origin case, the global routing table contains one entry per ASN; multihoming, anycast, and traffic-engineering more-specifics documented in §8.3.1 add entries on top of that baseline, and §8.3's "honest bound" paragraph states the realistic table size. 8.2. 8.2. Routing Protocol Extensions ASIP extends existing routing protocols rather than replacing them: +==========+================+============+========================+ | Protocol | ASIP Extension | Scope | Status | +==========+================+============+========================+ | BGP4 | eBGP-ASIP | Inter-AS | REQUIRED for internet- | | | | (Tier 1) | facing routers | +----------+----------------+------------+------------------------+ | iBGP | iBGP-ASIP | Inter-zone | RECOMMENDED for multi- | | | | (Tier 2) | zone AS | +----------+----------------+------------+------------------------+ | OSPFv2 | OSPF-ASIP | Intra-zone | RECOMMENDED for intra- | | | | (Tier 3) | zone routing | +----------+----------------+------------+------------------------+ | IS-IS | IS-IS-ASIP | Intra-AS | OPTIONAL alternative | | | | (Tier 2/3) | IGP | +----------+----------------+------------+------------------------+ | Static | Unchanged | All tiers | Always available | +----------+----------------+------------+------------------------+ Table 11 *Note on existing protocols:* ASIP does not deprecate any existing routing protocol. Operators MAY continue to use RIPv2, EIGRP, or any other protocol within their AS for IPv4-compatible traffic. The "ASIP" extensions add awareness of the 128-bit address space. They do not remove any existing functionality. Operators MAY additionally deploy the OPTIONAL Cost Factor metric (§17 companion draft), which has no effect on conformance to this specification. 8.3. 8.3. eBGP-ASIP eBGP-ASIP extends BGP4 [RFC4271] with: * 128-bit address family support (AFI/SAFI for ASIP; see §15.2). * WHOIS-ASIP route validation integration (Section 8.4, REQUIRED where the structural routing-table bound is relied upon). Hause Expires 18 October 2026 [Page 40] Internet-Draft ASIP April 2026 * An OPTIONAL Cost Factor path attribute specified in a separate companion document (§17); eBGP-ASIP conformance does not require CF. eBGP-ASIP operates alongside BGP4 on the same peering session via multi-protocol extensions [RFC4760]. eBGP-ASIP does not replace BGP4 for IPv4 prefixes; the two AFIs coexist. *Prefix granularity and table bound.* The nominal inter-AS aggregation boundary is /32 in the r.r.r.r field (one prefix per ASN locator). Prefixes more specific than /32 in r.r.r.r (i.e., subdividing a single ASN's address space at the inter-AS boundary) SHOULD NOT be advertised across AS boundaries; they MAY be advertised when operationally necessary to support the use cases in Section 8.3.1. Aggregation less specific than /32 (covering multiple ASN locators under a single prefix) MAY be performed down to /16 for internal backbone use but MUST NOT be used to obscure origin at peering boundaries. *Honest bound.* The routing-table entry count under ASIP is not equal to the ASN count. Approximately 74,000 ASNs exist globally (2026); any bound that simply counts allocated or announced ASNs (e.g., a "~175,000-entry" figure derived from allocated-but-unannounced ASN counts) would conflate "ASN count" with "routing-table entry count" and ignore the reasons operators deaggregate today. The actual entry count under ASIP will be larger than the ASN count whenever: * An AS is multihomed and injects separate more-specifics to steer traffic per upstream (Section 8.3.1); * An AS uses anycast across multiple origin locations (Section 11.1); * An AS splits traffic engineering announcements for failover; * An AS has legitimately acquired address space from a transferred ASN and continues to announce the old locator. Forbidding these use cases does not remove them; operators would respond by splitting into additional ASNs, which grows the locator count rather than shrinking the table. The realistic structural bound is "substantially smaller than today's 1M+ BGP4 table in the common case, with a long tail of more-specifics driven by the traffic-engineering use cases that ASIP cannot eliminate." The specification records the trade-off in that form because a single- number headline figure would omit the deaggregation drivers that an implementer must size for. Hause Expires 18 October 2026 [Page 41] Internet-Draft ASIP April 2026 8.3.1. 8.3.1. Multihoming, Anycast, and ASN Transfer Because r.r.r.r is a routing locator rather than a host identity, the following cases work without re-coupling identifier and locator: * *Multihoming.* A host reachable through two upstream ASes is assigned one ASIP address per upstream (e.g., ASN_A:z:s:h and ASN_B:z:s:h). DNS-ASIP publishes both A-ASIP records. Applications use happy-eyeballs-style selection between them. The host's stable identity is the z:s:h triple under its own administrative scope; r.r.r.r varies with reachability. Server- side operational impact of a client presenting multiple addresses is addressed in §18.5b. * *Cross-ASN anycast.* An anycast service advertised from multiple ASNs is assigned one address per origin ASN. Each origin ASN advertises its own ASN_n::h.h.h.h prefix. Clients use DNS-ASIP to obtain one or more candidate anycast addresses and the routing system steers each packet to the nearest instance via normal BGP path selection. This is strictly equal in capability to current cross-ASN anycast (Cloudflare, Google) and is not artificially constrained to a single ASN. * *ASN transfer.* When an ASN transfers between organizations, the addresses using that ASN as their r.r.r.r locator also transfer. Operators MAY renumber affected hosts by rewriting r.r.r.r at ingress (Section 8.3.2); the z:s:h portion remains stable and no application reconfiguration is required for hosts addressed through stable identifiers rather than bare ASIP literals. 8.3.2. 8.3.2. Locator Rewriting An AS border router MAY rewrite the r.r.r.r field of packets on ingress or egress when the rewrite is a pure locator change (z, s, h unchanged) and the mapping is published in WHOIS-ASIP (Section 8.4) or equivalent. Locator rewriting is used for: * Stateless IPv4/ASIP translation at AS boundaries (Section 12.2); * ASN transfer renumbering (Section 8.3.1); * Privacy rewriting of internal z.z.z.z and s.s.s.s as described in Section 14.8. Locator rewriting MUST NOT alter the transport-layer payload or checksums in ways inconsistent with the translation rules of Section 12. A router performing locator rewrite MUST enforce the AH- rewrite prohibition defined in §5.3 ("Enforcement at rewriting Hause Expires 18 October 2026 [Page 42] Internet-Draft ASIP April 2026 nodes"): any inbound packet carrying an AH extension header (NH=51) MUST be dropped with the ICMP-ASIP administratively-prohibited code rather than silently rewritten. A router that rewrites AH-protected traffic produces an ICV-failure symptom indistinguishable from an on- path attack; the prohibition is normative in both §5.3 (from the IPsec-interaction perspective) and here (from the rewrite- implementation perspective), and the two statements are semantically identical. 8.4. 8.4. WHOIS-ASIP Route Validation eBGP-ASIP routers validate received route advertisements against WHOIS-ASIP, a route-ownership registry. A route advertisement that cannot be validated against a registered WHOIS-ASIP entry SHOULD NOT be installed in the routing table. WHOIS-ASIP is functionally similar to RPKI [RFC6480] but is scoped to ASIP's locator model: the registry maps each r.r.r.r value (and any legitimate more-specifics permitted by Section 8.3.1) to the ASN authorized to originate it. Because the common case is one prefix per ASN, the registry is substantially smaller than RPKI's prefix space; the long tail of multihoming, anycast, and TE more-specifics is registered explicitly. *Normative status.* Route-ownership validation is a core guarantee of this document (Section 2.4 R5). Accordingly: * Deployments that rely on the structural routing-table bound or on the "one route = one authorized origin" property MUST deploy WHOIS-ASIP validation on all eBGP-ASIP sessions. * Deployments willing to accept BGP4-equivalent route hygiene (no route validation, hijacks and leaks possible) MAY defer WHOIS-ASIP validation during transition. Such deployments MUST NOT claim the structural routing-table bound. The structural routing-table guarantee does not exist without route- ownership validation: a deployment that accepts any eBGP-ASIP advertisement from any peer inherits the same hijack, leak, and bogon-injection pathology as BGP4, and no "one route = one authorized origin" property can be claimed. The two tiers above bind R5's REQUIRED/RECOMMENDED status to the property the deployment actually relies on. Hause Expires 18 October 2026 [Page 43] Internet-Draft ASIP April 2026 *Chicken-and-egg.* As with RPKI, WHOIS-ASIP adoption provides meaningful protection only when a critical mass of originating ASes publish records. Early adopters SHOULD publish WHOIS-ASIP records even when few peers validate them, and SHOULD default to log-only for received advertisements that fail validation until peering partners converge on enforcement. See Section 18.6. *Bootstrap transport.* WHOIS-ASIP services MUST be reachable over IPv4 during the transition period so that new ASNs can bootstrap their ASIP routing locators without a pre-existing ASIP path. After ASIP native reachability is established, WHOIS-ASIP services MAY be reached over ASIP. This avoids the chicken-and-egg failure mode where two new ASIP-native ASNs cannot discover each other's r.r.r.r locator because the registry they depend on is itself only reachable via ASIP. *Response authentication.* WHOIS-ASIP responses MUST be authenticated: the structural routing-table bound and the "one route = one authorized origin" property both depend on a validator being able to trust that the WHOIS-ASIP record it retrieved reflects the registry's actual entry. A companion specification (draft-asip- whois-00, out of scope for this document) is expected to define the signature and trust-anchor model; an RPKI-style X.509 hierarchy [RFC6480] is the working assumption. Until that specification is published, eBGP-ASIP deployments relying on WHOIS-ASIP validation MUST obtain records over an authenticated channel (e.g., TLS with HPKP-equivalent pinning, or signed zone file distribution) and MUST NOT accept unauthenticated WHOIS-ASIP responses as a basis for route acceptance. Without authentication, an adversary in the IPv4 bootstrap path could inject forged locator-to-ASN bindings into a validator's cache and defeat the entire route-validation chain. *Service discovery.* WHOIS-ASIP service endpoints MUST be published via DNS using the SRV record _whois-asip._tcp.{registry-domain} and MUST be reachable at the IPv4 address(es) to which that SRV resolves. Registry operators MUST publish their SRV records under at least one well-known registry domain delegated by IANA (see §15.10). This resolves the bootstrap-discovery gap: a new ASN needs only a working IPv4 DNS resolver to locate its regional WHOIS-ASIP service; no pre- existing ASIP path, hard-coded endpoint, or out-of-band configuration is required. Hause Expires 18 October 2026 [Page 44] Internet-Draft ASIP April 2026 8.5. 8.5. iBGP-ASIP and OSPF-ASIP iBGP-ASIP distributes external routes within an AS. OSPF-ASIP extends OSPFv2 with 128-bit address support. Both are specified fully in companion documents. iBGP-ASIP and OSPF-ASIP conformance does not require CF awareness; where an operator deploys the OPTIONAL CF attribute of §17's companion draft, iBGP-ASIP MAY carry it transparently across the AS. Neither iBGP-ASIP nor OSPF-ASIP defines CF behavior in this document. Neither is mandatory. An operator running a single-zone AS may use OSPF-ASIP alone. An operator running a flat network may use static routes alone with ASIP addressing. The protocol does not prescribe internal network architecture. 9. 9. ICMP-ASIP ICMP-ASIP extends ICMP [RFC792] to support 128-bit addresses, incorporating the Neighbor Discovery functions from IPv6's ICMPv6 [RFC4443]. ICMP-ASIP is identified by Next Header value 143 (to be assigned by IANA; see Section 15.5). Both ICMPv4 and ICMP-ASIP MUST be supported simultaneously by ASIP implementations. *Why not NH=58.* ICMP-ASIP MUST NOT reuse IPv6's ICMPv6 Next-Header value (58). Reuse would create a dispatcher ambiguity: a middlebox that strips or normalizes the outer ASIP header while preserving the NH chain would deliver the inner payload to an ICMPv6 handler that expects 128-bit ICMPv6 semantics, not ICMP-ASIP. Because the message-type registries, Neighbor Discovery option codes, and checksum pseudo-headers differ between ICMPv6 and ICMP-ASIP, the collision would silently produce wrong behavior rather than a clean error. A distinct Next-Header value (requested value 143, subject to IANA assignment) eliminates the ambiguity. 9.1. 9.1. Core Messages ICMP-ASIP carries full 128-bit addresses in Echo Request/Reply, Destination Unreachable, Time Exceeded, Redirect, Packet Too Big, and Parameter Problem messages. Path MTU Discovery is extended for the ASIP header. The initial ICMP-ASIP Type values used normatively elsewhere in this document (§12.7, §12.8) are listed here for implementer convenience; the full registry is established per §15.5 and follows ICMPv6 [RFC4443] numbering unless otherwise noted: Hause Expires 18 October 2026 [Page 45] Internet-Draft ASIP April 2026 +=========+============================+============================+ | Type | Name | Normative use in this | | | | spec | +=========+============================+============================+ | 1 | Destination Unreachable | §12.7.3, §12.7.7, §5.3 | | | | (AH-rewrite drop) | +---------+----------------------------+----------------------------+ | 2 | Packet Too Big | §12.7.4, §12.8 (PMTUD) | +---------+----------------------------+----------------------------+ | 3 | Time Exceeded | Hop Limit = 0 drop | +---------+----------------------------+----------------------------+ | 4 | Parameter Problem | Header malformed | +---------+----------------------------+----------------------------+ | 128 | Echo Request | §12.7.2 | +---------+----------------------------+----------------------------+ | 129 | Echo Reply | §12.7.2 | +---------+----------------------------+----------------------------+ | 133-137 | Router/Neighbor Discovery | §9.2, §3.14 | | | (RS, RA, NS, NA, Redirect) | | +---------+----------------------------+----------------------------+ Table 12 Values not listed above follow the ICMPv6 registry [RFC4443] until §15.5's IANA action establishes a distinct ICMP-ASIP registry. 9.2. 