【转载】RFC5952 IPv6地址文本格式的建议规范

Internet Engineering Task Force (IETF) S. Kawamura
Request for Comments: 5952 NEC BIGLOBE, Ltd.
Updates: 4291 M. Kawashima
Category: Standards Track NEC AccessTechnica, Ltd.
ISSN: 2070-1721 August 2010

     A Recommendation for IPv6 Address Text Representation

Abstract

As IPv6 deployment increases, there will be a dramatic increase in
the need to use IPv6 addresses in text. While the IPv6 address
architecture in Section 2.2 of RFC 4291 describes a flexible model
for text representation of an IPv6 address, this flexibility has been
causing problems for operators, system engineers, and users. This
document defines a canonical textual representation format. It does
not define a format for internal storage, such as within an
application or database. It is expected that the canonical format
will be followed by humans and systems when representing IPv6
addresses as text, but all implementations must accept and be able to
handle any legitimate RFC 4291 format.

Status of This Memo

This is an Internet Standards Track document.

This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 5741.

Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc5952.

Kawamura & Kawashima Standards Track [Page 1]

RFC 5952 IPv6 Text Representation August 2010

Copyright Notice

Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.

Kawamura & Kawashima Standards Track [Page 2]

RFC 5952 IPv6 Text Representation August 2010

Table of Contents

  1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
    1.1. Requirements Language . . . . . . . . . . . . . . . . . . 4
  2. Text Representation Flexibility of RFC 4291 . . . . . . . . . 4
    2.1. Leading Zeros in a 16-Bit Field . . . . . . . . . . . . . 4
    2.2. Zero Compression . . . . . . . . . . . . . . . . . . . . . 5
    2.3. Uppercase or Lowercase . . . . . . . . . . . . . . . . . . 6
  3. Problems Encountered with the Flexible Model . . . . . . . . . 6
    3.1. Searching . . . . . . . . . . . . . . . . . . . . . . . . 6
    3.1.1. General Summary . . . . . . . . . . . . . . . . . . . 6
    3.1.2. Searching Spreadsheets and Text Files . . . . . . . . 6
    3.1.3. Searching with Whois . . . . . . . . . . . . . . . . . 6
    3.1.4. Searching for an Address in a Network Diagram . . . . 7
    3.2. Parsing and Modifying . . . . . . . . . . . . . . . . . . 7
    3.2.1. General Summary . . . . . . . . . . . . . . . . . . . 7
    3.2.2. Logging . . . . . . . . . . . . . . . . . . . . . . . 7
    3.2.3. Auditing: Case 1 . . . . . . . . . . . . . . . . . . . 8
    3.2.4. Auditing: Case 2 . . . . . . . . . . . . . . . . . . . 8
    3.2.5. Verification . . . . . . . . . . . . . . . . . . . . . 8
    3.2.6. Unexpected Modifying . . . . . . . . . . . . . . . . . 8
    3.3. Operating . . . . . . . . . . . . . . . . . . . . . . . . 8
    3.3.1. General Summary . . . . . . . . . . . . . . . . . . . 8
    3.3.2. Customer Calls . . . . . . . . . . . . . . . . . . . . 9
    3.3.3. Abuse . . . . . . . . . . . . . . . . . . . . . . . . 9
    3.4. Other Minor Problems . . . . . . . . . . . . . . . . . . . 9
    3.4.1. Changing Platforms . . . . . . . . . . . . . . . . . . 9
    3.4.2. Preference in Documentation . . . . . . . . . . . . . 9
    3.4.3. Legibility . . . . . . . . . . . . . . . . . . . . . . 9
  4. A Recommendation for IPv6 Text Representation . . . . . . . . 10
    4.1. Handling Leading Zeros in a 16-Bit Field . . . . . . . . . 10
    4.2. "::" Usage . . . . . . . . . . . . . . . . . . . . . . . . 10
    4.2.1. Shorten as Much as Possible . . . . . . . . . . . . . 10
    4.2.2. Handling One 16-Bit 0 Field . . . . . . . . . . . . . 10
    4.2.3. Choice in Placement of "::" . . . . . . . . . . . . . 10
    4.3. Lowercase . . . . . . . . . . . . . . . . . . . . . . . . 10
  5. Text Representation of Special Addresses . . . . . . . . . . . 11
  6. Notes on Combining IPv6 Addresses with Port Numbers . . . . . 11
  7. Prefix Representation . . . . . . . . . . . . . . . . . . . . 12
  8. Security Considerations . . . . . . . . . . . . . . . . . . . 12
  9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12
  10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
    10.1. Normative References . . . . . . . . . . . . . . . . . . . 12
    10.2. Informative References . . . . . . . . . . . . . . . . . . 13
    Appendix A. For Developers . . . . . . . . . . . . . . . . . . . 14

Kawamura & Kawashima Standards Track [Page 3]

RFC 5952 IPv6 Text Representation August 2010

  1. Introduction

A single IPv6 address can be text represented in many ways. Examples
are shown below.

