<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-ietf-tsvwg-udp-options-45" category="std" consensus="true" submissionType="IETF" xml:lang="en" number="9868" updates="768" tocInclude="true" sortRefs="true" symRefs="true" prepTime="2025-10-07T15:43:19" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://dx.doi.org/10.17487/rfc9868" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <link href="https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options-45" rel="prev"/>
  <front>
    <title abbrev="Transport Options for UDP">Transport Options for UDP</title>
    <seriesInfo name="RFC" value="9868" stream="IETF"/>
    <author initials="J." surname="Touch" fullname="Joe Touch">
      <organization showOnFrontPage="true">Independent Consultant</organization>
      <address>
        <postal>
          <city>Manhattan Beach</city>
          <region>CA</region>
          <code>90266</code>
          <country>United States of America</country>
        </postal>
        <phone>+1 (310) 560-0334</phone>
        <email>touch@strayalpha.com</email>
      </address>
    </author>
    <author initials="C." surname="Heard" fullname="C. M. (Mike) Heard" role="editor">
      <organization showOnFrontPage="true">Unaffiliated</organization>
      <address>
        <postal>
          <street>PO Box 2667</street>
          <city>Redwood City</city>
          <region>CA</region>
          <code>94064-2667</code>
          <country>United States of America</country>
        </postal>
        <phone>+1 (408) 499-7257</phone>
        <email>heard@pobox.com</email>
      </address>
    </author>
    <date month="10" year="2025"/>
    <area>WIT</area>
    <workgroup>TSVWG</workgroup>
    <keyword>example</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">Transport protocols are extended through the use of transport header
options. This document updates RFC 768 (UDP) by indicating the
location, syntax, and semantics for UDP transport layer options
within the surplus area after the end of the UDP user data but
before the end of the IP datagram.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9868" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2025 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions-used-in-this-do">Conventions Used in This Document</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-background">Background</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-udp-option-intended-uses">UDP Option Intended Uses</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-udp-option-design-principle">UDP Option Design Principles</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-udp-option-area">The UDP Option Area</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-udp-surplus-area-struct">The UDP Surplus Area Structure</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-option-checksum-ocs">The Option Checksum (OCS)</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="10" format="counter" sectionFormat="of" target="section-10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-udp-options">UDP Options</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="11" format="counter" sectionFormat="of" target="section-11"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-safe-udp-options">SAFE UDP Options</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.11.2">
              <li pn="section-toc.1-1.11.2.1">
                <t indent="0" pn="section-toc.1-1.11.2.1.1"><xref derivedContent="11.1" format="counter" sectionFormat="of" target="section-11.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-end-of-options-list-eol">End of Options List (EOL)</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.2">
                <t indent="0" pn="section-toc.1-1.11.2.2.1"><xref derivedContent="11.2" format="counter" sectionFormat="of" target="section-11.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-no-operation-nop">No Operation (NOP)</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.3">
                <t indent="0" pn="section-toc.1-1.11.2.3.1"><xref derivedContent="11.3" format="counter" sectionFormat="of" target="section-11.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-additional-payload-checksum">Additional Payload Checksum (APC)</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.4">
                <t indent="0" pn="section-toc.1-1.11.2.4.1"><xref derivedContent="11.4" format="counter" sectionFormat="of" target="section-11.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-fragmentation-frag">Fragmentation (FRAG)</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.5">
                <t indent="0" pn="section-toc.1-1.11.2.5.1"><xref derivedContent="11.5" format="counter" sectionFormat="of" target="section-11.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-maximum-datagram-size-mds">Maximum Datagram Size (MDS)</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.6">
                <t indent="0" pn="section-toc.1-1.11.2.6.1"><xref derivedContent="11.6" format="counter" sectionFormat="of" target="section-11.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-maximum-reassembled-datagra">Maximum Reassembled Datagram Size (MRDS)</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.7">
                <t indent="0" pn="section-toc.1-1.11.2.7.1"><xref derivedContent="11.7" format="counter" sectionFormat="of" target="section-11.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-echo-request-req-and-echo-r">Echo Request (REQ) and Echo Response (RES)</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.8">
                <t indent="0" pn="section-toc.1-1.11.2.8.1"><xref derivedContent="11.8" format="counter" sectionFormat="of" target="section-11.8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-timestamp-time">Timestamp (TIME)</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.9">
                <t indent="0" pn="section-toc.1-1.11.2.9.1"><xref derivedContent="11.9" format="counter" sectionFormat="of" target="section-11.9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-authentication-auth-reserve">Authentication (AUTH), RESERVED Only</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.10">
                <t indent="0" pn="section-toc.1-1.11.2.10.1"><xref derivedContent="11.10" format="counter" sectionFormat="of" target="section-11.10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-experimental-exp">Experimental (EXP)</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="12" format="counter" sectionFormat="of" target="section-12"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-unsafe-options">UNSAFE Options</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.12.2">
              <li pn="section-toc.1-1.12.2.1">
                <t indent="0" pn="section-toc.1-1.12.2.1.1"><xref derivedContent="12.1" format="counter" sectionFormat="of" target="section-12.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-unsafe-compression-ucmp">UNSAFE Compression (UCMP)</xref></t>
              </li>
              <li pn="section-toc.1-1.12.2.2">
                <t indent="0" pn="section-toc.1-1.12.2.2.1"><xref derivedContent="12.2" format="counter" sectionFormat="of" target="section-12.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-unsafe-encryption-uenc">UNSAFE Encryption (UENC)</xref></t>
              </li>
              <li pn="section-toc.1-1.12.2.3">
                <t indent="0" pn="section-toc.1-1.12.2.3.1"><xref derivedContent="12.3" format="counter" sectionFormat="of" target="section-12.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-unsafe-experimental-uexp">UNSAFE Experimental (UEXP)</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.13">
            <t indent="0" pn="section-toc.1-1.13.1"><xref derivedContent="13" format="counter" sectionFormat="of" target="section-13"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-rules-for-designing-new-opt">Rules for Designing New Options</xref></t>
          </li>
          <li pn="section-toc.1-1.14">
            <t indent="0" pn="section-toc.1-1.14.1"><xref derivedContent="14" format="counter" sectionFormat="of" target="section-14"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-option-inclusion-and-proces">Option Inclusion and Processing</xref></t>
          </li>
          <li pn="section-toc.1-1.15">
            <t indent="0" pn="section-toc.1-1.15.1"><xref derivedContent="15" format="counter" sectionFormat="of" target="section-15"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-udp-api-extensions">UDP API Extensions</xref></t>
          </li>
          <li pn="section-toc.1-1.16">
            <t indent="0" pn="section-toc.1-1.16.1"><xref derivedContent="16" format="counter" sectionFormat="of" target="section-16"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-udp-options-are-for-transpo">UDP Options Are for Transport, Not Transit</xref></t>
          </li>
          <li pn="section-toc.1-1.17">
            <t indent="0" pn="section-toc.1-1.17.1"><xref derivedContent="17" format="counter" sectionFormat="of" target="section-17"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-udp-options-vs-udp-lite">UDP Options vs. UDP-Lite</xref></t>
          </li>
          <li pn="section-toc.1-1.18">
            <t indent="0" pn="section-toc.1-1.18.1"><xref derivedContent="18" format="counter" sectionFormat="of" target="section-18"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-interactions-with-legacy-de">Interactions with Legacy Devices</xref></t>
          </li>
          <li pn="section-toc.1-1.19">
            <t indent="0" pn="section-toc.1-1.19.1"><xref derivedContent="19" format="counter" sectionFormat="of" target="section-19"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-options-in-a-stateless-unre">Options in a Stateless, Unreliable Transport Protocol</xref></t>
          </li>
          <li pn="section-toc.1-1.20">
            <t indent="0" pn="section-toc.1-1.20.1"><xref derivedContent="20" format="counter" sectionFormat="of" target="section-20"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-udp-option-state-caching">UDP Option State Caching</xref></t>
          </li>
          <li pn="section-toc.1-1.21">
            <t indent="0" pn="section-toc.1-1.21.1"><xref derivedContent="21" format="counter" sectionFormat="of" target="section-21"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-updates-to-rfc-768">Updates to RFC 768</xref></t>
          </li>
          <li pn="section-toc.1-1.22">
            <t indent="0" pn="section-toc.1-1.22.1"><xref derivedContent="22" format="counter" sectionFormat="of" target="section-22"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-interactions-with-other-rfc">Interactions with Other RFCs</xref></t>
          </li>
          <li pn="section-toc.1-1.23">
            <t indent="0" pn="section-toc.1-1.23.1"><xref derivedContent="23" format="counter" sectionFormat="of" target="section-23"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-multicast-and-broadcast-con">Multicast and Broadcast Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.24">
            <t indent="0" pn="section-toc.1-1.24.1"><xref derivedContent="24" format="counter" sectionFormat="of" target="section-24"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-network-management-consider">Network Management Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.25">
            <t indent="0" pn="section-toc.1-1.25.1"><xref derivedContent="25" format="counter" sectionFormat="of" target="section-25"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.25.2">
              <li pn="section-toc.1-1.25.2.1">
                <t indent="0" pn="section-toc.1-1.25.2.1.1"><xref derivedContent="25.1" format="counter" sectionFormat="of" target="section-25.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-general-considerations-rega">General Considerations Regarding the Use of Options</xref></t>
              </li>
              <li pn="section-toc.1-1.25.2.2">
                <t indent="0" pn="section-toc.1-1.25.2.2.1"><xref derivedContent="25.2" format="counter" sectionFormat="of" target="section-25.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-regarding-on">Considerations Regarding On-Path Attacks</xref></t>
              </li>
              <li pn="section-toc.1-1.25.2.3">
                <t indent="0" pn="section-toc.1-1.25.2.3.1"><xref derivedContent="25.3" format="counter" sectionFormat="of" target="section-25.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-regarding-op">Considerations Regarding Option Processing</xref></t>
              </li>
              <li pn="section-toc.1-1.25.2.4">
                <t indent="0" pn="section-toc.1-1.25.2.4.1"><xref derivedContent="25.4" format="counter" sectionFormat="of" target="section-25.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-for-fragment">Considerations for Fragmentation</xref></t>
              </li>
              <li pn="section-toc.1-1.25.2.5">
                <t indent="0" pn="section-toc.1-1.25.2.5.1"><xref derivedContent="25.5" format="counter" sectionFormat="of" target="section-25.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-for-providin">Considerations for Providing UDP Security</xref></t>
              </li>
              <li pn="section-toc.1-1.25.2.6">
                <t indent="0" pn="section-toc.1-1.25.2.6.1"><xref derivedContent="25.6" format="counter" sectionFormat="of" target="section-25.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-regarding-mi">Considerations Regarding Middleboxes</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.26">
            <t indent="0" pn="section-toc.1-1.26.1"><xref derivedContent="26" format="counter" sectionFormat="of" target="section-26"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.27">
            <t indent="0" pn="section-toc.1-1.27.1"><xref derivedContent="27" format="counter" sectionFormat="of" target="section-27"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.27.2">
              <li pn="section-toc.1-1.27.2.1">
                <t indent="0" pn="section-toc.1-1.27.2.1.1"><xref derivedContent="27.1" format="counter" sectionFormat="of" target="section-27.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.27.2.2">
                <t indent="0" pn="section-toc.1-1.27.2.2.1"><xref derivedContent="27.2" format="counter" sectionFormat="of" target="section-27.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.28">
            <t indent="0" pn="section-toc.1-1.28.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-implementation-information">Implementation Information</xref></t>
          </li>
          <li pn="section-toc.1-1.29">
            <t indent="0" pn="section-toc.1-1.29.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.30">
            <t indent="0" pn="section-toc.1-1.30.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">Transport protocols use options as a way to extend their
capabilities. TCP <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>, the Stream Control Transmission Protocol (SCTP) <xref target="RFC9260" format="default" sectionFormat="of" derivedContent="RFC9260"/>, and the Datagram Congestion Control Protocol (DCCP) <xref target="RFC4340" format="default" sectionFormat="of" derivedContent="RFC4340"/>
include space for these options, but UDP <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/> currently does not.
This document updates RFC 768 with an extension to UDP that provides
space for transport options including their generic syntax and
semantics for their use in UDP's stateless, unreliable message
protocol. The details of the impact on RFC 768 are provided in
<xref target="sec-updates-768" format="default" sectionFormat="of" derivedContent="Section 21"/>. This extension does not apply to UDP-Lite, as discussed
further in <xref target="sec-options-vs-lite" format="default" sectionFormat="of" derivedContent="Section 17"/>.</t>
    </section>
    <section anchor="conventions-used-in-this-document" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-conventions-used-in-this-do">Conventions Used in This Document</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are
    to be interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/>
        <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all capitals,
    as shown here. 
</t>
      <t indent="0" pn="section-2-2">In this document, the characters "&gt;&gt;" at the beginning of a paragraph 
indicate a statement using the key words listed above. This
convention aids reviewers in quickly identifying or finding the
portions of this RFC covered by these key words.</t>
    </section>
    <section anchor="terminology" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-terminology">Terminology</name>
      <t indent="0" pn="section-3-1">The following terminology is used in this document:</t>
      <dl newline="false" spacing="normal" indent="3" pn="section-3-2">
        <dt pn="section-3-2.1">IP datagram <xref target="RFC0791" format="default" sectionFormat="of" derivedContent="RFC0791"/> <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>:</dt>
        <dd pn="section-3-2.2">
          <t indent="0" pn="section-3-2.2.1">An IP packet, composed of the IP
header (including any IPv4 options) and an IP payload area
(including any IPv6 extension headers or other shim headers).</t>
        </dd>
        <dt pn="section-3-2.3">Must-support options:</dt>
        <dd pn="section-3-2.4">
          <t indent="0" pn="section-3-2.4.1">UDP Options that all implementations are
required to support. Their use in individual UDP packets is
optional.</t>
        </dd>
        <dt pn="section-3-2.5">SAFE Options:</dt>
        <dd pn="section-3-2.6">
          <t indent="0" pn="section-3-2.6.1">UDP Options that are designed to be safe to ignore
for a receiver that does not understand them. Such options do not
alter the UDP user data or signal a change in what its contents
represent.</t>
        </dd>
        <dt pn="section-3-2.7">Socket pair:</dt>
        <dd pn="section-3-2.8">
          <t indent="0" pn="section-3-2.8.1">A pair of sockets defining a UDP exchange, defined
by a remote socket and a local socket, each composed of an IP
address and UDP port number (most widely known from TCP <xref target="RFC0793" format="default" sectionFormat="of" derivedContent="RFC0793"/>, which has been obsoleted by <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>).</t>
        </dd>
        <dt pn="section-3-2.9">Surplus area:</dt>
        <dd pn="section-3-2.10">
          <t indent="0" pn="section-3-2.10.1">The area of an IP payload that follows a UDP
packet; this area is used for UDP Options in this document.</t>
        </dd>
        <dt pn="section-3-2.11">UDP packet:</dt>
        <dd pn="section-3-2.12">
          <t indent="0" pn="section-3-2.12.1">The more contemporary term used herein to refer to a
user datagram <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>.</t>
        </dd>
        <dt pn="section-3-2.13">UDP fragment:</dt>
        <dd pn="section-3-2.14">
          <t indent="0" pn="section-3-2.14.1">One or more components of a UDP packet and its UDP
Options that enable transmission over multiple IP payloads,
larger than permitted by the maximum size of a single IP packet;
note that each UDP fragment is itself transmitted as a UDP packet
with its own options.</t>
        </dd>
        <dt pn="section-3-2.15">(UDP) User data:</dt>
        <dd pn="section-3-2.16">
          <t indent="0" pn="section-3-2.16.1">The user data field of a UDP packet <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>.</t>
        </dd>
        <dt pn="section-3-2.17">UDP Length:</dt>
        <dd pn="section-3-2.18">
          <t indent="0" pn="section-3-2.18.1">The length field of a UDP header <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>.</t>
        </dd>
        <dt pn="section-3-2.19">UNSAFE Options:</dt>
        <dd pn="section-3-2.20">
          <t indent="0" pn="section-3-2.20.1">UDP Options that are not designed to be safely ignored
by a receiver that does not understand them. Such options
could alter the UDP user data or signal a change in what its
contents represent, but there are restrictions on how they can be
transmitted; these restrictions are noted in Sections <xref target="sec-udp-opt" format="counter" sectionFormat="of" derivedContent="10"/> and <xref target="sec-unsafe-opt" format="counter" sectionFormat="of" derivedContent="12"/>.</t>
        </dd>
        <dt pn="section-3-2.21">User:</dt>
        <dd pn="section-3-2.22">
          <t indent="0" pn="section-3-2.22.1">The upper layer application, protocol, or service that
produces and consumes content that UDP transfers.</t>
        </dd>
        <dt pn="section-3-2.23">User datagram:</dt>
        <dd pn="section-3-2.24">
          <t indent="0" pn="section-3-2.24.1">A UDP packet, composed of a UDP header and UDP
payload; as discussed herein, the UDP payload need not extend to the
end of the IP datagram. In this document, the original intent
that a UDP datagram corresponds to the user portion of a single
IP datagram is redefined, where a UDP datagram can span more than
one IP datagram through UDP fragmentation.</t>
        </dd>
      </dl>
    </section>
    <section anchor="background" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-background">Background</name>
      <t indent="0" pn="section-4-1">Many protocols include a default, invariant header and an area for
   header options that varies from packet to packet. These options
   enable the protocol to be extended for use in particular
   environments or in ways unforeseen by the original designers.
   Examples include TCP's Maximum Segment Size (MSS), Window Scale,
      Timestamp, and Authentication Options <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/> <xref target="RFC5925" format="default" sectionFormat="of" derivedContent="RFC5925"/> <xref target="RFC7323" format="default" sectionFormat="of" derivedContent="RFC7323"/>.</t>
      <t indent="0" pn="section-4-2">Header options are used both in stateful (connection-oriented, e.g.,
   TCP <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>, SCTP <xref target="RFC9260" format="default" sectionFormat="of" derivedContent="RFC9260"/>, and DCCP <xref target="RFC4340" format="default" sectionFormat="of" derivedContent="RFC4340"/>) and stateless
   (connectionless, e.g., IPv4 <xref target="RFC0791" format="default" sectionFormat="of" derivedContent="RFC0791"/> and IPv6 <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>) protocols. In
   stateful protocols, they can help extend the way in which state is
   managed. In stateless protocols, their effect is often limited to
   individual packets, but they can have an aggregate effect on a
   sequence of packets as well.</t>
      <t indent="0" pn="section-4-3">UDP is one of the most popular protocols that lacks space for header
   options <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>. The UDP header was intended to be a minimal
   addition to IP, providing only port numbers and a checksum for error
   detection. This document extends UDP to provide a trailer area for
      such options, located after the UDP user data.</t>
      <t indent="0" pn="section-4-4">UDP Options are possible because UDP includes its own length field,
   separate from that of the IP header. Other transport protocols infer
   transport payload length from the IP datagram length (TCP, DCCP, and
   SCTP). Internet historians have suggested a number of possible
   reasons why the design of UDP includes this field, e.g., to support
   multiple UDP packets within the same IP datagram or to indicate the
   length of the UDP user data as distinct from zero padding required
   for systems that cannot write an arbitrary number of bytes of data. These
   suggestions are not consistent with earlier versions of UDP or with the
   concurrent design of multi-segment, multiplexing protocols; however,
   the real reason remains unknown. Regardless, this field presents
   an opportunity to differentiate the UDP user data from the implied
   transport payload length, which this document leverages to support a
   trailer options field.</t>
      <t indent="0" pn="section-4-5">There are other ways to include additional header fields or options
   in protocols that otherwise are not extensible. In particular, in-
   band encoding can be used to differentiate transport payload from
   additional fields, such as was proposed in <xref target="I-D.hildebrand-spud-prototype" format="default" sectionFormat="of" derivedContent="Hi15"/>. This approach can
   cause complications for interactions with legacy devices and is
   thus not considered further in this document.</t>
      <t indent="0" pn="section-4-6">IPv6 Teredo extensions <xref target="RFC4380" format="default" sectionFormat="of" derivedContent="RFC4380"/> <xref target="RFC6081" format="default" sectionFormat="of" derivedContent="RFC6081"/> use a similar
   inconsistency between UDP and IPv6 packet lengths to support
   trailers, but in this case, the values differ between the UDP header
   and an IPv6 length contained as the payload of the UDP user data.
   This allows IPv6 trailers in the UDP user data but has no relation
   to the surplus area discussed in this document. As a consequence,
   Teredo extensions are compatible with UDP Options.</t>
    </section>
    <section anchor="udp-option-intended-uses" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-udp-option-intended-uses">UDP Option Intended Uses</name>
      <t indent="0" pn="section-5-1">UDP Options can be used to provide a soft control plane to UDP. They
   enable capabilities available in other transport protocols, such as
   fragmentation and reassembly, that enable UDP frames larger than the
   IP MTU to traverse devices that rely on transport ports, e.g., Network Address Translations (NATs),
   without additional mechanisms or state. They add features that
   could, in the future, protect transport integrity and validate
   source identity (authentication), as well as those that could
   encrypt the user payload while still protecting the UDP transport
   header -- unlike Datagram Transport Layer Security (DTLS) <xref target="RFC9147" format="default" sectionFormat="of" derivedContent="RFC9147"/>.
