summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc6052.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6052.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6052.txt')
-rw-r--r--doc/rfc/rfc6052.txt1011
1 files changed, 1011 insertions, 0 deletions
diff --git a/doc/rfc/rfc6052.txt b/doc/rfc/rfc6052.txt
new file mode 100644
index 0000000..5b43898
--- /dev/null
+++ b/doc/rfc/rfc6052.txt
@@ -0,0 +1,1011 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) C. Bao
+Request for Comments: 6052 CERNET Center/Tsinghua University
+Updates: 4291 C. Huitema
+Category: Standards Track Microsoft Corporation
+ISSN: 2070-1721 M. Bagnulo
+ UC3M
+ M. Boucadair
+ France Telecom
+ X. Li
+ CERNET Center/Tsinghua University
+ October 2010
+
+
+ IPv6 Addressing of IPv4/IPv6 Translators
+
+Abstract
+
+ This document discusses the algorithmic translation of an IPv6
+ address to a corresponding IPv4 address, and vice versa, using only
+ statically configured information. It defines a well-known prefix
+ for use in algorithmic translations, while allowing organizations to
+ also use network-specific prefixes when appropriate. Algorithmic
+ translation is used in IPv4/IPv6 translators, as well as other types
+ of proxies and gateways (e.g., for DNS) used in IPv4/IPv6 scenarios.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc6052.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 1]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+Copyright Notice
+
+ Copyright (c) 2010 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 1.1. Applicability Scope . . . . . . . . . . . . . . . . . . . 3
+ 1.2. Conventions . . . . . . . . . . . . . . . . . . . . . . . 4
+ 1.3. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4
+ 2. IPv4-Embedded IPv6 Address Prefix and Format . . . . . . . . . 5
+ 2.1. Well-Known Prefix . . . . . . . . . . . . . . . . . . . . 5
+ 2.2. IPv4-Embedded IPv6 Address Format . . . . . . . . . . . . 5
+ 2.3. Address Translation Algorithms . . . . . . . . . . . . . . 7
+ 2.4. Text Representation . . . . . . . . . . . . . . . . . . . 7
+ 3. Deployment Guidelines . . . . . . . . . . . . . . . . . . . . 8
+ 3.1. Restrictions on the Use of the Well-Known Prefix . . . . . 8
+ 3.2. Impact on Inter-Domain Routing . . . . . . . . . . . . . . 8
+ 3.3. Choice of Prefix for Stateless Translation Deployments . . 9
+ 3.4. Choice of Prefix for Stateful Translation Deployments . . 11
+ 4. Design Choices . . . . . . . . . . . . . . . . . . . . . . . . 12
+ 4.1. Choice of Suffix . . . . . . . . . . . . . . . . . . . . . 12
+ 4.2. Choice of the Well-Known Prefix . . . . . . . . . . . . . 13
+ 5. Security Considerations . . . . . . . . . . . . . . . . . . . 14
+ 5.1. Protection against Spoofing . . . . . . . . . . . . . . . 14
+ 5.2. Secure Configuration . . . . . . . . . . . . . . . . . . . 15
+ 5.3. Firewall Configuration . . . . . . . . . . . . . . . . . . 15
+ 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15
+ 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 16
+ 8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 16
+ 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
+ 9.1. Normative References . . . . . . . . . . . . . . . . . . . 17
+ 9.2. Informative References . . . . . . . . . . . . . . . . . . 17
+
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 2]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+1. Introduction
+
+ This document is part of a series of IPv4/IPv6 translation documents.
+ A framework for IPv4/IPv6 translation is discussed in
+ [v4v6-FRAMEWORK], including a taxonomy of scenarios that will be used
+ in this document. Other documents specify the behavior of various
+ types of translators and gateways, including mechanisms for
+ translating between IP headers and other types of messages that
+ include IP addresses. This document specifies how an individual IPv6
+ address is translated to a corresponding IPv4 address, and vice
+ versa, in cases where an algorithmic mapping is used. While specific
+ types of devices are used herein as examples, it is the
+ responsibility of the specification of such devices to reference this
+ document for algorithmic mapping of the addresses themselves.
+
+ Section 2 describes the prefixes and the format of "IPv4-embedded
+ IPv6 addresses", i.e., IPv6 addresses in which 32 bits contain an
+ IPv4 address. This format is common to both "IPv4-converted" and
+ "IPv4-translatable" IPv6 addresses. This section also defines the
+ algorithms for translating addresses, and the text representation of
+ IPv4-embedded IPv6 addresses.
+
+ Section 3 discusses the choice of prefixes, the conditions in which
+ they can be used, and the use of IPv4-embedded IPv6 addresses with
+ stateless and stateful translation.
