diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5579.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5579.txt')
-rw-r--r-- | doc/rfc/rfc5579.txt | 507 |
1 files changed, 507 insertions, 0 deletions
diff --git a/doc/rfc/rfc5579.txt b/doc/rfc/rfc5579.txt new file mode 100644 index 0000000..4b3b4b7 --- /dev/null +++ b/doc/rfc/rfc5579.txt @@ -0,0 +1,507 @@ + + + + + + +Independent Submission F. Templin, Ed. +Request for Comments: 5579 Boeing Research & Technology +Category: Informational February 2010 +ISSN: 2070-1721 + + + Transmission of IPv4 Packets over + Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Interfaces + +Abstract + + The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) + specifies a Non-Broadcast, Multiple Access (NBMA) interface type for + the transmission of IPv6 packets over IPv4 networks using automatic + IPv6-in-IPv4 encapsulation. The original specifications make no + provisions for the encapsulation and transmission of IPv4 packets, + however. This document specifies a method for transmitting IPv4 + packets over ISATAP interfaces. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This is a contribution to the RFC Series, independently of any other + RFC stream. The RFC Editor has chosen to publish this document at + its discretion and makes no statement about its value for + implementation or deployment. Documents approved for publication by + the RFC Editor are not a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc5579. + +IESG Note + + This RFC is not a candidate for any level of Internet Standard. The + IETF disclaims any knowledge of the fitness of this RFC for any + purpose and in particular notes that the decision to publish is not + based on IETF review for such things as security, congestion control, + or inappropriate interaction with deployed protocols. The RFC Editor + has chosen to publish this document at its discretion. Readers of + this document should exercise caution in evaluating its value for + implementation and deployment. See RFC 3932 for more information. + + + + + + +Templin Informational [Page 1] + +RFC 5579 IPv4 Packets over ISATAP February 2010 + + +Copyright Notice + + Copyright (c) 2010 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + +Table of Contents + + 1. Introduction ....................................................3 + 2. Terminology .....................................................3 + 3. ISATAP Interface Model ..........................................3 + 4. ISATAP Interface MTU ............................................4 + 5. IPv6 Operation ..................................................4 + 6. IPv4 Operation ..................................................4 + 6.1. ISATAP IPv4 Address Configuration ..........................4 + 6.2. IPv4 Route Configuration ...................................5 + 6.3. ISATAP Interface Determination .............................5 + 6.4. Next-Hop Resolution ........................................5 + 6.5. Encapsulation and Transmission .............................6 + 6.6. IPv4 Multicast Mapping .....................................6 + 6.7. Recursive Encapsulation Avoidance ..........................7 + 7. Security Considerations .........................................7 + 8. Acknowledgements ................................................7 + 9. References ......................................................7 + 9.1. Normative References .......................................7 + 9.2. Informative References .....................................8 + Appendix A. Encapsulation Avoidance ................................9 + + + + + + + + + + + + + + + + + + +Templin Informational [Page 2] + +RFC 5579 IPv4 Packets over ISATAP February 2010 + + +1. Introduction + + The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) + [RFC5214] specifies a Non-Broadcast, Multiple Access (NBMA) interface + type for the transmission of IPv6 packets over IPv4 networks using + automatic IPv6-in-IPv4 encapsulation. ISATAP interfaces therefore + typically configure IPv6 addresses and prefixes, but they do not + configure IPv4 addresses and prefixes. In typical implementations + and deployments, an ISATAP interface therefore appears as an ordinary + interface configured for IPv6 operation but with a null IPv4 + configuration. This places an unnecessary limitation