9.2. Neighbor Discovery ASIP adopts IPv6's Neighbor Discovery Protocol (NDP) [RFC4861] in full, adapted for the four-field address format. NDP replaces ARP for ASIP-native address resolution, providing: * *Router Solicitation / Router Advertisement (RS/RA):* Used by hosts to discover routers and obtain network prefixes for SLAAC- ASIP (Section 3.14). RAs carry the 96-bit prefix (r:z:s), the M flag (managed addressing via DHCP-ASIP), the A flag (autonomous SLAAC-ASIP permitted), and prefix lifetime. * *Neighbor Solicitation / Neighbor Advertisement (NS/NA):* Used for address resolution (replacing ARP), Duplicate Address Detection (DAD), and neighbor unreachability detection. All NS/NA messages use link-local source addresses (169.254.0.0::h.h.h.h). * *Redirect:* Used by routers to inform hosts of a better first-hop router for a destination. Hause Expires 18 October 2026 [Page 46] Internet-Draft ASIP April 2026 NDP messages are sent to solicited-node multicast addresses derived from the target's h.h.h.h field. The solicited-node group is formed from the low 24 bits of h.h.h.h, mirroring IPv6's 24-bit L2-multicast form (IEEE 802.3 33:33:xx:xx:xx:xx for Ethernet). Collisions on the high 8 bits of h.h.h.h cause two ASIP hosts to share a solicited-node group; the NA reply carries the full 32-bit h.h.h.h and the requester discriminates at L3. *Collision-rate difference versus IPv6.* Because ASIP's h.h.h.h is 32 bits rather than IPv6's 64-bit interface identifier, only 8 bits of the host field are elided into the solicited-node group (versus 40 bits elided in IPv6). Both protocols use 24 bits of the host/IID to form the solicited-node group, so both partition into 2^24 groups; under uniformly-random SLAAC host IDs, the expected number of other hosts sharing a given host's group is (N-1) / 2^24 for both ASIP and IPv6, where N is the subnet's host count. At N=1000 this is approximately 6×10^-5 on both protocols; at N=10,000 approximately 6×10^-4; at N=1,000,000 approximately 0.06. The solicited-node collision rate is therefore not materially worse on ASIP than on IPv6 at realistic subnet sizes. The 32-bit host field's distinct collision concern is the full-identifier birthday collision (two hosts drawing the same h.h.h.h value); that concern is covered quantitatively in §3.14.3 and addressed by §3.14.3's DHCP-ASIP-at-10k threshold. The solicited-node-group concern and the full-identifier concern are separate collision mechanisms operating at different layers (L3 group membership vs. L3 uniqueness) and MUST NOT be conflated: the group-level collision is negligible at realistic subnet sizes, while the identifier-level collision becomes material at N~10,000 and above. 9.3. 9.3. ARP-ASIP Compatibility For backward compatibility on mixed IPv4/ASIP L2 segments, an ARP- style resolution mechanism for 128-bit addresses (provisionally "ARP- ASIP") MAY be supported as a fallback. On pure ASIP links, NDP (§9.2) is the specified mechanism and MUST be used. An ASIP link on which neither NDP nor a specified ARP-ASIP is available is a misconfiguration; this document does not define ARP-ASIP wire format, and a companion specification would be required before ARP-ASIP is interoperable. ASIP-only deployments that depend on ARP-ASIP before such a companion document is published are NOT INTEROPERABLE and SHOULD NOT be built; operators needing L2 resolution on ASIP MUST deploy NDP per §9.2. 10. 10. Multicast Hause Expires 18 October 2026 [Page 47] Internet-Draft ASIP April 2026 10.1. 10.1. Scoped Multicast Model ASIP adopts IPv6's scoped multicast architecture [RFC4291, RFC7346], adapted to the four-field address structure. Multicast scope determines how far a multicast packet is forwarded and is encoded directly in the address. ASIP multicast uses the low-order 4 bits of the z.z.z.z field to encode scope (values 0-15), mirroring the IPv6 multicast scope field [RFC7346]. The remaining 28 bits of z.z.z.z MUST be zero for scoped multicast (r.r.r.r = 255.255.255.0/24). Packets received with non- zero values in those 28 bits MUST be dropped at ingress (not merely ignored by receivers), because forwarding a packet whose reserved bits are non-zero would create a covert-channel and scope-bypass surface that a future assignment of those bits may not resolve safely. Hause Expires 18 October 2026 [Page 48] Internet-Draft ASIP April 2026 +============+====================+==========================+ | z.z.z.z | Scope | Boundary | | Low Nibble | | | +============+====================+==========================+ | 0x0 | Reserved | MUST NOT be used | +------------+--------------------+--------------------------+ | 0x1 | Interface-local | Never leaves the | | | | originating interface | +------------+--------------------+--------------------------+ | 0x2 | Link-local | Single physical/virtual | | | | link | +------------+--------------------+--------------------------+ | 0x3 | Reserved | MUST NOT be used | +------------+--------------------+--------------------------+ | 0x4 | Admin-local | Administratively defined | | | | (site, building) | +------------+--------------------+--------------------------+ | 0x5 | Site-local | Single site / campus | +------------+--------------------+--------------------------+ | 0x6-0x7 | Unassigned | Reserved for future | | | | scope levels | +------------+--------------------+--------------------------+ | 0x8 | Organization-local | Single AS / organization | +------------+--------------------+--------------------------+ | 0x9-0xD | Unassigned | Reserved for future | | | | scope levels | +------------+--------------------+--------------------------+ | 0xE | Global | Entire terrestrial | | | | internet | +------------+--------------------+--------------------------+ | 0xF | Reserved | MUST NOT be used | +------------+--------------------+--------------------------+ Table 13 Routers MUST NOT forward a scoped multicast packet beyond its indicated scope boundary. Routers MUST drop scoped multicast packets whose z.z.z.z low nibble is a Reserved or Unassigned value, and SHOULD log the event. This is a hard enforcement, not a suggestion. 10.2. 10.2. Intra-ASN Multicast (IPv4 Compatible) Packets with r.r.r.r = 0.0.0.0 (all upper fields zero) and h.h.h.h in the IPv4 multicast range (224.0.0.0/4) are treated as intra-ASN multicast and MUST NOT be forwarded beyond the local AS boundary. This preserves full compatibility with existing IPv4 multicast deployments. Hause Expires 18 October 2026 [Page 49] Internet-Draft ASIP April 2026 10.3. 10.3. Cross-ASN Multicast Cross-ASN multicast uses r.r.r.r values in the range 255.255.255.0 through 255.255.255.254. The single r.r.r.r value 255.255.255.255 is reserved for broadcast (§11.2) and MUST NOT be used for multicast. The z.z.z.z field encodes the scope. The s.s.s.s and h.h.h.h fields identify the multicast group, providing a 64-bit group space within each scope level and each r.r.r.r assignment. 255.255.255.0 : {scope} : {group-hi} : {group-lo} 10.4. 10.4. Well-Known Multicast Groups The addresses below are the canonical well-known groups. They use the general cross-ASN multicast r.r.r.r prefix 255.255.255.0 of §4.2 with IPv4-familiar group values in h.h.h.h, so that operators who recognize 224.0.0.5 and 224.0.0.6 from IPv4 OSPF see the same values here. The per-protocol r.r.r.r values 255.255.255.1 (OSPF-ASIP), 255.255.255.2 (eBGP-ASIP), and 255.255.255.3 (IS-IS-ASIP) in the §4.2 table are reserved for future per-protocol use (e.g., a protocol- specific group-ID encoding that does not overlap the IPv4 224/4 values); an implementation MUST join the 255.255.255.0-prefixed groups below to participate in the listed protocols, and a 255.255.255.1/2/3 address MUST NOT be used in place of the addresses below until a companion specification defines those prefixes' group- ID encoding. 255.255.255.0:0.0.0.2::224.0.0.1 All ASIP routers (link-local) 255.255.255.0:0.0.0.2::224.0.0.2 All ASIP Zone Servers (link-local) 255.255.255.0:0.0.0.2::224.0.0.5 OSPF-ASIP all routers (link-local) 255.255.255.0:0.0.0.2::224.0.0.6 OSPF-ASIP designated routers (link- local) 255.255.255.0:0.0.0.8::224.0.0.10 iBGP-ASIP peer discovery (organization-local) 255.255.255.0:0.0.0.14::224.0.0.1 All ASIP routers (global) 10.5. 10.5. Multicast Listener Discovery ASIP uses MLD-ASIP, adapted from IPv6's MLDv2 [RFC3810], for multicast group membership management. MLD-ASIP operates over ICMP- ASIP and uses link-local source addresses (169.254.0.0::h.h.h.h) for all messages, identical to IPv6's requirement that MLD use link-local sources. This ensures multicast membership management functions before any global addressing is configured. Hause Expires 18 October 2026 [Page 50] Internet-Draft ASIP April 2026 10.6. 10.6. Composition of Multicast Scope with Realm and Mesh Scope §10.1 defines a multicast scope nibble (link, subnet, admin, site, org, global, …) drawn from IPv6 precedent. §4.1 defines an orthogonal scope hierarchy including realm (§3.12) and mesh (§3.11). Neither section states how the two compose. The rules below are NORMATIVE for any router enforcing either scope: 1. *Scope = Interface-local or Link-local (0x1, 0x2).* Never cross any boundary, including realm and mesh boundaries. Confined to the originating link. 2. *Scope = Admin-local, Site-local, Organization-local (0x4, 0x5, 0x8).* Confined to the originating AS. MUST NOT cross an AS boundary, MUST NOT cross a realm boundary, and MUST NOT cross a mesh gateway. "Organization-local scope in realm A" does not imply reachability in realm B even if the two realms share an operator. 3. *Scope = Global (0xE).* Confined to the originating realm's terrestrial scope (or, if originated in a non-terrestrial realm, to that realm's internal global scope). "Global" is *realm- local-global*, not universal. A multicast packet with scope=0xE originating in realm A MUST NOT be forwarded into realm B by any relay. No "universal-across-realms" multicast scope is currently defined; the Universal row in §4.1's scope table is reserved for a future inter-realm-multicast specification and has no encoding today. 4. *Realm-boundary ingress rule.* A router that receives a multicast packet on an interface it classifies as being at a realm boundary (i.e., the packet's source r.r.r.r lies in a different realm from the router's local realm) MUST drop the packet regardless of the packet's multicast scope nibble. Realm boundaries are hard drops for multicast; no multicast scope permits realm crossing in this document. 5. *Mesh-boundary rule.* Multicast packets originated in a mesh domain (§3.11) MUST NOT be forwarded out of the mesh by a mesh gateway, regardless of scope nibble. Conversely, non-mesh multicast MUST NOT be forwarded into a mesh domain by a mesh gateway. If a use case requires a mesh to receive a copy of a terrestrial multicast, the gateway MUST terminate the terrestrial multicast and originate a new mesh-scoped multicast (application- level relay), not forward natively. Hause Expires 18 October 2026 [Page 51] Internet-Draft ASIP April 2026 6. *Link-local unicast scope (§3.10) and multicast.* Link-local multicast (nibble = 0x2) is the multicast analog of link-local unicast. Both are bounded to the single link and are not affected by realm or mesh boundaries because they never reach a boundary node's forwarding plane. *Interaction matrix (informative summary):* +====================+============+=========+=========+==========+ | Multicast scope | Crosses | Crosses | Crosses | Crosses | | | link? | AS? | realm? | mesh | | | | | | gateway? | +====================+============+=========+=========+==========+ | 0x0 Reserved | Drop | Drop | Drop | Drop | +--------------------+------------+---------+---------+----------+ | 0x1 Interface- | No | No | No | No | | local | | | | | +--------------------+------------+---------+---------+----------+ | 0x2 Link-local | Intra-link | No | No | No | | | only | | | | +--------------------+------------+---------+---------+----------+ | 0x3 Reserved | Drop | Drop | Drop | Drop | +--------------------+------------+---------+---------+----------+ | 0x4 Admin-local | Yes (admin | No | No | No | | | scope) | | | | +--------------------+------------+---------+---------+----------+ | 0x5 Site-local | Yes (site) | No | No | No | +--------------------+------------+---------+---------+----------+ | 0x6-0x7 Unassigned | Drop | Drop | Drop | Drop | +--------------------+------------+---------+---------+----------+ | 0x8 Organization- | Yes (AS) | No | No | No | | local | | | | | +--------------------+------------+---------+---------+----------+ | 0x9-0xD Unassigned | Drop | Drop | Drop | Drop | +--------------------+------------+---------+---------+----------+ | 0xE Global | Yes | Yes | *No* | No | +--------------------+------------+---------+---------+----------+ | 0xF Reserved | Drop | Drop | Drop | Drop | +--------------------+------------+---------+---------+----------+ Table 14 Rule 4 is the load-bearing rule: no multicast packet crosses a realm boundary natively in this document, regardless of scope nibble. §10.1 multicast scope and §4.1 realm scope are orthogonal dimensions, and a packet may satisfy one scope test while violating the other; Rule 4 composes the two so that realm-boundary enforcement dominates every multicast scope nibble and no combination admits a realm crossing. Hause Expires 18 October 2026 [Page 52] Internet-Draft ASIP April 2026 11. 11. Anycast and Broadcast 11.1. 11.1. Anycast Anycast is a routing property, not a distinct address class. Two anycast cases are supported: * *Same-ASN anycast.* Multiple origin sites within the same ASN advertise the same ASIP prefix. The inter-AS routing system steers each packet to the nearest origin by normal BGP path selection. This is the straightforward extension of IPv4 anycast. * *Cross-ASN anycast.* An anycast service reachable from multiple different ASNs (the current Cloudflare/Google model) is assigned multiple ASIP addresses, one per origin ASN, and is published under a single DNS-ASIP name with all its A-ASIP records. Clients use normal DNS-ASIP resolution to obtain the candidate set; the routing system steers each flow to the instance best-reached through its chosen destination address. This preserves the operational capability that BGP4 anycast delivers today. The cross-ASN case is the reason Section 3.1 defines r.r.r.r as a routing locator rather than a host identity. An anycast service host is not "owned" by one ASN; it is reachable through several, each with its own locator. Ordering and selection among anycast instances uses standard BGP path-selection criteria [RFC4271]. If an operator separately deploys the OPTIONAL Cost Factor metric (§17 / draft-asip-cf-00), CF MAY additionally influence anycast instance selection per that companion draft; CF-based anycast selection is not required by this document. 11.2. 11.2. Broadcast The r.r.r.r value 255.255.255.255 is permanently reserved for broadcast and maps to the Layer 2 broadcast address. Broadcast packets MUST NOT be routed beyond the local network segment. *Note:* As with IPv6, ASIP RECOMMENDS using multicast with a scope no broader than required instead of broadcast for most use cases. Broadcast remains defined for IPv4 compatibility. Link-layer resolution on ASIP-only segments uses NDP (§9.2); any ARP-style fallback (§9.3) is undefined in this document and MUST NOT be assumed interoperable. Hause Expires 18 October 2026 [Page 53] Internet-Draft ASIP April 2026 12. 