   They also enable Packetization Layer Path MTU Discovery (PLPMTUD)
   over UDP, known as Datagram Packetization Layer Path Maximum
   Transmission Unit Discovery (DPLPMTUD) <xref target="RFC9869" format="default" sectionFormat="of" derivedContent="RFC9869"/>, providing a means for
   probe packet validation without affecting the user data plane, as
   well as providing explicit indication of the receiver transport
   reassembly size.</t>
      <t indent="0" pn="section-5-2">UDP originally assumed that such capabilities would be provided by
   the user or by a layer above UDP <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>. However, enough protocols
   have evolved to use UDP directly, so such an intermediate layer
   would be difficult to deploy for legacy applications. UDP Options
   leverage the opportunity presented by the surplus area to enable
   these extensions within the UDP transport layer itself. Among the
   use cases where this approach could be of benefit are request-
   response protocols such as DNS over UDP <xref target="I-D.heard-dnsop-udp-opt-large-dns-responses" format="default" sectionFormat="of" derivedContent="He24"/>.</t>
    </section>
    <section anchor="udp-option-design-principles" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-udp-option-design-principle">UDP Option Design Principles</name>
      <t indent="0" pn="section-6-1">UDP Options have been designed based on the following core
   principles. Each is an observation about preexisting behavior of UDP <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>
   in the absence of these extensions that this document does not
   intend to change or a lesson learned from other protocol designs.</t>
      <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-6-2"><li pn="section-6-2.1" derivedCounter="1.">
          <t indent="0" pn="section-6-2.1.1">UDP is stateless; UDP Options do not change that fact.  </t>
          <t indent="0" pn="section-6-2.1.2">
The state required or maintained by the endpoints is intended to be
managed either by the application or a layer/library on behalf of
the application. Reassembly of fragments is the only limited
exception where this document introduces a notion of state to
UDP.</t>
        </li>
        <li pn="section-6-2.2" derivedCounter="2.">
          <t indent="0" pn="section-6-2.2.1">UDP is unidirectional; UDP Options do not change that fact.  </t>
          <t indent="0" pn="section-6-2.2.2">
Responses to options are initiated by the application or a
layer/library on behalf of the application. A mechanism that
requires bidirectionality needs to be defined in a separate
document.</t>
        </li>
        <li pn="section-6-2.3" derivedCounter="3.">
          <t indent="0" pn="section-6-2.3.1">UDP Options have no length limit separate from that of the UDP
packet itself.  </t>
          <t indent="0" pn="section-6-2.3.2">
Past experience with other protocols confirms that static length
limits will always need to be exceeded, e.g., as has been an
issue with TCP options and IPv4 addresses. Each implementation
can limit how long/many options there are, but a specification is
more robust when it does not introduce such a limit.</t>
        </li>
        <li pn="section-6-2.4" derivedCounter="4.">
          <t indent="0" pn="section-6-2.4.1">UDP Options are not intended to replace or replicate other
protocols.  </t>
          <t indent="0" pn="section-6-2.4.2">
This includes NTP, ICMP (notably echo), etc. UDP Options are
intended to introduce features useful for applications, not to
either replace these other protocols nor instrument UDP to
replace the need for network testing devices.</t>
        </li>
        <li pn="section-6-2.5" derivedCounter="5.">
          <t indent="0" pn="section-6-2.5.1">UDP Options are a framework, not a protocol.  </t>
          <t indent="0" pn="section-6-2.5.2">
Options can be defined in this initial document even when the
details are not sufficient to specify a complete protocol. Uses
of such options could then be described or supplemented in other
documents. Examples herein include REQ/RES and TIME; in both
cases, the option format is defined, but the protocol that uses
these is specified elsewhere (REQ/RES for DPLPMTUD <xref target="RFC9869" format="default" sectionFormat="of" derivedContent="RFC9869"/>) or
left undefined (TIME).</t>
        </li>
        <li pn="section-6-2.6" derivedCounter="6.">
          <t indent="0" pn="section-6-2.6.1">The UDP Option mechanism and UDP Options themselves are intended
	  to default to the same behavior experienced by a legacy receiver.  </t>
          <t indent="0" pn="section-6-2.6.2">
By default, even when option checksums (OCS, APC),
authentication, or decryption fail, all received packets (with
the exception of UDP fragments) are passed (possibly with an
empty data payload) to the user application. Options that do not
modify user data are intended to (by default) result in the user
data also being passed, even if, e.g., option checksums or
authentication fails. It is always the user's or application's
obligation to override this default behavior explicitly.</t>
        </li>
      </ol>
      <t indent="0" pn="section-6-3">These principles are intended to enable the design and use of UDP
   Options with minimal impact to legacy UDP endpoints, preferably
   none. UDP is -- and remains -- a minimal transport protocol.
   Additional capability is explicitly activated by user applications
   or libraries acting on their behalf.</t>
      <t indent="0" pn="section-6-4">Finally, UDP Options do not attempt to match the number of zero-
   length UDP datagrams received by legacy and option-aware receivers
   from a source using UDP fragmentation (see <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>). Legacy
   receivers interpret every UDP fragment as a zero-length packet
   (because they do not perform reassembly), but option-aware receivers
   would reassemble the packet as a non-zero-length packet. Zero-length
   UDP packets have been used as "liveness" indicators (see <xref section="5" sectionFormat="of" target="RFC8085" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8085#section-5" derivedContent="RFC8085"/>),
   but such use is dangerous because they lack unique
   identifiers (the IPv6 base header has none, and the IPv4 ID field is
   deprecated for such use <xref target="RFC6864" format="default" sectionFormat="of" derivedContent="RFC6864"/>).</t>
    </section>
    <section anchor="the-udp-option-area" numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-the-udp-option-area">The UDP Option Area</name>
      <t indent="0" pn="section-7-1">The UDP transport header includes demultiplexing and service
identification (port numbers), an error detection checksum, and a
field that indicates the UDP datagram length (including UDP header).
The UDP Length field is typically redundant with the size of the
maximum space available as a transport protocol payload, as
determined by the IP header (see details in <xref target="sec-legacy-int" format="default" sectionFormat="of" derivedContent="Section 18"/>). The UDP
Option area is created when the UDP Length indicates a smaller
transport payload than implied by the IP header.</t>
      <t indent="0" pn="section-7-2">For IPv4, the IP Total Length field indicates the total IP datagram
length (including the IP header), and the size of the IP options is
indicated in the IP header (in 4-byte words) as the "Internet Header
Length" (IHL) <xref target="RFC0791" format="default" sectionFormat="of" derivedContent="RFC0791"/>, as shown in <xref target="fig-1" format="default" sectionFormat="of" derivedContent="Figure 1"/>. In exceptional cases,
the Protocol field in IPv4 might not indicate UDP (i.e., 17), e.g.,
when intervening shim headers are present such as IP Security
(IPsec) <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301"/> or for IP Payload Compression (IPComp) <xref target="RFC3173" format="default" sectionFormat="of" derivedContent="RFC3173"/>.</t>
      <t indent="0" pn="section-7-3">The upper bound for UDP Length when Protocol = 17 is given by:</t>
      <artwork align="left" pn="section-7-4">
   UDP_Length &lt;= IPv4_Total_Length - IPv4_IHL * 4
</artwork>
      <t indent="0" pn="section-7-5">If shim headers are present, this upper bound must be reduced by the
sum of the lengths of shim headers that precede the UDP header.</t>
      <figure anchor="fig-1" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-ipv4-datagram-with-udp-head">IPv4 Datagram with UDP Header</name>
        <artwork align="left" pn="section-7-6.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version|  IHL  |   DSCP    |ECN|          Total Length         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Identification        |Flags|      Fragment Offset    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Time to Live | Proto=17 (UDP)|        Header Checksum        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       Source Address                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Destination Address                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
... zero or more IP options (using space as indicated by IHL) ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
...     zero or more shim headers (each indicating size)      ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         UDP Source Port       |     UDP Destination Port      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          UDP Length           |         UDP Checksum          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
      </figure>
      <t indent="0" pn="section-7-7">For IPv6, the IP Payload Length field indicates the transport
payload after the base IPv6 header, which includes the IPv6
extension headers and space available for the transport protocol, as
shown in <xref target="fig-2" format="default" sectionFormat="of" derivedContent="Figure 2"/> <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>. Note that the Next Header field in IPv6
might not indicate UDP (i.e., 17), e.g., when intervening IP
extension headers are present. For IPv6, the lengths of any
additional IP extensions are indicated within each extension
<xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>, so the upper bound for UDP Length is given by:</t>
      <artwork align="left" pn="section-7-8">
  UDP_Length &lt;= IPv6_Payload_Length - sum(extension header lengths)
</artwork>
      <figure anchor="fig-2" align="left" suppress-title="false" pn="figure-2">
        <name slugifiedName="name-ipv6-datagram-with-udp-head">IPv6 Datagram with UDP Header</name>
        <artwork align="left" pn="section-7-9.1">
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Traffic Class |             Flow Label                |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Payload Length        |  Next Header  |   Hop Limit   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
...
|                       Source Address (128 bits)               |
...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
...
|                    Destination Address (128 bits)             |
...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
... zero or more IP Extension headers (each indicating size)  ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         UDP Source Port       |     UDP Destination Port      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          UDP Length           |         UDP Checksum          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
      </figure>
      <t indent="0" pn="section-7-10">In both cases, the space available for the UDP packet is indicated
by IP, either directly in the base header or by adding information
in the shim headers or extensions. In either case, this document
will refer to this available space as the "IP transport payload".</t>
      <t indent="0" pn="section-7-11">As a result of this redundancy, there is an opportunity to use the
UDP Length field as a way to break up the IP transport payload into
two areas -- that intended as UDP user data and an additional
"surplus area" (as shown in <xref target="fig-3" format="default" sectionFormat="of" derivedContent="Figure 3"/>).</t>
      <figure anchor="fig-3" align="left" suppress-title="false" pn="figure-3">
        <name slugifiedName="name-ip-transport-payload-vs-udp">IP Transport Payload vs. UDP Length</name>
        <artwork align="left" pn="section-7-12.1">
                         IP transport payload
          &lt;-------------------------------------------------&gt;
+--------+---------+----------------------+------------------+
| IP Hdr | UDP Hdr |     UDP user data    |   surplus area   |
+--------+---------+----------------------+------------------+
          &lt;------------------------------&gt;
                     UDP Length
</artwork>
      </figure>
      <t indent="0" pn="section-7-13">In most cases, the IP transport payload and UDP Length point to the
same location, indicating that there is no surplus area. This is not
a requirement of UDP <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/> (discussed further in <xref target="sec-legacy-int" format="default" sectionFormat="of" derivedContent="Section 18"/>).
This document uses the surplus area for UDP Options.</t>
      <t indent="0" pn="section-7-14">The surplus area can commence at any valid byte offset, i.e., it
need not be 16-bit or 32-bit aligned. In effect, this document
redefines the UDP Length field as a "trailer options offset".</t>
    </section>
    <section anchor="the-udp-surplus-area-structure" numbered="true" removeInRFC="false" toc="include" pn="section-8">
      <name slugifiedName="name-the-udp-surplus-area-struct">The UDP Surplus Area Structure</name>
      <t indent="0" pn="section-8-1">UDP Options use the entire surplus area, i.e., the contents of the
IP payload after the last byte of the UDP payload. They commence
with a 2-byte Option Checksum (OCS) field aligned to the first 2-
byte boundary (relative to the start of the IP datagram) of that
area, adding zeroes before OCS as needed for alignment. The UDP
Option area can be used with any UDP payload length (including zero,
i.e., a UDP Length of 8), as long as there remains enough space for
the aligned OCS and the options used.</t>
      <t indent="0" pn="section-8-2">&gt;&gt; UDP Options <bcp14>MAY</bcp14> begin at any UDP Length offset.</t>
      <t indent="0" pn="section-8-3">&gt;&gt; Option area bytes used for alignment before the OCS <bcp14>MUST</bcp14> be zero.
If this is not the case, all options <bcp14>MUST</bcp14> be ignored and the surplus
area silently discarded.</t>
      <t indent="0" pn="section-8-4">These alignment bytes, coupled with OCS as computed over the
remainder of the surplus area, ensure that the one's complement sum
of the surplus area is zero. OCS is half-word (2-byte) aligned to
avoid the need for byte-swapping in its implementation.</t>
      <t indent="0" pn="section-8-5">The OCS contains an optional one's complement sum that detects errors
in the surplus area, which is not otherwise covered by the UDP
      checksum, as detailed in <xref target="sec-ocs" format="default" sectionFormat="of" derivedContent="Section 9"/>.</t>
      <t indent="0" pn="section-8-6">The remainder of the surplus area consists of options, all except
two of which are defined using a TLV (type, length, and optional
value) syntax similar to that of TCP <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>, as detailed in
<xref target="sec-udp-opt" format="default" sectionFormat="of" derivedContent="Section 10"/> (types No Operation (NOP) and End of Options List (EOL) have an implicit length of one byte).
These options continue until the end of the surplus area or can end
earlier using the EOL Option, followed by zeroes
(discussed further in <xref target="sec-udp-opt" format="default" sectionFormat="of" derivedContent="Section 10"/>).</t>
    </section>
    <section anchor="sec-ocs" numbered="true" removeInRFC="false" toc="include" pn="section-9">
      <name slugifiedName="name-the-option-checksum-ocs">The Option Checksum (OCS)</name>
      <t indent="0" pn="section-9-1">The Option Checksum (OCS) Option is a conventional Internet checksum
   <xref target="RFC0791" format="default" sectionFormat="of" derivedContent="RFC0791"/> that detects errors in the surplus area. The OCS Option
   contains a 16-bit checksum that is aligned to the first 2-byte
   boundary, preceded by zeroes for padding (if needed), as shown in
   <xref target="fig-4" format="default" sectionFormat="of" derivedContent="Figure 4"/>.</t>
      <figure anchor="fig-4" align="left" suppress-title="false" pn="figure-4">
        <name slugifiedName="name-udp-ocs-format-here-using-o">UDP OCS Format, Here Using One Zero Byte for Alignment</name>
        <artwork align="left" pn="section-9-2.1">
                +--------+--------+--------+--------+
                |         UDP data         |    0   |
                +--------+--------+--------+--------+
                |       OCS       |  UDP Options... |
                +--------+--------+--------+--------+
</artwork>
      </figure>
      <t indent="0" pn="section-9-3">The OCS consists of a 16-bit Internet checksum <xref target="RFC1071" format="default" sectionFormat="of" derivedContent="RFC1071"/>, computed
   over the surplus area and including the length of the surplus area
   as an unsigned 16-bit value. The OCS protects the surplus area from
   errors in a similar way that the UDP checksum protects the UDP user
   data (when not zero).</t>
      <t indent="0" pn="section-9-4">The primary purpose of the OCS is to detect existing nonstandard
   (i.e., non-option) uses of that area and accidental errors. It is
   not intended to detect attacks, as discussed further in <xref target="sec-sec-cons" format="default" sectionFormat="of" derivedContent="Section 25"/>.
   OCS is not intended to prevent future nonstandard uses of the
   surplus area nor does it enable shared use with mechanisms that do
   not comply with UDP Options.</t>
      <t indent="0" pn="section-9-5">The design enables traversal of errant middleboxes that incorrectly
   compute the UDP checksum over the entire IP payload <xref target="I-D.fairhurst-udp-options-cco" format="default" sectionFormat="of" derivedContent="Fa18"/> <xref target="Zu20" format="default" sectionFormat="of" derivedContent="Zu20"/>,
   rather than only the UDP header and UDP payload (as indicated by the
   UDP header length). Because the OCS is computed over the surplus
   area and its length and then inverted, the OCS effectively negates the
   effect that incorrectly including the surplus has on the UDP
   checksum. As a result, when OCS is non-zero, the UDP checksum is the
   same in either case.</t>
      <t indent="0" pn="section-9-6">&gt;&gt; The OCS <bcp14>MUST</bcp14> be non-zero when the UDP checksum is non-zero.</t>
      <t indent="0" pn="section-9-7">&gt;&gt; When the UDP checksum is zero, the OCS <bcp14>MAY</bcp14> be unused and is then
   indicated by a zero OCS value.</t>
      <t indent="0" pn="section-9-8">&gt;&gt; UDP Option implementations <bcp14>MUST</bcp14> default to using the OCS (i.e., as a
   non-zero value); users overriding that default take the risk of not
   detecting nonstandard uses of the option area (of which there are
   none currently known).</t>
      <t indent="0" pn="section-9-9">Like the UDP checksum, the OCS is optional under certain
   circumstances and contains zero when not used. UDP checksums can be
   zero for IPv4 <xref target="RFC0791" format="default" sectionFormat="of" derivedContent="RFC0791"/> and for IPv6 <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/> when the UDP payload
   is already covered by another checksum, as might occur for tunnels
   <xref target="RFC6935" format="default" sectionFormat="of" derivedContent="RFC6935"/>. The same exceptions apply to the OCS when used to detect
   bit errors; an additional exception occurs for its use in the UDP
      datagram prior to fragmentation or after reassembly (see <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>).</t>
      <t indent="0" pn="section-9-10">The benefits are similar to allowing UDP checksums to be zero, but
   the risks differ. The OCS is additionally important to ensure packets
   with UDP Options can traverse errant middleboxes <xref target="Zu20" format="default" sectionFormat="of" derivedContent="Zu20"/>. When the
   cost of computing an OCS is negligible, it is better to use the OCS to
   ensure such traversal. In cases where such traversal risks can
   safely be ignored, such as controlled environments, over paths where
   traversal is validated, or where upper layer protocols
   (applications, libraries, etc.) can adapt (by enabling the OCS when
   packet exchange fails), and when bit errors at the UDP layer would
   be detected by other layers (as with the UDP checksum), the OCS can be
   disabled, e.g., to conserve energy or processing resources or when
   performance can be improved. This is why zeroing the OCS is only safe
   when UDP checksum is also zero and why OCS might still be used in
   that case.</t>
      <t indent="0" pn="section-9-11">The OCS covers the surplus area as formatted for transmission and is
   processed immediately upon reception.</t>
      <t indent="0" pn="section-9-12">&gt;&gt; If the receiver validation of the OCS fails, all options <bcp14>MUST</bcp14> be
   ignored and the surplus area silently discarded.</t>
      <t indent="0" pn="section-9-13">&gt;&gt; UDP user data that is validated by a correct UDP checksum <bcp14>MUST</bcp14> by
   default be delivered to the application layer, even if the OCS
   fails, unless the endpoints have negotiated otherwise for this UDP
   packet's socket pair.</t>
      <t indent="0" pn="section-9-14">When not used (i.e., containing zero), the OCS is assumed to be
   "correct" for the purpose of accepting UDP datagrams at a receiver
   (see <xref target="sec-opt-inclusion" format="default" sectionFormat="of" derivedContent="Section 14"/>).</t>
    </section>
    <section anchor="sec-udp-opt" numbered="true" removeInRFC="false" toc="include" pn="section-10">
      <name slugifiedName="name-udp-options">UDP Options</name>
      <t indent="0" pn="section-10-1">UDP Options are a minimum of two bytes in length as shown in <xref target="fig-5" format="default" sectionFormat="of" derivedContent="Figure 5"/>,
   except only the one-byte options No Operation (NOP) and End
   of Options List (EOL) described below.</t>
      <figure anchor="fig-5" align="left" suppress-title="false" pn="figure-5">
        <name slugifiedName="name-udp-option-default-format">UDP Option Default Format</name>
        <artwork align="left" pn="section-10-2.1">
                +--------+--------+------------~~------------+
                |  Kind  | Length | (remainder of option...) |
                +--------+--------+------------~~------------+
</artwork>
      </figure>
      <t indent="0" pn="section-10-3">The Kind field is always one byte and is named after the
   corresponding TCP field (though other protocols refer to this as
   "Type"). The Length field, which indicates the length in bytes of the
   entire option, including Kind and Length, is one byte for all
   lengths below 255 (including the Kind and Length bytes). A Length of
   255 indicates use of the UDP Option extended format shown in <xref target="fig-6" format="default" sectionFormat="of" derivedContent="Figure 6"/>.
   The Extended Length field is a 16-bit field in network standard
   byte order. The length of the option refers to its Length field or
   Extended Length field, whichever is applicable.</t>
      <figure anchor="fig-6" align="left" suppress-title="false" pn="figure-6">
        <name slugifiedName="name-udp-option-extended-format">UDP Option Extended Format</name>
        <artwork align="left" pn="section-10-4.1">
                +--------+--------+--------+--------+
                |  Kind  |  255   | Extended Length |
                +--------+--------+--------+--------+
                | (remainder of option...)          |
                +--------+--------+--------+--------+
</artwork>
      </figure>
      <t indent="0" pn="section-10-5">&gt;&gt; The UDP Length <bcp14>MUST</bcp14> be at least as large as the UDP header (8)
   and no larger than the IP transport payload. Datagrams with length
   values outside this range <bcp14>MUST</bcp14> be silently dropped as invalid and
   logged.</t>
      <t indent="0" pn="section-10-6">&gt;&gt; All logging <bcp14>SHOULD</bcp14> be rate limited. Excess logging events can be
   coalesced and reported as a count or can be silently dropped if
   needed to avoid resource overloading.</t>
      <t indent="0" pn="section-10-7">&gt;&gt; Option Lengths (or Extended Lengths, where applicable) smaller
   than the minimum for the corresponding Kind <bcp14>MUST</bcp14> be treated as an
   error. Such errors call into question the remainder of the surplus
   area and thus <bcp14>MUST</bcp14> result in all UDP Options being silently
   discarded.</t>
      <t indent="0" pn="section-10-8">&gt;&gt; Any UDP Option other than NOP or EOL whose length is 254 or less
   <bcp14>MUST</bcp14> use the UDP Option default format shown in <xref target="fig-5" format="default" sectionFormat="of" derivedContent="Figure 5"/>. NOP and
   EOL never use either length format.</t>
      <t indent="0" pn="section-10-9">&gt;&gt; Any UDP Option whose length is larger than 254 <bcp14>MUST</bcp14> use the UDP
   Option extended format shown in <xref target="fig-6" format="default" sectionFormat="of" derivedContent="Figure 6"/>.</t>
      <t indent="0" pn="section-10-10">&gt;&gt; For compactness, UDP Options <bcp14>SHOULD</bcp14> use the smallest option
   format possible.</t>
      <t indent="0" pn="section-10-11">&gt;&gt; UDP Options <bcp14>MUST</bcp14> be interpreted in the order in which they occur
   in the surplus area or, in the case of UDP fragments, in the order
   in which they appear in the UDP fragment option area (see <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>).</t>
      <t indent="0" pn="section-10-12">The following UDP Options are currently defined:</t>
      <table align="center" pn="table-1">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Kind</th>
            <th align="left" colspan="1" rowspan="1">Length</th>
            <th align="left" colspan="1" rowspan="1">Meaning</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">0*</td>
            <td align="left" colspan="1" rowspan="1">-</td>
            <td align="left" colspan="1" rowspan="1">End of Options List (EOL)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">1*</td>
            <td align="left" colspan="1" rowspan="1">-</td>
            <td align="left" colspan="1" rowspan="1">No Operation (NOP)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">2*</td>
            <td align="left" colspan="1" rowspan="1">6</td>
            <td align="left" colspan="1" rowspan="1">Additional Payload Checksum (APC)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">3*</td>
            <td align="left" colspan="1" rowspan="1">10/12</td>
            <td align="left" colspan="1" rowspan="1">Fragmentation (FRAG)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">4*</td>
            <td align="left" colspan="1" rowspan="1">4</td>
            <td align="left" colspan="1" rowspan="1">Maximum Datagram Size (MDS)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">5*</td>
            <td align="left" colspan="1" rowspan="1">5</td>
            <td align="left" colspan="1" rowspan="1">Maximum Reassembled Datagram Size (MRDS)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">6*</td>
            <td align="left" colspan="1" rowspan="1">6</td>
            <td align="left" colspan="1" rowspan="1">Request (REQ)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">7*</td>
            <td align="left" colspan="1" rowspan="1">6</td>
            <td align="left" colspan="1" rowspan="1">Response (RES)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">8</td>
            <td align="left" colspan="1" rowspan="1">10</td>
            <td align="left" colspan="1" rowspan="1">Timestamp (TIME)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">9</td>
            <td align="left" colspan="1" rowspan="1">(varies)</td>
            <td align="left" colspan="1" rowspan="1">RESERVED for Authentication (AUTH)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">10-126</td>
            <td align="left" colspan="1" rowspan="1">(varies)</td>
            <td align="left" colspan="1" rowspan="1">Unassigned (assignable by IANA)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">127</td>
            <td align="left" colspan="1" rowspan="1">(varies)</td>
            <td align="left" colspan="1" rowspan="1">RFC3692-style experiments (EXP)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">128-191</td>
            <td align="left" colspan="1" rowspan="1"/>
            <td align="left" colspan="1" rowspan="1">Reserved</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">192</td>
            <td align="left" colspan="1" rowspan="1">(varies)</td>
            <td align="left" colspan="1" rowspan="1">Reserved for UNSAFE Compression (UCMP)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">193</td>
            <td align="left" colspan="1" rowspan="1">(varies)</td>
            <td align="left" colspan="1" rowspan="1">Reserved for UNSAFE Encryption (UENC)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">194-253</td>
            <td align="left" colspan="1" rowspan="1"/>
            <td align="left" colspan="1" rowspan="1">Unassigned-UNSAFE (assignable by IANA)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">254</td>
            <td align="left" colspan="1" rowspan="1">(varies)</td>
            <td align="left" colspan="1" rowspan="1">RFC3692-style UNSAFE experiments (UEXP)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">255</td>
            <td align="left" colspan="1" rowspan="1"/>
            <td align="left" colspan="1" rowspan="1">Reserved-UNSAFE</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-10-14">Options indicated by Kind values in the range 0..191 are known as
   SAFE Options because they do not interfere with use of UDP user data by
   legacy endpoints or when the option is unsupported. Options
   indicated by Kind values in the range 192..255 are known as UNSAFE
   Options because they might interfere with use by legacy receiving
   endpoints (e.g., an option that alters the UDP data payload).</t>
      <t indent="0" pn="section-10-15">UNSAFE Option nicknames are expected to begin with capital "U",
   which needs to be avoided for SAFE Option nicknames (see <xref target="sec-iana-cons" format="default" sectionFormat="of" derivedContent="Section 26"/>). 
