<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ren-v6ops-ipv6-iid-patterns-measurement-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IPv6 IID Patterns Measurement">Measurement and Analysis of IPv6 Interface Identifier Patterns in the Real World</title>
    <seriesInfo name="Internet-Draft" value="draft-ren-v6ops-ipv6-iid-patterns-measurement-00"/>
    <author fullname="Gang Ren">
      <organization>Tsinghua University</organization>
      <address>
        <email>rengang@cernet.edu.cn</email>
      </address>
    </author>
    <author fullname="Wei Zhang">
      <organization>Tsinghua University</organization>
      <address>
        <email>zhang-w22@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xia Yin">
      <organization>Tsinghua University</organization>
      <address>
        <email>yxia@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Lin He">
      <organization>Tsinghua University</organization>
      <address>
        <email>helin1170@gmail.com</email>
      </address>
    </author>
    <author fullname="Haisheng Yu">
      <organization>CNNIC</organization>
      <address>
        <email>yuhaisheng@cnnic.cn</email>
      </address>
    </author>
    <date year="2025" month="December" day="08"/>
    <area>Operations</area>
    <workgroup>IPv6 Operations</workgroup>
    <keyword>Interface Identifier</keyword>
    <keyword>Network Reconnaissance</keyword>
    <keyword>IPv6 Privacy</keyword>
    <abstract>
      <?line 91?>

<t>Interface Identifiers (IIDs) are critical components of IPv6 addresses, significantly impacting user privacy and the feasibility of network reconnaissance. RFC 7707 previously provided a comprehensive analysis of IID patterns based on data from the early stages of IPv6 deployment. However, with the widespread adoption of privacy-enhancing standards such as RFC 7217, historical data no longer accurately reflects the current IPv6 ecosystem. This document provides updated measurements of IID patterns by utilizing an improved pattern recognition method and incorporating novel data sources, such as public mailing lists. The measurement data reveals that while "Low-byte" patterns have decreased significantly in server addresses, a substantial number of seemingly random addresses actually belong to non-random, specific patterns, implying that heuristic scanning remains a viable vector. Furthermore, while client devices have widely adopted randomized addresses-effectively enhancing privacy-Client Premise Equipment (CPE) routers continue to exhibit a high usage rate of IEEE EUI-64 addresses, constituting an often-overlooked privacy risk. This document aims to update the statistics and analysis regarding IID pattern distribution found in RFC 7707, providing essential insights for modern network defense strategies and standard compliance.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ren-v6ops-ipv6-iid-patterns-measurement/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        v6ops Working Group mailing list (<eref target="mailto:v6ops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/v6ops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/v6ops/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 95?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>RFC 7707 <xref target="RFC7707"/> provided a pioneering analysis of network reconnaissance techniques and defense strategies in IPv6 networks. That document discussed the feasibility of address scanning in detail and provided statistical data on the distribution of IPv6 Interface Identifier (IID) patterns for various device types (servers, clients, and routers) at that time. However, the data cited in RFC 7707 was primarily based on measurements conducted around 2012-2013. In the subsequent decade, both the scale of IPv6 deployment and the relevant standards have undergone profound changes.</t>
      <t>First, to address the privacy leakage and scanning risks associated with traditional EUI-64 addresses, the IETF has published a series of updated standards. These include RFC 8981 <xref target="RFC8981"/>, RFC 7217 <xref target="RFC7217"/> (which defines a method for generating semantically opaque stable addresses), and RFC 8064 <xref target="RFC8064"/> (which recommends deprecating EUI-64 in all cases). Second, the default behaviors of network stacks in mainstream operating systems (such as Windows, Linux, Android, and iOS) have adjusted accordingly, widely adopting these privacy protection mechanisms. Collectively, these factors have resulted in an IPv6 address ecosystem that differs significantly from the era of RFC 7707.</t>