on the ISATAP + domain of applicability. + + ISATAP interfaces perform automatic IPv6-in-IPv4 encapsulation over a + virtual IPv6 overlay that spans a region within a connected IPv4 + routing topology (i.e., a "site") comprising ordinary IPv4 routers. + ISATAP interfaces configure IPv6 link-local addresses that + encapsulate an IPv4 address assigned to an underlying IPv4 interface + within the IPv6 link-local prefix "fe80::/10", as specified in + Sections 6 and 7 of [RFC5214]. ISATAP interfaces may additionally + configure IPv6 addresses from a non-link-local IPv6 prefix in exactly + the same fashion. As a result, [RFC5214] extends the basic + transition mechanisms specified in [RFC4213]. + + This document specifies mechanisms and operational practices that + enable automatic IPv4-in-IPv4 encapsulation over ISATAP interfaces in + the same manner as for IPv6-in-IPv4 encapsulation. As a result, this + document also extends the IPv4-in-IPv4 tunneling mechanisms specified + in [RFC2003]. These mechanisms are useful in a wide variety of + enterprise network scenarios, e.g., as discussed in the RANGER + [RANGER] and VET [VET] proposals. + + The following sections specify IPv4 operation over ISATAP interfaces. + A working knowledge of the IPv4 and IPv6 protocols ([RFC0791] and + [RFC2460]), IPv4-in-IPv4 encapsulation [RFC2003], and IPv6-in-IPv4 + encapsulation ([RFC4213] and [RFC5214]) is assumed. + +2. Terminology + + The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, + SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this + document, are to be interpreted as described in [RFC2119]. + +3. ISATAP Interface Model + + ISATAP interfaces use automatic IPv6-in-IPv4 encapsulation to span a + region within a connected IPv4 routing topology (i.e., a "site") in a + single IPv6 hop. That is to say that the site comprises border nodes + + + +Templin Informational [Page 3] + +RFC 5579 IPv4 Packets over ISATAP February 2010 + + + with ISATAP interfaces that forward IPv6-in-IPv4 packets across the + site in a single IPv6 hop, and ordinary IPv4 routers between the + border nodes that decrement the Time to Live (TTL) in the outer IPv4 + header. Border nodes that configure ISATAP interfaces within the + same site therefore see each other as single-hop neighbors. + + ISATAP interfaces are configured over one or more of the node's + underlying IPv4 interfaces connected to the site. These underlying + IPv4 interfaces configure site- or greater-scoped IPv4 addresses, and + the underlying IPv4 interfaces of two "neighboring" ISATAP interfaces + may be separated by many IPv4 hops within the site. + + This specification simply extends the ISATAP interface model to also + support IPv4-in-IPv4 encapsulation. When IPv4-in-IPv4 encapsulation + is used, the ISATAP interface spans exactly the same underlying site + as for IPv6-in-IPv4 encapsulation. + +4. ISATAP Interface MTU + + ISATAP interface MTU considerations are exactly as specified in + Section 3.2 of [RFC4213] and apply equally for both IPv6 and IPv4 + operation. + +5. IPv6 Operation + + IPv6 operations over ISATAP interfaces are exactly as specified in + [RFC5214]. + +6. IPv4 Operation + + The following sections specify IPv4 operation over ISATAP interfaces: + +6.1. ISATAP IPv4 Address Configuration + + As for IPv6 operation, IPv4 operation requires that all ISATAP + interfaces connected to the same site configure a unique Layer 3 IPv4 + address ("L3ADDR") taken from an IPv4 prefix for the site. L3ADDR is + used for next-hop determination, but it may also be used as the + source address for packets that originate from the ISATAP interface + itself. + + When a unique "name" for the ISATAP site is required (e.g., to + distinguish it from other ISATAP sites), L3ADDR is taken from a + public IPv4 prefix. Otherwise, it may be taken from a link-local- + scoped IPv4 prefix (e.g., 169.254/16 [RFC3927]). + + Methods for ensuring L3ADDR uniqueness include dynamic allocation + using DHCP [RFC2131], manual configuration, etc. + + + +Templin Informational [Page 4] + +RFC 5579 IPv4 Packets over ISATAP February 2010 + + +6.2. IPv4 Route Configuration + + As for any IPv4 interface, IPv4 Forwarding Information Base (FIB) + entries (i.e., IPv4 routes) are configured over ISATAP interfaces via + either administrative or dynamic mechanisms. + + Next-hop