12. Compatibility and Transition 12.1. 12.1. Deployment Model ASIP is a new address family on the wire. An ASIP-aware end host runs a network stack that originates Version=8 frames for ASIP destinations. For IPv4-mapped destinations (Section 3.3) the stack emits a Version=8 frame whose r=z=s=0 source and destination are handled by a translator (Section 12.2); where no translator is reachable, the host MAY fall back to emitting a native Version=4 frame on the same interface. That fallback is a dual-stack kernel data path by any reasonable definition, and this document acknowledges it as such. The single-stack property claimed by ASIP is narrower and scoped explicitly: applications see one address family (AF_ASIP), and sockets above the kernel are not duplicated per version. "Single-stack" in this document therefore refers to the socket API surface exposed to applications, not to the kernel's forwarding behavior. During transition, an ASIP-aware host's kernel will process both IPv4 and ASIP frames, and forwarding elements in the path will be IPv4-only, ASIP-aware, or both. That is unavoidable. Networks that have not deployed ASIP continue to operate as pure IPv4 networks. They require no modification. They are also not reachable by ASIP-native traffic except through the translation and encapsulation mechanisms below. 12.2. 12.2. IPv4/ASIP Stateless Translation at AS Boundaries ASIP-aware AS border routers MAY act as stateless translators between Version=8 frames carrying IPv4-mapped addresses (r=z=s=0) and Version=4 frames. The translation rules follow SIIT [RFC7915] adapted for the ASIP address format: * An ASIP-to-IPv4 translation strips the r=z=s=0 address prefix, emitting an IPv4 packet with h.h.h.h as the IPv4 source/ destination. * An IPv4-to-ASIP translation prepends r=z=s=0 on ingress, producing a Version=8 frame whose addresses are IPv4-mapped. * Transport checksums are recomputed per SIIT. *Origin advertisement requirement (normative; see §14.1).* Operators deploying this section's stateless translation MUST originate the 0.0.0.0::/96 IPv4-mapped prefix via eBGP-ASIP from the translator- owning ASN, so that the §14.1 ingress filter at every downstream peer Hause Expires 18 October 2026 [Page 54] Internet-Draft ASIP April 2026 treats r=z=s=0 sourced traffic as originating from a legitimate peer rather than as spoofed. Without this advertisement, reverse- direction reply traffic (§12.7.1, common case) will be dropped at the first non-translator-declared peering boundary. This is a deployment requirement, not a wire-format requirement. This requirement binds only to operators deploying §12.2 stateless translation; operators deploying only §12.3 encapsulation (ASIP-to-IPv4 tunneling) MUST NOT originate 0.0.0.0::/96, because they do not serve that prefix and originating an unserved prefix is exactly the hijack pattern WHOIS- ASIP (§8.4) rejects. Translation is stateless in the data-plane forward direction: any Version=8 frame with r=z=s=0 can be emitted as Version=4 using only information from the packet itself. ICMP error translation and reverse-path locator reconstruction require a stable mapping between the IPv4 literal and the originating ASIP source's r.r.r.r value; see §12.7.1 and §12.7.3 for the mechanisms. That mapping MAY be per-flow state or an administratively configured static mapping; the forward- direction translation itself remains stateless. *h.h.h.h addressability constraint.* An ASIP source whose traffic is stateless-translated to IPv4 emits IPv4 packets with Src = S8.h.h.h.h (§12.7.1). Reply traffic from the IPv4 destination therefore targets that h.h.h.h value as an IPv4 address on the public IPv4 internet. For stateless §12.2 translation to work without a NAT44-style rewrite, S8.h.h.h.h MUST be a globally routable IPv4 address owned by the translator operator and reachable via the translator on the return path. ASIP sources whose h.h.h.h falls in RFC 1918 private space, CGN shared space (100.64.0.0/10), or any other non-publicly- routable IPv4 range MUST either (i) be assigned a publicly-routable h.h.h.h from a translator-owned IPv4 pool for egress, with the translator performing h.h.h.h rewrite (stateful NAT44, as in §12.6 CGNAT behavior), or (ii) use §12.3 encapsulation instead of §12.2 translation. The constraint is load-bearing because the IPv4 return path has no ASIP locator information and can only reach the h.h.h.h literal; a non-publicly-routable h.h.h.h simply produces unreachable return traffic. *Path-asymmetric traffic and multihoming.* The h.h.h.h-ownership rule above also constrains return-path routing for multihomed ASIP clients (§8.3.1). Because reply traffic is addressed to the IPv4 h.h.h.h that the forward-direction translator owns, and IPv4-side routing steers that reply back to the translator that announced the h.h.h.h, return traffic inherently lands at the same translator that created the forward-direction mapping. A stateless translator at a different ASN's border that receives an inbound IPv4 packet whose Dst is not in its own translator-owned pool MUST silently drop the packet and MUST NOT synthesize a forged ASIP source by guessing a reverse mapping. Hause Expires 18 October 2026 [Page 55] Internet-Draft ASIP April 2026 When an ASIP client deliberately switches outbound traffic from ASN_A's translator to ASN_B's translator (e.g., uplink failover), the client's ASIP source address changes (new h.h.h.h from ASN_B's pool, per the rewrite or multihoming model); existing IPv4-side sessions bound to the ASN_A h.h.h.h do not survive the switch and MUST be reopened. Session-continuity mitigations are covered in §18.5b. The translator's behavior is strictly "drop what you don't own, do not fabricate": fabricating a reverse mapping would inject forged ASIP source addresses into a downstream path and violate §14.1 ingress filtering at every subsequent hop. 12.3. 12.3. ASIP-to-IPv4 Encapsulation Across IPv4 Transit Where two ASIP-aware sites are separated by IPv4-only transit, they MAY tunnel Version=8 frames inside Version=4 packets. The normative encapsulation is GENEVE over UDP [RFC8926] using IANA-assigned port 6081, with ASIP frames carried as the inner protocol. An IANA- assigned ASIP-to-IPv4 protocol type is requested for GENEVE's protocol field (Section 15.9). Rationale. GENEVE/UDP is the encapsulation of choice for modern virtual networks (VXLAN, NVGRE are similar but older): it is stateless, adds 16 bytes of UDP+GENEVE overhead on top of the outer IPv4 header, is supported by commodity silicon, does not introduce per-flow TCP congestion-control interactions between unrelated tenants, and does not require a handshake before the first packet. HTTPS (TCP/TLS) tunneling is NOT RECOMMENDED for general transit use: TCP-over-TCP introduces nested congestion control and head-of-line blocking across unrelated inner flows; TLS handshakes add round-trips on every tunnel re-establishment; per-packet bytes above the inner L4 payload are ASIP(40)+IPv4(20)+TCP(20)+TLS(~29) = 109 rather than the 76 of GENEVE/UDP (ASIP(40)+IPv4(20)+UDP(8)+GENEVE(8)). HTTPS tunneling is retained only as a last-resort traversal option (see below). Operators MAY use alternative encapsulation methods: * *GRE or IP-in-IP* for high-throughput backbone links where UDP NAT traversal is not a concern. * *WireGuard or IPsec/ESP* where per-tunnel authentication and encryption are required. * *HTTPS as a last-resort traversal option* for environments that block UDP and non-HTTPS TCP. HTTPS tunneling is NOT RECOMMENDED for general transit use because of the overhead and congestion- control pathology noted above. It is MAY, not SHOULD. Hause Expires 18 October 2026 [Page 56] Internet-Draft ASIP April 2026 The 8TO4-ENDPOINT eBGP-ASIP attribute carries the IPv4 tunnel endpoint address automatically. Tunnel MTU and Path MTU Discovery behave as defined in [RFC8926]; operators MUST account for the encapsulation overhead when sizing MTU (see §12.8). *GENEVE option TLVs.* This document defines no ASIP-specific GENEVE option classes. ASIP-to-IPv4 encapsulation MUST use GENEVE with no options in the baseline defined here; the 8-byte GENEVE header in §12.8's overhead budget assumes zero options. Implementations that receive ASIP-to-IPv4 GENEVE frames carrying unknown option TLVs MUST process them per [RFC8926] §3.5 (critical-bit handling). Future ASIP deployments that wish to define option TLVs (e.g., for per-flow telemetry, inter-AS traffic-engineering hints) MUST do so in a companion specification and MUST request an option class from IANA's GENEVE registry; inline invention of TLVs by operators breaks interop and is NOT RECOMMENDED. *Tunnel endpoint authentication and reflection/amplification.* UDP- based encapsulation on a well-known port is a reflection/ amplification surface if decapsulators accept packets from any outer source. ASIP-to-IPv4 decapsulators MUST maintain a configured allowlist of peer tunnel endpoint IPv4 addresses (learned via the 8TO4-ENDPOINT eBGP-ASIP attribute or administratively configured) and MUST silently drop inbound GENEVE/UDP/6081 packets whose outer IPv4 source is not on that allowlist. Decapsulators MUST NOT emit ICMPv4 error messages in response to unauthorized outer sources (doing so converts the decapsulator into a reflector). Decapsulators SHOULD rate-limit per outer source. Where operators require cryptographic endpoint authentication rather than source-address allowlisting (e.g., when the outer IPv4 path is subject to spoofing), WireGuard or IPsec/ESP MUST be used instead of bare GENEVE/UDP as noted above. 12.4. 12.4. Transition Value Unlike IPv6, which offered no incremental benefit to early adopters until a critical mass was reached, ASIP provides localized value at each adoption phase. These are not "phases of global deployment"; each benefits the individual adopter. * *ISP backbone adopter:* Reduced routing-table churn on the subset of the table that is ASIP-native, assuming WHOIS-ASIP is deployed (Section 8.4). Early adopters will not see a full 1M-entry table reduction because they inherit a transit environment dominated by IPv4 prefixes, and the BGP4 table their routers carry is unaffected by a parallel ASIP table; the per-adopter benefit grows with ASIP adoption across their peering set. Hause Expires 18 October 2026 [Page 57] Internet-Draft ASIP April 2026 * *Cloud providers:* ASN+Zone addressing eliminates VPC address overlap within and across cooperating ASIP-aware tenants; cross- region routing inside a cloud's own ASIP deployment is simpler than the IPv4 overlay-on-overlay model. * *Enterprise:* Internal zone addressing (127.x.x.x) enables multi- region private networks without external address coordination or RFC 1918 conflict management. This benefit is realized entirely inside the enterprise and requires no upstream ASIP deployment. * *Consumer ISPs:* For customers whose reachable destinations are ASIP-native, CGNAT can be bypassed. For customers whose destinations remain IPv4, CGNAT is unchanged. Each role interoperates with non-upgraded peers via Section 12.2 translation and Section 12.3 encapsulation. There is no dependency between roles. Organizations adopt at their own pace, but the claim "each adopter benefits fully regardless of anyone else's deployment" is too strong; the honest claim is that each adopter obtains localized value and pays localized cost. 12.5. 12.5. IPv6 Coexistence ASIP and IPv6 MAY coexist on the same infrastructure; neither supersedes the other. An operator already running IPv6 MAY continue to run it and adopt ASIP as a parallel address family, as a replacement at the AS boundary, or not at all. ASIP does not claim to be technically superior to IPv6; it offers an alternative transition path whose costs and benefits differ. See Section 18.5 for a candid discussion. 12.6. 12.6. CGNAT Behavior CGNAT devices that are not ASIP-aware are IPv4-only middleboxes and operate unchanged on IPv4 traffic. They cannot process Version=8 frames. An ASIP-aware CGNAT MAY translate the h.h.h.h field of IPv4-mapped ASIP addresses in the same way it translates IPv4 source addresses today; it MUST NOT modify r.r.r.r, z.z.z.z, or s.s.s.s during translation. CGNAT operators without a publicly registered ASN MUST NOT originate non-mapped ASIP traffic onto the public internet; they MAY use internal zone prefixes (Section 3.5) for subscriber addressing and MUST translate at the AS boundary. Hause Expires 18 October 2026 [Page 58] Internet-Draft ASIP April 2026 12.7. 12.7. Stateless Translation Reference: Packet-Level Walkthrough This subsection is NORMATIVE for implementations that perform IPv4/ ASIP stateless translation per §12.2. It supplements §12.2 by specifying the byte-level behavior for the cases that translator implementations most often get wrong: ICMP errors carrying truncated inner headers, fragmented inner payloads, the IPv4 DF bit, and ICMPv4 Fragmentation Needed. Byte values are hexadecimal; offsets are zero- based. *Notation.* ASIP source S8 = ASN 0.0.59.65, zone 0, subnet 0, host 192.0.2.1 (compressed: 15169::192.0.2.1). IPv4 destination D4 = 198.51.100.1. IPv4-mapped ASIP destination D8m = ::198.51.100.1. All checksums shown are illustrative placeholders denoted cksum; implementations MUST compute them per [RFC7915] (transport) and per the respective protocol (ICMP). 12.7.1. 12.7.1. Simple TCP Data Packet (ASIP -> IPv4) Inbound to translator: Version=8 frame, 40-byte ASIP header + 20-byte TCP header + 100-byte payload; S = 15169::192.0.2.1, D = ::198.51.100.1. ASIP header fields on the wire (big-endian): Offset Bytes Field 0x00 80 00 00 00 Version=8, TC=0, FlowLabel=0 0x04 00 78 06 40 PayloadLen=120, NH=6(TCP), HopLimit=64 0x08 00 00 3B 41 00 00 00 00 S.rrrr=0.0.59.65, S.zzzz=0.0.0.0 0x10 00 00 00 00 C0 00 02 01 S.ssss=0.0.0.0, S.hhhh=192.0.2.1 0x18 00 00 00 00 00 00 00 00 D.rrrr=0.0.0.0, D.zzzz=0.0.0.0 0x20 00 00 00 00 C6 33 64 01 D.ssss=0.0.0.0, D.hhhh=198.51.100.1 0x28 [TCP header 20 bytes] 0x3C [payload 100 bytes] After translation, the translator emits Version=4 frame: Offset Bytes Field 0x00 45 00 00 8C V=4, IHL=5, ToS=0, TotLen=140 0x04 00 00 00 00 ID=0 (see note), Flags=0, FragOff=0 0x08 40 06 CC CC TTL=64, Proto=6(TCP), HdrChecksum (CC CC = computed) 0x0C C0 00 02 01 Src=192.0.2.1 (h.h.h.h of S) 0x10 C6 33 64 01 Dst=198.51.100.1 (h.h.h.h of D) 0x14 [TCP header 20 bytes, checksum recomputed per RFC 7915] 0x28 [payload 100 bytes] The r.r.r.r=0.0.59.65 source ASN locator is dropped because the egress IPv4 network has no field to carry it. Reply traffic from D4 arrives at the translator as Version=4 with Src=198.51.100.1, Dst=192.0.2.1, and is translated back to Version=8 with S8' = ::198.51.100.1, D8' = 15169::192.0.2.1. *The translator MUST maintain sufficient state (or an administratively configured reverse mapping) Hause Expires 18 October 2026 [Page 59] Internet-Draft ASIP April 2026 to recover the original S8.r.r.r.r = 0.0.59.65 on the return path*; without it, the reply is translated with S8'.r.r.r.r = 0 (the IPv4-mapped form) and arrives at the original client under a different source address than the one it sent to, breaking any per- address state at the client. This state is implicit in the SIIT [RFC7915] model when one side is IPv4-mapped; it is stated explicitly here because the r.r.r.r locator has no IPv4 analog and a translator that omits reverse-path reconstruction will produce source-address mismatch on every reply. *IPv4 ID field:* set to 0 when DF is off and the packet is not fragmented. When DF is set (see §12.7.4) or fragmentation is needed, the translator assigns a 16-bit ID per RFC 7915. *ASIP pseudo-header for transport checksums.