      <t>This document aims to update the community's understanding of IPv6 IID allocation through the latest measurement data. By employing a broader range of data sources and a more accurate pattern recognition methodology, this document presents a latest panoramic view of IPv6 address patterns. The data reveals the evolution of server address configuration strategies, the current state of endpoint privacy protection, and potential risks existing within edge network devices, providing a factual basis for updating the relevant sections on address distribution statistics in RFC 7707.</t>
      <t>The insights provided in this document are critical for network operators, equipment vendors, and the research community. By revealing the persistence of scannable patterns in infrastructure and the specific privacy vulnerabilities in edge devices, this document underscores the need for updated defense strategies-moving beyond simple "security by obscurity"-and calls for stricter adherence to standards like RFC 8064 in CPE manufacturing. Furthermore, the updated data models presented here serve as a foundational reference for future network measurements and security assessments.</t>
    </section>
    <section anchor="ipv6-interface-identifiers-mechanisms-patterns-and-mapping">
      <name>IPv6 Interface Identifiers: Mechanisms, Patterns, and Mapping</name>
      <t>This section outlines the generation mechanisms of Interface Identifiers (IIDs) in modern IPv6 networks, the observable sequence patterns, and the mapping relationship between the two.</t>
      <section anchor="allocation-mechanisms">
        <name>Allocation Mechanisms</name>
        <t>The generation mechanism of an IID determines the underlying properties of the address. Common allocation mechanisms include:</t>
        <ul spacing="normal">
          <li>
            <t>Stateless Address Autoconfiguration (SLAAC): Traditionally based on the IEEE EUI-64 specification, expanding a 48-bit MAC address and embedding it into the IID <xref target="RFC4862"/>.</t>
          </li>
          <li>
            <t>Temporary Addresses: To protect privacy, operating systems periodically generate random IIDs that change over time <xref target="RFC8981"/>.</t>
          </li>
          <li>
            <t>Stable Opaque Addresses: Generates a stable IID per prefix that exhibits random characteristics, intended to replace EUI-64 as the default configuration <xref target="RFC7217"/>.</t>
          </li>
          <li>
            <t>DHCPv6: Stateful address assignment managed by a server. Server policies can be sequential, random, or based on specific algorithms <xref target="RFC8415"/>.</t>
          </li>
          <li>
            <t>Manual Configuration: Administrators manually specify static addresses, commonly used for server and router interfaces, often employing patterns that are easy to remember.</t>
          </li>
          <li>
            <t>Transition Technologies: Mechanisms such as Teredo <xref target="RFC4380"/> or ISATAP <xref target="RFC5214"/>, which generate IIDs containing IPv4 address or port information via specific algorithms.</t>
          </li>
        </ul>
      </section>
      <section anchor="interface-identifier-sequence-patterns">
        <name>Interface Identifier Sequence Patterns</name>
        <t>"Sequence Pattern" refers to the byte structure characteristics of an IID as perceived by an external observer. RFC 7707 established a well-known taxonomy for these patterns. This document adopts and extends this taxonomy. The primary patterns are listed below (roughly in order of identification priority):</t>
        <ol spacing="normal" type="1"><li>
            <t>Transition Technology: IIDs conforming to specific transition protocol specifications (e.g., ISATAP addresses beginning with <tt>0000:5efe</tt> <xref target="RFC5214"/>).</t>
          </li>
          <li>
            <t>IEEE-based: IIDs conforming to the EUI-64 format, containing <tt>ff:fe</tt> in the middle, with the first three bytes corresponding to a valid vendor OUI <xref target="RFC4862"/>.</t>
          </li>
          <li>
            <t>Embedded-IPv4: IIDs containing a complete IPv4 address.</t>
          </li>
          <li>
            <t>Embedded-Port: IIDs where the low-order bits contain common service port numbers (e.g., 80, 443), with the remainder typically being zero. This is essentially a special case of the Low-byte pattern.</t>