+
+ Section 4 provides a summary of the discussions behind two specific
+ design decisions, the choice of a null suffix and the specific value
+ of the selected prefix.
+
+ Section 5 discusses security concerns.
+
+ In some scenarios, a dual-stack host will unnecessarily send its
+ traffic through an IPv6/IPv4 translator. This can be caused by the
+ host's default address selection algorithm [RFC3484], referrals, or
+ other reasons. Optimizing these scenarios for dual-stack hosts is
+ for future study.
+
+1.1. Applicability Scope
+
+ This document is part of a series defining address translation
+ services. We understand that the address format could also be used
+ by other interconnection methods between IPv6 and IPv4, e.g., methods
+ based on encapsulation. If encapsulation methods are developed by
+ the IETF, we expect that their descriptions will document their
+ specific use of IPv4-embedded IPv6 addresses.
+
+
+
+
+
+Bao, et al. Standards Track [Page 3]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+1.2. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in RFC 2119 [RFC2119].
+
+1.3. Terminology
+
+ This document makes use of the following terms:
+
+ Address translator: any entity that has to derive an IPv4 address
+ from an IPv6 address or vice versa. This applies not only to
+ devices that do IPv4/IPv6 packet translation, but also to other
+ entities that manipulate addresses, such as name resolution
+ proxies (e.g., DNS64 [DNS64]) and possibly other types of
+ Application Layer Gateways (ALGs).
+
+ IPv4-converted IPv6 addresses: IPv6 addresses used to represent IPv4
+ nodes in an IPv6 network. They are a variant of IPv4-embedded
+ IPv6 addresses and follow the format described in Section 2.2.
+
+ IPv4-embedded IPv6 addresses: IPv6 addresses in which 32 bits
+ contain an IPv4 address. Their format is described in
+ Section 2.2.
+
+ IPv4/IPv6 translator: an entity that translates IPv4 packets to IPv6
+ packets, and vice versa. It may do "stateless" translation,
+ meaning that there is no per-flow state required, or "stateful"
+ translation, meaning that per-flow state is created when the first
+ packet in a flow is received.
+
+ IPv4-translatable IPv6 addresses: IPv6 addresses assigned to IPv6
+ nodes for use with stateless translation. They are a variant of
+ IPv4-embedded IPv6 addresses and follow the format described in
+ Section 2.2.
+
+ Network-Specific Prefix: an IPv6 prefix assigned by an organization
+ for use in algorithmic mapping. Options for the Network-Specific
+ Prefix are discussed in Sections 3.3 and 3.4.
+
+ Well-Known Prefix: the IPv6 prefix defined in this document for use
+ in an algorithmic mapping.
+
+
+
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 4]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+2. IPv4-Embedded IPv6 Address Prefix and Format
+
+2.1. Well-Known Prefix
+
+ This document reserves a "Well-Known Prefix" for use in an
+ algorithmic mapping. The value of this IPv6 prefix is:
+
+ 64:ff9b::/96
+
+2.2. IPv4-Embedded IPv6 Address Format
+
+ IPv4-converted IPv6 addresses and IPv4-translatable IPv6 addresses
+ follow the same format, described here as the IPv4-embedded IPv6
+ address Format. IPv4-embedded IPv6 addresses are composed of a
+ variable-length prefix, the embedded IPv4 address, and a variable-
+ length suffix, as presented in the following diagram, in which PL
+ designates the prefix length:
+
+ +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+ |PL| 0-------------32--40--48--56--64--72--80--88--96--104---------|
+ +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+ |32| prefix |v4(32) | u | suffix |
+ +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+ |40| prefix |v4(24) | u |(8)| suffix |
+ +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+ |48| prefix |v4(16) | u | (16) | suffix |
+ +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+ |56| prefix |(8)| u | v4(24) | suffix |
+ +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+ |64| prefix | u | v4(32) | suffix |
+ +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+ |96| prefix | v4(32) |
+ +--+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
+
+ Figure 1
+
+ In these addresses, the prefix shall be either the "Well-Known
+ Prefix" or a "Network-Specific Prefix" unique to the organization
+ deploying the address translators. The prefixes can only have one of
+ the following lengths: 32, 40, 48, 56, 64, or 96. (The Well-Known
+ Prefix is 96 bits long, and can only be used in the last form of the
+ table.)
+
+ Various deployments justify different prefix lengths with Network-
+ Specific Prefixes. The trade-off between different prefix lengths
+ are discussed in Sections 3.3 and 3.4.
+
+
+
+
+
+Bao, et al. Standards Track [Page 5]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+ Bits 64 to 71 of the address are reserved for compatibility with the
+ host identifier format defined in the IPv6 addressing architecture
+ [RFC4291]. These bits MUST be set to zero. When using a /96
+ Network-Specific Prefix, the administrators MUST ensure that the bits
+ 64 to 71 are set to zero. A simple way to achieve that is to
+ construct the /96 Network-Specific Prefix by picking a /64 prefix,
+ and then adding 4 octets set to zero.
