{"id":3351,"date":"2014-10-08T17:40:29","date_gmt":"2014-10-08T17:40:29","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3351"},"modified":"2020-05-06T10:31:33","modified_gmt":"2020-05-06T17:31:33","slug":"staring-at-ipv6s-prosthetic-headers-part-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/","title":{"rendered":"Staring at IPv6&#8217;s Prosthetic Head(ers) &#8211; part 2"},"content":{"rendered":"<p>In my last post, Staring at IPv6\u2019s Prosthetic Head(ers), I introduced the IPv6 extension header. There\u2019s a recent IETF draft that I\u2019d like to explore in a blog entry (IPv6 Extension Headers in the Real World) but I wanted to make sure to first review the IPv6 extension header concept for myself and for readers. We\u2019ll get to that draft next time around in part 3 but for now let\u2019s finish our review of IPv6 extension headers by looking at the specific types that have been defined. (These definitions\u00a0<a href=\"http:\/\/www.iana.org\/assignments\/ipv6-parameters\/ipv6-parameters.xhtml\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">are summarized on the\u00a0Internet Assigned Numbers Authority (IANA) site<\/a>.)<\/p>\n<p>Recall that extension headers in IPv6 were a design choice to help get rid of the variable length header in IPv4. Instead, &#8220;optional Internet-layer info is encoded into separate headers that may be placed between the IPv6 header and the upper-layer header in a packet&#8221; (<a href=\"http:\/\/tools.ietf.org\/html\/rfc2460\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 2460<\/a>). This kind of header chain allows for more than one header to be used to provide special treatment for a packet yet it maintains more optimal packet processing.\u00a0<em>Figure 1<\/em>\u00a0illustrates an IPv6 packet with a single header followed by an IPv6 packet with a Routing extension header.<\/p>\n<p><em>Figure 1: IPv6 Header and Extension Header example<\/em><\/p>\n<p>While the extension header concept is flexible enough to allow for the definition of new headers for any purpose, there are a relatively small number of extension headers that have been defined (with a smaller subset of these actually in use in production networks).<\/p>\n<p>These are:<\/p>\n<ul>\n<li>Hop-by-Hop Options header (sometimes shortened to\u00a0<em>HbH<\/em>)<\/li>\n<li>Destination Options header<\/li>\n<li>Routing header<\/li>\n<li>Fragment header<\/li>\n<li>Authentication header<\/li>\n<li>Encapsulating Security Payload header<\/li>\n<\/ul>\n<p>RFC 2460 recommends that if more than on extension header is used in the same packet, the particular order in the bullet list above should be preserved. This fixed and predictable\u00a0order of header extensions enables faster packet processing.<\/p>\n<p>Extension headers always fall on a 64-bit boundary and are always an integer multiple of 8 bits (which can result in padding of the header). This fixed boundary facilitates more optimal processing of the packet in hardware.<\/p>\n<p>Let\u2019s review each of the extension headers in more detail.<\/p>\n<p><strong>Hop-by-Hop Options header\u00a0<\/strong><\/p>\n<p>Ever get on an elevator at the ground floor headed for your penthouse suite then had to stop at every floor along the way? Me neither (besides, I\u2019m told, penthouse suites have their own private elevators), but you get the idea. The options in an HbH header (Figure 2) must be examined by every router in the path. Ostensibly, these options are included to indicate to the router what kind of special handling the packet should be receiving. Applications for this option include jumbogram support, MLD support, RSVP for IPv6, and the router alert option.<\/p>\n<p><em>Figure 2: Hop-by-Hop Options header<\/em><\/p>\n<p>The Next Header field is 8 bits. The Header Length field is next and contains 8 bits as well. It specifies the length of the Hop-by-Hop options header (minus the first byte). The Options field that follows contains one or more TLV(Type\/Length\/Value)-encoded options and is always some multiple of 8 bytes.<\/p>\n<p>A Next Header value of 0 identifies the hop-by-hop options header.<\/p>\n<p><strong>Destination Options header<\/strong><\/p>\n<p>As the name suggests, this header includes options exclusively for the destination node. An application of destination options includes support for IPv6 mobility.