   RESERVED and RESERVED-UNSAFE are not assignable by IANA and not
   otherwise defined at this time. The AUTH, UCMP, and UENC
   reservations are intended for all future options supporting
   authentication, compression, and encryption, respectively, and
   remain reserved until assigned for those uses.</t>
      <t indent="0" pn="section-10-16">Although the FRAG Option modifies the original UDP payload contents
   (i.e., is UNSAFE with respect to the original UDP payload), it is
   used only in subsequent fragments with zero-length UDP user data
   payloads, thus is SAFE in actual use, as discussed further in
   <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>.</t>
      <t indent="0" pn="section-10-17">These options are defined in the following subsections. Options 0
   and 1 use the same values as for TCP.</t>
      <t indent="0" pn="section-10-18">&gt;&gt; An endpoint supporting UDP Options <bcp14>MUST</bcp14> support those marked with
   an "*" above: EOL, NOP, APC, FRAG, MDS, MRDS, REQ, and RES. This
   includes both recognizing and being able to generate these options
   if configured to do so. These are called "must-support" options.</t>
      <t indent="0" pn="section-10-19">The set of must-support options is defined herein. New options are
   not eligible for this designation.</t>
      <t indent="0" pn="section-10-20">&gt;&gt; All other SAFE Options (without an "*") <bcp14>MAY</bcp14> be implemented, and
   their use <bcp14>SHOULD</bcp14> be determined either out-of-band or negotiated,
   notably if needed to detect when options are silently ignored by
   legacy receivers.</t>
      <t indent="0" pn="section-10-21">&gt;&gt; Receivers supporting UDP Options <bcp14>MUST</bcp14> silently ignore unknown or
   malformed SAFE Options (i.e., in the same way a legacy receiver
   would ignore all UDP Options). An option is malformed when its
   length does not indicate (one of) the value(s) stated in the
   option's specification. A malformed FRAG Option is an exception to
   this rule; it <bcp14>SHALL</bcp14> be treated as an unsupported UNSAFE Option.</t>
      <t indent="0" pn="section-10-22">&gt;&gt; Options with inherently invalid Length field values, i.e., those
   that indicate underruns of the option itself or overruns of the
   surplus area (pointing past the end of the IP payload), <bcp14>MUST</bcp14> be
   treated as an indication of a malformed surplus area, and all
   options <bcp14>MUST</bcp14> silently be discarded.</t>
      <t indent="0" pn="section-10-23">Receivers cannot generally treat unexpected Option Lengths as
   invalid, as this would unnecessarily limit future revision of
   options (e.g., defining a new APC that is defined by having a
   different length).</t>
      <t indent="0" pn="section-10-24">&gt;&gt; When UNSAFE Options are present, the UDP user data <bcp14>MUST</bcp14> be empty,
   and any transport payload <bcp14>MUST</bcp14> be contained in a FRAG Option (see
   <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>). Recall that such options may alter the transport
   payload or signal a change in what its contents represent. This
   restriction ensures their safe use in environments that might
   include legacy receivers (see <xref target="sec-unsafe-opt" format="default" sectionFormat="of" derivedContent="Section 12"/>), because the transport
   payload occurs inside the FRAG Option area and is silently discarded
   by legacy receivers.</t>
      <t indent="0" pn="section-10-25">&gt;&gt; Receivers supporting UDP Options that receive unsupported options
   in the UNSAFE range <bcp14>MUST</bcp14> terminate all option processing and <bcp14>MUST</bcp14>
   silently drop all UDP Options in that datagram. See <xref target="sec-unsafe-opt" format="default" sectionFormat="of" derivedContent="Section 12"/> for
   further discussion of UNSAFE Options.</t>
      <t indent="0" pn="section-10-26">&gt;&gt; Other than FRAG, NOP, EXP, and UEXP, each option <bcp14>SHOULD NOT</bcp14> occur
   more than once in a single UDP datagram. If an option other than
   these four occurs more than once, a receiver <bcp14>MUST</bcp14> interpret only the
   first instance of that option and <bcp14>MUST</bcp14> ignore later instances.
   <xref target="sec-sec-cons" format="default" sectionFormat="of" derivedContent="Section 25"/> provides additional advice for Denial of Service (DoS)
   issues that involve large numbers of options, whether valid,
   unknown, or repeating.</t>
      <t indent="0" pn="section-10-27">&gt;&gt; NOP <bcp14>MAY</bcp14> occur multiple times, either in succession or between
   other options, for option alignment. Additional repetition
   constraints are indicated in <xref target="sec-nop" format="default" sectionFormat="of" derivedContent="Section 11.2"/>.</t>
      <t indent="0" pn="section-10-28">&gt;&gt; If FRAG occurs more than once, the options area <bcp14>MUST</bcp14> be
   considered malformed and <bcp14>MUST NOT</bcp14> be processed.</t>
      <t indent="0" pn="section-10-29">&gt;&gt; EXP and UEXP <bcp14>MAY</bcp14> occur more than once but <bcp14>SHOULD NOT</bcp14> occur more
   than once using the same Experimental ID (ExID) (see Sections <xref target="sec-exp" format="counter" sectionFormat="of" derivedContent="11.10"/> and <xref target="sec-uexp" format="counter" sectionFormat="of" derivedContent="12.3"/>).</t>
      <t indent="0" pn="section-10-30">&gt;&gt; Options other than OCS, AUTH, and UENC <bcp14>MUST NOT</bcp14> include fields
   whose values depend on the contents of the surplus area.</t>
      <t indent="0" pn="section-10-31">AUTH and UENC are always computed as if their hash and the OCS are
   zero; the OCS is always computed as if its contents are zero and
   after the AUTH or UENC hash has been computed.</t>
      <t indent="0" pn="section-10-32">&gt;&gt; Future options <bcp14>MUST NOT</bcp14> be defined as having an option field
   value dependent on the content or presence of other options or on
   the remaining contents of the surplus area, i.e., the area after the
   last option (presumably EOL).</t>
      <t indent="0" pn="section-10-33">If future options were to depend on the contents or presence of
   other options, interactions between those values, the OCS, and the
   AUTH and UENC Options could be unpredictable. This does not prohibit
   options that modify later options (in order of appearance within a
   packet), such as would typically be the case for compression (UCMP).</t>
      <t indent="0" pn="section-10-34">Note that there is no need to reserve area after the last UDP Option
   for future uses, because any such use can be supported by defining a
   new UDP Option over that area instead. Using an option for this
   purpose is safer than treating the region as an exception, because
   its use can be verified based on option Kind and Length.</t>
      <t indent="0" pn="section-10-35">&gt;&gt; AUTH and UENC <bcp14>MUST NOT</bcp14> be used concurrently.</t>
      <t indent="0" pn="section-10-36">AUTH and UENC are never used together because UENC would serve both
   purposes.</t>
      <t indent="0" pn="section-10-37">&gt;&gt; "Must-support" options other than NOP and EOL <bcp14>MUST</bcp14> be placed by
   the transmitter before other SAFE UDP Options. A receiver <bcp14>MAY</bcp14> drop
   all UDP Options if this ordering is not honored. Such events <bcp14>MAY</bcp14> be
   logged for diagnostic purposes.</t>
      <t indent="0" pn="section-10-38">The requirement that must-support options come before others is
   intended to allow for endpoints to implement DoS protection, as
   discussed further in <xref target="sec-sec-cons" format="default" sectionFormat="of" derivedContent="Section 25"/>.</t>
    </section>
    <section anchor="safe-udp-options" numbered="true" removeInRFC="false" toc="include" pn="section-11">
      <name slugifiedName="name-safe-udp-options">SAFE UDP Options</name>
      <t indent="0" pn="section-11-1">SAFE UDP Options can be silently ignored by legacy receivers without
   affecting the meaning of the UDP user data. They stand in contrast
   to UNSAFE Options, which modify UDP user data in ways that render it
   unusable by legacy receivers (<xref target="sec-unsafe-opt" format="default" sectionFormat="of" derivedContent="Section 12"/>). The following subsections
   describe SAFE Options defined in this document.</t>
      <section anchor="end-of-options-list-eol" numbered="true" removeInRFC="false" toc="include" pn="section-11.1">
        <name slugifiedName="name-end-of-options-list-eol">End of Options List (EOL)</name>
        <t indent="0" pn="section-11.1-1">The End of Options List (EOL, Kind=0) Option indicates that there
   are no more options. It is used to indicate the end of the list of
   options without needing to use NOP Options (see the following
   section) as padding to fill all available option space.</t>
        <figure anchor="fig-7" align="left" suppress-title="false" pn="figure-7">
          <name slugifiedName="name-udp-eol-option-format">UDP EOL Option Format</name>
          <artwork align="left" pn="section-11.1-2.1">
                               +--------+
                               | Kind=0 |
                               +--------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.1-3">&gt;&gt; When the UDP Options do not consume the entire surplus area or
   the options area of a UDP fragment, the last non-NOP Option <bcp14>MUST</bcp14> be
   EOL.</t>
        <t indent="0" pn="section-11.1-4">&gt;&gt; NOPs <bcp14>SHOULD NOT</bcp14> be used as padding before the EOL Option. As a
   one-byte option, EOL need not be otherwise aligned.</t>
        <t indent="0" pn="section-11.1-5">&gt;&gt; All bytes after EOL in the surplus area or the options area of a
   UDP fragment <bcp14>MUST</bcp14> be set to zero on transmit.</t>
        <t indent="0" pn="section-11.1-6">&gt;&gt; Bytes after EOL in the surplus area or the options area of a UDP
   fragment <bcp14>MAY</bcp14> be checked as being zero on receipt but <bcp14>MUST NOT</bcp14> be
   otherwise processed (except for OCS calculation, which zeros would
   not affect) and <bcp14>MUST NOT</bcp14> be passed to the user.</t>
        <t indent="0" pn="section-11.1-7">&gt;&gt; If a receiver elects to check the bytes following EOL and finds
   that they are not all set to zero, it <bcp14>MUST</bcp14> silently discard the
   options area. In this case, the UDP user data <bcp14>MUST</bcp14> be delivered to
   the application layer, unless the socket has been explicitly
   configured to do otherwise, as decided by the upper layer or
   negotiated with the other endpoint.</t>
        <t indent="0" pn="section-11.1-8">Requiring the post-option surplus area to be zero prevents side-
   channel uses of this area, instead requiring that all use of the
   surplus area be UDP Options supported by both endpoints. It is
   useful to allow this area to be used for zero padding to increase
   the UDP datagram length without affecting the UDP user data length,
   e.g., for UDP DPLPMTUD (<xref section="4.4" sectionFormat="of" target="RFC9869" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9869#section-4.4" derivedContent="RFC9869"/>).</t>
      </section>
      <section anchor="sec-nop" numbered="true" removeInRFC="false" toc="include" pn="section-11.2">
        <name slugifiedName="name-no-operation-nop">No Operation (NOP)</name>
        <t indent="0" pn="section-11.2-1">The No Operation (NOP, Kind=1) Option is a one-byte placeholder,
   intended to be used as padding, e.g., to align multi-byte options
   along 16-bit, 32-bit, or 64-bit boundaries.</t>
        <figure anchor="fig-8" align="left" suppress-title="false" pn="figure-8">
          <name slugifiedName="name-udp-nop-option-format">UDP NOP Option Format</name>
          <artwork align="left" pn="section-11.2-2.1">
                            +--------+
                            | Kind=1 |
                            +--------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.2-3">&gt;&gt; UDP packets <bcp14>SHOULD NOT</bcp14> use more than seven consecutive NOPs,
   i.e., to support alignment up to 8-byte boundaries. UDP packets
   <bcp14>SHOULD NOT</bcp14> use NOPs at the end of the options area as a substitute
   for EOL followed by zero-fill. NOPs are intended to assist with
   alignment, not as other padding or fill.</t>
        <t indent="0" pn="section-11.2-4">&gt;&gt; Receivers persistently experiencing packets with more than seven
   consecutive NOPs <bcp14>SHOULD</bcp14> log such events, at least occasionally, as a
   potential DoS indicator.</t>
        <t indent="0" pn="section-11.2-5">NOPs are not reported to the user, whether used per-datagram or per-
   fragment (as defined in <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>).</t>
        <t indent="0" pn="section-11.2-6">This issue is discussed further in <xref target="sec-sec-cons" format="default" sectionFormat="of" derivedContent="Section 25"/>.</t>
      </section>
      <section anchor="additional-payload-checksum-apc" numbered="true" removeInRFC="false" toc="include" pn="section-11.3">
        <name slugifiedName="name-additional-payload-checksum">Additional Payload Checksum (APC)</name>
        <t indent="0" pn="section-11.3-1">The Additional Payload Checksum (APC, Kind=2) Option provides a
   stronger supplement to the checksum in the UDP header, using a 32-
   bit Cyclic Redundancy Check (CRC) of the conventional UDP user data payload only (excluding
   the IP pseudoheader, UDP header, and surplus area). It is not an
   alternative to the UDP checksum because it does not cover the IP
   pseudoheader or UDP header, and it is not a supplement to the OCS
   because the latter covers the surplus area only. Its purpose is to
   detect user data errors that the UDP checksum might not detect.</t>
        <t indent="0" pn="section-11.3-2">A CRC32c has been chosen because of its ubiquity and use in other
   Internet protocols, including Internet Small Computer System Interface (iSCSI) <xref target="RFC3385" format="default" sectionFormat="of" derivedContent="RFC3385"/> and SCTP. The option
   contains the CRC32c in network standard byte order, as used for
   iSCSI.</t>
        <figure anchor="fig-9" align="left" suppress-title="false" pn="figure-9">
          <name slugifiedName="name-udp-apc-option-format">UDP APC Option Format</name>
          <artwork align="left" pn="section-11.3-3.1">
                +--------+--------+--------+--------+
                | Kind=2 | Len=6  |    CRC32c...    |
                +--------+--------+--------+--------+
                |  CRC32c (cont.) |
                +--------+--------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.3-4">When present, the APC always contains a valid CRC checksum. There
   are no reserved values, including the value zero. A CRC value of
   zero is a potentially valid checksum. As such, it does not indicate
   that the APC is not used; instead, the option would simply not be
   included if that were the desired effect.</t>
        <t indent="0" pn="section-11.3-5">The APC does not protect the UDP pseudoheader; only the current UDP
   checksum provides that protection (when used). The APC cannot provide
   that protection because it would need to be updated whenever the UDP
   pseudoheader changed, e.g., during NAT address and port translation
	(see <xref target="RFC1141" format="default" sectionFormat="of" derivedContent="RFC1141"/>).</t>
        <t indent="0" pn="section-11.3-6">&gt;&gt; UDP packets with incorrect APC Option checksum fields <bcp14>SHOULD</bcp14> be passed to the
   application with an indication of APC Option checksum failure. This is the default
   behavior for APC.</t>
        <t indent="0" pn="section-11.3-7">&gt;&gt; Like all SAFE UDP Options, the APC <bcp14>MUST</bcp14> be silently ignored when
   failing, unless the receiver has been explicitly configured to do
   otherwise.</t>
        <t indent="0" pn="section-11.3-8">Although all UDP Option aware endpoints support the APC (being in the
   required set), this silently ignored behavior ensures that option-
   aware receivers operate the same as legacy receivers unless
   overridden. Another reason is because the APC check could fail even
   where the user data has not been corrupted, such as when its
   contents have been intentionally overwritten, e.g., by a middlebox to
   update embedded port numbers or IP addresses. Such overwrites could
   be intentional and not widely known; defaulting to silent ignore
   ensures that option-aware endpoints do not change how users or
   applications operate unless explicitly directed to do otherwise.</t>
        <t indent="0" pn="section-11.3-9">&gt;&gt; UDP packets with unrecognized APC lengths <bcp14>MUST</bcp14> receive the same
   treatment as UDP packets with incorrect APC Option checksum fields.</t>
        <t indent="0" pn="section-11.3-10">Ensuring that unrecognized APC lengths are treated as incorrect
   checksums enables future variants of APC to be treated similarly.</t>
        <t indent="0" pn="section-11.3-11">The APC is reported to the user and useful only per-datagram, because
   fragments have no UDP user data.</t>
      </section>
      <section anchor="sec-frag" numbered="true" removeInRFC="false" toc="include" pn="section-11.4">
        <name slugifiedName="name-fragmentation-frag">Fragmentation (FRAG)</name>
        <t indent="0" pn="section-11.4-1">The Fragmentation (FRAG, Kind=3) Option supports UDP fragmentation
   and reassembly, which can be used to transfer UDP messages larger
   than allowed by the IP Effective MTU for
   Receiving (EMTU_R) <xref target="RFC1122" format="default" sectionFormat="of" derivedContent="RFC1122"/>. FRAG includes
   a copy of the same UDP transport ports in each fragment, enabling
   them to traverse stateless Network Address (and port) Translation
   (NAT) devices, in contrast to the behavior of IP fragments
   <xref target="RFC4787" format="default" sectionFormat="of" derivedContent="RFC4787"/>. FRAG is typically used with the UDP MDS and MRDS Options
   to enable more efficient use of large messages, both at the UDP and
   IP layers. The design of FRAG is similar to that of the IPv6
   Fragmentation Header <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>, except that the UDP variant uses a
   16-bit Offset measured in bytes, rather than IPv6's 13-bit Fragment
   Offset measured in 8-byte units. This UDP variant avoids creating
   reserved fields.</t>
        <t indent="0" pn="section-11.4-2">The FRAG header also enables use of options that modify the contents
   of the UDP payload, such as encryption (UENC, see <xref target="unsafe-encryption-uenc" format="default" sectionFormat="of" derivedContent="Section 12.2"/>). Like
   FRAG, such options would not be safely used on UDP payloads
   because they would be misinterpreted by legacy receivers. FRAG
   allows use of these options, either on fragments or on a whole,
   unfragmented message (i.e., an "atomic" fragment at the UDP layer,
   similar to atomic IP datagrams <xref target="RFC6864" format="default" sectionFormat="of" derivedContent="RFC6864"/>). This is safe because FRAG
   hides the payload from legacy receivers by placing it within the
   surplus area.</t>
        <t indent="0" pn="section-11.4-3">&gt;&gt; When FRAG is present, it <bcp14>SHOULD</bcp14> come as early as possible in the
   UDP Options list.</t>
        <t indent="0" pn="section-11.4-4">When present, placing FRAG first can simplify some implementations,
   notably those using hardware acceleration that assume a fixed
   location for the FRAG Option. However, there are cases where FRAG
   cannot occur first, such as when combined with per-fragment UENC or
   UCMP. In those cases, encryption or compression (or both) would
   precede FRAG when they also encrypt or compress the fragment option
   itself. Additional cases could include recoding, such as could be
   used to support Forward Error Correction (FEC) over a group of
   fragments. FRAG not being first might result in software (so-called
   "slow path") option processing or might also be accommodated via a
	small set of known cases.</t>
        <t indent="0" pn="section-11.4-5">&gt;&gt; When FRAG is present, the UDP user data <bcp14>MUST</bcp14> be empty. If the
   user data is not empty, all UDP Options <bcp14>MUST</bcp14> be silently ignored and
   the user data received <bcp14>MUST</bcp14> be sent to the user.</t>
        <t indent="0" pn="section-11.4-6">Legacy receivers interpret FRAG messages as zero-length user data
   UDP packets (i.e., UDP Length field is 8, the length of just the UDP
   header), which would not affect the receiver unless the presence of
   the UDP packet itself were a signal (see <xref section="5" sectionFormat="of" target="RFC8085" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8085#section-5" derivedContent="RFC8085"/>).
   In this manner, the FRAG Option also helps hide UNSAFE Options so
   they can be used more safely in the presence of legacy receivers.</t>
        <t indent="0" pn="section-11.4-7">The FRAG Option has two formats: non-terminal fragments use the
   shorter variant (<xref target="fig-10" format="default" sectionFormat="of" derivedContent="Figure 10"/>) and terminal fragments use the longer
   (<xref target="fig-11" format="default" sectionFormat="of" derivedContent="Figure 11"/>). The latter includes stand-alone fragments, i.e., when
   data is contained in the FRAG Option but reassembly is not required.</t>
        <figure anchor="fig-10" align="left" suppress-title="false" pn="figure-10">
          <name slugifiedName="name-udp-non-terminal-frag-optio">UDP Non-Terminal FRAG Option Format</name>
          <artwork align="left" pn="section-11.4-8.1">
                +--------+--------+--------+--------+
                | Kind=3 | Len=10 |   Frag. Start   |
                +--------+--------+--------+--------+
                |           Identification          |
                +--------+--------+--------+--------+
                |  Frag. Offset   |
                +--------+--------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.4-9">Most fields are common to both FRAG Option formats. The option Len
   field indicates whether there are more fragments (Len=10) or no more
   fragments (Len=12).</t>
        <t indent="0" pn="section-11.4-10">The Frag. Start field indicates the location of the beginning of the fragment
   data, measured from the beginning of the UDP header of the fragment.