* TCP, UDP, and ICMP-ASIP checksums over ASIP are computed using the IPv6 pseudo-header format [RFC8200 §8.1] with the 128-bit ASIP Source and Destination Addresses substituted verbatim for the IPv6 address fields, the 32-bit upper- layer packet length, 24 zero bits, and the 8-bit upper-layer protocol identifier (Next Header). The pseudo-header is never transmitted; it is a checksum input only. Translator implementations performing IPv4<->ASIP translation MUST recompute the transport checksum using the IPv4 pseudo-header on the IPv4 side and the ASIP pseudo-header above on the ASIP side; incremental update [RFC1624] is permitted only when both pseudo-headers are fully known to the translator. *TCP options.* TCP options (Timestamp, SACK-Permitted, MSS, Window Scale, etc.) are part of the TCP header, not the IP layer. They pass through IPv4<->ASIP translation byte-for-byte unchanged; only the TCP checksum is recomputed. The MSS option value (if present on a SYN) is end-host-visible: the translator MUST NOT rewrite it, but the ASIP and IPv4 sides' PMTU discovery (§12.8, §12.7.4) jointly determine the actual usable segment size, and an MSS advertised for a larger IPv4-side MTU will be clamped by the normal PMTU path. 12.7.2. 12.7.2. ICMP-ASIP Echo Request -> ICMPv4 Echo Request An ICMP-ASIP Echo Request (NH=143, Type=128) from 15169::192.0.2.1 to ::198.51.100.1 is translated to an ICMPv4 Echo Request (Proto=1, Type=8). The identifier and sequence fields pass through unchanged; the payload passes through unchanged; the ICMP checksum is recomputed. Return direction reverses the type mapping (ICMPv4 Type=0 -> ICMP-ASIP Type=129). *Return-path locator reconstruction.* The ICMPv4 Echo Reply arrives at the translator with IPv4 Src = the original D4 and IPv4 Dst = the h.h.h.h that was emitted as the IPv4 source on the forward Echo Request. To deliver the reply back to the originating ASIP host with Hause Expires 18 October 2026 [Page 60] Internet-Draft ASIP April 2026 the full S8 = r:z:s:h preserved, the translator MUST apply the same r.r.r.r reconstruction state or administrative-mapping rule specified in §12.7.3 (forward direction is stateless; reverse direction requires mapping). Because Echo flows are often short-lived (single exchange) and high-volume (traceroute, PMTUD probes), translators that maintain per-flow mapping state SHOULD use an Echo-specific short timeout (RECOMMENDED: 60 seconds from the last forward Echo Request) to bound state growth independently of longer TCP/UDP flow state. See §14.15. 12.7.3. 12.7.3. ICMPv4 Destination Unreachable Carrying a Truncated IPv4 Inner Header (-> ICMP-ASIP) This is the translation case implementers most frequently get wrong. An IPv4 router upstream of the translator emits ICMPv4 Type=3 (Destination Unreachable), which includes as its payload the first 28 bytes of the offending IPv4 packet (20-byte IPv4 header + 8 bytes of the next protocol, per RFC 792 semantics and RFC 1812 minimum). When this error arrives at the translator with inner Src=192.0.2.1 (the IPv4 form of the ASIP originator), the translator MUST synthesize an ICMP-ASIP error whose inner payload is a reconstructed ASIP header, not a pass-through of the IPv4 header. Inbound ICMPv4 (bytes after IPv4 outer header): Offset Bytes Field 0x00 03 01 [cksum] 00 00 00 00 Type=3, Code=1(host unreach), Unused 0x08 [inner IPv4 hdr 20 bytes: Src=192.0.2.1, Dst=198.51.100.1, Proto=6] 0x1C [inner IPv4 first 8 bytes of TCP: SrcPort, DstPort, SeqNum] Outbound ICMP-ASIP (NH=143): Offset Bytes Field 0x00 01 01 [cksum] 00 00 00 00 Type=1(Dst Unreach), Code=1, Unused 0x08 [reconstructed inner ASIP hdr 40 bytes] Version=8, PayloadLen=copied from original, NH=6(TCP), HopLimit=copied, S.rrrr=0.0.59.65, S.zzzz=0, S.ssss=0, S.hhhh=192.0.2.1 D.rrrr=0, D.zzzz=0, D.ssss=0, D.hhhh=198.51.100.1 0x30 [copied first 8 bytes of TCP: SrcPort, DstPort, SeqNum] Hause Expires 18 October 2026 [Page 61] Internet-Draft ASIP April 2026 *The inner ASIP header's S.rrrr field MUST be reconstructed* from the translator's per-session state or administrative mapping (the r.r.r.r=0.0.59.65 of the original ASIP source). If the translator lacks that state, it emits S.rrrr=0 (IPv4-mapped form) and the originating ASIP host's ICMP error-correlation will fail silently for any packet where the host tracks error association by full 128-bit source. The normative consequence is that *stateless translation is stateless in the forward direction only*; ICMP error translation requires either (i) per-flow ingress state or (ii) an administratively stable source-locator mapping. Implementations MUST document which approach they use. The ICMPv4-to-ICMP-ASIP Type/Code mapping follows RFC 7915 §4 for the common cases (Host Unreachable, Net Unreachable, Protocol Unreachable, Port Unreachable, TTL Expired, Parameter Problem). 12.7.4. 12.7.4. ICMPv4 Type 3 Code 4 (Fragmentation Needed / DF Set) -> ICMP-ASIP Packet Too Big When the IPv4-side MTU cannot accommodate a translated packet whose inner originator set the ASIP "atomic fragment" intent (analogous to IPv4 DF), the translator converts the ICMPv4 Type=3 Code=4 error into an ICMP-ASIP Packet Too Big message. Because ASIP-to-IPv4 translation shrinks the packet by 20 bytes (ASIP base header is 40 bytes; IPv4 minimum header is 20 bytes), an ASIP packet of size X translates to an IPv4 packet of size X-20. To fit at the IPv4 next- hop MTU M, the ASIP origin may send packets up to M+20 bytes. The reported MTU to the ASIP originator is therefore IPv4_next_hop_MTU + (ASIP_hdr - IPv4_hdr) = IPv4_next_hop_MTU + 20. This is consistent with RFC 7915 §5.1 MTU handling and symmetric with the IPv4->ASIP direction rule in §12.7.6 (which subtracts 20). Worked example: IPv4-side link reports next-hop MTU = 1500. Translator emits ICMP-ASIP Packet Too Big with MTU = 1520. The ASIP originator caches MTU=1520 for the destination; a 1520-byte ASIP packet becomes a 1500-byte IPv4 packet after translation and fits exactly. Implementations MUST NOT report the unadjusted IPv4 MTU (doing so causes a 20-byte per-packet efficiency loss) and MUST NOT report IPv4_next_hop_MTU - 20 (doing so causes a 40-byte per-packet loss and diverges from RFC 7915). *Fragment-needed-on-fragmented-inner corner case.* If the ICMPv4 Type=3 Code=4 error arrives as a response to a translated ASIP packet that was already a fragment (NH=44 fragment header present), the translator emits ICMP-ASIP Packet Too Big and the originator MUST re- fragment at the lower MTU at the source, not via intermediate-router fragmentation (§5.2: ASIP fragments only at the source). This preserves IPv6/ASIP fragmentation semantics. Hause Expires 18 October 2026 [Page 62] Internet-Draft ASIP April 2026 12.7.5. 12.7.5. Fragmented Inner Payload (-> IPv4) An ASIP packet containing a Fragment Extension Header (NH=44) translates to an IPv4 packet with Flags.MF and FragOff set from the fragment header. The 32-bit fragment Identification in the ASIP fragment header is truncated to 16 bits for the IPv4 ID field; the low-order 16 bits are used. This is a lossy truncation but matches RFC 7915 §5.1.1 behavior. *The translator MUST NOT perform reassembly*; it forwards fragments as fragments. If the IPv4-side link MTU cannot carry the translated fragment, ICMPv4 Type=3 Code=4 is returned upstream and handled per §12.7.4. *Fragment-ID collision attack surface.* Two ASIP fragmented flows whose 32-bit fragment IDs differ only in the upper 16 bits collapse to the same 16-bit IPv4 ID after truncation. On the IPv4 side, a reassembler may mis-associate fragments from the two flows, producing a fragmentation-based injection or corruption surface analogous to the RFC 7915 §5.1.1 caveat. Translators SHOULD assign the IPv4 ID field by hashing (source address, destination address, fragment ID) rather than by simple truncation when per-flow state is available, to reduce collision probability; implementations that use simple low- 16-bit truncation MUST rate-limit the number of distinct fragmented flows translated concurrently, or MUST refuse to translate fragments above a configured flow-count threshold. *IPv4 -> ASIP direction (fragments).* An IPv4 packet with Flags.MF=1 or FragOff!=0 arriving at the translator is a fragment of a larger original datagram. The translator MUST perform per-fragment translation without reassembly: each IPv4 fragment becomes an ASIP packet carrying a Fragment Extension Header (NH=44) whose 32-bit Identification is the zero-extended IPv4 16-bit ID (upper 16 bits set to 0), whose M and FragOff fields mirror the IPv4 Flags.MF and FragOff respectively, and whose payload is the fragmented upper-layer bytes verbatim. Reassembly occurs only at the ASIP destination, never at the translator. Fragments arriving out of order are translated in arrival order and forwarded independently; the translator MUST NOT buffer fragments waiting for earlier parts. This preserves the "stateless in the forward direction" property of §12.2 and matches RFC 7915 §4.1 behavior. 12.7.6. 12.7.6. IPv4 DF Bit Handling (IPv4 -> ASIP) When translating an IPv4 packet with DF=1 to ASIP, the translator: * If the IPv4 packet fits in the ASIP-side MTU with added overhead, forwards it as a single ASIP packet (no Fragment Extension Header). Hause Expires 18 October 2026 [Page 63] Internet-Draft ASIP April 2026 * If the IPv4 packet does not fit, responds with ICMPv4 Type=3 Code=4 (Fragmentation Needed) to the IPv4 source with next-hop MTU = ASIP_MTU - 20. The IPv4 source reduces its sending size. When DF=0, the translator MAY fragment the IPv4 packet inline on the IPv4 side before translation, or MAY translate-then-fragment on the ASIP side with a Fragment Extension Header. Either is compliant; implementations SHOULD prefer DF=1-respecting behavior for all IPv4 traffic because it matches modern IPv4-side deployment practice (PMTUD relies on DF=1). *Header-size delta with fragment extension header.* When the translate-then-fragment path adds an ASIP Fragment Extension Header (NH=44, 8 bytes), the IPv4->ASIP header delta is +28 bytes (ASIP 40-byte base + 8-byte frag ext, minus IPv4 20-byte header), not the +20 bytes used elsewhere in §12.7. A translator that emits fragmented ASIP output from a non-fragmented IPv4 input MUST account for the additional 8 bytes of fragment-extension overhead when deciding whether an output fragment will fit its ASIP-side MTU; the PMTU-reported value on the ASIP side is reduced by 8 additional bytes relative to the §12.7.4 +20 formula in this case. This is a translator-local accounting concern; the ASIP originator sees only the end-to-end PMTU and does not need separate knowledge of the translator's fragment-ext decision. 12.7.7. 12.7.7. ICMP-ASIP Error Back to IPv4 Originator (Reverse Direction) When an IPv4 originator (S4 = 203.0.113.7) sends to an IPv4-mapped ASIP destination that reaches an unreachable ASIP host via the translator, the far-side ASIP router emits an ICMP-ASIP error (e.g., Type=1 Destination Unreachable) whose inner reconstructed header shows S8 = ::203.0.113.7 (the translator's forward-direction synthesis) and some non-zero destination. That ICMP-ASIP error transits back toward the translator. The translator MUST synthesize an ICMPv4 error whose inner header is a reconstructed IPv4 header matching the packet S4 originally sent: inner Src = 203.0.113.7, inner Dst = the IPv4 h.h.h.h that S4 originally used as the destination. The outer ICMPv4 source address is the translator's IPv4 address (standard ICMP-originating-router semantics). Without this reverse synthesis, S4 receives an ICMP error referencing an IPv4 destination it never addressed, and IPv4-side error correlation fails. The translation uses the same state or administrative-mapping requirement as the forward ICMP path (§12.7.3): the translator must recover the original IPv4 Dst from the ICMP-ASIP inner header's D.hhhh field. Hause Expires 18 October 2026 [Page 64] Internet-Draft ASIP April 2026 12.7.8. 12.7.8. Port-Restricted Inner ICMP Some firewalls drop ICMPv4 Destination Unreachable messages whose inner TCP/UDP header indicates a port the firewall considers policy- blocked. When the translator receives such an error, it has already committed to forwarding the error back to the ASIP originator; the translator MUST NOT apply secondary port filtering on the inner payload of an ICMP error unless explicitly configured to do so. Conversely, if the IPv4-side firewall drops the error, the ASIP originator receives no feedback and its PMTU discovery or error correlation stalls. This is a pre-existing operational pathology inherited from IPv4; it is not created by ASIP and is not resolved here. Operators SHOULD disable aggressive ICMP filtering on translator-adjacent firewalls, identical to the advice given for IPv4 PMTUD. 12.8. 12.8. Path MTU Discovery and Encapsulation Budget This subsection is NORMATIVE. ASIP PMTUD is semantically identical to IPv6 PMTUD [RFC8201] extended for the ASIP-to-IPv4 encapsulation of §12.3. Operators who deploy ASIP over non-upgraded IPv4 transit MUST account for the overhead below, or applications will experience silent truncation, black-holing, or PTB storms. *Encapsulation overhead budget (single-level GENEVE/UDP/IPv4 over Ethernet):* Ethernet frame payload (L2 MTU) 1500 bytes - Ethernet header -14 - Outer IPv4 header -20 - Outer UDP header -8 - GENEVE header (no options) -8 - Inner ASIP base header -40 ------------------------------------------------- Available for inner L4 / application 1410 bytes On a standard 1500-byte L2 link, an ASIP flow traversing ASIP-to-IPv4 encapsulation has a *1410-byte inner payload budget*, not 1500. Applications and middleware that assume a 1500-byte MTU will emit 1500-byte inner packets; those packets will either be silently truncated or trigger Packet Too Big storms, depending on the encapsulator's policy. *Jumbo-frame paths.