+
+ The IPv4 address is encoded following the prefix, most significant
+ bits first. Depending of the prefix length, the 4 octets of the
+ address may be separated by the reserved octet "u", whose 8 bits MUST
+ be set to zero. In particular:
+
+ o When the prefix is 32 bits long, the IPv4 address is encoded in
+ positions 32 to 63.
+
+ o When the prefix is 40 bits long, 24 bits of the IPv4 address are
+ encoded in positions 40 to 63, with the remaining 8 bits in
+ position 72 to 79.
+
+ o When the prefix is 48 bits long, 16 bits of the IPv4 address are
+ encoded in positions 48 to 63, with the remaining 16 bits in
+ position 72 to 87.
+
+ o When the prefix is 56 bits long, 8 bits of the IPv4 address are
+ encoded in positions 56 to 63, with the remaining 24 bits in
+ position 72 to 95.
+
+ o When the prefix is 64 bits long, the IPv4 address is encoded in
+ positions 72 to 103.
+
+ o When the prefix is 96 bits long, the IPv4 address is encoded in
+ positions 96 to 127.
+
+ There are no remaining bits, and thus no suffix, if the prefix is 96
+ bits long. In the other cases, the remaining bits of the address
+ constitute the suffix. These bits are reserved for future extensions
+ and SHOULD be set to zero. Address translators who receive IPv4-
+ embedded IPv6 addresses where these bits are not zero SHOULD ignore
+ the bits' value and proceed as if the bits' value were zero. (Future
+ extensions may specify a different behavior.)
+
+
+
+
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 6]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+2.3. Address Translation Algorithms
+
+ IPv4-embedded IPv6 addresses are composed according to the following
+ algorithm:
+
+ o Concatenate the prefix, the 32 bits of the IPv4 address, and the
+ suffix (if needed) to obtain a 128-bit address.
+
+ o If the prefix length is less than 96 bits, insert the null octet
+ "u" at the appropriate position (bits 64 to 71), thus causing the
+ least significant octet to be excluded, as documented in Figure 1.
+
+ The IPv4 addresses are extracted from the IPv4-embedded IPv6
+ addresses according to the following algorithm:
+
+ o If the prefix is 96 bits long, extract the last 32 bits of the
+ IPv6 address;
+
+ o For the other prefix lengths, remove the "u" octet to obtain a
+ 120-bit sequence (effectively shifting bits 72-127 to positions
+ 64-119), then extract the 32 bits following the prefix.
+
+2.4. Text Representation
+
+ IPv4-embedded IPv6 addresses will be represented in text in
+ conformity with Section 2.2 of [RFC4291]. IPv4-embedded IPv6
+ addresses constructed using the Well-Known Prefix or a /96 Network-
+ Specific Prefix may be represented using the alternative form
+ presented in Section 2.2 of [RFC4291], with the embedded IPv4 address
+ represented in dotted decimal notation. Examples of such
+ representations are presented in Tables 1 and 2.
+
+ +-----------------------+------------+------------------------------+
+ | Network-Specific | IPv4 | IPv4-embedded IPv6 address |
+ | Prefix | address | |
+ +-----------------------+------------+------------------------------+
+ | 2001:db8::/32 | 192.0.2.33 | 2001:db8:c000:221:: |
+ | 2001:db8:100::/40 | 192.0.2.33 | 2001:db8:1c0:2:21:: |
+ | 2001:db8:122::/48 | 192.0.2.33 | 2001:db8:122:c000:2:2100:: |
+ | 2001:db8:122:300::/56 | 192.0.2.33 | 2001:db8:122:3c0:0:221:: |
+ | 2001:db8:122:344::/64 | 192.0.2.33 | 2001:db8:122:344:c0:2:2100:: |
+ | 2001:db8:122:344::/96 | 192.0.2.33 | 2001:db8:122:344::192.0.2.33 |
+ +-----------------------+------------+------------------------------+
+
+ Table 1: Text Representation of IPv4-Embedded IPv6 Addresses Using
+ Network-Specific Prefixes
+
+
+
+
+
+Bao, et al. Standards Track [Page 7]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+ +-------------------+--------------+----------------------------+
+ | Well-Known Prefix | IPv4 address | IPv4-Embedded IPv6 address |
+ +-------------------+--------------+----------------------------+
+ | 64:ff9b::/96 | 192.0.2.33 | 64:ff9b::192.0.2.33 |
+ +-------------------+--------------+----------------------------+
+
+ Table 2: Text Representation of IPv4-Embedded IPv6 Addresses Using
+ the Well-Known Prefix
+
+ The Network-Specific Prefix examples in Table 1 are derived from the
+ IPv6 prefix reserved for documentation in [RFC3849]. The IPv4
+ address 192.0.2.33 is part of the subnet 192.0.2.0/24 reserved for
+ documentation in [RFC5735]. The representation of IPv6 addresses is
+ compatible with [RFC5952].