<\/p>\n<p>The Destination Options header looks just like the Hop-by-Hop Options header in Figure 2. It also contains 8-bit Next Header and Header Length fields as well as an mutliple-of-8-octets Options field with one or more TLV(Type\/Length\/Value)-encoded options.<\/p>\n<p>A Next Header value of 60 identifies the Destination Options header.<\/p>\n<p><strong>Routing header<\/strong><\/p>\n<p>According to RFC 2460: &#8220;The Routing header [Figure 3] is used by an IPv6 source to list one or more intermediate nodes to be \u2018visited&#8217; on the way to a packet&#8217;s destination. \u00a0This function is very similar to IPv4&#8217;s Loose Source and Record Route option.\u201d (Remember our IPv4 \u201crecord route\u201d example from the previous blog?).<\/p>\n<p><em>Figure 3: Routing Header<\/em><\/p>\n<p>You\u2019ll recognize the Next Header and Header length field (identical to the ones above). But we also have two additional fields (Routing Type and Segments Left) as well as a type-specific data field.<\/p>\n<p>The Routing Type field identifies the Routing header variant. The Segments Left field indicates the number of remaining intermediate nodes to visit before reaching the destination. Both fields are also 8 bits in length. The contents of the type specific data are implied by the Routing header variant identified in the Routing Type field.<\/p>\n<p>A Next Header value of 43 identifies the routing header.<\/p>\n<p><strong>Fragment header<\/strong><\/p>\n<p>The Fragment Header (Figure 4) allows an IPv6 source to send packets bigger than what the path MTU permits.<\/p>\n<p><em>Figure 4: Fragment header<\/em><\/p>\n<p>The 8-bit Next Header field in this case &#8220;Identifies the initial header type of the Fragmentable Part of the original packet.\u201d The 8-bit Reserved field is ignored. The Fragment Offset field is 13 bits and indicates the number of octets following the header. The next 2 bits are ignored and the 1-bit M flag indicates whether any more fragments follow.<\/p>\n<p>A Next Header value of 44 identifies the fragment header.<\/p>\n<p>(The fragmentation process is quite involved and takes up several pages of RFC 2460.)<\/p>\n<p><strong>Authentication header<\/strong><\/p>\n<p>The Authentication header (Figure 5) is used to provide data authentication, integrity, and protection against replays (i.e., retransmission of captured packets) of the IPv6 packet. The standard for it is specified in\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc4302\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 4302<\/a>.<\/p>\n<p><em>Figure 5: Authentication header<\/em><\/p>\n<p>A Next Header value of 51 identifies the fragment header.<\/p>\n<p><strong>Encapsulating Security Payload header<\/strong><\/p>\n<p>The Encapsulating Security Payload header (Figure 6) is used to provide data confidentiality, authentication, integrity, and protection against replays for the encapsulated payload. The standard for it is specified in\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc4303\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 4303<\/a>.<\/p>\n<p><em>Figure 6: Encapsulating Security Payload header<\/em><\/p>\n<p>A Next Header value of 50 identifies the Encapsulating Security Payload header.<\/p>\n<p>Now that we\u2019ve met the IPv6 extension headers, we can discuss their current status in the Real World\u2122 of IPv6 operations. Stay tuned.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In my last post, Staring at IPv6\u2019s Prosthetic Head(ers), I introduced the IPv6 extension header. There\u2019s a recent IETF draft that I\u2019d like to explore in a blog entry (IPv6 Extension Headers in the Real World) but I wanted to make sure to first review the IPv6 extension header concept for myself and for readers. [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":3187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3351","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Staring at IPv6&#039;s Prosthetic Head(ers) - part 2<\/title>\n<meta name=\"description\" content=\"In my last post, Staring at IPv6\u2019s Prosthetic Head(ers), I introduced the IPv6 extension header. There\u2019s a recent IETF draft that I\u2019d like to explore in a blog entry (IPv6 Extension Headers in the Real World) but I wanted to make sure to first review the IPv6 extension header