          </li>
          <li>
            <t>Low-byte: IIDs where the high-order bits are all zero, and only the lowest bytes (typically a small portion of the final 64 bits) are non-zero.</t>
          </li>
          <li>
            <t>Byte-pattern: IIDs containing a large number of zero bytes (e.g., more than 3 bytes are <tt>00</tt>), exhibiting sparse characteristics but not fitting the Low-byte definition.</t>
          </li>
          <li>
            <t>Seed-Similar (New): A new classification introduced in this document. This refers to IIDs that would traditionally be classified as "Randomized" but are identified as having non-random characteristics through a specific algorithm (detailed in subsequent sections).</t>
          </li>
          <li>
            <t>Randomized: IIDs remaining after filtering out all the above rules. They exhibit no obvious observable structure.</t>
          </li>
        </ol>
        <t>The original methodology of RFC 7707 (implemented in tools like <tt>addr6</tt> <xref target="IPv6-Toolkit"/>) classified all addresses remaining after the first six filtering steps as "Randomized". This approach resulted in the misclassification of many non-random, manually configured addresses (such as <tt>ffff:ffff:ffff:ffff</tt> or specific wordy addresses). By introducing "Seed-Similar" Patterns, this document aims to further strip away non-random components from these "remaining addresses", thereby more accurately assessing the entropy of the address space.</t>
      </section>
      <section anchor="mapping-patterns-to-mechanisms">
        <name>Mapping Patterns to Mechanisms</name>
        <t>While the sequence pattern of an IID is publicly visible, the specific mechanism generating it is often opaque. A single pattern may be produced by multiple different mechanisms. The table below summarizes the most typical correspondences between sequence patterns and allocation mechanisms in the current network environment:</t>
        <table anchor="tab-mapping">
          <name>Mapping between Sequence Patterns and Allocation Mechanisms</name>
          <thead>
            <tr>
              <th align="left">Sequence Pattern</th>
              <th align="left">Primary Mechanisms</th>
              <th align="left">Notes</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Transition</td>
              <td align="left">Teredo <xref target="RFC4380"/>, ISATAP <xref target="RFC5214"/>, etc.</td>
              <td align="left">Depends on specific transition protocol specs.</td>
            </tr>
            <tr>
              <td align="left">IEEE-based</td>
              <td align="left">SLAAC (Traditional EUI-64)</td>
              <td align="left">Decreased in modern clients, but still common in CPEs.</td>
            </tr>
            <tr>
              <td align="left">Embedded-IPv4</td>
              <td align="left">Manual, Some Transition Techs</td>
              <td align="left">Common in dual-stack network planning.</td>
            </tr>
            <tr>
              <td align="left">Embedded-Port</td>
              <td align="left">Manual Configuration</td>
              <td align="left">Configured by admins for service mnemonics.</td>
            </tr>
            <tr>
              <td align="left">Low-byte</td>
              <td align="left">Manual, DHCPv6 (Sequential)</td>
              <td align="left">Mainstream for infrastructure/servers; easy to scan.</td>
            </tr>
            <tr>
              <td align="left">Byte-pattern</td>
              <td align="left">Manual Configuration</td>
              <td align="left">Contains many zeros but not strictly Low-byte.</td>
            </tr>
            <tr>
              <td align="left">Randomized</td>
              <td align="left">Temporary <xref target="RFC8981"/>, Stable Opaque <xref target="RFC7217"/>, DHCPv6 (Random)</td>
              <td align="left">Pattern cannot distinguish between "Temporary" and "Stable" devices.</td>
            </tr>
            <tr>
              <td align="left">Seed-Similar</td>
              <td align="left">Manual, DHCPv6 (Specific Algo)</td>
              <td align="left">Previously misclassified as random; likely follows specific organizational norms.</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="measurement-methodology">
      <name>Measurement Methodology</name>
