IPv8: A Protocol Proposal That Fails Before the Payload

Blog ENG - Cisco - Post 1 2026

IPv8 sounds like a natural successor to IPv4 and IPv6. That is precisely why the recent discussion around it deserves a careful reading.
The central point is simple:

IPv8 is not an Internet standard, it is an individual Internet-Draft, and existing IPv4 infrastructure cannot simply forward packets with an IP Version field set to 8 as if they were ordinary IPv4 packets.

The claim of full backward compatibility fails before the payload is ever considered. The issue is not only procedural, and it is not only technical; it is both. The document has no formal standing in the IETF standards process, while its proposed packet format and transition model do not support the operational meaning of native IPv4 compatibility.

The useful distinction is this: coexistence is not compatibility. A protocol can coexist with IPv4 by using translation, encapsulation, gateways, downgraded packets, or special edge behavior. That does not mean existing IPv4 routers, hosts, firewalls, tooling, and operational models can process the new protocol natively. In protocol design, compatibility is not established by intention; it is demonstrated by what deployed systems actually do when the packet arrives.

The Procedural Issue: an Internet-Draft Is Not an Internet Standard

The document commonly referred to as IPv8 is draft-thain-ipv8-02, an individual Internet-Draft. That matters.
An Internet-Draft is not an Internet Standard, not an adopted IETF working-group output, and not a normative protocol specification. It is a working document: useful for discussion, revision, criticism, or abandonment, but not evidence of IETF endorsement.

This distinction is not bureaucratic hair-splitting.
In Internet architecture, process is part of the engineering system.
A protocol that expects global deployment must pass through governance, review, interoperability analysis, registry coordination, implementation feedback, and operational scrutiny. Until that happens, it should be described for what it is: a proposal, not a standard.

So the first correction is formal. IPv8 should not be described as the next IP standard, the new Internet Protocol, or an IETF-approved successor to IPv6. A more accurate description is: an individual Internet-Draft proposing a protocol suite named IPv8.

The Registry Issue: the Name IPv8 Is Not Freely Available

The name itself is already problematic.
The IP Version field is four bits wide, and IANA maintains the registry of assigned IP version numbers. In that registry:

  • version 4 is IPv4
  • version 6 is IPv6
  • version 8 is marked as reserved and historic, with reference to the earlier Pip work documented in RFC 1621.

This is not a cosmetic concern. RFC 1621 records Pip as one of the historical candidate replacements for IPv4, not as today’s Internet successor. Later IETF housekeeping moved several old experimental or historical version numbers, including version 8, into historic or reserved status.
A new proposal cannot simply behave as if version number 8 were an empty slot.

Protocol architecture has memory, and registries are part of that memory.
Reusing a historically reserved version number is not just a naming decision.
It is a governance and interoperability problem before the first packet is transmitted.

The Technical Issue: the Packet Format Does Not Match IPv4

The technical problem becomes clear as soon as the headers are placed side by side. RFC 791 defines the IPv4 Internet header with a four-bit Version field, a four-bit IHL field, and 32-bit Source and Destination Address fields.

The proposed IPv8 packet uses Version field 8 and replaces the 32-bit IPv4 source and destination address fields with 64-bit addressing components: a Source ASN Prefix plus Source Host Address, followed by a Destination ASN Prefix plus Destination Host Address. In other words, the proposed header is not simply an IPv4 packet with more generous semantics. The field offsets no longer mean the same thing.

IPv4 Internet Header Format

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |Version|  IHL  |Type of Service|          Total Length         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |         Identification        |Flags|      Fragment Offset    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Time to Live |    Protocol   |         Header Checksum       |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Source Address                          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    Destination Address                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    Options                    |    Padding    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Proposed IPv8 Packet Header Format

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |Version|  IHL  |Type of Service|          Total Length         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |         Identification        |Flags|      Fragment Offset    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Time to Live |    Protocol   |         Header Checksum       |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    Source ASN Prefix                          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    Source Host Address                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                 Destination ASN Prefix                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                 Destination Host Address                      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

For readers who do not want to parse the full ASCII diagram, the displacement can be summarized more directly:

Offset      IPv4 Meaning                 Proposed IPv8 Meaning
------      --------------------------   ------------------------------
0-3         Version/IHL/TOS/Length       Version/IHL/TOS/Length
4-7         ID/Flags/Fragment Offset     ID/Flags/Fragment Offset
8-11        TTL/Protocol/Checksum        TTL/Protocol/Checksum
12-15       Source Address               Source ASN Prefix
16-19       Destination Address          Source Host Address
20-23       Options, if IHL > 5          Destination ASN Prefix
24-27       Options, if IHL > 6          Destination Host Address

This table is the core of the technical argument.
In IPv4, bytes 12-15 are the source address and bytes 16-19 are the destination address. In the proposed IPv8 header, bytes 16-19 are not the destination address; they are the Source Host Address.
Therefore, even if a non-conforming IPv4 device ignored the Version field and tried to parse the packet as IPv4, it would read the wrong fields.
That is not backward compatibility. That is misinterpretation.

The Router Behavior Issue: RFC 1812 Drops the Packet

The packet-format mismatch is already enough to reject the native-compatibility claim. RFC 1812 makes the point even stronger.

Before an IPv4 router processes any IP packet, RFC 1812 requires it to perform basic validity checks on the IP header. One of those checks is explicit: the IP version number must be 4. If a packet fails that validation, it is discarded rather than forwarded as IPv4.

This means that a conforming IPv4 router must not forward a packet with Version field 8 as though it were IPv4. The failure occurs at the first four bits of the header. This is why the title is not only rhetorical: the proposal fails before the payload.

It also clarifies the TTL discussion. Under RFC 1812, a router decrements TTL when it forwards a valid IPv4 packet. A packet with Version field 8 does not pass IPv4 validation in the first place. The correct formal statement is therefore not that IPv8 forwarding by IPv4 infrastructure is not guaranteed. It is stronger: native forwarding of such a packet is excluded by conforming IPv4 router behavior.

Coexistence Is Not Compatibility

The IPv8 draft attempts to preserve the backward-compatibility claim by stating that IPv8 devices send IPv4 packets to IPv4-only devices and that IPv4-only devices should never receive a packet with Version field 8.
It also describes boundary behavior where IPv8 packets are downgraded to IPv4, and an 8to4 mechanism in which IPv8 packets traverse IPv4-only networks by encapsulation.

That is not native backward compatibility. That is a transition model.
There is nothing wrong with transition models in principle. The Internet survives because translation, tunneling, encapsulation, and staged deployment exist.
But they must be named correctly. If an IPv8 node has to detect neighbor capability, construct a different packet per next hop, strip prefixes, maintain translation state, or encapsulate the original packet inside IPv4, then the IPv8 packet is not being processed natively by existing IPv4 infrastructure. 
This distinction should be the backbone of the discussion: coexistence can be engineered; compatibility must be demonstrated on the wire.

The Operational Model Is Much Larger Than the Compatibility Claim

The proposal is not simply IPv4 with longer addresses. It introduces a broader operating model: DNS8, A8 records, ARP8, ICMPv8, eBGP8, OSPF8, IS-IS8, WHOIS8, Zone Servers, ACL8, DHCP8, NetLog8, XLATE8, WiFi8, Update8, IPv8 MIB, SNMPv8, and new socket constructs such as AF_INET8 and sockaddr_in8.
The draft also lists mandatory routing behavior, including eBGP8 and OSPF8 for Layer 3 devices.

This is where the architecture becomes difficult to reconcile with the phrase “no modification required”. A focused protocol proposal usually tries to minimize its blast radius. This one expands the blast radius across addressing, routing, DNS, host APIs, management, telemetry, access control, update behavior, and device compliance.

That does not automatically make the idea invalid as a thought experiment.
It does, however, make the compatibility claim much harder to defend.
A system that requires new stack behavior, new routing semantics, new DNS records, new resolver behavior, and new control-plane assumptions is not a drop-in evolution of IPv4. It is a replacement program with a compatibility layer attached.

The Layering Issue: Management Ambition Bleeds into Protocol Design

A particularly revealing aspect of the draft is its attempt to unify network telemetry, authentication, name resolution, time synchronization, access control, and translation into a Zone Server platform. The abstract also states that every manageable element in an IPv8 network is authorized through OAuth2 JWT tokens served from a local cache.