   The fragment data follows the remainder of the UDP Options and
   continues to the end of the IP datagram (i.e., the end of the
   surplus area). Those options (i.e., any that precede or follow the
   FRAG Option) are applied to this UDP fragment.</t>
        <t indent="0" pn="section-11.4-11">The Frag. Offset field indicates the location of this fragment
   relative to the original UDP datagram (prior to fragmentation or
   after reassembly), measured from the start of the original UDP
   datagram's header.</t>
        <t indent="0" pn="section-11.4-12">The Identification field is a 32-bit value that, when used in
   combination with the IP source address, UDP source port, IP
   destination address, and UDP destination port, uniquely identifies
   the original UDP datagram.</t>
        <figure anchor="fig-11" align="left" suppress-title="false" pn="figure-11">
          <name slugifiedName="name-udp-non-terminal-frag-option">UDP Non-Terminal FRAG Option Format</name>
          <artwork align="left" pn="section-11.4-13.1">
               +--------+--------+--------+--------+
               | Kind=3 | Len=12 |   Frag. Start   |
               +--------+--------+--------+--------+
               |           Identification          |
               +--------+--------+--------+--------+
               |  Frag. Offset   |Reass DgOpt Start|
               +--------+--------+--------+--------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.4-14">The terminal FRAG Option format adds a Reassembled Datagram Option
   Start (RDOS) pointer, measured from the start of the original UDP
   datagram header, indicating the end of the reassembled data and the
   start of the surplus area within the original UDP datagram. UDP
   Options that apply to the reassembled datagram are contained in the
   reassembled surplus area, as indicated by RDOS. UDP Options that
   occur within the fragment are processed on the fragment itself. This
   allows either pre-reassembly or post-reassembly UDP Option effects,
   such as using UENC on each fragment while also using TIME on the
   reassembled datagram for round-trip latency measurements.</t>
        <t indent="0" pn="section-11.4-15">An example showing the relationship between UDP fragments and the
   original UDP datagram is provided in <xref target="fig-12" format="default" sectionFormat="of" derivedContent="Figure 12"/>. In this example, the
   trailer containing per-datagram options resides entirely within the
   terminal fragment, but this need not always be the case.</t>
        <figure anchor="fig-12" align="left" suppress-title="false" pn="figure-12">
          <name slugifiedName="name-udp-fragments-and-original-">UDP Fragments and Original UDP Datagram</name>
          <artwork align="left" pn="section-11.4-16.1">
       Constituent UDP Fragments         Original UDP Datagram

     +-------------+------------+
     | Src Port    | Dst Port   |
     +-------------+------------+
     | UDP Len (8) | UDP Chksum |
     +-------------+------------+
     |     OCS     | K=3   L=10 |      +-------------+------------+
     +-------------+------------+      | Src Port    | Dst Port   |
  ,--| Frag. Start | Identifi-  ~      +-------------+------------+
  |  +-------------+------------+      | UDP L.(RDOS)| UDP Chksum |
  |  ~ cation      | Frag. Off. |-----&gt;+-------------+------------+
  |  +-------------+------------+      | Frag Data from 1st Frag. |
  |  ~ Per-Fragment Options     ~      |             .            |
  '-&gt;+-------------+------------+      ~             .            ~
     ~      Fragment Data       ~      |             .            |
     +-------------+------------+  ,--&gt;+-------------+------------+
                                   |   | Frag Data from 2nd Frag. |
     +-------------+------------+  |   |             .            |
     | Src Port    | Dst Port   |  |   ~             .            ~
     +-------------+------------+  |   |             .            |
     | UDP Len (8) | UDP Chksum |  | ,&gt;+-------------+------------+
     +-------------+------------+  | | |     OCS     | UDP Options|
     |     OCS     | K=3   L=12 |  | | +-------------+            +
     +-------------+------------+  | | ~             .            ~
  ,--| Frag. Start | Identifi-  ~  | | +-------------+------------+
  |  +-------------+------------+  | |
  |  ~ cation      | Frag. Off. |--' |
  |  +-------------+------------+    |
  |  |  RDOS       | Frag.Opts. |    |
  '-&gt;+--|----------+------------+    |
     ~  |   Fragment Data       ~    |
     +--|----------+------------+    |
        |                            |
        '----------------------------'
</artwork>
        </figure>
        <t indent="0" pn="section-11.4-17">The FRAG Option does not need a "more fragments" bit (as used by IP
   fragmentation) because it provides the same indication by using the
   longer, 12-byte variant, as shown in <xref target="fig-11" format="default" sectionFormat="of" derivedContent="Figure 11"/>.</t>
        <t indent="0" pn="section-11.4-18">&gt;&gt; The FRAG Option <bcp14>MAY</bcp14> be used on a single fragment; in this case,
   the Frag. Offset would be zero and the option would have the 12-byte
   format.</t>
        <t indent="0" pn="section-11.4-19">&gt;&gt; Endpoints supporting UDP Options <bcp14>MUST</bcp14> be capable of fragmenting
   and reassembling at least two fragments, each of a size that will
   fit within the standard Ethernet MTU of 1,500 bytes. For further
   details, please see <xref target="sec-mrds" format="default" sectionFormat="of" derivedContent="Section 11.6"/>.</t>
        <t indent="0" pn="section-11.4-20">Use of the single fragment variant can be helpful in supporting use
   of UNSAFE Options without undesirable impact to receivers that do
   not support either UDP Options or the specific UNSAFE Options.</t>
        <t indent="0" pn="section-11.4-21">During fragmentation, the UDP header checksum of each fragment
   remains constant. It does not depend on the fragment data (which
   appears in the surplus area) because all fragments have a zero-
   length user data field.</t>
        <t indent="0" pn="section-11.4-22">&gt;&gt; The Identification field is a 32-bit value that <bcp14>MUST</bcp14> be unique
   over the expected fragment reassembly timeout.</t>
        <t indent="0" pn="section-11.4-23">&gt;&gt; The Identification field <bcp14>SHOULD</bcp14> be generated in a manner similar
   to that of the IPv6 Fragment ID <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>.</t>
        <t indent="0" pn="section-11.4-24">&gt;&gt; UDP fragments <bcp14>MUST NOT</bcp14> overlap.</t>
        <t indent="0" pn="section-11.4-25">&gt;&gt; Similar to IPv6 reassembly <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>, if any of the fragments
   being reassembled overlap with any other fragments being reassembled
   for the same UDP packet, reassembly of that UDP packet <bcp14>MUST</bcp14> be
   abandoned and all the fragments that have been received for that UDP
   packet <bcp14>MUST</bcp14> be discarded, and no ICMP error messages are to be sent
   in this case (to avoid a potential DoS attack turning into an ICMP
   storm in the reverse direction).</t>
        <t indent="0" pn="section-11.4-26">&gt;&gt; Note that fragments might be duplicated in the network. Instead
   of treating these exact duplicate fragments as overlapping
   fragments, an implementation <bcp14>MAY</bcp14> choose to detect this case and drop
   exact duplicate fragments while keeping the other fragments
   belonging to the same UDP packet.</t>
        <t indent="0" pn="section-11.4-27">UDP fragmentation relies on a fragment expiration timer, which can
   be preset or could use a value computed using the UDP Timestamp
   Option.</t>
        <t indent="0" pn="section-11.4-28">&gt;&gt; The default UDP reassembly expiration timeout <bcp14>SHOULD</bcp14> be no more
   than 2 minutes.</t>
        <t indent="0" pn="section-11.4-29">&gt;&gt; UDP reassembly expiration <bcp14>MUST NOT</bcp14> generate an ICMP error. Such
   events are not an IP error and can be addressed by the
   user/application layer if desired.</t>
        <t indent="0" pn="section-11.4-30">&gt;&gt; UDP reassembly space <bcp14>SHOULD</bcp14> be limited to reduce the impact of
	DoS attacks on resource use.</t>
        <t indent="0" pn="section-11.4-31">&gt;&gt; UDP reassembly space limits <bcp14>SHOULD NOT</bcp14> be computed as a shared
   resource across multiple sockets, to avoid cross-socket pair DoS
   attacks.</t>
        <t indent="0" pn="section-11.4-32">&gt;&gt; Individual UDP fragments <bcp14>MUST NOT</bcp14> be forwarded to the user. The
   reassembled datagram is received only after complete reassembly,
   checksum validation, and continued processing of the remaining UDP
   Options.</t>
        <t indent="0" pn="section-11.4-33">Per-fragment UDP Options, if used in addition to FRAG, occur before
   the fragment data. They typically occur after the FRAG Option,
   except where they modify the FRAG Option itself (e.g., UENC or
   UCMP). Per-fragment options are processed before the fragment is
   included in the reassembled datagram. Such options can be useful to
   protect the reassembly process itself, e.g., to prevent the
   reassembly cache from being polluted (using AUTH or UENC).</t>
        <t indent="0" pn="section-11.4-34">&gt;&gt; Fragments of a single datagram <bcp14>MAY</bcp14> use different sets of options.
   It is expected to be computationally expensive to validate
   uniformity across all fragments, and there could be legitimate
   reasons for including options in a fragment but not all fragments
   (e.g., MDS and MRDS).</t>
        <t indent="0" pn="section-11.4-35">If an option is used per-fragment but defined as not usable per-
   fragment, it is treated the same as any other unknown option.</t>
        <t indent="0" pn="section-11.4-36">Per-datagram UDP Options, if used, reside in the surplus area of the
   original UDP datagram. Processing of those options occurs after
   reassembly is complete. This enables the safe use of UNSAFE Options,
   which are required to result in discarding the entire UDP datagram
   if they are unknown to the receiver or otherwise fail (see <xref target="sec-unsafe-opt" format="default" sectionFormat="of" derivedContent="Section 12"/>).</t>
        <t indent="0" pn="section-11.4-37">In general, UDP packets are fragmented as follows:</t>
        <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-11.4-38"><li pn="section-11.4-38.1" derivedCounter="1.">
            <t indent="0" pn="section-11.4-38.1.1">Create a UDP packet with data and UDP Options. This is the
original UDP datagram, which we will call "D". The UDP Options
follow the UDP user data and occur in the surplus area, just as
in an unfragmented UDP datagram with UDP Options.  </t>
            <t indent="0" pn="section-11.4-38.1.2">
&gt;&gt; UDP Options for the original packet <bcp14>MUST</bcp14> be fully prepared
before the rest of the fragmentation steps that follow here.  </t>
            <t indent="0" pn="section-11.4-38.1.3">
&gt;&gt; The UDP checksum of the original packet <bcp14>SHOULD</bcp14> be set to zero
because it is never transmitted. Equivalent protection is
provided if each fragment has a non-zero OCS value, as will be
the case if each fragment's UDP checksum is non-zero. Similarly,
the OCS value of the original packet <bcp14>SHOULD</bcp14> be zero if each
fragment will have a non-zero OCS value, as will be the case if
each fragment's UDP checksum is non-zero.</t>
          </li>
          <li pn="section-11.4-38.2" derivedCounter="2.">
            <t indent="0" pn="section-11.4-38.2.1">Identify the desired fragment size, which we will call "S". This
value is calculated to take into account the path MTU (if known)
and to allow space for per-fragment options.</t>
          </li>
          <li pn="section-11.4-38.3" derivedCounter="3.">
            <t indent="0" pn="section-11.4-38.3.1">Fragment "D" into chunks of size no larger than "S"-12 each (10
for the non-terminal FRAG Option and 2 for OCS), with one final
chunk no larger than "S"-14 (12 for the terminal FRAG Option and
2 for OCS). Note that all the per-datagram options in step #1
need not be limited to the terminal fragment, i.e., the RDOS
pointer can indicate the start of the original surplus area
anywhere in the reassembled datagram.</t>
          </li>
          <li pn="section-11.4-38.4" derivedCounter="4.">
            <t indent="0" pn="section-11.4-38.4.1">For each chunk of "D" in step #3, create a UDP packet with no
user data (UDP Length=8) followed by the word-aligned OCS, the
FRAG Option, and any additional per-fragment UDP Options,
followed by the FRAG data chunk.</t>
          </li>
          <li pn="section-11.4-38.5" derivedCounter="5.">
            <t indent="0" pn="section-11.4-38.5.1">Complete the processing associated with creating these additional
per-fragment UDP Options for each fragment.</t>
          </li>
        </ol>
        <t indent="0" pn="section-11.4-39">Receivers reverse the above sequence. They process all received
   options in each fragment. When the FRAG Option is encountered, the
   FRAG data is used in reassembly. After all fragments are received,
   the entire UDP packet is processed with any trailing UDP Options
   applying to the reassembled user data.</t>
        <t indent="0" pn="section-11.4-40">&gt;&gt; Reassembly failures at the receiver result in silent discard of
   any per-fragment options and fragment contents, and such failures
   <bcp14>SHOULD NOT</bcp14> generate zero-length frames to the user.</t>
        <t indent="0" pn="section-11.4-41">&gt;&gt; Finally, because fragmentation processing can be expensive, the
   FRAG Option <bcp14>SHOULD</bcp14> be avoided unless the original datagram requires
   fragmentation or it is needed for "safe" use of UNSAFE Options.</t>
        <t indent="0" pn="section-11.4-42">&gt;&gt; The FRAG Option <bcp14>MAY</bcp14> also be used to provide limited support for
   UDP Options in systems that have access to only the initial portion
   of the data in incoming or outgoing packets, as such systems could
   potentially access per-fragment options. Such packets would, of
   course, be silently ignored by legacy receivers that do not support
   UDP Options.</t>
        <t indent="0" pn="section-11.4-43">The presence of the FRAG Option is not reported to the user.</t>
      </section>
      <section anchor="maximum-datagram-size-mds" numbered="true" removeInRFC="false" toc="include" pn="section-11.5">
        <name slugifiedName="name-maximum-datagram-size-mds">Maximum Datagram Size (MDS)</name>
        <t indent="0" pn="section-11.5-1">The Maximum Datagram Size (MDS, Kind=4) Option is a 16-bit hint of
   the largest UDP packet or UDP fragment that an endpoint believes can
   be received without use of IP fragmentation. It helps UDP
   applications limit the largest UDP packet that can be sent without
   UDP fragmentation and helps UDP fragmentation determine the largest
   UDP fragment to send -- in both cases, to avoid IP fragmentation.</t>
        <t indent="0" pn="section-11.5-2">As with the TCP Maximum Segment Size (MSS) Option <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>, the
   size indicated is the IP layer MTU decreased by the fixed IP and UDP
   headers only <xref target="RFC9293" format="default" sectionFormat="of" derivedContent="RFC9293"/>. The space needed for IP and UDP Options
   needs to be adjusted by the sender when using the value indicated.
   The value transmitted is based on EMTU_R, the largest IP datagram
   that can be received (i.e., reassembled at the receiver) <xref target="RFC1122" format="default" sectionFormat="of" derivedContent="RFC1122"/>.
   However, as with TCP, this value is only a hint at what the receiver
   believes, as when used with PLPMTUD at the UDP layer, as discussed
   later in this section.</t>
        <t indent="0" pn="section-11.5-3">&gt;&gt; MDS does not indicate a known path MTU and thus <bcp14>MUST NOT</bcp14> be used
   to limit transmissions.</t>
        <figure anchor="fig-13" align="left" suppress-title="false" pn="figure-13">
          <name slugifiedName="name-udp-mds-option-format">UDP MDS Option Format</name>
          <artwork align="left" pn="section-11.5-4.1">
                +--------+--------+--------+--------+
                | Kind=4 | Len=4  |    MDS size     |
                +--------+--------+--------+--------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.5-5">&gt;&gt; The UDP MDS Option <bcp14>MAY</bcp14> be used as a hint for path MTU discovery
   <xref target="RFC1191" format="default" sectionFormat="of" derivedContent="RFC1191"/> <xref target="RFC8201" format="default" sectionFormat="of" derivedContent="RFC8201"/>, but this could be difficult because of known
   issues with ICMP blocking <xref target="RFC2923" format="default" sectionFormat="of" derivedContent="RFC2923"/> as well as UDP lacking automatic
   retransmission.</t>
        <t indent="0" pn="section-11.5-6">MDS is more likely to be useful when coupled with IP source
   fragmentation or UDP fragmentation to limit the largest reassembled
   UDP message as indicated by MRDS (see <xref target="sec-mrds" format="default" sectionFormat="of" derivedContent="Section 11.6"/>), e.g., when
   EMTU_R is larger than the required minimums (576 for IPv4 <xref target="RFC0791" format="default" sectionFormat="of" derivedContent="RFC0791"/>
   and 1500 for IPv6 <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>).</t>
        <t indent="0" pn="section-11.5-7">&gt;&gt; MDS can be used with DPLPMTUD <xref target="RFC8899" format="default" sectionFormat="of" derivedContent="RFC8899"/> to provide a hint to the
   Packetization Layer Path MTU (PLPMTU) value, though it <bcp14>MUST NOT</bcp14>
   prohibit transmission of larger UDP packets used as DPLPMTUD probes.</t>
        <t indent="0" pn="section-11.5-8">MDS is reported to the user, whether used per-datagram or per-
   fragment (as defined in <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>). When used per-fragment, the
   reported value is the minimum of the MDS values received per-
   fragment.</t>
      </section>
      <section anchor="sec-mrds" numbered="true" removeInRFC="false" toc="include" pn="section-11.6">
        <name slugifiedName="name-maximum-reassembled-datagra">Maximum Reassembled Datagram Size (MRDS)</name>
        <t indent="0" pn="section-11.6-1">The Maximum Reassembled Datagram Size (MRDS, Kind=5) Option is a 16-
   bit indicator of the largest reassembled UDP datagram that can be
   received, including the UDP header and any per-datagram UDP Options,
   accompanied by an 8-bit indication of how many UDP fragments can be
   reassembled. The MRDS size field is the UDP equivalent of IP's EMTU_R, but the
   two are not related <xref target="RFC1122" format="default" sectionFormat="of" derivedContent="RFC1122"/>. Using the FRAG Option (<xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>),
   UDP packets can be transmitted as transport fragments, each in their
   own (presumably not fragmented) IP datagram, and be reassembled at
   the UDP layer. MRDS segs is the number of UDP fragments that can be
   reassembled.</t>
        <figure anchor="fig-14" align="left" suppress-title="false" pn="figure-14">
          <name slugifiedName="name-udp-mrds-option-format">UDP MRDS Option Format</name>
          <artwork align="left" pn="section-11.6-2.1">
            +--------+--------+--------+--------+---------+
            | Kind=5 | Len=5  |    MRDS size    |MRDS segs|
            +--------+--------+--------+--------+---------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.6-3">&gt;&gt; Endpoints supporting UDP Options <bcp14>MUST</bcp14> support a local MRDS size
   of at least 2,926 bytes for IPv4 and 2,886 bytes for IPv6. Support
   for larger values is encouraged.</t>
        <t indent="0" pn="section-11.6-4">&gt;&gt; Endpoints supporting UDP Options <bcp14>MUST</bcp14> support a local MRDS segs
	value of at least 2. Support for larger values is encouraged.</t>
        <t indent="0" pn="section-11.6-5">These parameters plus the Path MTU (PMTU) allow a sender to compute the size of
   the largest pre-fragmentation UDP packet that a receiver will
   guarantee to accept. MMS_S is defined as the PMTU less the size of
   the IP header and the UDP header, i.e., the maximum UDP message size
   that can be successfully sent in a single UDP datagram if there are
   no IP options or extension headers and no UDP per-fragment options.
   Given the above size definitions, the size of the largest pre-fragmentation UDP packet that the
   receiver will guarantee to accept is the smaller of the MRDS size
   and the following:</t>
        <t indent="0" pn="section-11.6-6">(MMS_S - 12) * (MRDS segs) - 2 - (Total Per-Frag IP/UDP Options) + 8</t>
        <t indent="0" pn="section-11.6-7">In the above expression, the Total Per-Frag IP/UDP Options includes the size of all IP
   options and extension headers and all per-fragment UDP Options,
   except for OCS and FRAG, that are in the sequence of UDP fragments.</t>
        <t indent="0" pn="section-11.6-8">&gt;&gt; If no MRDS Option has been received, a sender <bcp14>MUST</bcp14> assume that
   MRDS size is 2,926 bytes for IPv4 and 2,886 bytes for IPv6 and that
   MRDS segs is 2, i.e., the minimum values allowed.</t>
        <t indent="0" pn="section-11.6-9">MRDS is reported to the user, whether used per-datagram or per-
   fragment (as defined in <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>). When used per-fragment, the
   reported value is the minimum of the MRDS values received per-
   fragment.</t>
      </section>
      <section anchor="echo-request-req-and-echo-response-res" numbered="true" removeInRFC="false" toc="include" pn="section-11.7">
        <name slugifiedName="name-echo-request-req-and-echo-r">Echo Request (REQ) and Echo Response (RES)</name>
        <t indent="0" pn="section-11.7-1">The echo Request (REQ, Kind=6) and echo Response (RES, Kind=7)
   Options provide UDP packet-level acknowledgments as a capability
   for use by upper layer protocols, e.g., user applications,
   libraries, operating systems, etc. Both the REQ and RES are under
   the control of these upper layers, i.e., UDP Option support
   described in this document never automatically responds to a REQ
   with a RES. Instead, the REQ is delivered to the upper layer, which
   decides whether and when to issue a RES.</t>
        <t indent="0" pn="section-11.7-2">One such use is described as part of DPLPMTUD <xref target="RFC9869" format="default" sectionFormat="of" derivedContent="RFC9869"/>. This use case
   is described as part of UDP Options but is logically considered to
   be a capability of an upper layer that uses UDP Options. The options
   both have the format indicated in <xref target="fig-15" format="default" sectionFormat="of" derivedContent="Figure 15"/>, in which the token has
   no internal structure or meaning.</t>
        <figure anchor="fig-15" align="left" suppress-title="false" pn="figure-15">
          <name slugifiedName="name-udp-req-and-res-options-for">UDP REQ and RES Options Format</name>
          <artwork align="left" pn="section-11.7-3.1">
                +--------+--------+-----------------+
                |  Kind  | Len=6  |      token      |
                +--------+--------+-----------------+
                  1 byte   1 byte       4 bytes
</artwork>
        </figure>
        <t indent="0" pn="section-11.7-4">&gt;&gt; As advice to upper layer protocol/library designers, when
   supporting REQ/RES and responding with a RES, the upper layer <bcp14>SHOULD</bcp14>
   respond with the most recently received REQ token.</t>
        <t indent="0" pn="section-11.7-5">&gt;&gt; If the implementation includes a layer/library that produces and
   consumes REQ/RES on behalf of the user/application, then that layer
   <bcp14>MUST</bcp14> be disabled by default; in this case, REQ/RES are simply sent
   upon request by the user/application and passed to it when received,
	as with most other UDP Options.</t>
        <t indent="0" pn="section-11.7-6">For example, an application needs to explicitly enable the
   generation of a RES Option by DPLPMTUD when using UDP Options
   <xref target="RFC9869" format="default" sectionFormat="of" derivedContent="RFC9869"/>.</t>
        <t indent="0" pn="section-11.7-7">&gt;&gt; The token transmitted in a RES Option <bcp14>MUST</bcp14> be a token received in
   a REQ Option by the transmitter. This ensures that the response is
   to a received request.</t>
        <t indent="0" pn="section-11.7-8">REQ and RES Option kinds each appear at most once in each UDP
   packet, as with most other options. A single packet can include both
   options, though they would be otherwise unrelated to each other.
   Note also that the FRAG Option is not used when sending DPLPMTUD
   probes to determine a PLPMTU <xref target="RFC9869" format="default" sectionFormat="of" derivedContent="RFC9869"/>.</t>
        <t indent="0" pn="section-11.7-9">REQ and RES are reported to the user, whether used per-datagram or
   per-fragment (as defined in <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>). When used per-fragment,
   the reported value indicates the most recently received token.</t>
      </section>
      <section anchor="timestamps-time" numbered="true" removeInRFC="false" toc="include" pn="section-11.8">
        <name slugifiedName="name-timestamp-time">Timestamp (TIME)</name>
        <t indent="0" pn="section-11.8-1">Timestamps are provided as a capability to be used by applications
   and other upper layer protocols. They are based on a notion of time
   as a monotonically non-decreasing unsigned integer, with wraparound.