* On end-to-end 9000-byte jumbo-frame paths, the budget is 9000 - 14 - 20 - 8 - 8 - 40 = 8910 bytes inner payload. Jumbo-frame paths are not universal; any path segment that does not support jumbo frames reduces the budget to that segment's MTU. Operators deploying ASIP-to-IPv4 across mixed-MTU paths MUST NOT assume jumbo MTU end-to-end. *Normative requirements:* Hause Expires 18 October 2026 [Page 65] Internet-Draft ASIP April 2026 * *(MUST)* ASIP-aware hosts MUST implement PMTUD per [RFC8201]: on receipt of an ICMP-ASIP Packet Too Big (Type=2), the host MUST cache the reported MTU per destination (and per source address, see below) and MUST NOT emit packets larger than the cached MTU to that destination until the cache entry expires. * *(MUST)* ASIP-to-IPv4 encapsulators MUST set the outer IPv4 DF bit so that intermediate IPv4-only links trigger ICMPv4 Type=3 Code=4 rather than silently fragmenting the outer IPv4 packet. Translation of the ICMPv4 error back to ICMP-ASIP Packet Too Big is specified in §12.7.4. * *(MUST)* The ASIP minimum link MTU is 1280 bytes (identical to IPv6's minimum per RFC 8200 §5). On receipt of an ICMP-ASIP Packet Too Big whose reported MTU is less than 1280, the ASIP originator MUST clamp the cached PMTU to 1280 for the affected destination and MUST use a Fragment Extension Header (NH=44) to carry larger application payloads in 1280-byte pieces. Implementations MUST NOT set a cached PMTU below 1280 regardless of the reported value, and MUST NOT emit ASIP packets smaller than 1280 bytes on the wire except as trailing fragments. The "< 48" degenerate case (ASIP 40-byte base header + 8-byte minimum upper- layer header) is equally covered by this rule. * *(MUST, per-source-address cache)* Hosts that hold multiple ASIP source addresses (multihoming, §8.3.1) MUST cache PMTU state keyed by the tuple (source address, destination address), not by destination alone. The forward path differs per source address because r.r.r.r steers inter-AS forwarding; PMTU to the same destination via two different locators MAY differ. Flushing the cache only on destination change will cause PTB storms when the host switches source addresses. * *(SHOULD)* Encapsulating gateways SHOULD probe path MTU proactively (e.g., using Packetization-Layer PMTUD per [RFC8899]) rather than waiting for the first ICMP Packet Too Big event in the data flow. * *(MAY)* Operators with strict application MTU requirements MAY configure their ASIP-to-IPv4 transit to use GRE (-24 outer: IPv4(20)+GRE(4)) or IP-in-IP (-20 outer: IPv4(20) only) instead of GENEVE/UDP (-36 outer: IPv4(20)+UDP(8)+GENEVE(8)). IP-in-IP recovers 16 bytes of inner payload per packet versus GENEVE/UDP at the cost of losing UDP-based NAT traversal and per-flow port entropy for ECMP hashing. The choice is a trade-off between payload efficiency and outer-transport properties. Hause Expires 18 October 2026 [Page 66] Internet-Draft ASIP April 2026 *Deliberate non-resolution: outer PMTU vs. inner PMTU.* When an ASIP- to-IPv4 tunnel reports a path MTU via ICMPv4 on the outer path, the encapsulator MUST translate that to an ICMP-ASIP Packet Too Big on the inner flow (§12.7.4). When an ICMP-ASIP Packet Too Big is received on the inner flow from beyond the decapsulator, the encapsulator MUST NOT re-generate an ICMPv4 error on the outer path; the inner error is propagated to the inner originator directly. This is the standard IP-in-IP tunneling behavior [RFC4459] and is restated here because translation-plus-encapsulation paths combine both semantics. 13. 13. Application Compatibility 13.1. 13.1. Legacy Applications Existing IPv4 applications require no modification. The ASIP socket compatibility layer intercepts standard BSD socket calls (AF_INET, connect(), bind(), etc.) and transparently manages the upper 96 bits via DNS-ASIP resolution and routing table state. The application never sees an ASIP address. 13.2. 13.2. New Applications Applications that wish to leverage ASIP addressing directly MAY use the AF_ASIP address family and sockaddr_asip structure defined in Section 5.5. Libraries SHOULD provide helper functions for converting between ASIP canonical/compressed notation strings and sockaddr_asip structures. 13.3. 13.3. URL and URI Representation ASIP addresses in URLs use canonical or compressed notation enclosed in brackets, consistent with IPv6 convention [RFC3986]: https://[15169:0.0.0.1:0.0.0.10:192.0.2.1]:443/path (full, no compression needed) https://[15169::192.0.2.1]:443/path (flat network, compressed) https://[::8.8.8.8]:443/path (IPv4 compatible, compressed) https://[64496::10.0.0.1]:8080/api (documentation ASN, compressed) Parsers MUST handle both compressed and uncompressed forms within brackets. The host field h.h.h.h is always present per Section 6.3 Rule 5, which prevents ambiguity with bare IPv4 addresses in URLs. 14. 14. Security Considerations Hause Expires 18 October 2026 [Page 67] Internet-Draft ASIP April 2026 14.1. 14.1. ASN Locator Spoofing ASIP border routers MUST implement ingress filtering validating that the source r.r.r.r of received packets is a legitimate origin for the eBGP-ASIP session over which the packet arrived. The legitimate- origin set is the union of the peer's own ASN locators and any ASN locators the peer has validly announced (including multihoming and anycast more-specifics per Section 8.3.1). This is consistent with BCP 38 [RFC2827]. Because the locator is carried in the address rather than inferred from prefix ownership, the check is a direct field match rather than a lookup. Note that the check validates the locator, not the host identity: an operator who rewrites r.r.r.r at an internal boundary (Section 8.3.2) MUST ensure that the rewritten locator still passes the ingress-filter check at the next external boundary. *IPv4-mapped source (r=z=s=0) handling at ingress.* An incoming Version=8 frame with source r.r.r.r=0 is by definition a packet emitted (or re-emitted) by a §12.2 translator: either (a) IPv4-to- ASIP forward, where the translator prepended r=z=s=0 on ingress, or (b) IPv4-to-ASIP reply to a native ASIP client, where the IPv4 source gets lifted to ::S4 (§12.7.1 reverse direction, the common case of every reply from an IPv4 destination to an ASIP-native originator). Both cases produce legitimate downstream traffic whose source locator is 0.0.0.0. The filter below treats them uniformly. A border router MUST accept r=z=s=0 sourced Version=8 frames on an interface if and only if *both* of the following hold: (i) the peer's legitimate- origin set on that eBGP-ASIP session (or administratively configured adjacency) contains the 0.0.0.0::/96 IPv4-mapped prefix; and (ii) the receiving interface satisfies a uRPF-style reception check for 0.0.0.0::/96 in the sense of [RFC3704]. Condition (ii) prevents the one-bit-flip attack in which a transit peer that merely re-advertises 0.0.0.0::/96 thereby unlocks blanket acceptance of r=z=s=0 source packets across _all_ its customer-facing ingress without applying BCP 38 to its own customers; condition (ii) restricts acceptance to interfaces consistent with the route for the IPv4-mapped prefix. Transit ASes that re-advertise 0.0.0.0::/96 MUST themselves apply §14.14's intra-AS BCP 38 rule on their customer-facing ingress, so that a downstream customer cannot spoof r=z=s=0 into a transit AS that is itself trusted by its upstream peers. Carriage of the 0.0.0.0::/96 prefix is expected to be propagated by normal eBGP-ASIP advertisement from the translator-owning ASN outward, exactly as any other originated prefix; transit ASes re-advertise it and MUST include it in the outbound legitimate-origin set they present to their own downstream peers. A receiving border router that is a transit hop several ASNs away from the originating translator will therefore see 0.0.0.0::/96 in its upstream peer's advertised set and, Hause Expires 18 October 2026 [Page 68] Internet-Draft ASIP April 2026 provided the packet arrives on the interface associated with that upstream route (uRPF condition (ii)), will correctly accept r=z=s=0 reply traffic. This preserves the §12.7.1 reverse-direction reply path across arbitrary-length multi-AS transit. *uRPF mode selection (normative).* Condition (ii) admits two modes from [RFC3704]: strict (packet accepted only if the best-path route for 0.0.0.0::/96 in the router's RIB points out the same interface on which the packet arrived) and feasible-path/loose (packet accepted if any route for 0.0.0.0::/96 exists via the receiving interface, whether or not best-path; loose mode accepts if any route exists in the RIB at all, regardless of interface). Leaving the mode unspecified would produce implementation divergence: one vendor strict-mode-drops legitimate asymmetric reply traffic, while another vendor loose-mode-accepts exactly the one-bit-flip pattern condition (ii) was written to block. Accordingly: - On single-homed edge eBGP- ASIP interfaces facing stub customers or transit-free peers, routers MUST apply strict-mode uRPF for 0.0.0.0::/96; strict mode is the mode that actually closes the one-bit-flip gap. - On multihomed-customer- facing interfaces and on transit/core interfaces where asymmetric return paths are expected (e.g., a customer multihomed to two upstreams advertising via primary but receiving replies via backup), routers MUST apply feasible-path uRPF per [RFC3704] §2.2 (packet accepted if the receiving interface is _any_ reverse path for 0.0.0.0::/96 in the RIB, not only the best path). Feasible-path uRPF tolerates legitimate asymmetry while still requiring a per-interface route association, which continues to block the one-bit-flip attack from an interface that has no 0.0.0.0::/96 route at all. - Loose-mode uRPF (the "any route anywhere" variant) MUST NOT be used for 0.0.0.0::/96 reception on any eBGP-ASIP interface; loose mode degenerates condition (ii) into condition (i) and reintroduces the one-bit-flip acceptance gap that condition (ii) was written to block. - During a transient RIB state where 0.0.0.0::/96 is absent (BGP flap, session reset), condition (ii) will fail and legitimate r=z=s=0 replies will be dropped for the duration of the absence. This is the same transient-drop behavior that RFC 3704 uRPF applies to IPv4 BCP 38 and is accepted as a standard operational cost; operators SHOULD minimize 0.0.0.0::/96 churn by configuring the prefix with eBGP-ASIP dampening disabled and with a stable originator. The mode selection above is enforceable at configuration time: the operator knows which of its interfaces are single-homed-edge vs. multihomed/transit, and per-interface mode configuration is standard in every eBGP-ASIP- capable router. An implementation that cannot determine the correct mode per-interface MUST default to strict mode and reject r=z=s=0 traffic on any interface where strict uRPF fails; this is the safe default. On any eBGP-ASIP session whose legitimate-origin set does NOT contain 0.0.0.0::/96, or where the uRPF reception check fails, packets with r=z=s=0 source MUST be dropped: the all-zero locator is Hause Expires 18 October 2026 [Page 69] Internet-Draft ASIP April 2026 not a valid origin for a peer that has not propagated the IPv4-mapped originator prefix, and an attacker on such a link cannot bypass the §14.1 locator-match filter by forging r=z=s=0 (which would otherwise evade the filter because no non-zero ASN is present to compare against). Operators who deploy stateless §12.2 translation at their AS boundary MUST originate the 0.0.0.0::/96 prefix via eBGP-ASIP so that downstream reply traffic flows are not black-holed by peer ingress filters; a translator deployment that silently serves §12.2 without this advertisement will see its reverse-direction replies dropped at the first non-translator-declared boundary. Operators deploying only §12.3 encapsulation (ASIP-to-IPv4 tunneling) without §12.2 translation MUST NOT originate 0.0.0.0::/96, because they do not serve that prefix; originating a prefix one does not serve is a hijack pattern WHOIS-ASIP (§8.4) is specifically designed to reject. 14.2. 14.2. Internal Zone Prefix Protection The 127.x.x.x internal zone prefix MUST NOT appear on WAN interfaces. Border routers MUST drop packets with 127.x.x.x as source or destination r.r.r.r on external interfaces and SHOULD log each violation. 14.3. 14.3. RINE Prefix Protection The 100.x.x.x RINE prefix MUST NOT appear in eBGP-ASIP advertisements or on non-peering interfaces. Border routers MUST filter these prefixes and SHOULD log violations. 14.4. 14.4. Interior Link Convention Protection Border routers MUST filter received eBGP-ASIP route advertisements whose announced reachability would treat the 222.0.0.0/8 h.h.h.h range as an externally routable interior-link address. This is a control-plane filter applied to route advertisements only. Border routers MUST NOT filter data-plane packets based solely on the h.h.h.h value being in 222.0.0.0/8. The h.h.h.h field is locally significant and other ASes may legitimately use any h.h.h.h value for any purpose. Per Section 3.8, route-advertisement filtering and data-plane filtering are distinct and MUST NOT be conflated. 14.5. 14.5. RFC 1918 Address Privacy RFC 1918 private addresses in h.h.h.h remain non-routable on the public internet, consistent with IPv4 behavior. Hause Expires 18 October 2026 [Page 70] Internet-Draft ASIP April 2026 14.6. 14.6. Prefix Granularity Enforcement *More-specifics than /32 in r.r.r.r.* Prefixes more specific than /32 in the r.r.r.r field subdivide a single ASN locator's address space across multiple route advertisements. Such announcements SHOULD NOT be accepted at external eBGP-ASIP boundaries. They MAY be accepted when they are explicitly listed in the originating ASN's WHOIS-ASIP record (Section 8.4) as legitimate multihoming, anycast, or TE more- specifics (Section 8.3.1). A blanket "no deaggregation ever" rule would force operators to split into additional ASNs to achieve the same traffic-engineering granularity, which grows the locator count and does not shrink the table; the WHOIS-ASIP-authorized-more- specifics model supports the real use cases BGP4 already supports without this perverse incentive. *Less-specifics than /32 in r.r.r.r.* Aggregation covering multiple ASN locators (less specific than /32) MAY be performed for internal backbone routing but MUST NOT be advertised across peering boundaries, because such an aggregate obscures the per-ASN origin that WHOIS-ASIP validation depends on. This resolves the tension between §8.3 aggregation-to-/16 and the "one route = one ASN" property: aggregation is a routing-table optimization internal to an operator, not a peering-advertisement practice. 14.7. 14.7. Header Overhead and DDoS The 40-byte ASIP header is 20 bytes larger than IPv4's minimum header and identical in size to IPv6. In volumetric DDoS scenarios, this increases per-packet overhead for both attacker and defender. The net effect is approximately equivalent; the additional header bytes do not create a meaningful amplification vector. Rate limiting and traffic scrubbing operate identically to IPv4 and IPv6 at the transport layer. 14.8. 14.8. Privacy Considerations The r.r.r.r field reveals the origin ASN of every packet. This is functionally equivalent to existing BGP prefix-to-AS mapping via whois lookups, but encoded directly in the address rather than requiring a secondary lookup. Operators concerned about origin AS privacy at the packet level may use VPN or tunnel encapsulation to mask the outer ASIP header, identical to existing practice with IPv4/ IPv6. Hause Expires 18 October 2026 [Page 71] Internet-Draft ASIP April 2026 The z.z.z.z and s.s.s.s fields reveal internal network topology to external observers. Operators who consider this unacceptable SHOULD use XLATE-ASIP (address translation) at their AS boundary to replace internal z.z.z.z and s.s.s.s values with a public-facing address before packets exit the AS. This is recommended for all operators as a baseline privacy practice. 