The issue is not that identity, authorization, telemetry, or policy are unimportant. They are fundamental in modern operations. The issue is architectural placement. IP is a network-layer protocol. OAuth2 and JWT belong to a different layer of the stack and a different set of operational assumptions.

Mature architecture is often less about adding capabilities than about placing them where failure, scaling, and responsibility can be managed. Collapsing naming, identity, telemetry, routing validation, access control, and translation into one broad control construct may look coherent on paper, but it creates a very large operational and failure domain.

Registry and Addressing Concerns Beyond the Version Field

The registry concern does not stop at the Version field. The draft gives special meaning to values such as 127.0.0.0/8, 100.0.0.0/8, and 222.0.0.0/8.

Some of those values appear in the IPv8 r.r.r.r prefix field rather than directly as IPv4 host addresses, so not every reference is a literal IPv4 wire-address collision. But the operational confusion is still real. In existing IPv4 operations, 127.0.0.0/8 has a strong loopback meaning, 100.64.0.0/10 is Shared Address Space within the broader 100/8 range, and 222/8 is globally allocated.

The broader architectural point is simple: protocol design should reduce ambiguity, not create new numeric meanings that operators, parsers, documentation, and tooling must constantly disambiguate.

Why This Matters for Operators

For operators, the practical lesson is straightforward:

  • Do not treat IPv8 as a roadmap item, a coming standard, or a credible replacement path for IPv4 or IPv6.
  • Do not confuse an individual Internet-Draft with an IETF standard.
  • Most importantly, evaluate compatibility claims by looking at what routers, host stacks, registries, firewalls, resolvers, and operational tooling actually do with the packet.

That test is deliberately concrete. If the packet is dropped by a conforming IPv4 router, it is not natively backward compatible. If the solution requires translation, encapsulation, or new capability discovery, it may coexist with IPv4, but it is not the same thing as being processed by IPv4 infrastructure as-is.

Public Perception: a Bounded “April Fool” Argument

Several public discussions have treated the proposal as unserious or late-April-Fool-like. That perception is worth mentioning, but it should not carry the argument. 

Whether the document was meant as a serious proposal, an overambitious thought experiment, or an accidental parody is less important than the engineering facts: the registry does not support the name, the header does not match IPv4, conforming IPv4 routers do not forward Version 8 packets, and the proposed operating model requires far more than transparent compatibility.

The irony is architectural, not comedic. IPv8 promises no forced migration while describing a new packet version, a new address model, new DNS records, new socket APIs, new routing behavior, new device obligations, and a broad Zone Server control plane. That is not native backward compatibility. It is coexistence through replacement machinery.

Conclusion

The IPv8 proposal is useful, although perhaps not in the way its author intended.
It reminds us that Internet architecture is not shaped by names, ambition, or syntactic similarity to what already exists. It is shaped by invariants: packet formats, registries, deployed behavior, operational trust, and the long memory of systems that have been built, optimized, hardened, automated, misunderstood, repaired, and kept alive for decades.

Calling something IPv8 does not make it the successor to IPv6, just as extending a familiar header does not make a new protocol backward compatible. A packet is either accepted, parsed, forwarded, filtered, translated, encapsulated, or dropped by real devices following real rules. In this case, the proposed Version field alone is enough to break the central claim. Beyond that, the shifted address fields, registry conflicts, new DNS semantics, new socket APIs, new routing expectations, and management-plane coupling all point in the same direction.

The deeper lesson is architectural. Mature infrastructure is not hostile to change, but it is hostile to ambiguity disguised as simplicity.
The Internet has evolved precisely because its most important transitions were forced to respect deployment reality, failure domains, interoperability, governance, and operational cost. A proposal that overlooks those constraints may still be interesting as a thought experiment, but it cannot be treated as a credible protocol transition plan.

For that reason, IPv8 should not be described as an emerging Internet standard, nor as a practical replacement for IPv4 or IPv6.

The accurate assessment is narrower and firmer:

IPv8 is a non-standard individual Internet-Draft with unresolved procedural, registry, packet-processing, layering, and operational contradictions.

Compatibility is not established by a sentence in a specification; it is proven by the behavior of real networks when the packet arrives.