      <t>This section details the methods used to collect IPv6 address data and analyze IID patterns. To update the statistics in RFC 7707, we have not only expanded the scope of data sources but also improved the IID pattern recognition algorithm to more accurately assess the randomness of the address space.</t>
      <section anchor="data-sources">
        <name>Data Sources</name>
        <t>To comprehensively cover different types of IPv6 devices (servers, clients, and routers), we utilized multiple data collection channels. In particular, obtaining address data with temporal attributes via public mailing lists provides a new perspective for analyzing the evolutionary trends of IID patterns.</t>
        <ul spacing="normal">
          <li>
            <t>Public Domain Names:
To measure server addresses, we utilized multiple public top-level domain lists (such as Alexa Top 1M, OpenIntel, Tranco, etc.). By performing DNS queries for AAAA records (Web servers), MX records (Mail servers), and NS records (Name servers) on these domains, we collected a large-scale set of server IPv6 addresses. This continues the traditional measurement approach of RFC 7707, ensuring data consistency and comparability.</t>
          </li>
          <li>
            <t>BitTorrent DHT Network:
To obtain client addresses of end-users, we participated in the BitTorrent network. By deploying passive nodes, we collected active client IPv6 addresses. This method does not rely on server logs and can more directly reflect the address configuration of end-users. This methodology was inspired by <xref target="Draft-P2P"/>.</t>
          </li>
          <li>
            <t>Traceroute Probes:
To measure network infrastructure (router) addresses, we performed Traceroute probes on all advertised BGP prefixes, continuing the traditional approach of RFC 7707. Additionally, we performed traceroutes to the collected server and client addresses. Specifically, we distinguished the edge router (the last hop), which is crucial for analyzing the configuration habits of Customer Premises Equipment (CPE).</t>
          </li>
          <li>
            <t>Public Mailing Lists:
This is a novel data source introduced in this document. Many open-source communities and organizations maintain public mailing list archives. Email header information (Headers) typically contains the IP address of the sending client as well as the addresses of Mail Transfer Agent (MTA) servers along the path.  </t>
            <ul spacing="normal">
              <li>
                <t>Advantage: This data not only distinguishes between clients and servers but, more importantly, carries explicit timestamps (Date header). This allows us to construct a longitudinal dataset spanning over a decade, thereby tracking the evolutionary trends of IID patterns over time (e.g., the adoption process of RFC 7217).</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="interface-id-pattern-recognition-methodology">
        <name>Interface ID Pattern Recognition Methodology</name>
        <t>Regarding pattern recognition, we largely followed the methodology established in RFC 7707 (specifically the logic implemented in the <tt>addr6</tt> tool <xref target="IPv6-Toolkit"/>). However, as noted previously, the traditional method lumps all addresses not matching specific rules into "Randomized", leading to a high false-positive rate. To address this, we added a recognition step for "Seed-Similar Patterns" at the end of the original identification flow-specifically, before classifying an address as "Randomized".</t>
        <t>Recognition Principle:</t>
        <t>The core idea of this method is based on statistical probability: if an IID to be tested is generated via a cryptographic algorithm or random generator (i.e., true random), the probability of it colliding with or exhibiting high similarity to any other known IID (whether random or manually configured) in a 64-bit space is negligible. Conversely, if an IID exhibits significant similarity to an IID in a known address list, we can conclude that the IID is highly likely non-randomly generated (e.g., it may be a variation of manual configuration, specific organizational norms, etc.).</t>
        <t>Implementation:</t>
        <ol spacing="normal" type="1"><li>
            <t>Seed List Construction: We first construct a large-scale "Seed Address List" based on all addresses collected in Section 3.1.</t>
          </li>
          <li>
            <t>Similarity Detection: For any IID remaining after filtering through the preceding rules, we compare it against the IIDs in the seed list.