14.9. 14.9. SLAAC-ASIP Security SLAAC-ASIP inherits the security properties and risks of IPv6 SLAAC [RFC4862]: * *Rogue Router Advertisements:* A malicious device on a link may send forged Router Advertisements containing incorrect prefixes, redirecting traffic or causing denial of service. RA Guard [RFC6105] adapted for ASIP SHOULD be deployed on all access switches. * *DAD Attacks:* An attacker may respond to every DAD probe, preventing legitimate devices from configuring addresses. This is mitigated by limiting DAD attempts and falling back to DHCP-ASIP. * *Host ID Tracking:* MAC-derived host identifiers (SLAAC-ASIP Method 3) enable device tracking across networks. Implementations SHOULD default to Method 1 (stable opaque) or Method 2 (temporary random) to prevent this. * *Temporary Address Rotation:* Method 2 temporary addresses SHOULD be regenerated on a configurable interval (default 24 hours) and MUST be regenerated when moving between networks. 14.10. 14.10. Link-Local Scope Enforcement Link-local addresses (169.254.0.0/16 in r.r.r.r) MUST NOT be forwarded by any router under any circumstances. Routers MUST silently drop packets with link-local source or destination addresses received on any interface other than the originating link. This enforcement prevents link-local addresses from being used as a side channel to bypass scope boundaries. 14.11. 14.11. Scope Boundary Enforcement Each scope level (Section 4.1) represents a security boundary. Routers at scope boundaries MUST enforce the containment hierarchy: * Link-local traffic MUST NOT exit the link. Hause Expires 18 October 2026 [Page 72] Internet-Draft ASIP April 2026 * Mesh-scoped traffic MUST NOT exit the mesh domain. Conversely, non-mesh traffic MUST NOT enter a mesh domain natively (§3.11; the only sanctioned entry is a mesh-gateway-performed translation). * Organization-scoped traffic (127.x.x.x) MUST NOT exit the AS. * Terrestrial traffic MUST NOT be forwarded into a non-terrestrial realm without explicit relay configuration. Conversely, a terrestrial router receiving a packet whose source r.r.r.r lies in a non-terrestrial realm range (97/8, 98/8, 99/8, 241/8–249/8, 250/8) on an interface that is not a configured realm-relay ingress MUST drop the packet. A terrestrial router MUST NOT accept such a packet on general peering links; realm-sourced traffic is accepted only on a physical or cryptographic channel configured as a realm-relay ingress. Without this ingress-side restriction, an attacker in a terrestrial peer's path could spoof a non-terrestrial source r.r.r.r and bypass realm-boundary controls that §3.12 authorizes only at designated relay points. * Cross-realm multicast is governed by §10.6; no multicast scope crosses a realm boundary natively in this document. Violation of scope boundaries MUST be dropped as specified above and SHOULD be logged as a security event. 14.12. 14.12. Extension Header Security ASIP reuses IPv6's extension header mechanism and therefore inherits the same security considerations [RFC7045, RFC8200]. Implementations MUST: * Limit the number of extension headers per packet to at most 8 distinct headers and the total length of the extension-header chain to at most 256 bytes. Packets exceeding either bound MUST be dropped at the ingress node and SHOULD be counted. These limits make the "long chain of extension headers" IDS-evasion attack [RFC7112] ineffective while preserving realistic legitimate use (at most one Hop-by-Hop, one Destination Options before routing, one Routing, one Fragment, one AH or ESP, one Destination Options after routing per RFC 8200 §4.1). * Require the full ASIP header chain, through and including the upper-layer protocol header, to be contained in the first fragment of a fragmented packet. Packets that violate this requirement MUST be dropped. This matches [RFC7112] and prevents first- fragment-only inspection bypass. Hause Expires 18 October 2026 [Page 73] Internet-Draft ASIP April 2026 * Drop packets with unrecognized extension header types at intermediate nodes (unless the header is a Destination Options header, which is only processed at the final destination). * Implement rate limiting on packets with Hop-by-Hop Options headers, which require processing at every node. 14.13. 14.13. Flow Label Security The flow label is source-assigned and opaque to the network. Routers MUST NOT trust flow labels for security decisions. An attacker may set arbitrary flow labels to manipulate ECMP distribution or QoS classification. Flow labels SHOULD be used as hints for performance optimization, never as security-relevant identifiers. 14.14. 14.14. STRIDE Summary The preceding §§14.1-14.13 address individual threats. This subsection consolidates coverage against the STRIDE categories (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) so that gaps are visible in one place. Normative statements in this subsection that are not already covered elsewhere are load-bearing. *Spoofing.* * ASN-locator spoofing at peer ingress: covered normatively in §14.1. * Intra-AS source-address spoofing (a host on the internal side of r.r.r.r faking a different z:s:h): NOT covered at the protocol layer. Operators MUST deploy BCP 38-equivalent ingress filtering on internal AS-access segments; this is a standard operational control and is not specific to ASIP, but is named here so that implementers do not assume §14.1's border-only filter suffices. * DNS-ASIP response spoofing: mitigated by DNSSEC at the DNS layer; ASIP imposes no additional requirements. A-ASIP records MUST be served over DNSSEC-validated zones where the deploying operator relies on A-ASIP-vs-A preference for policy decisions. * WHOIS-ASIP response spoofing: covered normatively by §8.4 "Response authentication." * ICMP-ASIP error-source spoofing: an on-path or off-path attacker can forge an ICMP-ASIP Packet Too Big or Destination Unreachable to poison a host's PMTU cache or abort a connection. Hosts MUST validate that the inner header of an ICMP-ASIP error corresponds Hause Expires 18 October 2026 [Page 74] Internet-Draft ASIP April 2026 to a packet the host recently sent (source address, destination address, and at least 8 bytes of upper-layer header, identical to RFC 5927 guidance for ICMPv4); errors that do not match MUST be discarded. * NDP / RA spoofing on link-local: mitigated by RA Guard (§14.9) and by NDP cache entry validation; no new normative text needed. *Tampering.* * In-transit modification of unprotected traffic: not addressable at the IP layer; relies on upper-layer integrity (TLS, QUIC, AH, ESP). §14 makes no additional claim. * Extension-header chain tampering: bounded by §14.12 (max 8 headers, max 256 bytes, first-fragment inclusion). * GENEVE option tampering: mitigated by §12.3's "no options in the baseline" rule; future option-class additions MUST define their own integrity story in the companion specification that introduces them. * Flow-label manipulation by intermediate nodes: forbidden by §5.4 ("Routers MUST NOT … rewrite it in the forwarding path"); an on- path tamperer can manipulate it, but doing so is classified as a QoS/ECMP impact only and never a security-relevant change, per §14.13. *Repudiation.* * Translator logging: §14.15 (below) requires an observable counter of failed ICMP-error translations; operators SHOULD additionally log stateful translation session establishment and teardown at rates compatible with their incident-response workflow. This document does not mandate a specific log schema. * Locator-rewrite attribution gaps: when §8.3.2 rewrites r.r.r.r, downstream logs show the rewritten locator, not the original. Operators performing rewrite MUST retain a (timestamp, pre- rewrite, post-rewrite, peer-session) audit record for the period required by applicable policy; failing this, post-incident attribution across a rewrite boundary is impossible. * CF telemetry attribution: CF is specified in a separate companion document (§17 / draft-asip-cf-00); attribution of CF values to specific peers is a CF-companion concern and is not pinned down here. Hause Expires 18 October 2026 [Page 75] Internet-Draft ASIP April 2026 *Information disclosure.* * Flow-label as a side-channel: covered normatively in §14.13. * Extension-header chain as a fingerprinting vector: a responder's choice of extension-header ordering (AH vs. ESP placement, presence of Destination Options) can identify the implementation. Implementations SHOULD NOT emit optional extension headers that are not required by the packet's function; this is an RFC 8200 best practice restated for ASIP. * Translator state as a timing oracle: a per-flow translator that differentiates response latency between "first packet of a flow" (state creation) and "subsequent packets" (state hit) exposes an observable that an attacker can use to probe another user's flow existence. Translators SHOULD minimize the timing delta between state-miss and state-hit, or SHOULD apply a constant-time pad to external-facing response latency. * Multicast-scope network-topology disclosure: a receiver that observes which scope nibbles reach it learns the network's scope- boundary topology. This is not a new threat class (IPv6 MLD has the same property) and is accepted. * Internal zone (127.x) address leakage: covered normatively in §14.2. A packet with 127.x source arriving on a WAN interface is a configuration error that leaks internal topology; the MUST-drop rule in §14.2 prevents propagation. *Denial of service.* * Translator state exhaustion: covered in §14.15 (below). * GENEVE reflection: covered in §12.3 "Tunnel endpoint authentication and reflection/amplification." * ICMP-ASIP amplification: ICMP-ASIP Echo Reply is 1:1 in size with Echo Request and does NOT amplify on its own. However, ICMP-ASIP Destination Unreachable messages whose inner payload is set to the maximum permitted 1232-byte quotation ([RFC4443]-equivalent) do amplify a small triggering packet to ~1232 bytes plus headers. Routers emitting ICMP-ASIP errors MUST apply rate limits per (source, destination) pair, as required of ICMPv6 routers by [RFC4443] §2.4. Unsolicited Neighbor Advertisements and Router Advertisements are link-scoped and do not amplify across routers. Hause Expires 18 October 2026 [Page 76] Internet-Draft ASIP April 2026 * SLAAC DAD storms: a malicious host that responds positively to every DAD probe can starve a subnet. Mitigated by §3.14.3's bounded-retry rule and DHCP-ASIP fallback, plus RA Guard per §14.9. * WHOIS-ASIP query amplification: WHOIS-ASIP responses can be substantially larger than queries (especially for prefix-to-ASN enumerations). WHOIS-ASIP servers MUST apply per-client rate limits and MUST NOT answer unauthenticated bulk-enumeration queries over UDP. The authenticated-channel requirement of §8.4 ("Response authentication") restricts large-response queries to TLS-authenticated clients. * Flow-label-driven router-CPU exhaustion via ECMP hashing: flow labels are source-assigned and an attacker can choose labels to maximize cache-line contention in an ECMP hash-bucket table. Routers SHOULD include a random per-router seed in ECMP hashing so that an attacker cannot target a specific hash bucket without knowing the seed. *Elevation of privilege.* * Multicast scope escape: covered by §10.6 composition rules and by §14.11 scope-boundary enforcement. * Realm-boundary escape: covered by §3.12 "Cross-realm authentication" and by §14.11; supplemented by §10.6 rule 4 for multicast. * Internal-zone (127.x) addresses leaking externally: covered by §14.2. * eBGP-ASIP route injection by a non-authorized AS: covered by §8.4's WHOIS-ASIP validation where deployed; where WHOIS-ASIP is not enforced, operators accept BGP4-equivalent route hygiene (§8.4 "Normative status") and an injection remains possible, same as today's BGP4. 14.15. 14.15. Translator State and ICMP Error Attribution §12.7.1 and §12.7.3 require translators to maintain a mapping between IPv4 literals and the originating ASIP source locator in order to reconstruct ICMP errors and return-path source addresses. This mapping is an attack surface: Hause Expires 18 October 2026 [Page 77] Internet-Draft ASIP April 2026 * *Memory exhaustion via ICMP flood.* If the mapping is per-flow session state, an attacker can exhaust translator memory by opening many short-lived flows and solicit ICMP errors that force state allocation. Translators SHOULD bound per-session state, apply LRU eviction, and log state-table pressure events. * *Stale-mapping misattribution.* If the mapping is administrative/ static, a long-lived mapping entry can survive past the originating ASIP host's address changes (locator transfer, ASN renumbering). Misattributed ICMP errors are a low-severity information leak but not a traffic-injection vector. Operators SHOULD age out administrative mappings on ASN-transfer events. * *Observability requirement.* Translators MUST expose a counter of ICMP-error translations that failed for lack of mapping state; a sudden increase in this counter indicates either an attack or a misconfigured mapping and SHOULD be monitored. * *Short-flow state lifetime.* Echo and single-probe flows (§12.7.2) generate high-rate, low-value mapping entries that, if aged at the same timeout as TCP/UDP flow state, amplify the memory-exhaustion surface above. Translators that maintain per-flow mapping state SHOULD apply a distinct short timeout (RECOMMENDED: 60 seconds) to Echo/ping-class traffic and MAY apply the longer TCP/UDP default only to flows carrying a transport connection. This caps Echo- based state amplification without harming correlation of legitimate traceroute and PMTU probes. 15. 15. IANA Considerations 15.1. 15.1. IP Version Number IANA is requested to assign version number 8 in the IP Version Number registry to ASIP (AS-Structured Internet Protocol), the 128-bit four- field protocol specified in this document. 15.2. 15.2. Address Family IANA is requested to assign: * An Address Family Identifier (AFI) for ASIP in the Address Family Numbers registry. This is the AFI that eBGP-ASIP (§8.3), iBGP- ASIP, and any Multiprotocol BGP [RFC4760] usage MUST carry to announce ASIP reachability. * A Subsequent Address Family Identifier (SAFI) for ASIP unicast. Hause Expires 18 October 2026 [Page 78] Internet-Draft ASIP April 2026 * A Subsequent Address Family Identifier (SAFI) for ASIP multicast (for MP-BGP carriage of the cross-ASN multicast prefixes defined in §10.3 and §4.2). eBGP-ASIP conformance (§8.3) requires the AFI/SAFI assignment to exist before interoperable inter-AS ASIP routing can be deployed. Until IANA has assigned these values, experimental deployments MAY use a pair of Private Use AFI/SAFI values agreed between peers; such deployments MUST NOT advertise prefixes over assigned-value peering until the formal assignment is completed. 