   They are defined the same way as TCP Protection Against Wrapped
   Sequence (PAWS) numbers, i.e., "without any connection to [real-world,
   classical physics wall-clock] time" <xref target="RFC7323" format="default" sectionFormat="of" derivedContent="RFC7323"/>. They are quite
   similar to the behavior of relativistic time or the individual
   scalars of Lamport clocks <xref target="La78" format="default" sectionFormat="of" derivedContent="La78"/>. However, if desired, they can
   correspond to real-world time, e.g., as used for round-trip time (RTT)
   estimation. This option makes no assertions as to which is the case;
	the decision is up to the application layer using this option.</t>
        <t indent="0" pn="section-11.8-2">The Timestamp (TIME, Kind=8) Option exchanges two four-byte unsigned
   timestamp fields. It serves a similar purpose to TCP's Timestamp (TS) Option
   <xref target="RFC7323" format="default" sectionFormat="of" derivedContent="RFC7323"/>, enabling UDP to estimate the RTT
   between hosts. For UDP, this RTT can be useful for establishing UDP
   fragment reassembly timeouts or transport-layer rate limiting
   <xref target="RFC8085" format="default" sectionFormat="of" derivedContent="RFC8085"/>.</t>
        <figure anchor="fig-16" align="left" suppress-title="false" pn="figure-16">
          <name slugifiedName="name-udp-time-option-format">UDP TIME Option Format</name>
          <artwork align="left" pn="section-11.8-3.1">
     +--------+--------+------------------+------------------+
     | Kind=8 | Len=10 |      TSval       |      TSecr       |
     +--------+--------+------------------+------------------+
       1 byte   1 byte       4 bytes            4 bytes
</artwork>
        </figure>
        <t indent="0" pn="section-11.8-4">TS Value (TSval) and TS Echo Reply (TSecr) are used in a similar
   manner to the TCP TS Option <xref target="RFC7323" format="default" sectionFormat="of" derivedContent="RFC7323"/>. On transmitted UDP packets
   using the option, TSval is always set based on the local "time"
   value. Received TSval and TSecr field contents are provided to the
   application, which can pass the received TSval to be used as TSecr in
   UDP messages sent in response (i.e., to echo the received TSval). A
   received TSecr of zero indicates that the TSval was not echoed by
   the transmitter, i.e., from a previously received UDP packet.</t>
        <t indent="0" pn="section-11.8-5">&gt;&gt; TIME <bcp14>MAY</bcp14> use an RTT estimate based on non-zero Timestamp values as
   a hint for fragmentation reassembly, rate limiting, or other
   mechanisms that benefit from such an estimate.</t>
        <t indent="0" pn="section-11.8-6">&gt;&gt; An application <bcp14>MAY</bcp14> use TIME to compute this RTT estimate for
   further use by the user.</t>
        <t indent="0" pn="section-11.8-7">UDP timestamps are modeled after TCP timestamps and have similar
   expectations. In particular, they are expected to follow these
   guidelines:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-11.8-8">
          <li pn="section-11.8-8.1">
            <t indent="0" pn="section-11.8-8.1.1">Values are monotonic and non-decreasing except for anticipated
 number-space rollover events.</t>
          </li>
          <li pn="section-11.8-8.2">
            <t indent="0" pn="section-11.8-8.2.1">Values "increase" (allowing for rollover, i.e., modulo the field
 size except zero) according to a typical 'tick' time.</t>
          </li>
          <li pn="section-11.8-8.3">
            <t indent="0" pn="section-11.8-8.3.1">A request is defined as TSval being non-zero, and a reply is
 defined as TSecr being non-zero.</t>
          </li>
          <li pn="section-11.8-8.4">
            <t indent="0" pn="section-11.8-8.4.1">A receiver always responds to a request with the highest TSval
 received (allowing for rollover), which is not necessarily the
 most recently received.</t>
          </li>
        </ul>
        <t indent="0" pn="section-11.8-9">Rollover can be handled as a special case or more completely using
   sequence number extension <xref target="RFC9187" format="default" sectionFormat="of" derivedContent="RFC9187"/>; however, zero values need to be
   avoided explicitly.</t>
        <t indent="0" pn="section-11.8-10">&gt;&gt; TIME values <bcp14>MUST NOT</bcp14> use zeros as valid time values, because they
   are used as indicators of requests and responses.</t>
        <t indent="0" pn="section-11.8-11">TIME is reported to the user, whether used per-datagram or per-
   fragment (as defined in <xref target="sec-frag" format="default" sectionFormat="of" derivedContent="Section 11.4"/>). When used per-fragment, the
   reported value is the minimum and maximum of each of the timestamp
   values received per-fragment.</t>
        <t indent="0" pn="section-11.8-12">&gt;&gt; Use of TIME per-fragment is <bcp14>NOT RECOMMENDED</bcp14>. Exceptions include
   supporting diagnostics on the reassembly process itself, which could
   be more appropriate to handle within the UDP Option processing
   implementation.</t>
      </section>
      <section anchor="sec-auth" numbered="true" removeInRFC="false" toc="include" pn="section-11.9">
        <name slugifiedName="name-authentication-auth-reserve">Authentication (AUTH), RESERVED Only</name>
        <t indent="0" pn="section-11.9-1">The Authentication (AUTH, Kind=9) Option is reserved for all UDP
   authentication mechanisms <xref target="I-D.touch-tsvwg-udp-auth-opt" format="default" sectionFormat="of" derivedContent="To24"/>. AUTH is expected to cover the UDP
   user data and UDP Options, with possible additional coverage of the
   IP pseudoheader and UDP header and potentially also support for NAT
   traversal (i.e., by zeroing the remote socket -- the source IP
   address and UDP port -- before computing the check), the latter in a
   similar manner as per TCP Authentication Option (TCP-AO) NAT traversal <xref target="RFC6978" format="default" sectionFormat="of" derivedContent="RFC6978"/>.</t>
        <t indent="0" pn="section-11.9-2">Like APC, AUTH is a SAFE Option because it does not modify the UDP
   user data. AUTH could fail even where the user data has not been
   corrupted, such as when its contents have been overwritten. Such
   overwrites could be intentional and not widely known; defaulting to
   silent ignore ensures that option-aware endpoints do not change how
   users or applications operate unless explicitly directed to do
   otherwise. When a socket pair relies on AUTH, e.g., upon
   configuration of a security policy, this default is expected to be
   overridden, where incoming packets without AUTH or with a failed
   AUTH check would be silently dropped, such that only authenticated
   packets would be sent to the user. This approach enables security
   checks for AUTH to occur above UDP, in a separate shim layer or
   application library.</t>
        <t indent="0" pn="section-11.9-3">A specification for using AUTH is expected to define the
   coordination of AUTH security parameters and configuration of the
   socket pair when those parameters are installed. That specification
   is expected to address rules for when AUTH is required upon
   transmission and when the presence and correct validation of AUTH is
   required on reception.</t>
      </section>
      <section anchor="sec-exp" numbered="true" removeInRFC="false" toc="include" pn="section-11.10">
        <name slugifiedName="name-experimental-exp">Experimental (EXP)</name>
        <t indent="0" pn="section-11.10-1">The Experimental (EXP, Kind=127) Option is allocated for experiments
   <xref target="RFC3692" format="default" sectionFormat="of" derivedContent="RFC3692"/>. Only one such value is allocated because experiments are
   expected to use an Experimental ID (ExID) to differentiate
   concurrent use for different purposes, using UDP ExIDs registered
   with IANA according to the approach developed for TCP experimental
   options <xref target="RFC6994" format="default" sectionFormat="of" derivedContent="RFC6994"/>.</t>
        <figure anchor="fig-17" align="left" suppress-title="false" pn="figure-17">
          <name slugifiedName="name-udp-exp-option-format">UDP EXP Option Format</name>
          <artwork align="left" pn="section-11.10-2.1">
            +----------+----------+----------+----------+
            | Kind=127 |   Len    |      UDP ExID       |
            +----------+----------+----------+----------+
            |  (option contents, as defined)...         |
            +----------+----------+----------+----------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.10-3">&gt;&gt; The length of the Experimental Option <bcp14>MUST</bcp14> be at least 4 to
   account for the Kind, Len, and 16-bit UDP ExID
   (similar to TCP ExIDs <xref target="RFC6994" format="default" sectionFormat="of" derivedContent="RFC6994"/>).</t>
        <t indent="0" pn="section-11.10-4">The UDP EXP Option uses only 16-bit ExIDs, unlike TCP ExIDs. In TCP,
   the first 16 bits of the ExID is unique; the additional 16 bits,
   where present, are used to decrease the chance of the entire ExID
   occurring in legacy use of the TCP EXP Option. This extended variant
   provides no similar use for UDP EXP because ExIDs are required.</t>
        <t indent="0" pn="section-11.10-5">The UDP EXP Option also includes an Extended Length format, where
   the option Len is 255, followed by two bytes of Extended Length.</t>
        <figure anchor="fig-18" align="left" suppress-title="false" pn="figure-18">
          <name slugifiedName="name-udp-exp-extended-option-for">UDP EXP Extended Option Format</name>
          <artwork align="left" pn="section-11.10-6.1">
            +----------+----------+----------+----------+
            | Kind=127 |   255    |   Extended Length   |
            +----------+----------+----------+----------+
            |      UDP ExID       |(option contents...) |
            +----------+----------+----------+----------+
</artwork>
        </figure>
        <t indent="0" pn="section-11.10-7">UDP Experimental IDs (ExIDs) are assigned from a combined
   TCP/UDP ExID registry managed by IANA (see <xref target="sec-iana-cons" format="default" sectionFormat="of" derivedContent="Section 26"/>). Assigned
   ExIDs can be used in either the EXP or UEXP Options (see <xref target="sec-uexp" format="default" sectionFormat="of" derivedContent="Section 12.3"/> 
   for the latter).</t>
      </section>
    </section>
    <section anchor="sec-unsafe-opt" numbered="true" removeInRFC="false" toc="include" pn="section-12">
      <name slugifiedName="name-unsafe-options">UNSAFE Options</name>
      <t indent="0" pn="section-12-1">UNSAFE Options are not safe to ignore and can be used
   unidirectionally or without soft-state confirmation of UDP Option
   capability. They are always used only when the user data occurs
   inside a reassembled set of one or more UDP fragments, such that if
   UDP fragmentation is not supported, the enclosed UDP user data would
   be silently dropped anyway.</t>
      <t indent="0" pn="section-12-2">&gt;&gt; Applications using UNSAFE Options <bcp14>SHOULD NOT</bcp14> also use zero-length
   UDP packets as signals, because they will arrive when UNSAFE Options
   fail. Those that choose to allow such packets <bcp14>MUST</bcp14> account for such
   events.</t>
      <t indent="0" pn="section-12-3">&gt;&gt; UNSAFE Options <bcp14>MUST</bcp14> be used only as part of UDP fragments, used
      either per-fragment or after reassembly.</t>
      <t indent="0" pn="section-12-4">&gt;&gt; Receivers supporting UDP Options <bcp14>MUST</bcp14> silently drop the UDP user
   data of the reassembled datagram if any fragment or the entire
   datagram includes an UNSAFE Option whose Kind is not supported or
   if an UNSAFE Option appears outside the context of a fragment or
   reassembled fragments.</t>
      <section anchor="unsafe-compression-ucmp" numbered="true" removeInRFC="false" toc="include" pn="section-12.1">
        <name slugifiedName="name-unsafe-compression-ucmp">UNSAFE Compression (UCMP)</name>
        <t indent="0" pn="section-12.1-1">The UNSAFE Compression (UCMP, Kind=192) Option is reserved for all
   UDP compression mechanisms. UCMP is expected to cover the UDP user
   data and some (e.g., later, in sequence) UDP Options.</t>
      </section>
      <section anchor="unsafe-encryption-uenc" numbered="true" removeInRFC="false" toc="include" pn="section-12.2">
        <name slugifiedName="name-unsafe-encryption-uenc">UNSAFE Encryption (UENC)</name>
        <t indent="0" pn="section-12.2-1">The UNSAFE Encryption (UENC, Kind=193) Option is reserved for all
   UDP encryption mechanisms. UENC is expected to provide all of the
   services of the AUTH Option (<xref target="sec-auth" format="default" sectionFormat="of" derivedContent="Section 11.9"/>) and in addition to
   encrypt the UDP user data and some (e.g., later or in sequence) UDP
   Options, in a similar manner as TCP Authentication Option Extension for Payload Encryption (TCP-AO-ENC) <xref target="I-D.touch-tcp-ao-encrypt" format="default" sectionFormat="of" derivedContent="To18"/>.</t>
      </section>
      <section anchor="sec-uexp" numbered="true" removeInRFC="false" toc="include" pn="section-12.3">
        <name slugifiedName="name-unsafe-experimental-uexp">UNSAFE Experimental (UEXP)</name>
        <t indent="0" pn="section-12.3-1">The UNSAFE Experimental (UEXP, Kind=254) Option is reserved for
   experiments <xref target="RFC3692" format="default" sectionFormat="of" derivedContent="RFC3692"/>. As with EXP, only one such UEXP value is
   reserved because experiments are expected to use an Experimental ID
   (ExIDs) to differentiate concurrent use for different purposes,
   using UDP ExIDs registered with IANA according to the approach
   developed for TCP experimental options <xref target="RFC6994" format="default" sectionFormat="of" derivedContent="RFC6994"/>.</t>
        <t indent="0" pn="section-12.3-2">Assigned ExIDs can be used with either the UEXP or EXP Options.</t>
      </section>
    </section>
    <section anchor="sec-rules" numbered="true" removeInRFC="false" toc="include" pn="section-13">
      <name slugifiedName="name-rules-for-designing-new-opt">Rules for Designing New Options</name>
      <t indent="0" pn="section-13-1">The UDP Option Kind space allows for the definition of new options;
   however, the currently defined options (including AUTH, UENC, and
   UCMP) do not allow for arbitrary new options. The following is a
   summary of rules for new options and their rationales:</t>
      <t indent="0" pn="section-13-2">&gt;&gt; New options <bcp14>MUST NOT</bcp14> be defined as "must-implement", i.e., they
   are not eligible for the asterisk ("*") designation used in <xref target="sec-udp-opt" format="default" sectionFormat="of" derivedContent="Section 10"/>.</t>
      <t indent="0" pn="section-13-3">This document defines the minimum set of "must-implement" UDP
   Options. All new options are included at the discretion of a given
   implementation.</t>
      <t indent="0" pn="section-13-4">&gt;&gt; New options <bcp14>MUST NOT</bcp14> modify the content of options that precede
   them (in order of appearance and thus processing).</t>
      <t indent="0" pn="section-13-5">&gt;&gt; The fields of new options <bcp14>MUST NOT</bcp14> depend on the content of other
   options.</t>
      <t indent="0" pn="section-13-6">UNSAFE Options can both depend on and vary user data content because
   they are contained only inside UDP fragments and thus are processed
   only by receivers capable of handling UDP Options.</t>
      <t indent="0" pn="section-13-7">&gt;&gt; New options <bcp14>MUST NOT</bcp14> declare their order relative to other
      options, whether new or old, even as a preference.</t>
      <t indent="0" pn="section-13-8">&gt;&gt; At the sender, new options <bcp14>MUST NOT</bcp14> modify UDP packet content
   anywhere outside their option field, excepting only UNSAFE Options; areas that need to remain
   unmodified include the IP header, IP options, UDP user data, and
   surplus area (i.e., other options).</t>
      <t indent="0" pn="section-13-9">&gt;&gt; Options <bcp14>MUST NOT</bcp14> be modified in transit. This includes those
   already defined as well as new options.</t>
      <t indent="0" pn="section-13-10">&gt;&gt; New options <bcp14>MUST NOT</bcp14> require or allow that any UDP Options
   (including themselves) or the remaining surplus area be modified in
      transit.</t>
      <t indent="0" pn="section-13-11">&gt;&gt; All options <bcp14>MUST</bcp14> indicate whether they can be used per-fragment
   and, if so, <bcp14>MUST</bcp14> also indicate how their success or failure is
   reported to the user. It is <bcp14>RECOMMENDED</bcp14> that new options be designed to support per-fragment use; it is also <bcp14>RECOMMENDED</bcp14> that options used per-fragment
   be reported to the user as a finite aggregate (e.g., a sum,
      a flag, etc.) rather than individually.</t>
      <t indent="0" pn="section-13-12">With one exception, UNSAFE Options are used when UDP user data needs to be modified:</t>
      <t indent="0" pn="section-13-13">&gt;&gt; The FRAG Option modifies UDP user data, splitting it across
 multiple IP packets. UNSAFE Options <bcp14>MAY</bcp14> modify the UDP user data,
 e.g., by encryption, compression, or other transformations. All
 other (SAFE) options <bcp14>MUST NOT</bcp14> modify the UDP user data.</t>
    </section>
    <section anchor="sec-opt-inclusion" numbered="true" removeInRFC="false" toc="include" pn="section-14">
      <name slugifiedName="name-option-inclusion-and-proces">Option Inclusion and Processing</name>
      <t indent="0" pn="section-14-1">The following rules apply to option inclusion by senders and
   processing by receivers.</t>
      <t indent="0" pn="section-14-2">&gt;&gt; Senders <bcp14>MAY</bcp14> add any option, as configured by the API.</t>
      <t indent="0" pn="section-14-3">&gt;&gt; All "must-support" options <bcp14>MUST</bcp14> be processed by receivers, if
      present (presuming UDP Options are supported at that receiver).</t>
      <t indent="0" pn="section-14-4">&gt;&gt; Options that are not "must-support" options <bcp14>MAY</bcp14>, if present, be ignored by receivers,
   based, e.g., on API settings.</t>
      <t indent="0" pn="section-14-5">&gt;&gt; All options <bcp14>MUST</bcp14> be processed by receivers in the order
   encountered in the options area.</t>
      <t indent="0" pn="section-14-6">&gt;&gt; Unless configuration settings direct otherwise, all options
   except UNSAFE Options <bcp14>MUST</bcp14> result in the UDP user data being passed
   to the upper layer protocol or application, regardless of whether
   all options are processed, are supported, or succeed.</t>
      <t indent="0" pn="section-14-7">The basic premise is that, for options-aware endpoints, the sender
   decides what options to add and the receiver decides what options to
   handle. Simply adding an option does not force work upon a receiver,
   with the exception of the "must-support" options.</t>
      <t indent="0" pn="section-14-8">Upon receipt, the receiver checks various properties of the UDP
   packet and its options to decide whether to accept or drop the UDP
   packet and whether to accept or ignore some of its options as
   follows (in order):</t>
      <sourcecode type="pseudocode" markers="false" pn="section-14-9">
        if the UDP checksum fails then
            silently drop the entire UDP packet (per RFC 1122)
        if the UDP checksum passes or is zero then
            if (OCS != 0 and OCS fails) or
               (OCS == 0 and UDP CS != 0) then
                deliver the UDP user data but ignore other options
                (this is required to emulate legacy behavior)
            if (OCS != 0 and OCS passes) or
               (OCS == 0 and UDP CS == 0) then
                deliver the UDP user data after parsing
                and processing the rest of the options,
                regardless of whether each is supported or succeeds
                (again, this is required to emulate legacy behavior)
</sourcecode>
      <t indent="0" pn="section-14-10">The design of the UNSAFE Options ensures that the resulting UDP data
   will be silently dropped in both legacy receivers and options-aware receivers
   that do not recognize those options. Again, note that this still
   results in the delivery of a zero-length UDP packet.</t>
      <t indent="0" pn="section-14-11">Options-aware receivers can drop UDP packets with option processing
   errors via either an override of the default UDP processing or at
   the application layer.</t>
      <t indent="0" pn="section-14-12">Put another way, all options are treated the same, in that the transmitter can
   add each option as desired and the receiver has the choice to require a given option or
   not. Only if a particular option is indicated as mandatory by a receiver (e.g., by API configuration) would the
   receiver need to confirm it being present and correct.</t>
      <t indent="0" pn="section-14-13">In summary, for all options:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-14-14">
        <li pn="section-14-14.1">
          <t indent="0" pn="section-14-14.1.1">if the option is not required by the receiver, then UDP packets
 missing the option are accepted.</t>
        </li>
        <li pn="section-14-14.2">
          <t indent="0" pn="section-14-14.2.1">if the option is required (e.g., by override of the default
 behavior at the receiver) and missing or incorrectly formed,
 silently drop the UDP packet.</t>
        </li>
        <li pn="section-14-14.3">
          <t indent="0" pn="section-14-14.3.1">if the UDP packet is accepted (either because the option is not
 required or because it was required and correct), then pass the
 option with the UDP packet via the API. Note that FRAG, NOP, and
 EOL are not passed to the user (see <xref target="sec-udp-api" format="default" sectionFormat="of" derivedContent="Section 15"/>).</t>
        </li>
      </ul>
      <t indent="0" pn="section-14-15">&gt;&gt; Any options whose length exceeds that of the UDP packet (i.e.,
   intending to use data that would have been beyond the surplus area)
   <bcp14>SHOULD</bcp14> be silently ignored (again to model legacy behavior).</t>
    </section>
    <section anchor="sec-udp-api" numbered="true" removeInRFC="false" toc="include" pn="section-15">
      <name slugifiedName="name-udp-api-extensions">UDP API Extensions</name>
      <t indent="0" pn="section-15-1">UDP currently specifies an Application Programming Interface (API),
   summarized as follows (with Unix-style command as an example)
   <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-15-2">
        <li pn="section-15-2.1">
          <t indent="0" pn="section-15-2.1.1">Method to create new receive ports  </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-15-2.1.2">
            <li pn="section-15-2.1.2.1">
              <t indent="0" pn="section-15-2.1.2.1.1">e.g., bind(handle, recvaddr(optional), recvport)</t>
            </li>
          </ul>
        </li>
        <li pn="section-15-2.2">
          <t indent="0" pn="section-15-2.2.1">Receive, which returns data octets, source port, and source
address  </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-15-2.2.2">
            <li pn="section-15-2.2.2.1">
              <t indent="0" pn="section-15-2.2.2.1.1">e.g., recvfrom(handle, srcaddr, srcport, data)</t>
            </li>
          </ul>
        </li>
        <li pn="section-15-2.3">
          <t indent="0" pn="section-15-2.3.1">Send, which specifies data, source and destination addresses, and
source and destination ports  </t>
          <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-15-2.3.2">
            <li pn="section-15-2.3.2.1">
              <t indent="0" pn="section-15-2.3.2.1.1">e.g., sendto(handle, destaddr, destport, data)</t>
            </li>
          </ul>
        </li>
      </ul>
      <t indent="0" pn="section-15-3">This API is extended to support options as follows:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-15-4">
        <li pn="section-15-4.1">
          <t indent="0" pn="section-15-4.1.1">Extend the method to create receive ports to include per-packet
 and per-fragment receive options that are required or omitted as
 indicated by the application.  </t>
          <t indent="0" pn="section-15-4.1.2">
&gt;&gt; Datagrams not containing these required options <bcp14>MUST</bcp14> be
 silently dropped and <bcp14>SHOULD</bcp14> be logged.</t>
        </li>
        <li pn="section-15-4.2">
          <t indent="0" pn="section-15-4.2.1">Extend the method to create receive ports to have a means to
 indicate that all packets containing UDP Options that are
 received on a particular socket pair are to be discarded.  </t>
          <t indent="0" pn="section-15-4.2.2">
&gt;&gt; The default value for the setting to drop all packets
 containing UDP Options <bcp14>MUST</bcp14> be to process packets containing UDP
 Options normally (i.e., not to discard them).</t>
        </li>
        <li pn="section-15-4.3">
          <t indent="0" pn="section-15-4.3.1">Extend the receive function to indicate the per-packet options
 and their parameters as received with the corresponding received
 datagram. Note that per-fragment options are handled within the
 processing of each fragment.  </t>
          <t indent="0" pn="section-15-4.3.2">
&gt;&gt; Options and their processing status (success/fail) <bcp14>MUST</bcp14> be
 available to the user (i.e., application layer or upper layer
 protocol/service), both for the packet and for the fragment set,
 except for FRAG, NOP, and EOL; those three options are handled
 within UDP Option processing only. As a reminder (from <xref target="sec-opt-inclusion" format="default" sectionFormat="of" derivedContent="Section 14"/>), all options except UNSAFE Options <bcp14>MUST</bcp14> result in the UDP
 user data being passed to the application layer (unless
 overridden in the API), regardless of whether all options are
 processed, supported, or succeed.</t>
        </li>
        <li pn="section-15-4.4">
          <t indent="0" pn="section-15-4.4.1">For fragments, success for an option is reported only when all
 fragments succeed for that option.  </t>
          <t indent="0" pn="section-15-4.4.2">
&gt;&gt; Per-fragment option status reporting <bcp14>SHOULD</bcp14> default as needed
 (e.g., not computed and/or not passed up to the upper layers) to
 minimize overhead unless actively requested (e.g., by the
	  user/application layer).  </t>
          <t indent="0" pn="section-15-4.4.3">
&gt;&gt; SAFE Options associated with fragments are accumulated when
 associated with the reassembled packet; values <bcp14>MAY</bcp14> be coalesced,
 e.g., to indicate that only an AUTH failure of a fragment
 occurred, rather than not indicating the AUTH status of each
 fragment.</t>
        </li>
        <li pn="section-15-4.5">
          <t indent="0" pn="section-15-4.5.1">Extend the send function to indicate the options to be added to
 the corresponding sent datagram. This includes indicating which
 options apply to individual fragments vs. which apply to the UDP
 packet prior to fragmentation, if fragmentation is enabled. This
 includes a minimum datagram length, such that the options list
 ends in EOL and additional space is zero-filled as needed. It
 also includes a maximum fragment size, e.g., as discovered by
 DPLPMTUD, whether implemented at the application layer per
 <xref target="RFC8899" format="default" sectionFormat="of" derivedContent="RFC8899"/> or in conjunction with other UDP Options <xref target="RFC9869" format="default" sectionFormat="of" derivedContent="RFC9869"/>.</t>
        </li>
      </ul>
      <t indent="0" pn="section-15-5">Examples of API instances for Linux and FreeBSD are provided in
   <xref target="implementation-information" format="default" sectionFormat="of" derivedContent="Appendix A"/> to encourage uniform cross-platform implementations.</t>
      <t indent="0" pn="section-15-6">APIs are not intended to provide user control over option order,
   especially on a per-packet basis, as this could create a covert
   channel (see <xref target="sec-sec-cons" format="default" sectionFormat="of" derivedContent="Section 25"/>). Similarly, APIs are not intended to
   provide user/application control over UDP fragment boundaries on a
   per-packet basis; they are, however, expected to allow control over
   which options, including fragmentation, are enabled (or disabled) on
   a per-packet basis. Such control over fragmentation is critical to
   DPLPMTUD.</t>
    </section>
    <section anchor="udp-options-are-for-transport-not-transit" numbered="true" removeInRFC="false" toc="include" pn="section-16">
      <name slugifiedName="name-udp-options-are-for-transpo">UDP Options Are for Transport, Not Transit</name>
      <t indent="0" pn="section-16-1">UDP Options are indicated in the surplus area of the IP payload that
   is not used by UDP. That area is really part of the IP payload, not
   the UDP payload, and as such, it might be tempting to consider
   whether this is a generally useful approach to extending IP.</t>
      <t indent="0" pn="section-16-2">Unfortunately, the surplus area exists only for transports that
   include their own transport layer payload length indicator. TCP and
   SCTP include header length fields that already provide space for
   transport options by indicating the total length of the header area,
   such that the entire remaining area indicated in the network layer
   (IP) is the transport payload. UDP-Lite already uses the UDP Length
   field to indicate the boundary between data covered by the transport
   checksum and data not covered, and so there is no remaining area
   where the length of the UDP-Lite payload as a whole can be indicated
   <xref target="RFC3828" format="default" sectionFormat="of" derivedContent="RFC3828"/>.</t>
      <t indent="0" pn="section-16-3">UDP Options are transport options. They are no more (or less)
   appropriate to be modified in-transit than any other portion of the
      transport datagram.</t>
      <t indent="0" pn="section-16-4">&gt;&gt; Generally, transport headers, options, and data are not intended
   to be modified in-transit. UDP Options are no exception and are
   specified here as "<bcp14>MUST NOT</bcp14> be altered in transit".</t>
      <t indent="0" pn="section-16-5">However, note that the UDP Option mechanism provides no specific
   protection against in-transit modification of the UDP header, UDP
   payload, or surplus area, except as provided by the OCS or the
   options selected (e.g., AUTH or UENC).</t>
      <t indent="0" pn="section-16-6">Unless protected by encryption (e.g., UENC or via other layers,
   like IPsec), UDP Options remain visible to devices on the network
   path. The decision to not require mandatory encryption for UDP
   Options to prevent such visibility was made because the key
   distribution and management infrastructure necessary to support such
   encryption does not exist in many of the deployment scenarios of
   interest, notably those that use UDP directly as a stateless and
   connectionless transport protocol (e.g., see <xref target="I-D.heard-dnsop-udp-opt-large-dns-responses" format="default" sectionFormat="of" derivedContent="He24"/>).</t>
    </section>
    <section anchor="sec-options-vs-lite" numbered="true" removeInRFC="false" toc="include" pn="section-17">
      <name slugifiedName="name-udp-options-vs-udp-lite">UDP Options vs. UDP-Lite</name>
      <t indent="0" pn="section-17-1">UDP-Lite provides partial checksum coverage so that UDP packets
   with errors in some locations can be delivered to the user
   <xref target="RFC3828" format="default" sectionFormat="of" derivedContent="RFC3828"/>. It uses a different transport protocol number (136) than
   UDP (17) to interpret the UDP Length field as the prefix covered by
   the UDP checksum.</t>
      <t indent="0" pn="section-17-2">UDP (protocol 17) already defines the UDP Length field as the limit
   of the UDP checksum but by default also limits the data provided to
   the application as that which precedes the UDP Length. A goal of
   UDP-Lite is to deliver data beyond UDP Length as a default, which is
   why a separate transport protocol number was required.</t>
      <t indent="0" pn="section-17-3">UDP Options do not use or need a separate transport protocol number
   because the data beyond the UDP Length offset (surplus data) is not
   provided to the application by default. That data is interpreted
   exclusively within the UDP transport layer.</t>
      <t indent="0" pn="section-17-4">UDP-Lite cannot support UDP Options, either as proposed here or in
   any other form, because the entire payload of the UDP packet is
   already defined as user data and there is no additional field in
   which to indicate a surplus area for options. The UDP Length field
   in UDP-Lite is already used to indicate the boundary between user
   data covered by the checksum and user data not covered.</t>
    </section>
    <section anchor="sec-legacy-int" numbered="true" removeInRFC="false" toc="include" pn="section-18">
      <name slugifiedName="name-interactions-with-legacy-de">Interactions with Legacy Devices</name>
      <t indent="0" pn="section-18-1">It has always been permissible for the UDP Length to be inconsistent
   with the IP transport payload length <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>. Such inconsistency
   has been utilized in UDP-Lite using a different transport number <xref target="RFC3828" format="default" sectionFormat="of" derivedContent="RFC3828"/>. 