addresses in FIB entries configured over an ISATAP interface + correspond to the L3ADDR assigned to the ISATAP interface of a + neighbor. + +6.3. ISATAP Interface Determination + + When the node's IPv4 layer has a packet to send, it performs an IPv4 + FIB lookup to determine the outgoing ISATAP interface and the next- + hop L3ADDR. The node then checks the packet length against the MTU + configured on the ISATAP interface. + + If the packet is no larger than the MTU, the node admits it into the + ISATAP interface without fragmentation. If the packet is larger than + the MTU, the node examines the "Don't Fragment (DF)" flag in the IPv4 + header. If DF=1, it drops the packet and returns an ICMPv4 + "fragmentation needed" message to the original source [RFC1191]; + otherwise, it fragments the packet using IPv4 fragmentation and + admits each fragment into the ISATAP interface. + +6.4. Next-Hop Determination and Address Mapping + + As for ISATAP for IPv6, ISATAP for IPv4 requires a means for + determining the L3ADDR of neighbors on the ISATAP interface that can + provide a next-hop toward the final destination. Next-hop + determination for default routes is through the Potential Router List + (PRL) discovery procedures specified in Section 8.3.2 of [RFC5214]. + Next-hop determination methods for more-specific routes include + forwarding initial packets via a default router until a redirect is + received, name service lookup (e.g., as described in [VET]), etc. + + After a next-hop L3ADDR is discovered, the node admits IPv4 + packets/fragments into the ISATAP interface and maps the next-hop + L3ADDR into a next-hop Layer 2 address ("L2ADDR"), which in reality + is the IPv4 address of an underlying interface of the ISATAP neighbor + that may be many IPv4 hops away. + + Address mapping for IPv4 differs from the IPv6 version in that no + algorithmic mapping between L3ADDR and L2ADDR is possible. ISATAP + for IPv4 therefore requires an L3ADDR->L2ADDR address mapping method + that is coordinated on a per-site basis such that all nodes in the + site follow the same convention. Examples include name service + lookup (e.g., as described in [VET]), static mapping table lookup, + + + +Templin Informational [Page 5] + +RFC 5579 IPv4 Packets over ISATAP February 2010 + + + etc. + + The node next performs an IPv4 FIB lookup on the next-hop L2ADDR to + determine the correct underlying IPv4 interface. If the FIB lookup + fails, the node drops the packet and returns an ICMPv4 "Destination + Unreachable" message to the original source [RFC0792]; otherwise, it + encapsulates the packet and submits it to the IPv4 layer as described + below. + +6.5. Encapsulation and Transmission + + After performing the IPv4 FIB lookup on the next-hop L2ADDR, the node + encapsulates the packet as specified in [RFC2003] with the IPv4 + address of the underlying interface as the outer IPv4 source address + and the next-hop L2ADDR as the outer IPv4 destination address. The + node sets the DF flag in the outer IPv4 header according to Section + 3.2 of [RFC4213]. The node also sets the IP protocol field in the + outer IPv4 header to 4 (i.e., ip-protocol-4). + + The node then submits the encapsulated packet to the IPv4 layer. The + IPv4 layer fragments the packet if necessary, then forwards each + fragment to the underlying IPv4 interface. The underlying IPv4 + interface then performs address resolution on the outer IPv4 + destination address (i.e., the next-hop L2ADDR) and submits the + packet for transmission on the underlying link layer. + +6.6. IPv4 Multicast Mapping + + In many aspects, ISATAP is simply a unicast-only derivative of + "6over4" [RFC2529]. For various reasons, however, ISATAP has seen + practical wide-scale deployment while the 6over4 approach has been + silently carried forward through ongoing research efforts. This + specification extends the ISATAP interface model to support IPv4 + multicast mapping in a manner that exactly parallels IPv6 multicast + mapping in 6over4 (see [RFC2529], Section 6). Indeed, the approach + might more aptly be named "4over4" were it not for the fact that the + name "ISATAP" has already become ingrained in the widely published + terminology. + + IPv4 multicast mapping is available only on ISATAP interfaces + configured over sites that support IPv4 multicast. For such sites, + an