            </t>
            <ul spacing="normal">
              <li>
                <t>Criterion: Theoretically, calculating the Hamming Distance between two IIDs is an accurate measure of similarity. However, calculating pairwise Hamming Distances on datasets of hundreds of millions scales poorly. Therefore, we adopted a more efficient heuristic rule: if the first 4 bytes or the last 4 bytes of two IIDs are identical, they are determined to have similarity.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Classification Decision: If the IID under test is determined to be similar to an IID (from a different prefix) in the seed list, it is classified as "Seed-Similar"; otherwise, it is finally classified as "Randomized".</t>
          </li>
        </ol>
        <t>Validation:</t>
        <t>By introducing this improvement step, we successfully identified a large number of manually configured addresses that were previously misclassified as random (e.g., significantly non-random addresses like <tt>ffff:ffff:ffff:abcd</tt>). In our tests on the server dataset, this method reduced the proportion of addresses originally flagged as "Randomized" by approximately 69%. This indicates that RFC 7707 indeed significantly overestimated the randomness of server addresses, and the measurement results of this method are closer to the true state of network configuration.</t>
      </section>
    </section>
    <section anchor="measurement-results-and-analysis">
      <name>Measurement Results and Analysis</name>
      <t>This section presents the measurement results of IPv6 IID patterns based on data collected in 2024, compared with historical data cited in RFC 7707 (circa 2012). By analyzing this data, we evaluate the current state of IPv6 address scanning feasibility and privacy risks in the real world.</t>
      <section anchor="servers">
        <name>Servers</name>
        <t>The distribution of IID patterns for server addresses shows significant evolution, particularly in the decline of easily predictable patterns. The table below displays the distribution for Web servers, Mail servers, and Name servers (NS):</t>
        <table anchor="tab-servers">
          <name>IID Pattern Distribution in Server Addresses</name>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Randomized</th>
              <th align="left">Seed-Similar</th>
              <th align="left">Embedded-IPv4</th>
              <th align="left">Byte-pattern</th>
              <th align="left">IEEE-based</th>
              <th align="left">Port-Embed</th>
              <th align="left">Low-byte</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Web</td>
              <td align="left">21.52%</td>
              <td align="left">47.93%</td>
              <td align="left">12.75%</td>
              <td align="left">8.76%</td>
              <td align="left">0.27%</td>
              <td align="left">0.40%</td>
              <td align="left">8.36%</td>
            </tr>
            <tr>
              <td align="left">NS</td>
              <td align="left">1.86%</td>
              <td align="left">4.62%</td>
              <td align="left">20.62%</td>
              <td align="left">4.38%</td>
              <td align="left">1.07%</td>
              <td align="left">6.86%</td>
              <td align="left">59.52%</td>
            </tr>
            <tr>
              <td align="left">Mail</td>
              <td align="left">3.22%</td>
              <td align="left">13.06%</td>
              <td align="left">27.45%</td>
              <td align="left">3.52%</td>
              <td align="left">1.53%</td>
              <td align="left">3.50%</td>
              <td align="left">46.11%</td>
            </tr>
          </tbody>
        </table>
        <t>The most significant change observed is the marked decline in Low-byte patterns within Web and Mail servers (compared to ~90% in the RFC 7707 era). In the past, attackers could discover the vast majority of servers by simply scanning a small range (e.g., <tt>::1</tt> through <tt>::ff</tt>). The current data suggests that the hit rate for such simple linear scans has dropped drastically.</t>
        <t>However, the difficulty of scanning is not as high as the raw "Randomized" numbers might suggest. Our improved algorithm reveals that a large number of server addresses (approx. 46% in Web servers) actually fall into "Seed-Similar". These are addresses that, while not strictly Low-byte, follow specific organizational templates or non-random sequences. Consequently, while simple brute-force scanning is becoming less effective, address scanning remains feasible through Target Generation Algorithms (TGA) <xref target="_6Gen-TGA"/> which can leverage these patterns to discover targets.</t>
      </section>
      <section anchor="clients">
        <name>Clients</name>
