Skip to main content

A1. IPv4 Options

This table shows how the IPv4 options are classified with regard to "mutability". Where two references are provided, the second one supercedes the first. This table is based in part on information provided in RFC 1700, "ASSIGNED NUMBERS", (October 1994).

IMMUTABLE -- included in ICV calculation

CopyClass#NameReference
000End of Options List[RFC791]
001No Operation[RFC791]
102Security[RFC1108] (historic but in use)
105Extended Security[RFC1108] (historic but in use)
106Commercial Security
1020Router Alert[RFC2113]
1021Sender Directed Multi-Destination Delivery[RFC1770]

MUTABLE -- zeroed

CopyClass#NameReference
103Loose Source Route[RFC791]
024Time Stamp[RFC791]
007Record Route[RFC791]
109Strict Source Route[RFC791]
0218Traceroute[RFC1393]

EXPERIMENTAL, SUPERCEDED -- zeroed

CopyClass#NameReference
108Stream ID[RFC791, RFC1122 (Host Req)]
0011MTU Probe[RFC1063, RFC1191 (PMTU)]
0012MTU Reply[RFC1063, RFC1191 (PMTU)]
1017Extended Internet Protocol[RFC1385, DH98 (IPv6)]
0010Experimental Measurement
1213Experimental Flow Control
1014Experimental Access Ctl
0015???
1016IMI Traffic Descriptor
1019Address Extension

Notes

NOTE: Use of the Router Alert option is potentially incompatible with use of IPsec. Although the option is immutable, its use implies that each router along a packet's path will "process" the packet and consequently might change the packet. This would happen on a hop-by-hop basis as the packet goes from router to router. Prior to being processed by the application to which the option contents are directed (e.g., Resource Reservation Protocol (RSVP)/Internet Group Management Protocol (IGMP)), the packet should encounter AH processing. However, AH processing would require that each router along the path is a member of a multicast-SA defined by the SPI. This might pose problems for packets that are not strictly source routed, and it requires multicast support techniques not currently available.

NOTE: Addition or removal of security labels (e.g., Basic Security Option (BSO), Extended Security Option (ESO), or Commercial Internet Protocol Security Option (CIPSO)) by systems along a packet's path conflicts with the classification of these IP options as immutable and is incompatible with the use of IPsec.

NOTE: End of Options List options SHOULD be repeated as necessary to ensure that the IP header ends on a 4-byte boundary in order to ensure that there are no unspecified bytes that could be used for a covert channel.