  2001:db8:0:0:1:0:0:1

  2001:0db8:0:0:1:0:0:1

  2001:db8::1:0:0:1

  2001:db8::0:1:0:0:1

  2001:0db8::1:0:0:1

  2001:db8:0:0:1::1

  2001:db8:0000:0:1::1

  2001:DB8:0:0:1::1

All of the above examples represent the same IPv6 address. This
flexibility has caused many problems for operators, systems
engineers, and customers. The problems are noted in Section 3. A
canonical representation format to avoid problems is introduced in
Section 4.

1.1. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].

  1. Text Representation Flexibility of RFC 4291

Examples of flexibility in Section 2.2 of [RFC4291] are described
below.

2.1. Leading Zeros in a 16-Bit Field

  'It is not necessary to write the leading zeros in an individual
  field.'

Conversely, it is also not necessary to omit leading zeros. This
means that it is possible to select from representations such as
those in the following example. The final 16-bit field is different,
but all of these addresses represent the same address.

Kawamura & Kawashima Standards Track [Page 4]

RFC 5952 IPv6 Text Representation August 2010

  2001:db8:aaaa:bbbb:cccc:dddd:eeee:0001

  2001:db8:aaaa:bbbb:cccc:dddd:eeee:001

  2001:db8:aaaa:bbbb:cccc:dddd:eeee:01

  2001:db8:aaaa:bbbb:cccc:dddd:eeee:1

2.2. Zero Compression

  'A special syntax is available to compress the zeros.  The use of
  "::" indicates one or more groups of 16 bits of zeros.'

It is possible to select whether or not to omit just one 16-bit 0
field.

  2001:db8:aaaa:bbbb:cccc:dddd::1

  2001:db8:aaaa:bbbb:cccc:dddd:0:1

In cases where there is more than one field of only zeros, there is a
choice of how many fields can be shortened.

  2001:db8:0:0:0::1

  2001:db8:0:0::1

  2001:db8:0::1

  2001:db8::1

In addition, Section 2.2 of [RFC4291] notes,

  'The "::" can only appear once in an address.'

This gives a choice on where in a single address to compress the
zero.

  2001:db8::aaaa:0:0:1

  2001:db8:0:0:aaaa::1

Kawamura & Kawashima Standards Track [Page 5]

RFC 5952 IPv6 Text Representation August 2010

2.3. Uppercase or Lowercase

[RFC4291] does not mention any preference of uppercase or lowercase.

  2001:db8:aaaa:bbbb:cccc:dddd:eeee:aaaa

  2001:db8:aaaa:bbbb:cccc:dddd:eeee:AAAA

  2001:db8:aaaa:bbbb:cccc:dddd:eeee:AaAa
  1. Problems Encountered with the Flexible Model

3.1. Searching

3.1.1. General Summary

A search of an IPv6 address if conducted through a UNIX system is
usually case sensitive and extended options that allow for regular
expression use will come in handy. However, there are many
applications in the Internet today that do not provide this
capability. When searching for an IPv6 address in such systems, the
system engineer will have to try each and every possibility to search
for an address. This has critical impacts, especially when trying to
deploy IPv6 over an enterprise network.

3.1.2. Searching Spreadsheets and Text Files

Spreadsheet applications and text editors on GUI systems rarely have
the ability to search for text using regular expression. Moreover,
there are many non-engineers (who are not aware of case sensitivity
and regular expression use) that use these applications to manage IP
addresses. This has worked quite well with IPv4 since text
representation in IPv4 has very little flexibility. There is no
incentive to encourage these non-engineers to change their tool or
learn regular expression when they decide to go dual-stack. If the
entry in the spreadsheet reads, 2001:db8::1:0:0:1, but the search was
conducted as 2001:db8:0:0:1::1, this will show a result of no match.
One example where this will cause a problem is, when the search is
being conducted to assign a new address from a pool, and a check is
being done to see if it is not in use. This may cause problems for
the end-hosts or end-users. This type of address management is very
often seen in enterprise networks and ISPs.