        <t>Privacy protection for client devices has been a primary focus of IETF standardization efforts. We measured client IIDs using the BitTorrent dataset (BT-Client) and the Public Mailing List dataset (Mail-Client).</t>
        <table anchor="tab-clients">
          <name>IID Pattern Distribution in Client Addresses</name>
          <thead>
            <tr>
              <th align="left">Dataset</th>
              <th align="left">Randomized</th>
              <th align="left">Seed-Similar</th>
              <th align="left">Embedded-IPv4</th>
              <th align="left">Byte-pattern</th>
              <th align="left">IEEE-based</th>
              <th align="left">Port-Embed</th>
              <th align="left">Low-byte</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Mail-Client (2024)</td>
              <td align="left">86.93%</td>
              <td align="left">0.65%</td>
              <td align="left">2.27%</td>
              <td align="left">0.97%</td>
              <td align="left">1.51%</td>
              <td align="left">0.32%</td>
              <td align="left">7.34%</td>
            </tr>
            <tr>
              <td align="left">BT-Client</td>
              <td align="left">77.96%</td>
              <td align="left">1.96%</td>
              <td align="left">2.44%</td>
              <td align="left">2.20%</td>
              <td align="left">8.10%</td>
              <td align="left">0.11%</td>
              <td align="left">7.15%</td>
            </tr>
          </tbody>
        </table>
        <t>Notably, the proportion of IEEE-based patterns in the BT-Client dataset (~8.10%) is significantly higher than in the Mail-Client(2024) dataset (~1.51%). In-depth analysis suggests this discrepancy arises because the BitTorrent network contains not only typical user endpoints but also a large number of NAS devices and home routers running embedded BT clients. These embedded devices often lag in firmware updates and still utilize traditional SLAAC EUI-64 configurations. Therefore, we consider the Mail-Client dataset to be a more representative reference for the general population of end-user client devices.</t>
        <t>Longitudinal data based on Mail-Client shows that the usage of IEEE-based (EUI-64) addresses has dropped significantly from approximately 8.87% a decade ago to 1.51% currently. This indicates that RFC 8981 <xref target="RFC8981"/> (Temporary Addresses) and RFC 7217 <xref target="RFC7217"/> (Stable Opaque Addresses) have been widely and effectively deployed in modern operating systems (Windows, Android, iOS, Linux). This shift significantly mitigates the risk of attackers tracking specific users or identifying device manufacturers directly via endpoint IIDs. The table below shows the evolutionary trend of client IID patterns, clearly reflecting the success of privacy technologies:</t>
        <table anchor="tab-client-trend">
          <name>Evolutionary Trend of Client IID Patterns (Randomized and IEEE-based) from Mailing Lists</name>
          <thead>
            <tr>
              <th align="left">Year</th>
              <th align="left">Randomized</th>
              <th align="left">IEEE-based</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">2013</td>
              <td align="left">~79.14%</td>
              <td align="left">~8.87%</td>
            </tr>
            <tr>
              <td align="left">2016</td>
              <td align="left">~82.50%</td>
              <td align="left">~5.20%</td>
            </tr>
            <tr>
              <td align="left">2020</td>
              <td align="left">~85.10%</td>
              <td align="left">~2.30%</td>
            </tr>
            <tr>
              <td align="left">2024</td>
              <td align="left">~86.93%</td>
              <td align="left">~1.51%</td>
            </tr>
          </tbody>
        </table>
        <t>From a scanning perspective, the dominance of Randomized patterns (over 85%) makes discovering specific client endpoints via wide-range scanning extremely difficult. However, it is important to note that approximately 7% of client addresses still follow Low-byte patterns (e.g., <tt>::1</tt>, <tt>::2</tt>). This suggests that a non-negligible fraction of client devices-potentially manually configured workstations or servers within client networks-remain vulnerable to simple brute-force scanning techniques. Attackers may specifically target this subset of addresses to gain an initial foothold in client networks.</t>
      </section>
      <section anchor="routers">
        <name>Routers</name>
        <t>Router address measurements reveal a massive discrepancy in configuration strategies between the general network infrastructure and the client edge network.</t>
        <table anchor="tab-routers">
          <name>IID Pattern Distribution in Router Addresses</name>
          <thead>
            <tr>