+
+3. Deployment Guidelines
+
+3.1. Restrictions on the Use of the Well-Known Prefix
+
+ The Well-Known Prefix MUST NOT be used to represent non-global IPv4
+ addresses, such as those defined in [RFC1918] or listed in Section 3
+ of [RFC5735]. Address translators MUST NOT translate packets in
+ which an address is composed of the Well-Known Prefix and a non-
+ global IPv4 address; they MUST drop these packets.
+
+ The Well-Known Prefix SHOULD NOT be used to construct IPv4-
+ translatable IPv6 addresses. The nodes served by IPv4-translatable
+ IPv6 addresses should be able to receive global IPv6 traffic bound to
+ their IPv4-translatable IPv6 address without incurring intermediate
+ protocol translation. This is only possible if the specific prefix
+ used to build the IPv4-translatable IPv6 addresses is advertised in
+ inter-domain routing, but the advertisement of more specific prefixes
+ derived from the Well-Known Prefix is not supported, as explained in
+ Section 3.2. Network-Specific Prefixes SHOULD be used in these
+ scenarios, as explained in Section 3.3.
+
+ The Well-Known Prefix MAY be used by organizations deploying
+ translation services, as explained in Section 3.4.
+
+3.2. Impact on Inter-Domain Routing
+
+ The Well-Known Prefix MAY appear in inter-domain routing tables, if
+ service providers decide to provide IPv6-IPv4 interconnection
+ services to peers. Advertisement of the Well-Known Prefix SHOULD be
+ controlled either by upstream and/or downstream service providers
+ according to inter-domain routing policies, e.g., through
+
+
+
+
+
+Bao, et al. Standards Track [Page 8]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+ configuration of BGP [RFC4271]. Organizations that advertise the
+ Well-Known Prefix in inter-domain routing MUST be able to provide
+ IPv4/IPv6 translation service.
+
+ When the IPv4/IPv6 translation relies on the Well-Known Prefix, IPv4-
+ embedded IPv6 prefixes longer than the Well-Known Prefix MUST NOT be
+ advertised in BGP (especially External BGP) [RFC4271] because this
+ leads to importing the IPv4 routing table into the IPv6 one and
+ therefore introduces scalability issues to the global IPv6 routing
+ table. Administrators of BGP nodes SHOULD configure filters that
+ discard advertisements of embedded IPv6 prefixes longer than the
+ Well-Known Prefix.
+
+ When the IPv4/IPv6 translation service relies on Network-Specific
+ Prefixes, the IPv4-translatable IPv6 prefixes used in stateless
+ translation MUST be advertised with proper aggregation to the IPv6
+ Internet. Similarly, if translators are configured with multiple
+ Network-Specific Prefixes, these prefixes MUST be advertised to the
+ IPv6 Internet with proper aggregation.
+
+3.3. Choice of Prefix for Stateless Translation Deployments
+
+ Organizations may deploy translation services using stateless
+ translation. In these deployments, internal IPv6 nodes are addressed
+ using IPv4-translatable IPv6 addresses, which enable them to be
+ accessed by IPv4 nodes. The addresses of these external IPv4 nodes
+ are then represented in IPv4-converted IPv6 addresses.
+
+ Organizations deploying stateless IPv4/IPv6 translation SHOULD assign
+ a Network-Specific Prefix to their IPv4/IPv6 translation service.
+ IPv4-translatable and IPv4-converted IPv6 addresses MUST be
+ constructed as specified in Section 2.2. IPv4-translatable IPv6
+ addresses MUST use the selected Network-Specific Prefix. Both IPv4-
+ translatable IPv6 addresses and IPv4-converted IPv6 addresses SHOULD
+ use the same prefix.
+
+ Using the same prefix ensures that IPv6 nodes internal to the
+ organization will use the most efficient paths to reach the nodes
+ served by IPv4-translatable IPv6 addresses. Specifically, if a node
+ learns the IPv4 address of a target internal node without knowing
+ that this target is in fact located behind the same translator that
+ the node also uses, translation rules will ensure that the IPv6
+ address constructed with the Network-Specific Prefix is the same as
+ the IPv4-translatable IPv6 address assigned to the target. Standard
+ routing preference (i.e., "most specific match wins") will then
+ ensure that the IPv6 packets are delivered directly, without
+ requiring that translators receive the packets and then return them
+ in the direction from which they came.