3.1.3. Searching with Whois

The "whois" utility is used by a wide range of people today. When a
record is set to a database, one will likely check the output to see
if the entry is correct. If an entity was recorded as 2001:db8::/48,

Kawamura & Kawashima Standards Track [Page 6]

RFC 5952 IPv6 Text Representation August 2010

but the whois output showed 2001:0db8:0000::/48, most non-engineers
would think that their input was wrong and will likely retry several
times or make a frustrated call to the database hostmaster. If there
was a need to register the same prefix on different systems, and each
system showed a different text representation, this would confuse
people even more. Although this document focuses on addresses rather
than prefixes, it is worth mentioning the prefix problems because the
problems encountered with addresses and prefixes are mostly equal.

3.1.4. Searching for an Address in a Network Diagram

Network diagrams and blueprints often show what IP addresses are
assigned to a system devices. In times of trouble shooting there may
be a need to search through a diagram to find the point of failure
(for example, if a traceroute stopped at 2001:db8::1, one would
search the diagram for that address). This is a technique quite
often in use in enterprise networks and managed services. Again, the
different flavors of text representation will result in a time-
consuming search leading to longer mean times to restoration (MTTR)
in times of trouble.

3.2. Parsing and Modifying

3.2.1. General Summary

With all the possible methods of text representation, each
application must include a module, object, link, etc. to a function
that will parse IPv6 addresses in a manner such that no matter how it
is represented, they will mean the same address. Many system
engineers who integrate complex computer systems for corporate
customers will have difficulties finding that their favorite tool
will not have this function, or will encounter difficulties such as
having to rewrite their macros or scripts for their customers.

3.2.2. Logging

If an application were to output a log summary that represented the
address in full (such as 2001:0db8:0000:0000:1111:2222:3333:4444),
the output would be highly unreadable compared to the IPv4 output.
The address would have to be parsed and reformed to make it useful
for human reading. Sometimes logging for critical systems is done by
mirroring the same traffic to two different systems. Care must be
taken so that no matter what the log output is, the logs should be
parsed so they are equivalent.

Kawamura & Kawashima Standards Track [Page 7]

RFC 5952 IPv6 Text Representation August 2010

3.2.3. Auditing: Case 1

When a router or any other network appliance machine configuration is
audited, there are many methods to compare the configuration
information of a node. Sometimes auditing will be done by just
comparing the changes made each day. In this case, if configuration
was done such that 2001:db8::1 was changed to 2001:0db8:0000:0000:
0000:0000:0000:0001 just because the new engineer on the block felt
it was better, a simple diff will show that a different address was
configured. If this was done on a wide scale network, people will be
focusing on 'why the extra zeros were put in' instead of doing any
real auditing. Lots of tools are just plain diffs that do not take
into account address representation rules.

3.2.4. Auditing: Case 2

Node configurations will be matched against an information system
that manages IP addresses. If output notation is different, there
will need to be a script that is implemented to cover for this. The
result of an SNMP GET operation, converted to text and compared to a
textual address written by a human is highly unlikely to match on the
first try.

3.2.5. Verification

Some protocols require certain data fields to be verified. One
example of this is X.509 certificates. If an IPv6 address field in a
certificate was incorrectly verified by converting it to text and
making a simple textual comparison to some other address, the
certificate may be mistakenly shown as being invalid due to a
difference in text representation methods.

3.2.6. Unexpected Modifying

Sometimes, a system will take an address and modify it as a
convenience. For example, a system may take an input of
2001:0db8:0::1 and make the output 2001:db8::1. If the zeros were
input for a reason, the outcome may be somewhat unexpected.

3.3. Operating

3.3.1. General Summary

When an operator sets an IPv6 address of a system as 2001:db8:0:0:1:
0:0:1, the system may take the address and show the configuration
result as 2001:DB8::1:0:0:1. Someone familiar with IPv6 address
representation will know that the right address is set, but not
everyone may understand this.

Kawamura & Kawashima Standards Track [Page 8]

RFC 5952 IPv6 Text Representation August 2010

3.3.2. Customer Calls

When a customer calls to inquire about a suspected outage, IPv6
address representation should be handled with care. Not all
customers are engineers, nor do they have a similar skill level in
IPv6 technology. The network operations center will have to take
extra steps to humanly parse the address to avoid having to explain
to the customers that 2001:db8:0:1::1 is the same as
2001:db8::1:0:0:0:1. This is one thing that will never happen in
IPv4 because IPv4 addresses cannot be abbreviated.

3.3.3. Abuse

Network abuse reports generally include the abusing IP address. This
'reporting' could take any shape or form of the flexible model. A
team that handles network abuse must be able to tell the difference
between a 2001:db8::1:0:1 and 2001:db8:1::0:1. Mistakes in the
placement of the "::" will result in a critical situation. A system
that handles these incidents should be able to handle any type of
input and parse it in a correct manner. Also, incidents are reported
over the phone. It is unnecessary to report if the letter is
uppercase or lowercase. However, when a letter is spelled uppercase,
people tend to specify that it is uppercase, which is unnecessary
information.