   There are no known systems that use this inconsistency for UDP. 
   It is possible that such use might interact with UDP
   Options, i.e., where legacy systems might generate UDP datagrams
   that appear to have UDP Options. The OCS provides protection against
   such events and is stronger than a static "magic number".</t>
      <t indent="0" pn="section-18-2">UDP Options have been tested as interoperable with Linux, macOS, and
   Windows Cygwin and worked through NAT devices. These systems
   successfully delivered only the user data indicated by the UDP
   Length field and silently discarded the surplus area.</t>
      <t indent="0" pn="section-18-3">One reported embedded device passes the entire IP datagram to the
   UDP application layer. Although this feature could enable
   application-layer UDP Option processing, it would require that
   conventional UDP user applications examine only the UDP user data.
   This feature is also inconsistent with the UDP application interface
      <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/> <xref target="RFC1122" format="default" sectionFormat="of" derivedContent="RFC1122"/>.</t>
      <t indent="0" pn="section-18-4">It has been noted that Alcatel-Lucent's "Brick" Intrusion
   Detection System has a default configuration that interprets
   inconsistencies between UDP Length and IP Length as an attack to be
   reported. Note that other firewall systems, e.g., Check Point, use a
   default "relaxed UDP Length verification" to avoid falsely
      interpreting this inconsistency as an attack.</t>
      <t indent="0" pn="section-18-5">There are known uses of UDP exchanges of zero-length UDP user data
   packets, notably in the TIME protocol <xref target="RFC0868" format="default" sectionFormat="of" derivedContent="RFC0868"/>. The need to support
   such packets is also noted in the UDP usage guidelines <xref target="RFC8085" format="default" sectionFormat="of" derivedContent="RFC8085"/>.
   Some of the mechanisms in this document can generate more zero-length 
   UDP packets for a UDP Option aware endpoint than for a legacy
   endpoint (e.g., based on some error conditions), and some
   can generate fewer (e.g., fragment reassembly). Because such packets
   inherently carry no unique transport header or transport content,
   endpoints are already expected to be tolerant of their (inadvertent)
   replication or loss by the network, so such variations are not
   expected to be problematic.</t>
    </section>
    <section anchor="options-in-a-stateless-unreliable-transport-protocol" numbered="true" removeInRFC="false" toc="include" pn="section-19">
      <name slugifiedName="name-options-in-a-stateless-unre">Options in a Stateless, Unreliable Transport Protocol</name>
      <t indent="0" pn="section-19-1">There are two ways to interpret options for a stateless, unreliable
   protocol -- an option is either local to the message or intended to
   affect a stream of messages in a soft-state manner. Either
   interpretation is valid for defined UDP Options.</t>
      <t indent="0" pn="section-19-2">It is impossible to know in advance whether an endpoint supports a
   UDP Option.</t>
      <t indent="0" pn="section-19-3">&gt;&gt; All UDP Options other than UNSAFE ones <bcp14>MUST</bcp14> be ignored if not
   supported or upon failure (e.g., APC).</t>
      <t indent="0" pn="section-19-4">&gt;&gt; All UDP Options that fail <bcp14>MUST</bcp14> result in the UDP data still being
   sent to the application layer by default to ensure equivalence with
   legacy devices.</t>
      <t indent="0" pn="section-19-5">UDP Options that rely on soft-state exchange need to allow message
   reordering and loss, in the same way as UDP applications <xref target="RFC8085" format="default" sectionFormat="of" derivedContent="RFC8085"/>.</t>
      <t indent="0" pn="section-19-6">The above requirements prevent using any option that cannot be
   safely ignored unless it is hidden inside the FRAG area (i.e.,
   UNSAFE Options). Legacy systems also always need to be able to
   interpret the transport fragments as individual UDP packets.</t>
    </section>
    <section anchor="udp-option-state-caching" numbered="true" removeInRFC="false" toc="include" pn="section-20">
      <name slugifiedName="name-udp-option-state-caching">UDP Option State Caching</name>
      <t indent="0" pn="section-20-1">Some TCP connection parameters, stored in the TCP Control Block (TCB), can
   be usefully shared either among concurrent connections or between
   connections in sequence, known as TCB sharing <xref target="RFC9040" format="default" sectionFormat="of" derivedContent="RFC9040"/>. Although
   UDP is stateless, some of the options proposed herein could have
   similar benefits in being shared or cached. We call this UCB sharing,
   or UDP Control Block sharing, by analogy. Just as TCB sharing is not
   a standard because it is consistent with existing TCP
   specifications, UCB sharing would be consistent with existing UDP
   specifications, including this one. Both are implementation issues
   that are outside the scope of their respective specifications, and
   so UCB sharing is outside the scope of this document.</t>
    </section>
    <section anchor="sec-updates-768" numbered="true" removeInRFC="false" toc="include" pn="section-21">
      <name slugifiedName="name-updates-to-rfc-768">Updates to RFC 768</name>
      <t indent="0" pn="section-21-1">This document updates <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/> as follows:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-21-2">
        <li pn="section-21-2.1">
          <t indent="0" pn="section-21-2.1.1">This document defines the meaning of the IP payload area beyond
 the UDP Length but within the IP Length as the surplus area used
 herein for UDP Options.</t>
        </li>
        <li pn="section-21-2.2">
          <t indent="0" pn="section-21-2.2.1">This document extends the UDP API to support the use of UDP
 Options.</t>
        </li>
      </ul>
    </section>
    <section anchor="interactions-with-other-rfcs-and-drafts" numbered="true" removeInRFC="false" toc="include" pn="section-22">
      <name slugifiedName="name-interactions-with-other-rfc">Interactions with Other RFCs</name>
      <t indent="0" pn="section-22-1">This document clarifies the interaction between UDP Length and IP
   Length that is not explicitly constrained in either UDP or the host
      requirements <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/> <xref target="RFC1122" format="default" sectionFormat="of" derivedContent="RFC1122"/>.</t>
      <t indent="0" pn="section-22-2">Teredo extensions define use of a similar difference between
   these lengths for trailers <xref target="RFC4380" format="default" sectionFormat="of" derivedContent="RFC4380"/> <xref target="RFC6081" format="default" sectionFormat="of" derivedContent="RFC6081"/>. In <xref target="RFC6081" format="default" sectionFormat="of" derivedContent="RFC6081"/>, Teredo extensions define the length
   of an IPv6 payload inside UDP as pointing to less than the end of
   the UDP payload, enabling trailing options for that IPv6 packet:</t>
      <blockquote pn="section-22-3">
        <t indent="0" pn="section-22-3.1">...the IPv6 packet length (i.e., the Payload Length value in
the IPv6 header plus the IPv6 header size) is less than or
equal to the UDP payload length (i.e., the Length value in
the UDP header minus the UDP header size)</t>
      </blockquote>
      <t indent="0" pn="section-22-4">UDP Options are not affected by the difference between the UDP user
   payload end and the payload IPv6 end; both would end at the UDP user
   payload, which could end before the enclosing IPv4 or IPv6 header
   indicates -- allowing UDP Options in addition to the trailer options
   of the IPv6 payload. The result, if UDP Options were used, is shown
   in <xref target="fig-19" format="default" sectionFormat="of" derivedContent="Figure 19"/>.</t>
      <figure anchor="fig-19" align="left" suppress-title="false" pn="figure-19">
        <name slugifiedName="name-te-trailers-and-udp-options">TE Trailers and UDP Options Used Concurrently</name>
        <artwork align="left" pn="section-22-5.1">
                         Outer IP Length
    &lt;----------------------------------------------------------&gt;
   +--------+---------+------------------------------+----------+
   | IP Hdr | UDP Hdr | IPv6 packet/len | TE trailer | surplus  |
   +--------+---------+------------------------------+----------+
                       &lt;---------------&gt;
                       Inner IPv6 Length
             &lt;--------------------------------------&gt;
                           UDP Length
</artwork>
      </figure>
      <t indent="0" pn="section-22-6">UDP Options cannot be supported when a UDP packet has no independent
   UDP Length. One such case is when UDP Length==0 in IPv6, intended
   for (but not limited to) IPv6 Jumbograms <xref target="RFC2675" format="default" sectionFormat="of" derivedContent="RFC2675"/>. Note that
   although this technique is "Standard", the specification did not
   "update" UDP <xref target="RFC0768" format="default" sectionFormat="of" derivedContent="RFC0768"/>. Another such case arises when UDP is proxied
   via HTTP <xref target="RFC9298" format="default" sectionFormat="of" derivedContent="RFC9298"/>, as the UDP header is omitted and only the UDP
   user data is transported.</t>
      <t indent="0" pn="section-22-7">This document is consistent with the UDP profile for RObust Header
   Compression (ROHC) <xref target="RFC3095" format="default" sectionFormat="of" derivedContent="RFC3095"/>, noted here:</t>
      <blockquote pn="section-22-8">
        <t indent="0" pn="section-22-8.1">The Length field of the UDP header <bcp14>MUST</bcp14> match the Length
field(s) of the preceding subheaders, i.e., there must not
be any padding after the UDP payload that is covered by the
IP Length.</t>
      </blockquote>
      <t indent="0" pn="section-22-9">ROHC compresses UDP headers only when this match succeeds. It does
   not prohibit UDP headers where the match fails; in those cases, ROHC
   default rules (<xref section="5.10" sectionFormat="of" target="RFC3095" format="default" derivedLink="https://rfc-editor.org/rfc/rfc3095#section-5.10" derivedContent="RFC3095"/>) would cause the UDP header to remain
   uncompressed. Upon receipt of a compressed UDP header, <xref section="A.1.3" sectionFormat="of" target="RFC3095" format="default" derivedLink="https://rfc-editor.org/rfc/rfc3095#appendix-A.1.3" derivedContent="RFC3095"/>
   indicates that the UDP Length is "INFERRED"; in
   uncompressed packets, it would simply be explicitly provided.</t>
      <t indent="0" pn="section-22-10">This issue of handling UDP header compression is more explicitly
   described in more recent specifications, e.g., <xref section="10.10" sectionFormat="of" target="RFC8724" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8724#section-10.10" derivedContent="RFC8724"/>.</t>
    </section>
    <section anchor="multicast-and-broadcast-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-23">
      <name slugifiedName="name-multicast-and-broadcast-con">Multicast and Broadcast Considerations</name>
      <t indent="0" pn="section-23-1">UDP Options are primarily intended for unicast use. Using these
   options over multicast or broadcast IP requires careful
   consideration, e.g., to ensure that the options used are safe for
   different endpoints to interpret differently (e.g., either to
   support or silently ignore) or to ensure that all receivers of a
   multicast or broadcast group confirm support for the options in use.</t>
    </section>
    <section anchor="network-management-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-24">
      <name slugifiedName="name-network-management-consider">Network Management Considerations</name>
      <t indent="0" pn="section-24-1">UDP Options use and configuration may be useful to track and manage
   remotely. IP Flow Information Export (IPFIX) <xref target="RFC7011" format="default" sectionFormat="of" derivedContent="RFC7011"/> Information
   Elements for UDP Options have been defined in <xref target="RFC9870" format="default" sectionFormat="of" derivedContent="RFC9870"/>. Similar to
   what has been done for TCP <xref target="RFC9648" format="default" sectionFormat="of" derivedContent="RFC9648"/>, a YANG model <xref target="RFC7950" format="default" sectionFormat="of" derivedContent="RFC7950"/> for use
   by network management protocols (e.g., NETCONF <xref target="RFC6241" format="default" sectionFormat="of" derivedContent="RFC6241"/> or RESTCONF
   <xref target="RFC8040" format="default" sectionFormat="of" derivedContent="RFC8040"/>) may be developed. Development of these models is outside
   the scope of this document.</t>
    </section>
    <section anchor="sec-sec-cons" numbered="true" removeInRFC="false" toc="include" pn="section-25">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-25-1">There are a number of security issues raised by the introduction of
   options to UDP. Some are specific to this variant, but others are
   associated with any packet processing mechanism; all are discussed
   further in this section.</t>
      <section anchor="general-considerations-regarding-the-use-of-options" numbered="true" removeInRFC="false" toc="include" pn="section-25.1">
        <name slugifiedName="name-general-considerations-rega">General Considerations Regarding the Use of Options</name>
        <t indent="0" pn="section-25.1-1">Note that any user application that considers UDP Options to
   adversely affect security need not enable them. However, their use
   does not impact security in a substantially different way than TCP
   options; both enable the use of a control channel that has the
   potential for abuse. Similar to TCP, there are many options that, if
   unprotected, could be used by an attacker to interfere with
   communication.</t>
        <t indent="0" pn="section-25.1-2">UDP Options are not covered by DTLS <xref target="RFC9147" format="default" sectionFormat="of" derivedContent="RFC9147"/>. Neither TLS <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/>
   (Transport Layer Security for TCP) nor DTLS (TLS for UDP) protect
   the transport layer; both operate as a shim layer solely on the user
   data of transport packets, protecting only their contents.</t>
        <t indent="0" pn="section-25.1-3">Just as TLS does not protect the TCP header or its options, DTLS
   does not protect the UDP header or the new options introduced by
   this document. Transport security is provided in TCP by the TCP
   Authentication Option (TCP-AO) <xref target="RFC5925" format="default" sectionFormat="of" derivedContent="RFC5925"/> and (when defined) in UDP
   by the Authentication (AUTH) Option (<xref target="sec-auth" format="default" sectionFormat="of" derivedContent="Section 11.9"/>) and (when
   defined) the UNSAFE Encryption (UENC) Option (<xref target="sec-unsafe-opt" format="default" sectionFormat="of" derivedContent="Section 12"/>). Transport
   headers are also protected as payload when using IP security (IPsec)
   <xref target="RFC4301" format="default" sectionFormat="of" derivedContent="RFC4301"/>.</t>
        <t indent="0" pn="section-25.1-4">Some UDP Options are never passed to the receiving application,
   notably FRAG, NOP, and EOL. They are not intended to convey
   information, either by their presence (FRAG, EOL) or number (NOP).