              <th align="left">Dataset</th>
              <th align="left">Randomized</th>
              <th align="left">Seed-Similar</th>
              <th align="left">Embedded-IPv4</th>
              <th align="left">Byte-pattern</th>
              <th align="left">IEEE-based</th>
              <th align="left">Port-Embed</th>
              <th align="left">Low-byte</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Router</td>
              <td align="left">2.65%</td>
              <td align="left">3.19%</td>
              <td align="left">12.29%</td>
              <td align="left">12.14%</td>
              <td align="left">1.87%</td>
              <td align="left">3.02%</td>
              <td align="left">64.83%</td>
            </tr>
            <tr>
              <td align="left">Client-Edge-Router</td>
              <td align="left">36.07%</td>
              <td align="left">2.68%</td>
              <td align="left">5.91%</td>
              <td align="left">6.21%</td>
              <td align="left">17.66%</td>
              <td align="left">0.45%</td>
              <td align="left">31.02%</td>
            </tr>
          </tbody>
        </table>
        <t>In general routers (derived from traceroutes to BGP prefixes), Low-byte patterns remain the absolute mainstream (~65%). Additionally, Embedded-IPv4 patterns have accounted for ~12.29%, likely due to dual-stack deployment strategies. This implies that brute-force scanning against network infrastructure (e.g., targeting <tt>::1</tt> or <tt>::router</tt>) remains largely effective and is a viable reconnaissance vector.</t>
        <t>For Client Edge Routers (CPEs), scanning is relatively more difficult due to a higher proportion of Randomized and IEEE-based patterns. However, Low-byte patterns still account for approximately 31% (nearly one-third) of edge devices. This indicates that while less vulnerable than the general infrastructure, a significant portion of home gateways can still be discovered using traditional scanning methods targeting small ranges.</t>
        <t>A critical finding is that approximately 17.66% of CPE devices still default to using IEEE-based patterns. This behavior constitutes a significant privacy risk. The EUI-64 address directly exposes the device manufacturer (via OUI) and provides a stable identifier that allows external observers to track the entire home network over time, effectively functioning as a "Super Cookie". This highlights the urgency of enforcing RFC 8064 <xref target="RFC8064"/> on edge devices to eliminate this residual privacy vulnerability.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The implications of the observed IID patterns on network reconnaissance and user privacy (specifically regarding address scanning feasibility and CPE privacy risks) are discussed in detail in Section 4.</t>
      <t>Regarding the measurement methodology itself, this study adhered to ethical research principles to minimize impact on the network. Active measurements (such as traceroutes) were rate-limited to avoid congestion. For passive data collection from public mailing lists, only IP address information and timestamps were extracted; no personally identifiable information (PII), such as email addresses or message content, was stored or analyzed.</t>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>The data in this document indicates that IPv6 address Interface Identifier allocation patterns have undergone tremendous changes. While the general decrease in Low-byte patterns has increased the difficulty of traditional brute-force scanning, it remains feasible to discover the vast majority of servers and routers using heuristic methods. Furthermore, the configuration lag in edge routers remains a shortcoming in privacy protection. Future network measurements and security assessments should be based on these updated data models.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4862">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC7217">
          <front>
            <title>A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC)</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another. This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users. The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7217"/>
          <seriesInfo name="DOI" value="10.17487/RFC7217"/>
        </reference>
        <reference anchor="RFC8981">
          <front>
            <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8981"/>
          <seriesInfo name="DOI" value="10.17487/RFC8981"/>
        </reference>
        <reference anchor="RFC8064">
          <front>