concept for myself and for readers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Staring at IPv6&#039;s Prosthetic Head(ers) - part 2\" \/>\n<meta property=\"og:description\" content=\"In my last post, Staring at IPv6\u2019s Prosthetic Head(ers), I introduced the IPv6 extension header. There\u2019s a recent IETF draft that I\u2019d like to explore in a blog entry (IPv6 Extension Headers in the Real World) but I wanted to make sure to first review the IPv6 extension header concept for myself and for readers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-08T17:40:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"Staring at IPv6&#8217;s Prosthetic Head(ers) &#8211; part 2\",\"datePublished\":\"2014-10-08T17:40:29+00:00\",\"dateModified\":\"2020-05-06T17:31:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/\"},\"wordCount\":985,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/\",\"name\":\"Staring at IPv6's Prosthetic Head(ers) - part 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"datePublished\":\"2014-10-08T17:40:29+00:00\",\"dateModified\":\"2020-05-06T17:31:33+00:00\",\"description\":\"In my last post, Staring at IPv6\u2019s Prosthetic Head(ers), I introduced the IPv6 extension header. There\u2019s a recent IETF draft that I\u2019d like to explore in a blog entry (IPv6 Extension Headers in the Real World) but I wanted to make sure to first review the IPv6 extension header concept for myself and for readers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"width\":660,\"height\":454,\"caption\":\"The IPv6 Tipping Point Effect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6s-prosthetic-headers-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Staring at IPv6&#8217;s Prosthetic Head(ers) &#8211; part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Staring at IPv6's Prosthetic Head(ers) - part 2","description":"In my last post, Staring at IPv6\u2019s Prosthetic Head(ers), I introduced the IPv6 extension header. There\u2019s a recent IETF draft that I\u2019d like to explore in a blog entry (IPv6 Extension Headers in the Real World) but I wanted to make sure to first review the IPv6 extension header concept for myself and for readers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Staring at IPv6's Prosthetic Head(ers) - part 2","og_description":"In my last post, Staring at IPv6\u2019s Prosthetic Head(ers), I introduced the IPv6 extension header. There\u2019s a recent IETF draft that I\u2019d like to explore in a blog entry (IPv6 Extension Headers in the Real World) but I wanted to make sure to first review the IPv6 extension header concept for myself and for readers.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/","og_site_name":"Infoblox Blog","article_published_time":"2014-10-08T17:40:29+00:00","article_modified_time":"2020-05-06T17:31:33+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"Staring at IPv6&#8217;s Prosthetic Head(ers) &#8211; part 2","datePublished":"2014-10-08T17:40:29+00:00","dateModified":"2020-05-06T17:31:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/"},"wordCount":985,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/","name":"Staring at IPv6's Prosthetic Head(ers) - part 2","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","datePublished":"2014-10-08T17:40:29+00:00","dateModified":"2020-05-06T17:31:33+00:00","description":"In my last post, Staring at IPv6\u2019s Prosthetic Head(ers), I introduced the IPv6 extension header. There\u2019s a recent IETF draft that I\u2019d like to explore in a blog entry (IPv6 Extension Headers in the Real World) but I wanted to make sure to first review the IPv6 extension header concept for myself and for readers.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","width":660,"height":454,"caption":"The IPv6 Tipping Point Effect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6s-prosthetic-headers-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Staring at IPv6&#8217;s Prosthetic Head(ers) &#8211; part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3351"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3351\/revisions"}],"predecessor-version":[{"id":3352,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3351\/revisions\/3352"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3187"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}