15.3. 15.3. Reserved ASN Ranges IANA is requested to reserve the following ASN ranges for ASIP use. Each /8 in r.r.r.r spans 2^24 = 16,777,216 ASN values; a /16 spans 2^16 = 65,536. Rows below that span a single /8 or /16 carry the corresponding 2^24 or 2^16 Count; rows that span multiple /8 ranges (241.0.0.0–249.255.255.255; 251.0.0.0–253.255.255.255) carry the sum, and the partial-/8 row 255.0.0.0–255.255.254.255 excludes the 256 values reserved for cross-ASN multicast and broadcast per §15.6 and §15.7: +===============+=================+=============+================+ | ASN Range | r.r.r.r | Count | Purpose | | (decimal) | Equivalent | | | +===============+=================+=============+================+ | 1,627,389,952 | 97.0.0.0/8 | 16,777,216 | Near-Earth | | - | | | infrastructure | | 1,644,167,167 | | | realm | | | | | (Informative, | | | | | Section 3.12) | +---------------+-----------------+-------------+----------------+ | 1,644,167,168 | 98.0.0.0/8 | 16,777,216 | Cislunar / | | - | | | Lunar realm | | 1,660,944,383 | | | (Informative, | | | | | Section 3.12) | +---------------+-----------------+-------------+----------------+ | 1,660,944,384 | 99.0.0.0/8 | 16,777,216 | Martian realm | | - | | | (Informative, | | 1,677,721,599 | | | Section 3.12) | +---------------+-----------------+-------------+----------------+ | 1,677,721,600 | 100.0.0.0/8 | 16,777,216 | RINE peering | | - | | | fabric | | 1,694,498,815 | | | | +---------------+-----------------+-------------+----------------+ | 2,130,706,432 | 127.0.0.0/8 | 16,777,216 | Internal zone | | - | | | prefixes | | 2,147,483,647 | | | | Hause Expires 18 October 2026 [Page 79] Internet-Draft ASIP April 2026 +---------------+-----------------+-------------+----------------+ | 2,851,995,648 | 169.254.0.0/16 | 65,536 | Link-local | | - | | | scope | | 2,852,061,183 | | | | +---------------+-----------------+-------------+----------------+ | 4,026,531,840 | 240.0.0.0/8 | 16,777,216 | Mesh / ad-hoc | | - | | | scope | | 4,043,309,055 | | | | +---------------+-----------------+-------------+----------------+ | 4,043,309,056 | 241.0.0.0 - | 150,994,944 | Future | | - | 249.255.255.255 | | celestial | | 4,194,303,999 | | | bodies | | | | | (Informative) | +---------------+-----------------+-------------+----------------+ | 4,194,304,000 | 250.0.0.0/8 | 16,777,216 | DTN relay | | - | | | realm | | 4,211,081,215 | | | (Informative) | +---------------+-----------------+-------------+----------------+ | 4,211,081,216 | 251.0.0.0 - | 50,331,648 | Reserved for | | - | 253.255.255.255 | | future use | | 4,261,412,863 | | | | +---------------+-----------------+-------------+----------------+ | 4,261,412,864 | 254.0.0.0/8 | 16,777,216 | Documentation | | - | | | and testing | | 4,278,190,079 | | | | +---------------+-----------------+-------------+----------------+ | 4,278,190,080 | 255.0.0.0 - | 16,776,960 | Reserved for | | - | 255.255.254.255 | | future use | | 4,294,967,039 | | | (non- | | | | | multicast/ | | | | | broadcast) | +---------------+-----------------+-------------+----------------+ Table 15 15.4. 15.4. DNS A-ASIP Record Type IANA is requested to assign a DNS resource record type number for the A-ASIP record type defined in Section 7. 15.5. 15.5. ICMP-ASIP Next-Header Value and Type Registry IANA is requested to assign a previously-unassigned value in the IP Protocol Numbers / IPv6 Extension Header registry for ICMP-ASIP. The requested value is 143; any unassigned value in the range 143-252 that IANA prefers is acceptable. The assigned value MUST NOT be 58 (ICMPv6) to prevent dispatcher ambiguity across header-stripping middleboxes. Hause Expires 18 October 2026 [Page 80] Internet-Draft ASIP April 2026 IANA is also requested to establish a registry for ICMP-ASIP message types, initially populated with types corresponding to ICMPv4 [RFC792] and ICMPv6 [RFC4443] equivalents including Neighbor Solicitation, Neighbor Advertisement, Router Solicitation, and Router Advertisement for SLAAC-ASIP and neighbor discovery. 15.6. 15.6. Cross-ASN Multicast Registry IANA is requested to establish a registry for ASIP cross-ASN multicast prefix assignments within r.r.r.r = 255.255.255.0/24, with scope values as defined in Section 10.1. 15.7. 15.7. Broadcast Reservation IANA is requested to reserve r.r.r.r = 255.255.255.255 as the ASIP broadcast address. 15.8. 15.8. Next Header Values ASIP draws from the IPv6 Next Header registry for shared protocols (TCP, UDP, ESP, AH, Routing, Fragment, Destination Options, No Next Header). It requests a distinct value for ICMP-ASIP (Section 15.5) rather than reusing NH=58, to eliminate dispatcher ambiguity at header-stripping middleboxes. 15.9. 15.9. GENEVE Inner-Protocol Assignment for ASIP-to-IPv4 IANA is requested to assign a GENEVE [RFC8926] inner-protocol type identifying encapsulated ASIP frames for use by the ASIP-to-IPv4 transit encapsulation defined in Section 12.3. 15.10. 15.10. WHOIS-ASIP Registry Domain Delegation IANA is requested to delegate one or more well-known registry domains for WHOIS-ASIP service discovery (§8.4 "Service discovery"). Each delegated domain MUST carry an _whois-asip._tcp SRV record resolvable over IPv4 so that a bootstrapping ASN can locate its regional WHOIS- ASIP service without a pre-existing ASIP path. The specific delegation structure (single global domain vs. per-RIR domains) is left to IANA and the RIR community; this specification requires only that the delegation exist and that the SRV record be IPv4-resolvable during transition. 16. 16. Zone Server Reference Architecture (Informative) This section is INFORMATIVE. Nothing in this section is a protocol- layer requirement. Operators MAY deploy ASIP addressing without any Zone Server infrastructure. Hause Expires 18 October 2026 [Page 81] Internet-Draft ASIP April 2026 16.1. 16.1. Concept The Zone Server is a reference architecture for unified network service delivery. A Zone Server is a paired active/active platform that consolidates address assignment (DHCP-ASIP), name resolution (DNS-ASIP), time synchronization (NTP8), telemetry collection (NetLog8), authentication caching, route validation, access control, and IPv4/ASIP address translation (XLATE-ASIP) into a single operational platform. The motivation is operational: modern networks require a minimum of 6-8 independently configured, independently authenticated, independently monitored services before a device is operational. The Zone Server consolidates these into a single platform with a shared identity model and a single configuration surface. 16.2. 16.2. Service Delivery Model A device connecting to a Zone Server-equipped network sends one DHCP- ASIP Discover and receives a single response containing every service endpoint it requires. No subsequent manual configuration is needed. The device is fully operational (addressed, authenticated, time- synchronized, logged) before its first user interaction. 16.3. 16.3. Authentication Model The Zone Server reference architecture recommends OAuth2 JWT [RFC7519] as the universal authentication mechanism. Tokens are validated locally by the Zone Server without round trips to external identity providers. This enables continued operation when upstream identity providers are unreachable. Operators MAY use alternative authentication mechanisms. The Zone Server architecture is a recommendation, not a protocol-layer mandate. 16.4. 16.4. Why This Is Informative, Not Normative Bundling operational architecture into a protocol specification is a category error. Protocols define wire formats and interoperability requirements. Operational architecture defines how organizations deploy and manage their networks. These are different concerns with different rates of change, different stakeholders, and different consensus requirements. Hause Expires 18 October 2026 [Page 82] Internet-Draft ASIP April 2026 The Zone Server architecture is published as a companion specification to enable operators who want unified management to deploy it. Operators who do not want it lose nothing. ASIP addressing works without it. 17. 17. Cost Factor Routing Metric (Informative) The Cost Factor (CF) routing metric is specified in a separate companion document (draft-asip-cf-00). CF is intended as an OPTIONAL multi-dimensional path-selection input beyond the standard BGP attributes (LOCAL_PREF, AS_PATH, ORIGIN, MED). CF is NOT a protocol- layer requirement of this document: ASIP eBGP-ASIP sessions MUST function correctly using only standard BGP path-selection criteria [RFC4271], and no normative behavior defined in §§3–15 of this document depends on CF. An operator MAY deploy ASIP without any CF awareness; conformance to this specification does not require parsing, emitting, or acting on a CF path attribute. Implementers seeking the CF component set, accumulation semantics, wire-format encoding, and physics-floor rules MUST consult the companion draft; partial CF machinery is intentionally not reproduced here because a partial reproduction could be treated as specification despite not being a complete one, which would fork CF semantics between the two documents. 18. 18. Acknowledgment of Trade-offs Every protocol design involves trade-offs. This section makes them explicit rather than pretending they don't exist. Items marked UNRESOLVED describe cases where the design has no clean answer; they are documented here rather than hidden. 18.1. 18.1. Header Overhead The 40-byte ASIP base header is 20 bytes larger than IPv4 (20 bytes) and identical in size to IPv6 (40 bytes). By adopting IPv6's fixed- header design (dropping IHL, header checksum, and inline fragmentation), ASIP achieves header parity with IPv6 while carrying the same 128-bit address space in a structured four-field format. On bandwidth-constrained links (satellite, IoT, cellular), the 20-byte overhead versus IPv4 is non-trivial. Header compression (ROHC or equivalent adapted for ASIP) is RECOMMENDED for such environments. Per-packet overhead in ASIP-to-IPv4 transit is higher because of the outer IPv4 and UDP headers. The total bytes above the inner L4 payload are ASIP(40) + IPv4(20) + UDP(8) + GENEVE(8) = 76 bytes, of which the inner ASIP header contributes 40 bytes and the encapsulation framing (IPv4 + UDP + GENEVE) contributes 36 bytes. An HTTPS (TCP/TLS) tunneling alternative costs 109 total bytes per Hause Expires 18 October 2026 [Page 83] Internet-Draft ASIP April 2026 packet (ASIP(40) + IPv4(20) + TCP(20) + TLS(~29)) and introduces TCP congestion-control interactions; GENEVE/UDP is preferred because it avoids both the extra 33 bytes and the TCP-over-TCP pathology (see §12.3 rationale). 18.2. 18.2. Rigid Hierarchy The fixed four-field address structure (ASN/Zone/Subnet/Host) imposes a specific network topology model. Organizations whose networks do not map naturally to this hierarchy (highly flat networks, mesh topologies, multi-ASN single-logical-network deployments) may find the structure constraining. The Zone and Subnet fields are locally significant and operator-assigned, which provides flexibility within an organization. The r.r.r.r field is drawn from the global ASN number space and is constrained by external allocation. 18.3. 18.3. ASN Dependency Every ASIP-routable address requires an ASN locator. Organizations that do not currently hold an ASN must obtain one before deploying ASIP with public-facing addresses. The ASN allocation process is well-established via RIRs but adds a bureaucratic step that IPv4 and IPv6 do not require for basic internet connectivity. Organizations using only internal zone addressing (127.x.x.x) or link-local addressing (169.254.x.x) do not require a public ASN. 18.4. 18.4. Transition Realism ASIP is not wire-compatible with IPv4. Every router, OS kernel, NIC driver, firewall, IDS/IPS, load balancer, and middlebox in the forwarding path of an ASIP-aware endpoint must receive a software update to process Version=8 frames natively; hardware that cannot be updated must be replaced or bypassed via the Section 12.3 encapsulation. Until that happens for each deployment segment, ASIP- to-IPv4 encapsulation handles transit, but encapsulation adds overhead (36 bytes of encapsulation framing per packet: outer IPv4(20) + UDP(8) + GENEVE(8); total bytes above the inner L4 payload are 76 with the 40-byte inner ASIP header included) and operational complexity (tunnel MTU, PMTU discovery, endpoint discovery). The transition is incremental, not instantaneous, and not free. The abstract and Section 1.2 state this plainly rather than claiming "no modification required." Hause Expires 18 October 2026 [Page 84] Internet-Draft ASIP April 2026 18.5. 18.5. Relationship to IPv6 ASIP does not claim that IPv6 is technically deficient. IPv6 is a well-designed protocol that solves the address exhaustion problem, and ASIP borrows extensively from its design: the fixed 40-byte header, extension header mechanism, flow label, traffic class, SLAAC model, scoped multicast, and the elimination of header checksums and router-path fragmentation are all IPv6 innovations adopted wholesale. ASIP's residual contribution is the structured four-field address format (ASN locator / Zone / Subnet / Host), the IPv4-mapped address form, and a more structured relationship between the routing locator and the registered ASN. Whether this narrower contribution justifies a new protocol version rather than a set of IPv6 deployment guidelines is a legitimate question that this document does not claim to settle. Both protocols MAY coexist indefinitely. 18.6. 18.5a. UNRESOLVED: Multihoming Under an ASN-Shaped Address Section 8.3.1 handles multihoming by assigning one address per upstream ASN. This preserves capability but has a real cost: a multihomed host presents multiple stable addresses to applications, DNS-ASIP, and any system that identifies a host by its address literal rather than by name. Applications that hash or pin on IP address (legacy configuration files, certain rate-limit systems, session-affinity middleware) will see the same host as two hosts. Happy-eyeballs-style selection helps on the client side but does not solve the server-side identification problem. Alternatives considered and rejected were: (i) a separate non-locator host identifier field, which would have required a header redesign; (ii) identifier/locator split via HIP or LISP-style mapping, which would have added a mapping-service dependency on the critical path. Neither was compatible with the "familiar dotted-decimal, no new control plane" goal. The chosen trade-off is documented here as a cost the design accepts, not a cost it resolves. 18.7. 