IPv4 packet sent on an ISATAP interface with a multicast + destination address DST MUST be encapsulated for transmission on an + underlying IPv4 interface to the IPv4 multicast address of + Organization-Local Scope using the mapping below. The mapped address + SHOULD be taken from the block 239.193.0.0/16, a different sub-block + of the Organization-Local Scope address block, or -- if none of those + are available -- from the expansion blocks defined in [RFC2365]. + + + +Templin Informational [Page 6] + +RFC 5579 IPv4 Packets over ISATAP February 2010 + + + Note that when they are formed using the expansion blocks, they use + only a /16-sized block. + + +-------+-------+-------+-------+ + | 239 | OLS | DST2 | DST3 | + +-------+-------+-------+-------+ + + DST2, DST3 Last two bytes of IPv4 multicast address. + + OLS From the configured Organization-Local + Scope address block. SHOULD be 193; + see [RFC2365] for details. + + Figure 1: ISATAPv4 Multicast Mapping + + No new IANA registration procedures are required for the above. + +6.7. Recursive Encapsulation Avoidance + + The node must take care in managing its IPv4 FIB table entries in + order to avoid looping through recursive encapsulations. + +7. Security Considerations + + The security considerations specified in [RFC2003] apply equally to + this document. The security considerations specified in ISATAP + [RFC5214] and 6over4 [RFC2529] also apply, with the exception that + ip-protocol-4 encapsulation is used instead of ip-protocol-41. + + Updated tunnel security considerations are found in [SECURITY]. + +8. Acknowledgements + + This work extends the ISATAP interface model, which has evolved + through the insights of many contributers over the course of many + decades. Special thanks to Brian Carpenter and Jari Arkko for their + helpful review input. + +9. References + +9.1. Normative References + + [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, September + 1981. + + [RFC0792] Postel, J., "Internet Control Message Protocol", STD 5, + RFC 792, September 1981. + + + + +Templin Informational [Page 7] + +RFC 5579 IPv4 Packets over ISATAP February 2010 + + + [RFC1191] Mogul, J. and S. Deering, "Path MTU discovery", RFC 1191, + November 1990. + + [RFC2003] Perkins, C., "IP Encapsulation within IP", RFC 2003, + October 1996. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 + (IPv6) Specification", RFC 2460, December 1998. + + [RFC2529] Carpenter, B. and C. Jung, "Transmission of IPv6 over IPv4 + Domains without Explicit Tunnels", RFC 2529, March 1999. + + [RFC3927] Cheshire, S., Aboba, B., and E. Guttman, "Dynamic + Configuration of IPv4 Link-Local Addresses", RFC 3927, May + 2005. + + [RFC4213] Nordmark, E. and R. Gilligan, "Basic Transition Mechanisms + for IPv6 Hosts and Routers", RFC 4213, October 2005. + + [RFC5214] Templin, F., Gleeson, T., and D. Thaler, "Intra-Site + Automatic Tunnel Addressing Protocol (ISATAP)", RFC 5214, + March 2008. + +9.2. Informative References + + [SECURITY] Hoagland, J., Krishnan, S., and D. Thaler, "Security + Concerns With IP Tunneling", Work in Progress, October + 2008. + + [VET] Templin, F., "Virtual Enterprise Traversal (VET)", RFC + 5558, February 2010. + + [RANGER] Templin, F., "Routing and Addressing in Networks with + Global Enterprise Recursion (RANGER)", RFC 5720, February + 2010. + + [RFC2131] Droms, R., "Dynamic Host Configuration Protocol", RFC + 2131, March 1997. + + [RFC2365] Meyer, D., "Administratively Scoped IP Multicast", BCP 23, + RFC 2365, July 1998. + + + + + + + +Templin Informational [Page 8] + +RFC 5579 IPv4 Packets over ISATAP February 2010 + + +Appendix A. Encapsulation Avoidance + + In some instances, an ISATAP interface may be configured over a site + in which the L3ADDRs and L2ADDRs of all ISATAP neighbors are also + known to be routable within the underlying site. In that case, the + ISATAP interface MAY avoid encapsulation and submit the + unencapsulated packets directly to the IPv4 layer. Note however that + this approach does not provide for the use of indirection afforded + through encapsulation. + +Author's Address + + Fred L. Templin (editor) + Boeing Research & Technology + P.O. Box 3707 MC 7L-49 + Seattle, WA 98124 + USA + + EMail: fltemplin@acm.org + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Templin Informational [Page 9] + |