3.4. Other Minor Problems

3.4.1. Changing Platforms

When an engineer decides to change the platform of a running service,
the same code may not work as expected due to the difference in IPv6
address text representation. Usually, a change in a platform (e.g.,
Unix to Windows, Cisco to Juniper) will result in a major change of
code anyway, but flexibility in address representation will increase
the work load.

3.4.2. Preference in Documentation

A document that is edited by more than one author may become harder
to read.

3.4.3. Legibility

Capital case D and 0 can be quite often misread. Capital B and 8 can
also be misread.

Kawamura & Kawashima Standards Track [Page 9]

RFC 5952 IPv6 Text Representation August 2010

  1. A Recommendation for IPv6 Text Representation

A recommendation for a canonical text representation format of IPv6
addresses is presented in this section. The recommendation in this
document is one that complies fully with [RFC4291], is implemented by
various operating systems, and is human friendly. The recommendation
in this section SHOULD be followed by systems when generating an
address to be represented as text, but all implementations MUST
accept and be able to handle any legitimate [RFC4291] format. It is
advised that humans also follow these recommendations when spelling
an address.

4.1. Handling Leading Zeros in a 16-Bit Field

Leading zeros MUST be suppressed. For example, 2001:0db8::0001 is
not acceptable and must be represented as 2001:db8::1. A single 16-
bit 0000 field MUST be represented as 0.

4.2. "::" Usage

4.2.1. Shorten as Much as Possible

The use of the symbol "::" MUST be used to its maximum capability.
For example, 2001:db8:0:0:0:0:2:1 must be shortened to 2001:db8::2:1.
Likewise, 2001:db8::0:1 is not acceptable, because the symbol "::"
could have been used to produce a shorter representation 2001:db8::1.

4.2.2. Handling One 16-Bit 0 Field

The symbol "::" MUST NOT be used to shorten just one 16-bit 0 field.
For example, the representation 2001:db8:0:1:1:1:1:1 is correct, but
2001:db8::1:1:1:1:1 is not correct.

4.2.3. Choice in Placement of "::"

When there is an alternative choice in the placement of a "::", the
longest run of consecutive 16-bit 0 fields MUST be shortened (i.e.,
the sequence with three consecutive zero fields is shortened in 2001:
0:0:1:0:0:0:1). When the length of the consecutive 16-bit 0 fields
are equal (i.e., 2001:db8:0:0:1:0:0:1), the first sequence of zero
bits MUST be shortened. For example, 2001:db8::1:0:0:1 is correct
representation.

4.3. Lowercase

The characters "a", "b", "c", "d", "e", and "f" in an IPv6 address
MUST be represented in lowercase.

Kawamura & Kawashima Standards Track [Page 10]

RFC 5952 IPv6 Text Representation August 2010

  1. Text Representation of Special Addresses

Addresses such as IPv4-Mapped IPv6 addresses, ISATAP [RFC5214], and
IPv4-translatable addresses [ADDR-FORMAT] have IPv4 addresses
embedded in the low-order 32 bits of the address. These addresses
have a special representation that may mix hexadecimal and dot
decimal notations. The decimal notation may be used only for the
last 32 bits of the address. For these addresses, mixed notation is
RECOMMENDED if the following condition is met: the address can be
distinguished as having IPv4 addresses embedded in the lower 32 bits
solely from the address field through the use of a well-known prefix.
Such prefixes are defined in [RFC4291] and [RFC2765] at the time of
this writing. If it is known by some external method that a given
prefix is used to embed IPv4, it MAY be represented as mixed
notation. Tools that provide options to specify prefixes that are
(or are not) to be represented as mixed notation may be useful.

There is a trade-off here where a recommendation to achieve an exact
match in a search (no dot decimals whatsoever) and a recommendation
to help the readability of an address (dot decimal whenever possible)
does not result in the same solution. The above recommendation is
aimed at fixing the representation as much as possible while leaving
the opportunity for future well-known prefixes to be represented in a
human-friendly manner as tools adjust to newly assigned prefixes.

The text representation method noted in Section 4 should be applied
for the leading hexadecimal part (i.e., ::ffff:192.0.2.1 instead of
0:0:0:0:0:ffff:192.0.2.1).