+
+
+
+Bao, et al. Standards Track [Page 9]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+ The intra-domain routing protocol must be able to deliver packets to
+ the nodes served by IPv4-translatable IPv6 addresses. This may
+ require routing on some or all of the embedded IPv4 address bits.
+ Security considerations detailed in Section 5 require that routers
+ check the validity of the IPv4-translatable IPv6 source addresses,
+ using some form of reverse path check.
+
+ The management of stateless address translation can be illustrated
+ with a small example:
+
+ We will consider an IPv6 network with the prefix 2001:db8:
+ 122::/48. The network administrator has selected the Network-
+ Specific Prefix 2001:db8:122:344::/64 for managing stateless IPv4/
+ IPv6 translation. The IPv4-translatable address block for IPv4
+ subnet 192.0.2.0/24 is 2001:db8:122:344:c0:2::/96. In this
+ network, the host A is assigned the IPv4-translatable IPv6 address
+ 2001:db8:122:344:c0:2:2100::, which corresponds to the IPv4
+ address 192.0.2.33. Host A's address is configured either
+ manually or through DHCPv6.
+
+ In this example, host A is not directly connected to the
+ translator, but instead to a link managed by a router R. The
+ router R is configured to forward to A the packets bound to 2001:
+ db8:122:344:c0:2:2100::. To receive these packets, R will
+ advertise reachability of the prefix 2001:db8:122:344:c0:2:2100::/
+ 104 in the intra-domain routing protocol -- or perhaps a shorter
+ prefix if many hosts on link have IPv4-translatable IPv6 addresses
+ derived from the same IPv4 subnet. If a packet bound to
+ 192.0.2.33 reaches the translator, the destination address will be
+ translated to 2001:db8:122:344:c0:2:2100::, and the packet will be
+ routed towards R and then to A.
+
+ Let's suppose now that a host B of the same domain learns the IPv4
+ address of A, maybe through an application-specific referral. If
+ B has translation-aware software, B can compose a destination
+ address by combining the Network-Specific Prefix 2001:db8:122:
+ 344::/64 and the IPv4 address 192.0.2.33, resulting in the address
+ 2001:db8:122:344:c0:2:2100::. The packet sent by B will be
+ forwarded towards R, and then to A, avoiding protocol translation.
+
+ Forwarding, and reverse path checks, are more efficient when
+ performed on the combination of the prefix and the IPv4 address. In
+ theory, routers are able to route on prefixes of any length, but in
+ practice there may be routers for which routing on prefixes larger
+ than 64 bits is slower. However, routing efficiency is not the only
+ consideration in the choice of a prefix length. Organizations also
+ need to consider the availability of prefixes, and the potential
+ impact of all-zero identifiers.
+
+
+
+Bao, et al. Standards Track [Page 10]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+ If a /32 prefix is used, all the routing bits are contained in the
+ top 64 bits of the IPv6 address, leading to excellent routing
+ properties. These prefixes may however be hard to obtain, and
+ allocation of a /32 to a small set of IPv4-translatable IPv6
+ addresses may be seen as wasteful. In addition, the /32 prefix and a
+ zero suffix lead to an all-zero interface identifier, which is an
+ issue that we discuss in Section 4.1.
+
+ Intermediate prefix lengths such as /40, /48, or /56 appear as
+ compromises. Only some of the IPv4 bits are part of the /64
+ prefixes. Reverse path checks, in particular, may have a limited
+ efficiency. Reverse path checks limited to the most significant bits
+ of the IPv4 address will reduce the possibility of spoofing external
+ IPv4 addresses, but would allow IPv6 nodes to spoof internal IPv4-
+ translatable IPv6 addresses.
+
+ We propose a compromise, based on using no more than 1/256th of an
+ organization's allocation of IPv6 addresses for the IPv4/IPv6
+ translation service. For example, if the organization is an Internet
+ Service Provider with an allocated IPv6 prefix /32 or shorter, the
+ ISP could dedicate a /40 prefix to the translation service. An end
+ site with a /48 allocation could dedicate a /56 prefix to the
+ translation service, or possibly a /96 prefix if all IPv4-
+ translatable IPv6 addresses are located on the same link.
+
+ The recommended prefix length is also a function of the deployment
+ scenario. The stateless translation can be used for Scenario 1,
+ Scenario 2, Scenario 5, and Scenario 6 defined in [v4v6-FRAMEWORK].
+ For different scenarios, the prefix length recommendations are:
+
+ o For Scenario 1 (an IPv6 network to the IPv4 Internet) and Scenario
+ 2 (the IPv4 Internet to an IPv6 network), an ISP holding a /32
+ allocation SHOULD use a /40 prefix, and a site holding a /48
+ allocation SHOULD use a /56 prefix.