   It could also be useful to provide the options received in a
   reference order (e.g., sorted by option number) to avoid the order
   of options being used as a covert channel.</t>
        <t indent="0" pn="section-25.1-5">All logging is rate limited to avoid logging itself becoming a
   resource vulnerability.</t>
      </section>
      <section anchor="considerations-regarding-on-path-attacks" numbered="true" removeInRFC="false" toc="include" pn="section-25.2">
        <name slugifiedName="name-considerations-regarding-on">Considerations Regarding On-Path Attacks</name>
        <t indent="0" pn="section-25.2-1">UDP Options, like any options, have the potential to expose option
   information to on-path attackers, unless the options themselves are
   encrypted (as might be the case with some configurations of UENC,
   when defined). Application protocol designers are expected to ensure
   that information in UDP Options is not used with the assumption of
   privacy unless UENC provides that capability. Application protocol
   designers using secure payload contents (e.g., via DTLS) are
   expected to be aware that UDP Options add information that is not
   inside the UDP payload and thus not protected by the same mechanism
   and that alternate mechanisms (again, as might be the case with some
   configurations of UENC) could be additionally required to protect
   against information disclosure.</t>
        <t indent="0" pn="section-25.2-2">&gt;&gt; Implementations concerned with the potential use of UDP Options
   as a covert channel <bcp14>MAY</bcp14> consider limiting use of some or all
   options. Such implementations <bcp14>SHOULD</bcp14> return options in an order not
   related to their sequence in the received packet.</t>
        <t indent="0" pn="section-25.2-3">UDP Options create new potential opportunities for Distributed DoS
   (DDos) attacks, notably through the use of fragmentation. When
   enabled, UDP Options cause additional work at the receiver; however,
   of the "must-support" options, only REQ (e.g., when used with
   DPLPMTUD <xref target="RFC9869" format="default" sectionFormat="of" derivedContent="RFC9869"/>) will cause the upper layer to initiate a UDP
   response in the absence of user transmission.</t>
        <t indent="0" pn="section-25.2-4">&gt;&gt; Implementations concerned with the potential for DoS attacks
   involving large numbers of UDP Options, either implemented or
   unknown, or excessive sequences of valid repeating options (e.g.,
   NOPs) <bcp14>SHOULD</bcp14> detect excessive numbers of such occurrences and limit
   resources they use, e.g., through silent packet drops. Such
   responses <bcp14>SHOULD</bcp14> be logged. Specific thresholds for such limits will
   vary based on implementation and are thus not included here.</t>
      </section>
      <section anchor="considerations-regarding-option-processing" numbered="true" removeInRFC="false" toc="include" pn="section-25.3">
        <name slugifiedName="name-considerations-regarding-op">Considerations Regarding Option Processing</name>
        <t indent="0" pn="section-25.3-1">UDP Options use the TLV syntax similar to that of TCP. This syntax
   is known to require serial processing and could pose a DoS risk,
   e.g., if an attacker adds large numbers of unknown options that need
   to be parsed in their entirety, as is the case for IPv6 <xref target="RFC8504" format="default" sectionFormat="of" derivedContent="RFC8504"/>.</t>
        <t indent="0" pn="section-25.3-2">The use of UDP packets with inconsistent IP and UDP Length fields
   has the potential to trigger a buffer overflow error if not properly
   handled, e.g., if space is allocated based on the smaller field and
   copying is based on the larger field. However, there have been no reports
   of such vulnerability, and it would rely on inconsistent use of the
   two fields for memory allocation and copying.</t>
        <t indent="0" pn="section-25.3-3">Because required options come first and at most once each (with the
   exception of NOPs, which never need to come in sequences of more
   than seven in a row), their DoS impact is limited. Note that TLV
   formats for options do require serial processing, but any format
   that allows future options, whether ignored or not, could introduce
   a similar DoS vulnerability.</t>
        <t indent="0" pn="section-25.3-4">&gt;&gt; Implementations concerned with the potential for UDP Options
   introducing a vulnerability <bcp14>MAY</bcp14> implement only the required UDP
   Options and <bcp14>SHOULD</bcp14> also limit processing of TLVs, in number
   of non-padding options, total length, or both. The number of non-zero
   TLVs allowed in such cases <bcp14>MUST</bcp14> be at least as many as the
   number of concurrent options supported with an additional few to
   account for unexpected unknown options but <bcp14>SHOULD</bcp14> also consider
   being adaptive and based on the implementation to avoid locking in
   that limit globally.</t>
        <t indent="0" pn="section-25.3-5">For example, if a system supports 10 different option types that could
   concurrently be used, it is expected to allow up to around 13-14
   different options in the same packet. This document avoids
   specifying a fixed minimum but recognizes that a given system might
   not expect to receive more than a few unknown option types per
   packet.</t>
      </section>
      <section anchor="considerations-for-fragmentation" numbered="true" removeInRFC="false" toc="include" pn="section-25.4">
        <name slugifiedName="name-considerations-for-fragment">Considerations for Fragmentation</name>
        <t indent="0" pn="section-25.4-1">UDP fragmentation introduces its own set of security concerns, which
   can be handled in a manner similar to IP reassembly or TCP segment
   reordering <xref target="CERT18" format="default" sectionFormat="of" derivedContent="CERT18"/>. In particular, the number of UDP packets
   pending reassembly and effort used for reassembly is typically
   limited. In addition, it could be useful to assume a reasonable
   minimum fragment size, e.g., that non-terminal fragments are never
   smaller than 500 bytes.</t>
        <t indent="0" pn="section-25.4-2">&gt;&gt; Implementations concerned with the potential for UDP
   fragmentation introducing a vulnerability <bcp14>SHOULD</bcp14> implement limits on
   the number of pending fragments.</t>
      </section>
      <section anchor="considerations-for-providing-udp-security" numbered="true" removeInRFC="false" toc="include" pn="section-25.5">
        <name slugifiedName="name-considerations-for-providin">Considerations for Providing UDP Security</name>
        <t indent="0" pn="section-25.5-1">UDP security is not intended to rely solely on transport layer
   processing of options. UNSAFE Options are the only type that share
   fate with the UDP data because of the way that data is hidden in
   the surplus area until after those options are processed. All other
   options default to being silently ignored at the transport layer but
   could be dropped if that default is either overridden (e.g., by
   configuration) or discarded at the application layer (e.g., using
   information about the options processed that are passed along with
   the UDP packet).</t>
        <t indent="0" pn="section-25.5-2">Options providing UDP security, e.g., AUTH and UENC, require
   endpoint key and security parameter coordination, which UDP Options
   (being stateless) do not facilitate. These parameters include
   whether and when to override the defaults described herein,
   especially at the transmitter as to when emitted packets need to
   include AUTH and at the receiver as to whether (and when) packets
   with failed AUTH and/or without AUTH (or that fail the AUTH checks)
   are not to be forwarded to the user/application.</t>
      </section>
      <section anchor="considerations-regarding-middleboxes" numbered="true" removeInRFC="false" toc="include" pn="section-25.6">
        <name slugifiedName="name-considerations-regarding-mi">Considerations Regarding Middleboxes</name>
        <t indent="0" pn="section-25.6-1">Some middleboxes operate as UDP relays, forwarding data between a
   UDP socket and another transport socket by modifying the IP and/or
   UDP headers without properly acting as a protocol endpoint (i.e., an
   application layer proxy). In such cases, a sender might add UDP
   Options that could be stripped by the middlebox before the packet is
   forwarded to the second socket. A remote application will not
   receive the options (for SAFE Options, the payload data will be
   received; for UNSAFE Options, the payload data will not be received).
   In such cases, the application will function as it would if
   communicating with a remote endpoint that does not support UDP
   Options.</t>
        <t indent="0" pn="section-25.6-2">Additionally, <xref target="Zu20" format="default" sectionFormat="of" derivedContent="Zu20"/> reports that packets containing UDP Options do
   not traverse certain Internet paths; most likely, those options were
   stripped (e.g., by resetting the IP Length to correspond to the UDP
   Length, truncating the surplus area) or packets with options were
   dropped. UDP Options do not function over such paths.</t>
      </section>
    </section>
    <section anchor="sec-iana-cons" numbered="true" removeInRFC="false" toc="include" pn="section-26">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-26-1">IANA has created the "User Datagram Protocol (UDP)" registry group, which 
      consists of the "UDP Option Kind Numbers" registry and a pointer to the unified "TCP/UDP Experimental Option Experiment Identifiers (TCP/UDP ExIDs)" registry.  Note that the "TCP experimental IDs (ExIDs)" registry has been renamed as the "TCP/UDP Experimental Option Experiment Identifiers (TCP/UDP ExIDs)" registry, and is a unified registry for both TCP and UDP ExIDs.  IANA has added the following note to the unified TCP/UDP ExID registry:</t>
      <blockquote pn="section-26-2">
    16-bit ExIDs can be used with either TCP or UDP; 32-bit ExIDs can be 
    used with TCP or their first 16 bits can be used with UDP. Use with 
    each transport (TCP, UDP) is indicated in the protocol column, as 
    defined in RFC 9868. 
</blockquote>
      <t indent="0" pn="section-26-3">Initial values of the "UDP Option Kind Numbers" registry are as listed in
   <xref target="sec-udp-opt" format="default" sectionFormat="of" derivedContent="Section 10"/>, including those both assigned and reserved. Additional
   values in this registry are to be assigned from the Unassigned
   values in <xref target="sec-udp-opt" format="default" sectionFormat="of" derivedContent="Section 10"/> by IESG Approval or Standards Action <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>.
   Those assignments are subject to the conditions set forth in this
   document, particularly (but not limited to) those in <xref target="sec-rules" format="default" sectionFormat="of" derivedContent="Section 13"/>.</t>
      <t indent="0" pn="section-26-4">&gt;&gt; Although option nicknames are not used in-band, new UNSAFE
   Option names <bcp14>MUST</bcp14> commence with the capital letter "U" and new SAFE
   Options <bcp14>MUST NOT</bcp14> commence with either uppercase or lowercase "U".</t>
      <t indent="0" pn="section-26-5">IANA has added the following note to the "UDP Option Kind Numbers" indicating
   entries are mandatory to implement when UDP Options are supported.  
   No new options may be created that are mandatory to
   implement in all UDP Options implementations.</t>
      <blockquote pn="section-26-6">
        <t indent="0" pn="section-26-6.1">Codepoints 0-7 <bcp14>MUST</bcp14> be supported on any implementation
supporting UDP Options. All others are supported at the
discretion of each implementation.</t>
      </blockquote>
      <t indent="0" pn="section-26-7">UDP Experimental Option Experiment Identifiers (UDP ExIDs) are
   intended for use in a similar manner as TCP ExIDs <xref target="RFC6994" format="default" sectionFormat="of" derivedContent="RFC6994"/>. Both
   TCP and UDP ExIDs are managed as a single, unified registry because
   such options could be used for both transport protocols and because
   the option space is large enough that there is no clear need to
   maintain them separately. This new TCP/UDP ExIDs registry has entries
   for both transports, although each codepoint needs to be explicitly
   defined for each transport protocol in which it is used, i.e.,
   defining a codepoint in TCP does not imply it has a similar use in
   UDP. IANA has added a "Protocol" field to the registry and updated
   the current TCP ExIDs to be indicated as defined for TCP.  New assignments are to indicate the transport for which
   it is defined.</t>
      <t indent="0" pn="section-26-8">TCP/UDP ExIDs can be used in either (or both) the UDP EXP (<xref target="sec-exp" format="default" sectionFormat="of" derivedContent="Section 11.10"/>) or UEXP (<xref target="sec-uexp" format="default" sectionFormat="of" derivedContent="Section 12.3"/>) Options. TCP/UDP ExID entries for use
   in UDP consist of a 16-bit ExID (in network-standard order), and (as
   with the original TCP ExIDs) will preferentially also include a
   short description and acronym for use in documentation. TCP/UDP
   ExIDs used for UDP are always 16 bits because their use in EXP and
   UEXP Options is required and thus do not need a larger codepoint
   value to decrease the probability of accidental occurrence with non-ExID
   uses of the experimental options, as is the case with TCP ExIDs
   (e.g., when using 32-bit ExIDs). ExIDs defined solely for TCP
   options could be either 16 or 32 bits and all ExIDs (including now
   UDP) need to be unique in their first 16 bits, as originally
   described for TCP <xref target="RFC6994" format="default" sectionFormat="of" derivedContent="RFC6994"/>.</t>
      <t indent="0" pn="section-26-9">Values in the TCP/UDP ExID registry are to be assigned by IANA using
   the First Come First Served (FCFS) policy <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>, which applies to both the ExID value
   and the acronym. UDP Options using these ExIDs are subject
   to the same conditions as new UDP Options, i.e., they too are
   subject to the conditions set forth in this document, particularly
   (but not limited to) those in <xref target="sec-rules" format="default" sectionFormat="of" derivedContent="Section 13"/>.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.heard-dnsop-udp-opt-large-dns-responses" to="He24"/>
    <displayreference target="I-D.fairhurst-udp-options-cco" to="Fa18"/>
    <displayreference target="I-D.hildebrand-spud-prototype" to="Hi15"/>
    <displayreference target="I-D.touch-tcp-ao-encrypt" to="To18"/>
    <displayreference target="I-D.touch-tsvwg-udp-auth-opt" to="To24"/>
    <references anchor="sec-combined-references" pn="section-27">
      <name slugifiedName="name-references">References</name>
      <references anchor="sec-normative-references" pn="section-27.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC0768" target="https://www.rfc-editor.org/info/rfc768" quoteTitle="true" derivedAnchor="RFC0768">
          <front>
            <title>User Datagram Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="August" year="1980"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791" quoteTitle="true" derivedAnchor="RFC0791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="RFC1122" target="https://www.rfc-editor.org/info/rfc1122" quoteTitle="true" derivedAnchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t indent="0">This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9869" target="https://www.rfc-editor.org/info/rfc9869" quoteTitle="true" derivedAnchor="RFC9869">
          <front>
            <title>Datagram Packetization Layer Path MTU Discovery (DPLPMTUD) for UDP Options</title>
            <author initials="G." surname="Fairhurst" fullname="Gorry Fairhurst">
              <organization showOnFrontPage="true">University of Aberdeen</organization>
            </author>
            <author initials="T." surname="Jones" fullname="Tom Jones">
              <organization showOnFrontPage="true">University of Aberdeen</organization>
            </author>
            <date month="October" year="2025"/>
          </front>
          <seriesInfo name="RFC" value="9869"/>
          <seriesInfo name="DOI" value="10.17487/RFC9869"/>
        </reference>
      </references>
      <references anchor="sec-informative-references" pn="section-27.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="CERT18" target="https://www.kb.cert.org/vuls/id/962459" quoteTitle="true" derivedAnchor="CERT18">
          <front>
            <title>TCP implementations vulnerable to Denial of Service</title>
            <author>
              <organization showOnFrontPage="true">CERT Coordination Center</organization>
            </author>
            <date year="2018"/>
          </front>
          <refcontent>Vulnerability Note VU#962459</refcontent>
          <refcontent>Software Engineering Institute, CMU</refcontent>
        </reference>
        <reference anchor="I-D.fairhurst-udp-options-cco" target="https://datatracker.ietf.org/doc/html/draft-fairhurst-udp-options-cco-00" quoteTitle="true" derivedAnchor="Fa18">
          <front>
            <title>Checksum Compensation Options for UDP Options</title>
            <author fullname="Gorry Fairhurst" initials="G." surname="Fairhurst">
              <organization showOnFrontPage="true">University of Aberdeen</organization>
            </author>
            <author fullname="Tom Jones" initials="T." surname="Jones">
              <organization showOnFrontPage="true">University of Aberdeen</organization>
            </author>
            <author fullname="Raffaele Zullo" initials="R." surname="Zullo">
              <organization showOnFrontPage="true">University of Aberdeen</organization>
            </author>
            <date day="19" month="October" year="2018"/>
            <abstract>
              <t indent="0">This document describes a robust method for calculating checksums for use with UDP Options. The new method proposes an alternative checksum calculation for coverage of the option space. This is based on the IP checksum calculation, but uses an updated pseudoheader. The new method only checks the option portion of a UDP packet, but creates a checksum that compensates for the range of IP and UDP chekcsum validation methods that have been deployed, in this way the new method enhances the proability of NAPT traversal for packets that carry UDP-Options.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fairhurst-udp-options-cco-00"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.heard-dnsop-udp-opt-large-dns-responses" target="https://datatracker.ietf.org/doc/html/draft-heard-dnsop-udp-opt-large-dns-responses-00" quoteTitle="true" derivedAnchor="He24">
          <front>
            <title>Use of UDP Options for Transmission of Large DNS Responses</title>
            <author fullname="C. M. Heard" initials="C. M." surname="Heard">
              <organization showOnFrontPage="true">Unaffiliated</organization>
            </author>
            <date day="28" month="April" year="2024"/>
            <abstract>
              <t indent="0">This document describes an experimental method for using UDP Options to facilitate the transmission of large DNS responses without the use of IP fragmentation or fallback to TCP.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-heard-dnsop-udp-opt-large-dns-responses-00"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.hildebrand-spud-prototype" target="https://datatracker.ietf.org/doc/html/draft-hildebrand-spud-prototype-03" quoteTitle="true" derivedAnchor="Hi15">
          <front>
            <title>Substrate Protocol for User Datagrams (SPUD) Prototype</title>
            <author fullname="Joe Hildebrand" initials="J." surname="Hildebrand">
              <organization showOnFrontPage="true">Cisco Systems</organization>
            </author>
            <author fullname="Brian Trammell" initials="B." surname="Trammell">
              <organization showOnFrontPage="true">ETH Zurich</organization>
            </author>
            <date day="9" month="March" year="2015"/>
            <abstract>
              <t indent="0">SPUD is a prototype for grouping UDP packets together in a "tube", also allowing network devices on the path between endpoints to participate explicitly in the tube outside the end-to-end context.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hildebrand-spud-prototype-03"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="La78" quoteTitle="true" target="https://doi.org/10.1145/359545.359563" derivedAnchor="La78">
          <front>
            <title>Time, clocks, and the ordering of events in a distributed system</title>
            <author initials="L." surname="Lamport" fullname="Leslie Lamport">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1978" month="July"/>
          </front>
          <refcontent>Communications of the ACM, vol. 21, no. 7, pp. 558-565</refcontent>
          <seriesInfo name="DOI" value="10.1145/359545.359563"/>
        </reference>
        <reference anchor="RFC0793" target="https://www.rfc-editor.org/info/rfc793" quoteTitle="true" derivedAnchor="RFC0793">
          <front>
            <title>Transmission Control Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
        </reference>
        <reference anchor="RFC0868" target="https://www.rfc-editor.org/info/rfc868" quoteTitle="true" derivedAnchor="RFC0868">
          <front>
            <title>Time Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <author fullname="K. Harrenstien" initials="K." surname="Harrenstien"/>
            <date month="May" year="1983"/>
            <abstract>
              <t indent="0">This RFC specifies a standard for the ARPA Internet community. Hosts on the ARPA Internet that choose to implement a Time Protocol are expected to adopt and implement this standard. This protocol provides a site-independent, machine readable date and time. The Time service sends back to the originating source the time in seconds since midnight on January first 1900.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="26"/>
          <seriesInfo name="RFC" value="868"/>
          <seriesInfo name="DOI" value="10.17487/RFC0868"/>
        </reference>
        <reference anchor="RFC1071" target="https://www.rfc-editor.org/info/rfc1071" quoteTitle="true" derivedAnchor="RFC1071">
          <front>
            <title>Computing the Internet checksum</title>
            <author fullname="R.T. Braden" initials="R.T." surname="Braden"/>
            <author fullname="D.A. Borman" initials="D.A." surname="Borman"/>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <date month="September" year="1988"/>
            <abstract>
              <t indent="0">This RFC summarizes techniques and algorithms for efficiently computing the Internet checksum. It is not a standard, but a set of useful implementation techniques.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1071"/>
          <seriesInfo name="DOI" value="10.17487/RFC1071"/>
        </reference>
        <reference anchor="RFC1141" target="https://www.rfc-editor.org/info/rfc1141" quoteTitle="true" derivedAnchor="RFC1141">
          <front>
            <title>Incremental updating of the Internet checksum</title>
            <author fullname="T. Mallory" initials="T." surname="Mallory"/>
            <author fullname="A. Kullberg" initials="A." surname="Kullberg"/>
            <date month="January" year="1990"/>
            <abstract>
              <t indent="0">This memo correctly describes the incremental update procedure for use with the standard Internet checksum. It is intended to replace the description of Incremental Update in RFC 1071. This is not a standard but rather, an implementation technique.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1141"/>
          <seriesInfo name="DOI" value="10.17487/RFC1141"/>
        </reference>
        <reference anchor="RFC1191" target="https://www.rfc-editor.org/info/rfc1191" quoteTitle="true" derivedAnchor="RFC1191">
          <front>
            <title>Path MTU discovery</title>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="November" year="1990"/>
            <abstract>
              <t indent="0">This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path. It specifies a small change to the way routers generate one type of ICMP message. For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1191"/>
          <seriesInfo name="DOI" value="10.17487/RFC1191"/>
        </reference>
        <reference anchor="RFC2675" target="https://www.rfc-editor.org/info/rfc2675" quoteTitle="true" derivedAnchor="RFC2675">
          <front>
            <title>IPv6 Jumbograms</title>
            <author fullname="D. Borman" initials="D." surname="Borman"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="August" year="1999"/>
            <abstract>
              <t indent="0">This document describes the IPv6 Jumbo Payload option, which provides the means of specifying such large payload lengths. It also describes the changes needed to TCP and UDP to make use of jumbograms. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2675"/>
          <seriesInfo name="DOI" value="10.17487/RFC2675"/>
        </reference>
        <reference anchor="RFC2923" target="https://www.rfc-editor.org/info/rfc2923" quoteTitle="true" derivedAnchor="RFC2923">
          <front>
            <title>TCP Problems with Path MTU Discovery</title>
            <author fullname="K. Lahey" initials="K." surname="Lahey"/>
            <date month="September" year="2000"/>
            <abstract>
              <t indent="0">This memo catalogs several known Transmission Control Protocol (TCP) implementation problems dealing with Path Maximum Transmission Unit Discovery (PMTUD), including the long-standing black hole problem, stretch acknowlegements (ACKs) due to confusion between Maximum Segment Size (MSS) and segment size, and MSS advertisement based on PMTU. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2923"/>
          <seriesInfo name="DOI" value="10.17487/RFC2923"/>
        </reference>
        <reference anchor="RFC3095" target="https://www.rfc-editor.org/info/rfc3095" quoteTitle="true" derivedAnchor="RFC3095">
          <front>
            <title>RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="C. Burmeister" initials="C." surname="Burmeister"/>
            <author fullname="M. Degermark" initials="M." surname="Degermark"/>
            <author fullname="H. Fukushima" initials="H." surname="Fukushima"/>
            <author fullname="H. Hannu" initials="H." surname="Hannu"/>
            <author fullname="L-E. Jonsson" surname="L-E. Jonsson"/>
            <author fullname="R. Hakenberg" initials="R." surname="Hakenberg"/>
            <author fullname="T. Koren" initials="T." surname="Koren"/>
            <author fullname="K. Le" initials="K." surname="Le"/>
            <author fullname="Z. Liu" initials="Z." surname="Liu"/>
            <author fullname="A. Martensson" initials="A." surname="Martensson"/>
            <author fullname="A. Miyazaki" initials="A." surname="Miyazaki"/>
            <author fullname="K. Svanbro" initials="K." surname="Svanbro"/>
            <author fullname="T. Wiebke" initials="T." surname="Wiebke"/>
            <author fullname="T. Yoshimura" initials="T." surname="Yoshimura"/>
            <author fullname="H. Zheng" initials="H." surname="Zheng"/>
            <date month="July" year="2001"/>
            <abstract>
              <t indent="0">This document specifies a highly robust and efficient header compression scheme for RTP/UDP/IP (Real-Time Transport Protocol, User Datagram Protocol, Internet Protocol), UDP/IP, and ESP/IP (Encapsulating Security Payload) headers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3095"/>
          <seriesInfo name="DOI" value="10.17487/RFC3095"/>
        </reference>
        <reference anchor="RFC3173" target="https://www.rfc-editor.org/info/rfc3173" quoteTitle="true" derivedAnchor="RFC3173">
          <front>
            <title>IP Payload Compression Protocol (IPComp)</title>
            <author fullname="A. Shacham" initials="A." surname="Shacham"/>
            <author fullname="B. Monsour" initials="B." surname="Monsour"/>
            <author fullname="R. Pereira" initials="R." surname="Pereira"/>
            <author fullname="M. Thomas" initials="M." surname="Thomas"/>
            <date month="September" year="2001"/>
            <abstract>
              <t indent="0">This document describes a protocol intended to provide lossless compression for Internet Protocol datagrams in an Internet environment. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3173"/>
          <seriesInfo name="DOI" value="10.17487/RFC3173"/>
        </reference>
        <reference anchor="RFC3385" target="https://www.rfc-editor.org/info/rfc3385" quoteTitle="true" derivedAnchor="RFC3385">
          <front>
            <title>Internet Protocol Small Computer System Interface (iSCSI) Cyclic Redundancy Check (CRC)/Checksum Considerations</title>
            <author fullname="D. Sheinwald" initials="D." surname="Sheinwald"/>
            <author fullname="J. Satran" initials="J." surname="Satran"/>
            <author fullname="P. Thaler" initials="P." surname="Thaler"/>
            <author fullname="V. Cavanna" initials="V." surname="Cavanna"/>
            <date month="September" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3385"/>
          <seriesInfo name="DOI" value="10.17487/RFC3385"/>
        </reference>
        <reference anchor="RFC3692" target="https://www.rfc-editor.org/info/rfc3692" quoteTitle="true" derivedAnchor="RFC3692">
          <front>
            <title>Assigning Experimental and Testing Numbers Considered Useful</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="January" year="2004"/>
            <abstract>
              <t indent="0">When experimenting with or extending protocols, it is often necessary to use some sort of protocol number or constant in order to actually test or experiment with the new function, even when testing in a closed environment. For example, to test a new DHCP option, one needs an option number to identify the new function. This document recommends that when writing IANA Considerations sections, authors should consider assigning a small range of numbers for experimentation purposes that implementers can use when testing protocol extensions or other new features. This document reserves some ranges of numbers for experimentation purposes in specific protocols where the need to support experimentation has been identified.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="82"/>
          <seriesInfo name="RFC" value="3692"/>
          <seriesInfo name="DOI" value="10.17487/RFC3692"/>
        </reference>
        <reference anchor="RFC3828" target="https://www.rfc-editor.org/info/rfc3828" quoteTitle="true" derivedAnchor="RFC3828">
          <front>
            <title>The Lightweight User Datagram Protocol (UDP-Lite)</title>
            <author fullname="L-A. Larzon" surname="L-A. Larzon"/>
            <author fullname="M. Degermark" initials="M." surname="Degermark"/>
            <author fullname="S. Pink" initials="S." surname="Pink"/>
            <author fullname="L-E. Jonsson" role="editor" surname="L-E. Jonsson"/>
            <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
            <date month="July" year="2004"/>
            <abstract>
              <t indent="0">This document describes the Lightweight User Datagram Protocol (UDP-Lite), which is similar to the User Datagram Protocol (UDP) (RFC 768), but can also serve applications in error-prone network environments that prefer to have partially damaged payloads delivered rather than discarded. If this feature is not used, UDP-Lite is semantically identical to UDP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3828"/>
          <seriesInfo name="DOI" value="10.17487/RFC3828"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" quoteTitle="true" derivedAnchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t indent="0">This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4340" target="https://www.rfc-editor.org/info/rfc4340" quoteTitle="true" derivedAnchor="RFC4340">