  1. Notes on Combining IPv6 Addresses with Port Numbers

There are many different ways to combine IPv6 addresses and port
numbers that are represented in text. Examples are shown below.

o [2001:db8::1]:80

o 2001:db8::1:80

o 2001:db8::1.80

o 2001:db8::1 port 80

o 2001:db8::1p80

o 2001:db8::1#80

The situation is not much different in IPv4, but the most ambiguous
case with IPv6 is the second bullet. This is due to the "::"usage in

Kawamura & Kawashima Standards Track [Page 11]

RFC 5952 IPv6 Text Representation August 2010

IPv6 addresses. This style is NOT RECOMMENDED because of its
ambiguity. The [] style as expressed in [RFC3986] SHOULD be
employed, and is the default unless otherwise specified. Other
styles are acceptable when there is exactly one style for the given
context and cross-platform portability does not become an issue. For
URIs containing IPv6 address literals, [RFC3986] MUST be followed, as
well as the rules defined in this document.

  1. Prefix Representation

Problems with prefixes are the same as problems encountered with
addresses. The text representation method of IPv6 prefixes should be
no different from that of IPv6 addresses.

  1. Security Considerations

This document notes some examples where IPv6 addresses are compared
in text format. The example on Section 3.2.5 is one that may cause a
security risk if used for access control. The common practice of
comparing X.509 data is done in binary format.

  1. Acknowledgements

The authors would like to thank Jan Zorz, Randy Bush, Yuichi Minami,
and Toshimitsu Matsuura for their generous and helpful comments in
kick starting this document. We also would like to thank Brian
Carpenter, Akira Kato, Juergen Schoenwaelder, Antonio Querubin, Dave
Thaler, Brian Haley, Suresh Krishnan, Jerry Huang, Roman Donchenko,
Heikki Vatiainen, Dan Wing, and Doug Barton for their input. Also, a
very special thanks to Ron Bonica, Fred Baker, Brian Haberman, Robert
Hinden, Jari Arkko, and Kurt Lindqvist for their support in bringing
this document to light in IETF working groups.

  1. References

10.1. Normative References

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.

[RFC2765] Nordmark, E., "Stateless IP/ICMP Translation Algorithm
(SIIT)", RFC 2765, February 2000.

[RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter,
"Uniform Resource Identifier (URI): Generic Syntax",
STD 66, RFC 3986, January 2005.

Kawamura & Kawashima Standards Track [Page 12]

RFC 5952 IPv6 Text Representation August 2010

[RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing
Architecture", RFC 4291, February 2006.

10.2. Informative References

[ADDR-FORMAT] Bao, C., "IPv6 Addressing of IPv4/IPv6 Translators",
Work in Progress, July 2010.

[RFC4038] Shin, M-K., Hong, Y-G., Hagino, J., Savola, P., and E.
Castro, "Application Aspects of IPv6 Transition",
RFC 4038, March 2005.

[RFC5214] Templin, F., Gleeson, T., and D. Thaler, "Intra-Site
Automatic Tunnel Addressing Protocol (ISATAP)",
RFC 5214, March 2008.

Kawamura & Kawashima Standards Track [Page 13]

RFC 5952 IPv6 Text Representation August 2010

Appendix A. For Developers

We recommend that developers use display routines that conform to
these rules. For example, the usage of getnameinfo() with flags
argument NI_NUMERICHOST in FreeBSD 7.0 will give a conforming output,
except for the special addresses notes in Section 5. The function
inet_ntop() of FreeBSD7.0 is a good C code reference, but should not
be called directly. See [RFC4038] for details.

Authors' Addresses

Seiichi Kawamura
NEC BIGLOBE, Ltd.
14-22, Shibaura 4-chome
Minatoku, Tokyo 108-8558
JAPAN

Phone: +81 3 3798 6085
EMail: kawamucho@mesh.ad.jp

Masanobu Kawashima
NEC AccessTechnica, Ltd.
800, Shimomata
Kakegawa-shi, Shizuoka 436-8501
JAPAN

Phone: +81 537 23 9655
EMail: kawashimam@necat.nec.co.jp

Kawamura & Kawashima Standards Track [Page 14]

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 203,271评论 5 476
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 85,275评论 2 380
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 150,151评论 0 336
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 54,550评论 1 273
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 63,553评论 5 365
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 48,559评论 1 281
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 37,924评论 3 395
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 36,580评论 0 257
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 40,826评论 1 297
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 35,578评论 2 320
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 37,661评论 1 329
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 33,363评论 4 318
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 38,940评论 3 307
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 29,926评论 0 19
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 31,156评论 1 259
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 42,872评论 2 349
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 42,391评论 2 342

推荐阅读更多精彩内容