+
+ o For Scenario 5 (an IPv6 network to an IPv4 network) and Scenario 6
+ (an IPv4 network to an IPv6 network), the deployment SHOULD use a
+ /64 or a /96 prefix.
+
+3.4. Choice of Prefix for Stateful Translation Deployments
+
+ Organizations may deploy translation services based on stateful
+ translation technology. An organization may decide to use either a
+ Network-Specific Prefix or the Well-Known Prefix for its stateful
+ IPv4/IPv6 translation service.
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 11]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+ When these services are used, IPv6 nodes are addressed through
+ standard IPv6 addresses, while IPv4 nodes are represented by IPv4-
+ converted IPv6 addresses, as specified in Section 2.2.
+
+ The stateful nature of the translation creates a potential stability
+ issue when the organization deploys multiple translators. If several
+ translators use the same prefix, there is a risk that packets
+ belonging to the same connection may be routed to different
+ translators as the internal routing state changes. This issue can be
+ avoided either by assigning different prefixes to different
+ translators or by ensuring that all translators using the same prefix
+ coordinate their state.
+
+ Stateful translation can be used in scenarios defined in
+ [v4v6-FRAMEWORK]. The Well-Known Prefix SHOULD be used in these
+ scenarios, with two exceptions:
+
+ o In all scenarios, the translation MAY use a Network-Specific
+ Prefix, if deemed appropriate for management reasons.
+
+ o The Well-Known Prefix MUST NOT be used for Scenario 3 (the IPv6
+ Internet to an IPv4 network), as this would lead to using the
+ Well-Known Prefix with non-global IPv4 addresses. That means a
+ Network-Specific Prefix (for example, a /96 prefix) MUST be used
+ in that scenario.
+
+4. Design Choices
+
+ The prefix that we have chosen reflects two design choices, the null
+ suffix and the specific value of the Well-Known Prefix. We provide
+ here a summary of the discussions leading to those two choices.
+
+4.1. Choice of Suffix
+
+ The address format described in Section 2.2 recommends a zero suffix.
+ Before making this recommendation, we considered different options:
+ checksum neutrality, the encoding of a port range, and a value
+ different than 0.
+
+ In the case of stateless translation, there would be no need for the
+ translator to recompute a one's complement checksum if both the IPv4-
+ translatable and the IPv4-converted IPv6 addresses were constructed
+ in a "checksum-neutral" manner, that is, if the IPv6 addresses would
+ have the same one's complement checksum as the embedded IPv4 address.
+ In the case of stateful translation, checksum neutrality does not
+ eliminate checksum computation during translation, as only one of the
+ two addresses would be checksum neutral. We considered reserving 16
+ bits in the suffix to guarantee checksum neutrality, but declined
+
+
+
+Bao, et al. Standards Track [Page 12]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+ because it would not help with stateful translation and because
+ checksum neutrality can also be achieved by an appropriate choice of
+ the Network-Specific Prefix, i.e., selecting a prefix whose one's
+ complement checksum equals either 0 or 0xffff.
+
+ There have been proposals to complement stateless translation with a
+ port-range feature. Instead of mapping an IPv4 address to exactly
+ one IPv6 prefix, the options would allow several IPv6 nodes to share
+ an IPv4 address, with each node managing a different range of ports.
+ If a port range extension is needed, it could be defined later, using
+ bits currently reserved as null in the suffix.
+
+ When a /32 prefix is used, an all-zero suffix results in an all-zero
+ interface identifier. We understand the conflict with Section 2.6.1
+ of RFC4291, which specifies that all zeroes are used for the subnet-
+ router anycast address. However, in our specification, there is only
+ one node with an IPv4-translatable IPv6 address in the /64 subnet, so
+ the anycast semantic does not create confusion. We thus decided to
+ keep the null suffix for now. This issue does not exist for prefixes
+ larger than 32 bits, such as the /40, /56, /64, and /96 prefixes that
+ we recommend in Section 3.3.
+
+4.2. Choice of the Well-Known Prefix
+
+ Before making our recommendation of the Well-Known Prefix, we were
+ faced with three choices:
+
+ o reuse the IPv4-mapped prefix, ::ffff:0:0/96, as specified in RFC
+ 2765, Section 2.1;
+
+ o request IANA to allocate a /32 prefix, or
+
+ o request allocation of a new /96 prefix.
+
+ We weighted the pros and cons of these choices before settling on the
+ recommended /96 Well-Known Prefix.
+
+ The main advantage of the existing IPv4-mapped prefix is that it is
+ already defined. Reusing that prefix would require minimal
+ standardization efforts. However, being already defined is not just
+ an advantage, as there may be side effects of current
+ implementations. When presented with the IPv4-mapped prefix, current
+ versions of Windows and Mac OS generate IPv4 packets, but will not
+ send IPv6 packets. If we used the IPv4-mapped prefix, these nodes
+ would not be able to support translation without modification. This
+ will defeat the main purpose of the translation techniques. We thus
+ eliminated the first choice, i.e., decided to not reuse the IPv4-
+ mapped prefix, ::ffff:0:0/96.