            <title>Recommendation on Stable IPv6 Interface Identifiers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document changes the recommended default Interface Identifier (IID) generation scheme for cases where Stateless Address Autoconfiguration (SLAAC) is used to generate a stable IPv6 address. It recommends using the mechanism specified in RFC 7217 in such cases, and recommends against embedding stable link-layer addresses in IPv6 IIDs. It formally updates RFC 2464, RFC 2467, RFC 2470, RFC 2491, RFC 2492, RFC 2497, RFC 2590, RFC 3146, RFC 3572, RFC 4291, RFC 4338, RFC 4391, RFC 5072, and RFC 5121. This document does not change any existing recommendations concerning the use of temporary addresses as specified in RFC 4941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8064"/>
          <seriesInfo name="DOI" value="10.17487/RFC8064"/>
        </reference>
        <reference anchor="RFC8415">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="November" year="2018"/>
            <abstract>
              <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
        </reference>
        <reference anchor="RFC7707">
          <front>
            <title>Network Reconnaissance in IPv6 Networks</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>IPv6 offers a much larger address space than that of its IPv4 counterpart. An IPv6 subnet of size /64 can (in theory) accommodate approximately 1.844 * 10^19 hosts, thus resulting in a much lower host density (#hosts/#addresses) than is typical in IPv4 networks, where a site typically has 65,000 or fewer unique addresses. As a result, it is widely assumed that it would take a tremendous effort to perform address-scanning attacks against IPv6 networks; therefore, IPv6 address-scanning attacks have been considered unfeasible. This document formally obsoletes RFC 5157, which first discussed this assumption, by providing further analysis on how traditional address-scanning techniques apply to IPv6 networks and exploring some additional techniques that can be employed for IPv6 network reconnaissance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7707"/>
          <seriesInfo name="DOI" value="10.17487/RFC7707"/>
        </reference>
        <reference anchor="RFC4380">
          <front>
            <title>Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>We propose here a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP; we call this the Teredo service. Running the service requires the help of "Teredo servers" and "Teredo relays". The Teredo servers are stateless, and only have to manage a small fraction of the traffic between Teredo clients; the Teredo relays act as IPv6 routers between the Teredo service and the "native" IPv6 Internet. The relays can also provide interoperability with hosts using other transition mechanisms such as "6to4". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4380"/>
          <seriesInfo name="DOI" value="10.17487/RFC4380"/>
        </reference>
        <reference anchor="RFC5214">
          <front>
            <title>Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)</title>
            <author fullname="F. Templin" initials="F." surname="Templin"/>
            <author fullname="T. Gleeson" initials="T." surname="Gleeson"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) connects dual-stack (IPv6/IPv4) nodes over IPv4 networks. ISATAP views the IPv4 network as a link layer for IPv6 and supports an automatic tunneling abstraction similar to the Non-Broadcast Multiple Access (NBMA) model. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5214"/>
          <seriesInfo name="DOI" value="10.17487/RFC5214"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IPv6-Toolkit" target="https://github.com/fgont/ipv6toolkit">
          <front>
            <title>SI6 Networks' IPv6 Toolkit</title>
            <author initials="F." surname="Gont">
              <organization/>
            </author>
            <date year="2013"/>
          </front>
        </reference>
        <reference anchor="Draft-P2P">
          <front>
            <title>Measuring IPv6 Traffic in BitTorrent Networks</title>
            <author initials="M." surname="Defeche">
              <organization/>
            </author>
            <author initials="E." surname="Vyncke">
              <organization/>
            </author>
            <date year="2009"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vyncke-ipv6-traffic-in-p2p-networks-01"/>
        </reference>
        <reference anchor="_6Gen-TGA">
          <front>
            <title>Target Generation for Internet-wide IPv6 Scanning</title>
            <author initials="A." surname="Murdock">
              <organization/>
            </author>
            <author initials="F." surname="Li">
              <organization/>
            </author>
            <author initials="P." surname="Bramsen">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="V." surname="Paxson">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
          <seriesInfo name="ACM IMC" value="2017"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