          <front>
            <title>Datagram Congestion Control Protocol (DCCP)</title>
            <author fullname="E. Kohler" initials="E." surname="Kohler"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <date month="March" year="2006"/>
            <abstract>
              <t indent="0">The Datagram Congestion Control Protocol (DCCP) is a transport protocol that provides bidirectional unicast connections of congestion-controlled unreliable datagrams. DCCP is suitable for applications that transfer fairly large amounts of data and that can benefit from control over the tradeoff between timeliness and reliability. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4340"/>
          <seriesInfo name="DOI" value="10.17487/RFC4340"/>
        </reference>
        <reference anchor="RFC4380" target="https://www.rfc-editor.org/info/rfc4380" quoteTitle="true" derivedAnchor="RFC4380">
          <front>
            <title>Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="February" year="2006"/>
            <abstract>
              <t indent="0">We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP; we call this the Teredo service. Running the service requires the help of "Teredo servers" and "Teredo relays". The Teredo servers are stateless, and only have to manage a small fraction of the traffic between Teredo clients; the Teredo relays act as IPv6 routers between the Teredo service and the "native" IPv6 Internet. The relays can also provide interoperability with hosts using other transition mechanisms such as "6to4". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4380"/>
          <seriesInfo name="DOI" value="10.17487/RFC4380"/>
        </reference>
        <reference anchor="RFC4787" target="https://www.rfc-editor.org/info/rfc4787" quoteTitle="true" derivedAnchor="RFC4787">
          <front>
            <title>Network Address Translation (NAT) Behavioral Requirements for Unicast UDP</title>
            <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <date month="January" year="2007"/>
            <abstract>
              <t indent="0">This document defines basic terminology for describing different types of Network Address Translation (NAT) behavior when handling Unicast UDP and also defines a set of requirements that would allow many applications, such as multimedia communications or online gaming, to work consistently. Developing NATs that meet this set of requirements will greatly increase the likelihood that these applications will function properly. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="4787"/>
          <seriesInfo name="DOI" value="10.17487/RFC4787"/>
        </reference>
        <reference anchor="RFC5925" target="https://www.rfc-editor.org/info/rfc5925" quoteTitle="true" derivedAnchor="RFC5925">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t indent="0">This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC6081" target="https://www.rfc-editor.org/info/rfc6081" quoteTitle="true" derivedAnchor="RFC6081">
          <front>
            <title>Teredo Extensions</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="January" year="2011"/>
            <abstract>
              <t indent="0">This document specifies a set of extensions to the Teredo protocol. These extensions provide additional capabilities to Teredo, including support for more types of Network Address Translations (NATs) and support for more efficient communication. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6081"/>
          <seriesInfo name="DOI" value="10.17487/RFC6081"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" quoteTitle="true" derivedAnchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t indent="0">The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6864" target="https://www.rfc-editor.org/info/rfc6864" quoteTitle="true" derivedAnchor="RFC6864">
          <front>
            <title>Updated Specification of the IPv4 ID Field</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="February" year="2013"/>
            <abstract>
              <t indent="0">The IPv4 Identification (ID) field enables fragmentation and reassembly and, as currently specified, is required to be unique within the maximum lifetime for all datagrams with a given source address/destination address/protocol tuple. If enforced, this uniqueness requirement would limit all connections to 6.4 Mbps for typical datagram sizes. Because individual connections commonly exceed this speed, it is clear that existing systems violate the current specification. This document updates the specification of the IPv4 ID field in RFCs 791, 1122, and 2003 to more closely reflect current practice and to more closely match IPv6 so that the field's value is defined only when a datagram is actually fragmented. It also discusses the impact of these changes on how datagrams are used. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6864"/>
          <seriesInfo name="DOI" value="10.17487/RFC6864"/>
        </reference>
        <reference anchor="RFC6935" target="https://www.rfc-editor.org/info/rfc6935" quoteTitle="true" derivedAnchor="RFC6935">
          <front>
            <title>IPv6 and UDP Checksums for Tunneled Packets</title>
            <author fullname="M. Eubanks" initials="M." surname="Eubanks"/>
            <author fullname="P. Chimento" initials="P." surname="Chimento"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="April" year="2013"/>
            <abstract>
              <t indent="0">This document updates the IPv6 specification (RFC 2460) to improve performance when a tunnel protocol uses UDP with IPv6 to tunnel packets. The performance improvement is obtained by relaxing the IPv6 UDP checksum requirement for tunnel protocols whose header information is protected on the "inner" packet being carried. Relaxing this requirement removes the overhead associated with the computation of UDP checksums on IPv6 packets that carry the tunnel protocol packets. This specification describes how the IPv6 UDP checksum requirement can be relaxed when the encapsulated packet itself contains a checksum. It also describes the limitations and risks of this approach and discusses the restrictions on the use of this method.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6935"/>
          <seriesInfo name="DOI" value="10.17487/RFC6935"/>
        </reference>
        <reference anchor="RFC6978" target="https://www.rfc-editor.org/info/rfc6978" quoteTitle="true" derivedAnchor="RFC6978">
          <front>
            <title>A TCP Authentication Option Extension for NAT Traversal</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="July" year="2013"/>
            <abstract>
              <t indent="0">This document describes an extension to the TCP Authentication Option (TCP-AO) to support its use over connections that pass through Network Address Translators and/or Network Address and Port Translators (NATs/NAPTs). This extension changes the data used to compute traffic keys, but it does not alter TCP-AO's packet processing or key generation algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6978"/>
          <seriesInfo name="DOI" value="10.17487/RFC6978"/>
        </reference>
        <reference anchor="RFC6994" target="https://www.rfc-editor.org/info/rfc6994" quoteTitle="true" derivedAnchor="RFC6994">
          <front>
            <title>Shared Use of Experimental TCP Options</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="August" year="2013"/>
            <abstract>
              <t indent="0">This document describes how the experimental TCP option codepoints can concurrently support multiple TCP extensions, even within the same connection, using a new IANA TCP experiment identifier. This approach is robust to experiments that are not registered and to those that do not use this sharing mechanism. It is recommended for all new TCP options that use these codepoints.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6994"/>
          <seriesInfo name="DOI" value="10.17487/RFC6994"/>
        </reference>
        <reference anchor="RFC7011" target="https://www.rfc-editor.org/info/rfc7011" quoteTitle="true" derivedAnchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t indent="0">This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7323" target="https://www.rfc-editor.org/info/rfc7323" quoteTitle="true" derivedAnchor="RFC7323">
          <front>
            <title>TCP Extensions for High Performance</title>
            <author fullname="D. Borman" initials="D." surname="Borman"/>
            <author fullname="B. Braden" initials="B." surname="Braden"/>
            <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
            <author fullname="R. Scheffenegger" initials="R." role="editor" surname="Scheffenegger"/>
            <date month="September" year="2014"/>
            <abstract>
              <t indent="0">This document specifies a set of TCP extensions to improve performance over paths with a large bandwidth * delay product and to provide reliable operation over very high-speed paths. It defines the TCP Window Scale (WS) option and the TCP Timestamps (TS) option and their semantics. The Window Scale option is used to support larger receive windows, while the Timestamps option can be used for at least two distinct mechanisms, Protection Against Wrapped Sequences (PAWS) and Round-Trip Time Measurement (RTTM), that are also described herein.</t>
              <t indent="0">This document obsoletes RFC 1323 and describes changes from it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7323"/>
          <seriesInfo name="DOI" value="10.17487/RFC7323"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" quoteTitle="true" derivedAnchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t indent="0">YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8040" target="https://www.rfc-editor.org/info/rfc8040" quoteTitle="true" derivedAnchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t indent="0">This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8085" target="https://www.rfc-editor.org/info/rfc8085" quoteTitle="true" derivedAnchor="RFC8085">
          <front>
            <title>UDP Usage Guidelines</title>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
            <date month="March" year="2017"/>
            <abstract>
              <t indent="0">The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms. This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
              <t indent="0">Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. They may also need to implement additional mechanisms, depending on how they use UDP.</t>
              <t indent="0">Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
              <t indent="0">This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="145"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" quoteTitle="true" derivedAnchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t indent="0">Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t indent="0">To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t indent="0">This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" quoteTitle="true" derivedAnchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t indent="0">This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC8201" target="https://www.rfc-editor.org/info/rfc8201" quoteTitle="true" derivedAnchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t indent="0">This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8504" target="https://www.rfc-editor.org/info/rfc8504" quoteTitle="true" derivedAnchor="RFC8504">
          <front>
            <title>IPv6 Node Requirements</title>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="January" year="2019"/>
            <abstract>
              <t indent="0">This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.</t>
              <t indent="0">This document obsoletes RFC 6434, and in turn RFC 4294.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="220"/>
          <seriesInfo name="RFC" value="8504"/>
          <seriesInfo name="DOI" value="10.17487/RFC8504"/>
        </reference>
        <reference anchor="RFC8724" target="https://www.rfc-editor.org/info/rfc8724" quoteTitle="true" derivedAnchor="RFC8724">
          <front>
            <title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
            <author fullname="A. Minaburo" initials="A." surname="Minaburo"/>
            <author fullname="L. Toutain" initials="L." surname="Toutain"/>
            <author fullname="C. Gomez" initials="C." surname="Gomez"/>
            <author fullname="D. Barthel" initials="D." surname="Barthel"/>
            <author fullname="JC. Zuniga" initials="JC." surname="Zuniga"/>
            <date month="April" year="2020"/>
            <abstract>
              <t indent="0">This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t>
              <t indent="0">SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t>
              <t indent="0">This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t>
              <t indent="0">The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8724"/>
          <seriesInfo name="DOI" value="10.17487/RFC8724"/>
        </reference>
        <reference anchor="RFC8899" target="https://www.rfc-editor.org/info/rfc8899" quoteTitle="true" derivedAnchor="RFC8899">
          <front>
            <title>Packetization Layer Path MTU Discovery for Datagram Transports</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="T. Jones" initials="T." surname="Jones"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="I. Rüngeler" initials="I." surname="Rüngeler"/>
            <author fullname="T. Völker" initials="T." surname="Völker"/>
            <date month="September" year="2020"/>
            <abstract>
              <t indent="0">This document specifies Datagram Packetization Layer Path MTU Discovery (DPLPMTUD). This is a robust method for Path MTU Discovery (PMTUD) for datagram Packetization Layers (PLs). It allows a PL, or a datagram application that uses a PL, to discover whether a network path can support the current size of datagram. This can be used to detect and reduce the message size when a sender encounters a packet black hole. It can also probe a network path to discover whether the maximum packet size can be increased. This provides functionality for datagram transports that is equivalent to the PLPMTUD specification for TCP, specified in RFC 4821, which it updates. It also updates the UDP Usage Guidelines to refer to this method for use with UDP datagrams and updates SCTP.</t>
              <t indent="0">The document provides implementation notes for incorporating Datagram PMTUD into IETF datagram transports or applications that use datagram transports.</t>
              <t indent="0">This specification updates RFC 4960, RFC 4821, RFC 6951, RFC 8085, and RFC 8261.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8899"/>
          <seriesInfo name="DOI" value="10.17487/RFC8899"/>
        </reference>
        <reference anchor="RFC9040" target="https://www.rfc-editor.org/info/rfc9040" quoteTitle="true" derivedAnchor="RFC9040">
          <front>
            <title>TCP Control Block Interdependence</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="M. Welzl" initials="M." surname="Welzl"/>
            <author fullname="S. Islam" initials="S." surname="Islam"/>
            <date month="July" year="2021"/>
            <abstract>
              <t indent="0">This memo provides guidance to TCP implementers that is intended to help improve connection convergence to steady-state operation without affecting interoperability. It updates and replaces RFC 2140's description of sharing TCP state, as typically represented in TCP Control Blocks, among similar concurrent or consecutive connections.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9040"/>
          <seriesInfo name="DOI" value="10.17487/RFC9040"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" quoteTitle="true" derivedAnchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t indent="0">This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t indent="0">The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t indent="0">This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9187" target="https://www.rfc-editor.org/info/rfc9187" quoteTitle="true" derivedAnchor="RFC9187">
          <front>
            <title>Sequence Number Extension for Windowed Protocols</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="January" year="2022"/>
            <abstract>
              <t indent="0">Sliding window protocols use finite sequence numbers to determine segment placement and order. These sequence number spaces wrap around and are reused during the operation of such protocols. This document describes a way to extend the size of these sequence numbers at the endpoints to avoid the impact of that wrap and reuse without transmitting additional information in the packet header. The resulting extended sequence numbers can be used at the endpoints in encryption and authentication algorithms to ensure input bit patterns do not repeat over the lifetime of a connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9187"/>
          <seriesInfo name="DOI" value="10.17487/RFC9187"/>
        </reference>
        <reference anchor="RFC9260" target="https://www.rfc-editor.org/info/rfc9260" quoteTitle="true" derivedAnchor="RFC9260">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t indent="0">This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t indent="0">SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t indent="0">SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t indent="0">The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
        <reference anchor="RFC9293" target="https://www.rfc-editor.org/info/rfc9293" quoteTitle="true" derivedAnchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
            <date month="August" year="2022"/>
            <abstract>
              <t indent="0">This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="9293"/>
          <seriesInfo name="DOI" value="10.17487/RFC9293"/>
        </reference>
        <reference anchor="RFC9298" target="https://www.rfc-editor.org/info/rfc9298" quoteTitle="true" derivedAnchor="RFC9298">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t indent="0">This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="RFC9648" target="https://www.rfc-editor.org/info/rfc9648" quoteTitle="true" derivedAnchor="RFC9648">
          <front>
            <title>YANG Data Model for TCP</title>
            <author fullname="M. Scharf" initials="M." surname="Scharf"/>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani"/>
            <author fullname="V. Murgai" initials="V." surname="Murgai"/>
            <date month="October" year="2024"/>
            <abstract>
              <t indent="0">This document specifies a minimal YANG data model for TCP on devices that are configured and managed by network management protocols. The YANG data model defines a container for all TCP connections and groupings of authentication parameters that can be imported and used in TCP implementations or by other models that need to configure TCP parameters. The model also includes basic TCP statistics. The model is compliant with Network Management Datastore Architecture (NMDA) (RFC 8342).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9648"/>
          <seriesInfo name="DOI" value="10.17487/RFC9648"/>
        </reference>
        <reference anchor="RFC9870" target="https://www.rfc-editor.org/info/rfc9870" quoteTitle="true" derivedAnchor="RFC9870">
          <front>
            <title>Export of UDP Options Information in IP Flow Information Export (IPFIX)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization showOnFrontPage="true">Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization showOnFrontPage="true">Nokia</organization>
            </author>
            <date month="October" year="2025"/>
          </front>
          <seriesInfo name="RFC" value="9870"/>
          <seriesInfo name="DOI" value="10.17487/RFC9870"/>
        </reference>
        <reference anchor="I-D.touch-tcp-ao-encrypt" target="https://datatracker.ietf.org/doc/html/draft-touch-tcp-ao-encrypt-09" quoteTitle="true" derivedAnchor="To18">
          <front>
            <title>A TCP Authentication Option Extension for Payload Encryption</title>
            <author fullname="Dr. Joseph D. Touch" initials="J. D." surname="Touch"/>
            <date day="19" month="July" year="2018"/>
            <abstract>
              <t indent="0">This document describes an extension to the TCP Authentication Option (TCP-AO) to encrypt the TCP segment payload in addition to providing TCP-AO's authentication of the payload, TCP header, and IP pseudoheader. This extension augments how the packet contents and headers are processed and which keys are derived, and adds a capability for in-band coordination of unauthenticated Diffie- Hellman key exchange at connection establishment. The extension preserves key rollover coordination and protection of long-lived connections.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-touch-tcp-ao-encrypt-09"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.touch-tsvwg-udp-auth-opt" target="https://datatracker.ietf.org/doc/html/draft-touch-tsvwg-udp-auth-opt-00" quoteTitle="true" derivedAnchor="To24">
          <front>
            <title>The UDP Authentication Option</title>
            <author fullname="Dr. Joseph D. Touch" initials="J. D." surname="Touch">
              <organization showOnFrontPage="true">Independent Consultant</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t indent="0">This document extends UDP by defining a framework for an authentication option.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-touch-tsvwg-udp-auth-opt-00"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="Zu20" target="https://dl.ifip.org/db/conf/tma/tma2020/tma2020-camera-paper70.pdf" quoteTitle="true" derivedAnchor="Zu20">
          <front>
            <title>Overcoming the Sorrows of the Young UDP Options</title>
            <author initials="R." surname="Zullo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Jones">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Fairhurst">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2020"/>
          </front>
          <refcontent>4th Network Traffic Measurement and Analysis Conference (TMA)</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="implementation-information" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-implementation-information">Implementation Information</name>
      <t indent="0" pn="section-appendix.a-1">The following information is provided to encourage consistent naming
   for API implementations.</t>
      <t indent="0" pn="section-appendix.a-2">System-level variables (sysctl):</t>
      <table align="center" pn="table-2">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Name</th>
            <th align="left" colspan="1" rowspan="1">Default</th>
            <th align="left" colspan="1" rowspan="1">Meaning</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">UDP Options available</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_ocs</td>
            <td align="left" colspan="1" rowspan="1">1</td>
            <td align="left" colspan="1" rowspan="1">Use OCS</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_apc</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include APC</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_frag</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Fragment</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_mds</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include MDS</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_mrds</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include MRDS</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_req</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include REQ</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_resp</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include RES</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_time</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include TIME</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_auth</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include AUTH</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_exp</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include EXP</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_ucmp</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include UCMP</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_uenc</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include UENC</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_uexp</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Include UEXP</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-appendix.a-4">Socket options (sockopt), cached for outgoing datagrams:</t>
      <table align="center" pn="table-3">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Name</th>
            <th align="left" colspan="1" rowspan="1">Meaning</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_OPT</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP Options (at all)</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_OPT_OCS</td>
            <td align="left" colspan="1" rowspan="1">Use UDP OCS</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_OPT_APC</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP APC Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_OPT_FRAG</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP fragmentation</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP OPT MDS</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP MDS Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP OPT MRDS</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP MRDS Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP OPT REQ</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP REQ Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP OPT RES</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP RES Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_OPT_TIME</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP TIME Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP OPT AUTH</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP AUTH Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP OPT EXP</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP EXP Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_OPT_UCMP</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP UCMP Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_OPT_UENC</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP UENC Option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP OPT UEXP</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP UEXP Option</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-appendix.a-6">Send/sendto parameters:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-appendix.a-7">
        <li pn="section-appendix.a-7.1">
          <t indent="0" pn="section-appendix.a-7.1.1">(Same as sysctl, with different prefixes)</t>
        </li>
      </ul>
      <t indent="0" pn="section-appendix.a-8">Connection parameters (per-socket pair cached state, part UCB):</t>
      <table align="center" pn="table-4">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Name</th>
            <th align="left" colspan="1" rowspan="1">Initial Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">opts_enabled</td>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">ocs_enabled</td>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_ocs</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-appendix.a-10">NB: The JUNK Option is included for debugging purposes and is not
   intended to be enabled otherwise.</t>
      <t indent="0" pn="section-appendix.a-11">System variables:</t>
      <t indent="0" pn="section-appendix.a-12">net.ipv4.udp_opt_junk   0</t>
      <t indent="0" pn="section-appendix.a-13">System-level variables (sysctl):</t>
      <table align="center" pn="table-5">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Name</th>
            <th align="left" colspan="1" rowspan="1">Default</th>
            <th align="left" colspan="1" rowspan="1">Meaning</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_junk</td>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">Default use of junk</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-appendix.a-15">Socket options (sockopt):</t>
      <table align="center" pn="table-6">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Name</th>
            <th align="left" colspan="1" rowspan="1">Params</th>
            <th align="left" colspan="1" rowspan="1">Meaning</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_JUNK</td>
            <td align="left" colspan="1" rowspan="1">-</td>
            <td align="left" colspan="1" rowspan="1">Enable UDP junk option</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_JUNK_VAL</td>
            <td align="left" colspan="1" rowspan="1">fillval</td>
            <td align="left" colspan="1" rowspan="1">Value to use as junk fill</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">UDP_JUNK_LEN</td>
            <td align="left" colspan="1" rowspan="1">length</td>
            <td align="left" colspan="1" rowspan="1">Length of junk payload in bytes</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-appendix.a-17">Connection parameters (per-socket pair cached state, part UCB):</t>
      <table align="center" pn="table-7">
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Name</th>
            <th align="left" colspan="1" rowspan="1">Initial Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">junk_enabled</td>
            <td align="left" colspan="1" rowspan="1">net.ipv4.udp_opt_junk</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">junk_value</td>
            <td align="left" colspan="1" rowspan="1">0xABCD</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">junk_len</td>
            <td align="left" colspan="1" rowspan="1">4</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section numbered="false" anchor="acks" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.b-1">This work benefitted from feedback from <contact fullname="Erik Auerswald"/>, <contact fullname="Bob Briscoe"/>,
<contact fullname="Ken Calvert"/>, <contact fullname="Ted Faber"/>, <contact fullname="Gorry Fairhurst"/> (including OCS for errant
middlebox traversal), <contact fullname="C. M. Heard"/> (editor of this document, including
combining previous FRAG and LITE Options into the new FRAG, as well
as <xref target="fig-12" format="default" sectionFormat="of" derivedContent="Figure 12"/>), <contact fullname="Tom Herbert"/>, <contact fullname="Tom Jones"/>, <contact fullname="Mark Smith"/>, <contact fullname="Carl Williams"/>,
and <contact fullname="Raffaele Zullo"/>, as well as discussions on the IETF TSVWG and
SPUD email lists.</t>
      <t indent="0" pn="section-appendix.b-2">This work was partly supported by USC/ISI's Postel Center.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="J." surname="Touch" fullname="Joe Touch">
        <organization showOnFrontPage="true">Independent Consultant</organization>
        <address>
          <postal>
            <city>Manhattan Beach</city>
            <region>CA</region>
            <code>90266</code>
            <country>United States of America</country>
          </postal>
          <phone>+1 (310) 560-0334</phone>
          <email>touch@strayalpha.com</email>
        </address>
      </author>
      <author initials="C." surname="Heard" fullname="C. M. (Mike) Heard" role="editor">
        <organization showOnFrontPage="true">Unaffiliated</organization>
        <address>
          <postal>
            <street>PO Box 2667</street>
            <city>Redwood City</city>
            <region>CA</region>
            <code>94064-2667</code>
            <country>United States of America</country>
          </postal>
          <phone>+1 (408) 499-7257</phone>
          <email>heard@pobox.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