+
+
+
+Bao, et al. Standards Track [Page 13]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+ A /32 prefix would have allowed the embedded IPv4 address to fit
+ within the top 64 bits of the IPv6 address. This would have
+ facilitated routing and load balancing when an organization deploys
+ several translators. However, such destination-address-based load
+ balancing may not be desirable. It is not compatible with Session
+ Traversal Utilities for NAT (STUN) [RFC5389] in the deployments
+ involving multiple stateful translators, each one having a different
+ pool of IPv4 addresses. STUN compatibility would only be achieved if
+ the translators managed the same pool of IPv4 addresses and were able
+ to coordinate their translation state, in which case there is no big
+ advantage to using a /32 prefix rather than a /96 prefix.
+
+ According to Section 2.2 of [RFC4291], in the legal textual
+ representations of IPv6 addresses, dotted decimal can only appear at
+ the end. The /96 prefix is compatible with that requirement. It
+ enables the dotted decimal notation without requiring an update to
+ [RFC4291]. This representation makes the address format easier to
+ use and the log files easier to read.
+
+ The prefix that we recommend has the particularity of being "checksum
+ neutral". The sum of the hexadecimal numbers "0064" and "ff9b" is
+ "ffff", i.e., a value equal to zero in one's complement arithmetic.
+ An IPv4-embedded IPv6 address constructed with this prefix will have
+ the same one's complement checksum as the embedded IPv4 address.
+
+5. Security Considerations
+
+5.1. Protection against Spoofing
+
+ IPv4/IPv6 translators can be modeled as special routers, are subject
+ to the same risks, and can implement the same mitigations. (The
+ discussion of generic threats to routers and their mitigations is
+ beyond the scope of this document.) There is, however, a particular
+ risk that directly derives from the practice of embedding IPv4
+ addresses in IPv6: address spoofing.
+
+ An attacker could use an IPv4-embedded IPv6 address as the source
+ address of malicious packets. After translation, the packets will
+ appear as IPv4 packets from the specified source, and the attacker
+ may be hard to track. If left without mitigation, the attack would
+ allow malicious IPv6 nodes to spoof arbitrary IPv4 addresses.
+
+ The mitigation is to implement reverse path checks and to verify
+ throughout the network that packets are coming from an authorized
+ location.
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 14]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+5.2. Secure Configuration
+
+ The prefixes used for address translation are used by IPv6 nodes to
+ send packets to IPv6/IPv4 translators. Attackers could attempt to
+ fool nodes, DNS gateways, and IPv4/IPv6 translators into using wrong
+ values for these parameters, resulting in network disruption, denial
+ of service, and possible information disclosure. To mitigate such
+ attacks, network administrators need to ensure that prefixes are
+ configured in a secure way.
+
+ The mechanisms for achieving secure configuration of prefixes are
+ beyond the scope of this document.
+
+5.3. Firewall Configuration
+
+ Many firewalls and other security devices filter traffic based on
+ IPv4 addresses. Attackers could attempt to fool these firewalls by
+ sending IPv6 packets to or from IPv6 addresses that translate to the
+ filtered IPv4 addresses. If the attack is successful, traffic that
+ was previously blocked might be able to pass through the firewalls
+ disguised as IPv6 packets. In all such scenarios, administrators
+ should assure that packets that send to or from IPv4-embedded IPv6
+ addresses are subject to the same filtering as those directly sent to
+ or from the embedded IPv4 addresses.
+
+ The mechanisms for configuring firewalls and security devices to
+ achieve this filtering are beyond the scope of this document.
+
+6. IANA Considerations
+
+ IANA has made the following changes in the "Internet Protocol Version
+ 6 Address Space" registry located at http://www.iana.org.
+
+ OLD:
+
+ IPv6 Prefix Allocation Reference Note
+ ----------- ---------------- ------------ ----------------
+ 0000::/8 Reserved by IETF [RFC4291] [1][5]
+
+ NEW:
+
+ IPv6 Prefix Allocation Reference Note
+ ----------- ---------------- ------------ ----------------
+ 0000::/8 Reserved by IETF [RFC4291] [1][5][6]
+
+ [6] The "Well-Known Prefix" 64:ff9b::/96 used in an algorithmic
+ mapping between IPv4 to IPv6 addresses is defined out of the
+ 0000::/8 address block, per RFC 6052.