18.5b. Server-Side Multi-Address Operational Impact The multi-address model in §8.3.1 creates concrete operational consequences for any server-side system that derives identity or state from the client's source IP literal. This subsection names the affected systems, prescribes mitigations, and states the normative status of each mitigation. It converts §18.5a's acknowledgment of the multihoming trade-off into deployable operator guidance. *Affected systems (non-exhaustive):* Hause Expires 18 October 2026 [Page 85] Internet-Draft ASIP April 2026 +====================+==============================================+ | System | Failure mode under multi-address | +====================+==============================================+ | HTTP session | One user is routed to different backends | | stickiness keyed | across requests if the client switches | | on source IP | between its per-ASN addresses. | +--------------------+----------------------------------------------+ | Rate limiters | Effective per-user limit is multiplied by | | keyed on source IP | the number of upstream ASNs; DoS defenses | | | under-count. | +--------------------+----------------------------------------------+ | Stateful firewalls | Return traffic on a different source | | with per-IP state | address than the forward flow is dropped | | tables | or mismatched to a different state entry. | +--------------------+----------------------------------------------+ | IP allow-lists / | A client reachable via ASN_A is allow- | | IP block-lists | listed by its ASN_A address; the same | | | client arriving via ASN_B is not | | | recognized. | +--------------------+----------------------------------------------+ | TLS session | Resumption tickets bound to the ASN_A | | resumption keyed | address fail when the client reconnects | | on peer IP | from its ASN_B address, forcing full | | | handshakes. | +--------------------+----------------------------------------------+ | Abuse-reporting, | A single user action appears in logs as | | audit logs, SIEM | multiple distinct sources; incident | | correlation | investigation must cross-reference. | +--------------------+----------------------------------------------+ | CAPTCHA / risk- | Reputation does not aggregate across a | | score systems | client's addresses. | | keyed on IP | | +--------------------+----------------------------------------------+ | Path-bound PMTU | A host must track PMTU per source | | caches (see §12.8) | address, not per destination, because the | | | forward path differs per address. | +--------------------+----------------------------------------------+ Table 16 *Mitigations.* The following mitigations address the above failure modes. Normative status is assigned per mitigation; operators deploying ASIP servers in the public internet SHOULD implement the normative ones. * *(Normative, SHOULD) Prefer session-token stickiness over IP stickiness.* HTTP load balancers SHOULD use cookie-based or JWT- based stickiness rather than source-IP hashing when serving ASIP Hause Expires 18 October 2026 [Page 86] Internet-Draft ASIP April 2026 clients. This is the single most effective mitigation and the one operators can implement without any ASIP-specific support from clients. * *(Normative, SHOULD) Group by ASN in rate limiters.* Rate limiters SHOULD include the r.r.r.r ASN locator as an aggregation key in addition to the full 128-bit address, so that clients from the same enterprise ASN aggregate into one bucket. This is effective for the common multihoming case where a client's two addresses share the enterprise's two transit ASNs. For clients whose multiple addresses come from disjoint ASNs (e.g., a home user multihomed across two retail ISPs), ASN-grouping does not aggregate and token-based identity (cookies, JWTs) SHOULD be used instead. * *(Normative, SHOULD) Export z:s:h as the stable-identity triple in logs.* Where logs must correlate a user across addresses, the z:s:h 96-bit triple under the same administrative scope (§3.1 identifier/locator separation) is the stable portion. Logging systems SHOULD record both the full address and the z:s:h triple so downstream correlation is possible. * *(Advisory, MAY) DNS-based address preference rules.* Authoritative DNS-ASIP servers MAY order A-ASIP records in a consistent preference order per client (by ASN geography, by peering cost, etc.) so that a given client preferentially selects the same server-side address most of the time, reducing but not eliminating the multi-address fan-out. This is advisory because it depends on DNS resolver and client cache behavior that the server cannot control. * *(Normative, MUST -- see §12.8) Per-address PMTU cache.* Hosts holding multiple ASIP source addresses MUST cache PMTU state keyed by (source address, destination address), not by destination alone, because the forward path is a function of the chosen source address. The MUST status is defined in §12.8 and applies identically here; this subsection does not weaken it. * *(Advisory, MAY) TLS session resumption across addresses.* TLS server implementations MAY accept resumption tickets regardless of peer-IP continuity when the ticket includes a client-identity binding (PSK or channel ID). This is advisory because RFC 8446 does not require IP continuity and most existing implementations already accept resumption across address changes; the note is included for implementations that currently check peer IP. Hause Expires 18 October 2026 [Page 87] Internet-Draft ASIP April 2026 * *(Advisory, MAY) Firewall session reconciliation.* Stateful firewalls MAY use a client-identity tag (TLS channel ID, QUIC connection ID, or application cookie) as an auxiliary state key so that return traffic on a different source address is matched to the existing forward-flow state. This is advisory because the firewall must be in the application's trust domain to read such identifiers. *Deliberate non-resolution.* The normative/advisory split above is deliberate: mitigations that a single operator can deploy without cooperation from clients, DNS, or other operators are normative (SHOULD); mitigations that require cross-party coordination or depend on application semantics outside the firewall/LB boundary are advisory (MAY). This distinction is not a design escape hatch; it reflects what a deploying operator can actually control. Applications that cannot tolerate multi-address semantics at all SHOULD pin the client to a single address in DNS-ASIP (publish only one A-ASIP record per client) at the cost of losing multihoming failover — this is a deployment choice, not a protocol defect. 18.8. 18.6. WHOIS-ASIP Adoption WHOIS-ASIP route validation provides meaningful security only if widely adopted. An eBGP-ASIP router that enforces WHOIS-ASIP validation in a network where most peers do not publish WHOIS-ASIP records will reject legitimate routes. The same chicken-and-egg problem that limited RPKI deployment applies here. The simplification from one-route-per-ASN reduces but does not eliminate this problem. 18.9. 18.7. 32-Bit Host Field and SLAAC Constraints The 32-bit host field (h.h.h.h) is substantially smaller than IPv6's 64-bit interface identifier. This limits SLAAC-ASIP to methods that produce 32-bit identifiers rather than the full EUI-64 derivation available in IPv6. Birthday-paradox analysis (§3.14.3) gives approximately 39% collision probability at N=65,536 and 50% at N~77,000; the 10,000-host DHCP-ASIP-fallback threshold sits well below this point (~1% collision probability) to give DAD retries a large safety margin. Modern datacenter leaf-subnet populations routinely approach or exceed 10,000, so the threshold is operationally material: the collision region is reached by real fabrics, not by theoretical corner cases. Section 3.14.3 specifies the consequence: deployments expected to exceed ~10,000 concurrent hosts per subnet MUST use DHCP-ASIP rather than relying on SLAAC-ASIP uniqueness, and DAD retries are bounded to prevent indefinite re- rolling. Hause Expires 18 October 2026 [Page 88] Internet-Draft ASIP April 2026 18.10. 18.8. Interplanetary Address Reservation Reserving large ASN ranges for celestial bodies that currently have zero networked devices may appear wasteful. The counter-argument is that address space reservation costs nothing today but prevents painful renumbering later. IPv4's failure to reserve space for mobile devices, IoT, and cloud infrastructure before they existed is a cautionary example. The reservations are deliberately generous and can always be narrowed later; they cannot easily be widened once allocated. 18.11. 18.9. Complexity Budget ASIP is more complex than either IPv4 or IPv6 individually. It combines IPv4's addressing familiarity, IPv6's header and extension mechanism, a new hierarchical address structure, SLAAC, scoped multicast, and forward-looking realm allocations. Each feature is independently justified, but the aggregate complexity is a real adoption barrier. Implementors must understand three protocol generations to build a compliant stack. This specification attempts to mitigate complexity by making most features OPTIONAL or RECOMMENDED rather than REQUIRED, but the specification itself is long. A novel routing metric (the OPTIONAL Cost Factor, §17) is deliberately excised to a companion draft so that the ASIP address- family specification is not burdened with a metric it does not require. 19. References 19.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827, May 2000, . [RFC3704] Baker, F. and P. Savola, "Ingress Filtering for Multihomed Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March 2004, . Hause Expires 18 October 2026 [Page 89] Internet-Draft ASIP April 2026 [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, DOI 10.17487/RFC4271, January 2006, . [RFC4443] Conta, A., Deering, S., and M. Gupta, Ed., "Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification", STD 89, RFC 4443, DOI 10.17487/RFC4443, March 2006, . [RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter, "Multiprotocol Extensions for BGP-4", RFC 4760, DOI 10.17487/RFC4760, January 2007, . [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, DOI 10.17487/RFC4861, September 2007, . [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless Address Autoconfiguration", RFC 4862, DOI 10.17487/RFC4862, September 2007, . [RFC6437] Amante, S., Carpenter, B., Jiang, S., and J. Rajahalme, "IPv6 Flow Label Specification", RFC 6437, DOI 10.17487/RFC6437, November 2011, . [RFC7112] Gont, F., Manral, V., and R. Bonica, "Implications of Oversized IPv6 Header Chains", RFC 7112, DOI 10.17487/RFC7112, January 2014, . [RFC7607] Kumari, W., Bush, R., Schiller, H., and K. Patel, "Codification of AS 0 Processing", RFC 7607, DOI 10.17487/RFC7607, August 2015, . [RFC7915] Bao, C., Li, X., Baker, F., Anderson, T., and F. Gont, "IP/ICMP Translation Algorithm", RFC 7915, DOI 10.17487/RFC7915, June 2016, . Hause Expires 18 October 2026 [Page 90] Internet-Draft ASIP April 2026 [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", STD 86, RFC 8200, DOI 10.17487/RFC8200, July 2017, . [RFC8201] McCann, J., Deering, S., Mogul, J., and R. Hinden, Ed., "Path MTU Discovery for IP version 6", STD 87, RFC 8201, DOI 10.17487/RFC8201, July 2017, . [RFC8926] Gross, J., Ed., Ganga, I., Ed., and T. Sridhar, Ed., "Geneve: Generic Network Virtualization Encapsulation", RFC 8926, DOI 10.17487/RFC8926, November 2020, . 19.2. Informative References [I-D.thain-ipv8] Thain, J., "Internet Protocol Version 8 (IPv8)", Work in Progress, Internet-Draft, draft-thain-ipv8-00, April 2026, . [RFC1624] Rijsinghani, A., Ed., "Computation of the Internet Checksum via Incremental Update", RFC 1624, DOI 10.17487/RFC1624, May 1994, . [RFC1812] Baker, F., Ed., "Requirements for IP Version 4 Routers", RFC 1812, DOI 10.17487/RFC1812, June 1995, . [RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J., and E. Lear, "Address Allocation for Private Internets", BCP 5, RFC 1918, DOI 10.17487/RFC1918, February 1996, . [RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, DOI 10.17487/RFC2328, April 1998, . [RFC3810] Vida, R., Ed. and L. Costa, Ed., "Multicast Listener Discovery Version 2 (MLDv2) for IPv6", RFC 3810, DOI 10.17487/RFC3810, June 2004, . Hause Expires 18 October 2026 [Page 91] Internet-Draft ASIP April 2026 [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform Resource Identifier (URI): Generic Syntax", STD 66, RFC 3986, DOI 10.17487/RFC3986, January 2005, . [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing Architecture", RFC 4291, DOI 10.17487/RFC4291, February 2006, . [RFC4301] Kent, S. and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, December 2005, . [RFC4302] Kent, S., "IP Authentication Header", RFC 4302, DOI 10.17487/RFC4302, December 2005, . [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303, DOI 10.17487/RFC4303, December 2005, . [RFC4459] Savola, P., "MTU and Fragmentation Issues with In-the- Network Tunneling", RFC 4459, DOI 10.17487/RFC4459, April 2006, . [RFC5398] Huston, G., "Autonomous System (AS) Number Reservation for Documentation Use", RFC 5398, DOI 10.17487/RFC5398, December 2008, . [RFC5927] Gont, F., "ICMP Attacks against TCP", RFC 5927, DOI 10.17487/RFC5927, July 2010, . [RFC5952] Kawamura, S. and M. Kawashima, "A Recommendation for IPv6 Address Text Representation", RFC 5952, DOI 10.17487/RFC5952, August 2010, . [RFC6105] Levy-Abegnoli, E., Van de Velde, G., Popoviciu, C., and J. Mohacsi, "IPv6 Router Advertisement Guard", RFC 6105, DOI 10.17487/RFC6105, February 2011, . [RFC6480] Lepinski, M. and S. Kent, "An Infrastructure to Support Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480, February 2012, . Hause Expires 18 October 2026 [Page 92] Internet-Draft ASIP April 2026 [RFC6996] Mitchell, J., "Autonomous System (AS) Reservation for Private Use", BCP 6, RFC 6996, DOI 10.17487/RFC6996, July 2013, . [RFC7045] Carpenter, B. and S. Jiang, "Transmission and Processing of IPv6 Extension Headers", RFC 7045, DOI 10.17487/RFC7045, December 2013, . [RFC7217] Gont, F., "A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)", RFC 7217, DOI 10.17487/RFC7217, April 2014, . [RFC7346] Droms, R., "IPv6 Multicast Address Scopes", RFC 7346, DOI 10.17487/RFC7346, August 2014, . [RFC7519] Jones, M., Bradley, J., and N. Sakimura, "JSON Web Token (JWT)", RFC 7519, DOI 10.17487/RFC7519, May 2015, . [RFC792] Postel, J., "Internet Control Message Protocol", STD 5, RFC 792, DOI 10.17487/RFC0792, September 1981, . [RFC8305] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2: Better Connectivity Using Concurrency", RFC 8305, DOI 10.17487/RFC8305, December 2017, . [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, . [RFC8899] Fairhurst, G., Jones, T., Tüxen, M., Rüngeler, I., and T. Völker, "Packetization Layer Path MTU Discovery for Datagram Transports", RFC 8899, DOI 10.17487/RFC8899, September 2020, . [RFC8981] Gont, F., Krishnan, S., Narten, T., and R. Draves, "Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6", RFC 8981, DOI 10.17487/RFC8981, February 2021, . Hause Expires 18 October 2026 [Page 93] Internet-Draft ASIP April 2026 [RFC9171] Burleigh, S., Fall, K., and E. Birrane, III, "Bundle Protocol Version 7", RFC 9171, DOI 10.17487/RFC9171, January 2022, . [RFC9172] Birrane, III, E. and K. McKeever, "Bundle Protocol Security (BPSec)", RFC 9172, DOI 10.17487/RFC9172, January 2022, . Author's Address Jordan Hause Independent Email: truixprojects@gmail.com Hause Expires 18 October 2026 [Page 94]