+
+
+
+Bao, et al. Standards Track [Page 15]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+7. Acknowledgements
+
+ Many people in the BEHAVE WG have contributed to the discussion that
+ led to this document, including Andrew Sullivan, Andrew Yourtchenko,
+ Ari Keranen, Brian Carpenter, Charlie Kaufman, Dan Wing, Dave Thaler,
+ David Harrington, Ed Jankiewicz, Fred Baker, Hiroshi Miyata, Iljitsch
+ van Beijnum, John Schnizlein, Keith Moore, Kevin Yin, Magnus
+ Westerlund, Margaret Wasserman, Masahito Endo, Phil Roberts, Philip
+ Matthews, Remi Denis-Courmont, Remi Despres, and William Waites.
+
+ Marcelo Bagnulo is partly funded by Trilogy, a research project
+ supported by the European Commission under its Seventh Framework
+ Program.
+
+8. Contributors
+
+ The following individuals co-authored documents from which text has
+ been incorporated, and are listed in alphabetical order.
+
+ Dave Thaler
+ Microsoft Corporation
+ One Microsoft Way
+ Redmond, WA 98052
+ USA
+ Phone: +1 425 703 8835
+ EMail: dthaler@microsoft.com
+
+ Fred Baker
+ Cisco Systems
+ Santa Barbara, California 93117
+ USA
+ Phone: +1-408-526-4257
+ Fax: +1-413-473-2403
+ EMail: fred@cisco.com
+
+ Hiroshi Miyata
+ Yokogawa Electric Corporation
+ 2-9-32 Nakacho
+ Musashino-shi, Tokyo 180-8750
+ JAPAN
+ EMail: h.miyata@jp.yokogawa.com
+
+
+
+
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 16]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+9. References
+
+9.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing
+ Architecture", RFC 4291, February 2006.
+
+9.2. Informative References
+
+ [DNS64] Bagnulo, M., Sullivan, A., Matthews, P., and I. Beijnum,
+ "DNS64: DNS extensions for Network Address Translation
+ from IPv6 Clients to IPv4 Servers", Work in Progress,
+ October 2010.
+
+ [RFC1918] Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and
+ E. Lear, "Address Allocation for Private Internets",
+ BCP 5, RFC 1918, February 1996.
+
+ [RFC3484] Draves, R., "Default Address Selection for Internet
+ Protocol version 6 (IPv6)", RFC 3484, February 2003.
+
+ [RFC3849] Huston, G., Lord, A., and P. Smith, "IPv6 Address Prefix
+ Reserved for Documentation", RFC 3849, July 2004.
+
+ [RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway
+ Protocol 4 (BGP-4)", RFC 4271, January 2006.
+
+ [RFC5389] Rosenberg, J., Mahy, R., Matthews, P., and D. Wing,
+ "Session Traversal Utilities for NAT (STUN)", RFC 5389,
+ October 2008.
+
+ [RFC5735] Cotton, M. and L. Vegoda, "Special Use IPv4 Addresses",
+ BCP 153, RFC 5735, January 2010.
+
+ [RFC5952] Kawamura, S. and M. Kawashima, "A Recommendation for IPv6
+ Address Text Representation", RFC 5952, August 2010.
+
+ [v4v6-FRAMEWORK]
+ Baker, F., Li, X., Bao, C., and K. Yin, "Framework for
+ IPv4/IPv6 Translation", Work in Progress, August 2010.
+
+
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 17]
+
+RFC 6052 IPv6 Addressing of IPv4/IPv6 Translators October 2010
+
+
+Authors' Addresses
+
+ Congxiao Bao
+ CERNET Center/Tsinghua University
+ Room 225, Main Building, Tsinghua University
+ Beijing, 100084
+ China
+ Phone: +86 10-62785983
+ EMail: congxiao@cernet.edu.cn
+
+
+ Christian Huitema
+ Microsoft Corporation
+ One Microsoft Way
+ Redmond, WA 98052-6399
+ U.S.A.
+ EMail: huitema@microsoft.com
+
+
+ Marcelo Bagnulo
+ UC3M
+ Av. Universidad 30
+ Leganes, Madrid 28911
+ Spain
+ Phone: +34-91-6249500
+ EMail: marcelo@it.uc3m.es
+ URI: http://www.it.uc3m.es/marcelo
+
+
+ Mohamed Boucadair
+ France Telecom
+ 3, Av Francois Chateaux
+ Rennes 350000
+ France
+ EMail: mohamed.boucadair@orange-ftgroup.com
+
+
+ Xing Li
+ CERNET Center/Tsinghua University
+ Room 225, Main Building, Tsinghua University
+ Beijing, 100084
+ China
+ Phone: +86 10-62785983
+ EMail: xing@cernet.edu.cn
+
+
+
+
+
+
+
+Bao, et al. Standards Track [Page 18]
+