diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6992.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6992.txt')
-rw-r--r-- | doc/rfc/rfc6992.txt | 843 |
1 files changed, 843 insertions, 0 deletions
diff --git a/doc/rfc/rfc6992.txt b/doc/rfc/rfc6992.txt new file mode 100644 index 0000000..55eccbd --- /dev/null +++ b/doc/rfc/rfc6992.txt @@ -0,0 +1,843 @@ + + + + + + +Internet Engineering Task Force (IETF) D. Cheng +Request for Comments: 6992 Huawei Technologies +Category: Informational M. Boucadair +ISSN: 2070-1721 France Telecom + A. Retana + Cisco Systems + July 2013 + + + Routing for IPv4-Embedded IPv6 Packets + +Abstract + + This document describes a routing scenario where IPv4 packets are + transported over an IPv6 network, based on the methods described in + RFCs 6145 and 6052, along with a separate OSPFv3 routing table for + IPv4-embedded IPv6 routes in the IPv6 network. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6992. + +Copyright Notice + + Copyright (c) 2013 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + +Cheng, et al. Informational [Page 1] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + +Table of Contents + + 1. Introduction ....................................................2 + 1.1. The Scenario ...............................................3 + 1.2. Routing Solution per RFC 5565 ..............................4 + 1.3. An Alternative Routing Solution with OSPFv3 ................4 + 1.4. OSPFv3 Routing with a Specific Topology ....................6 + 2. Requirements Language ...........................................7 + 3. Provisioning ....................................................7 + 3.1. Deciding on the IPv4-Embedded IPv6 Topology ................7 + 3.2. Maintaining a Dedicated IPv4-Embedded IPv6 Routing Table ...7 + 4. Translation of IP Packets .......................................8 + 4.1. Address Translation ........................................8 + 5. Advertising IPv4-Embedded IPv6 Routes ...........................9 + 5.1. Advertising IPv4-Embedded IPv6 Routes through an + IPv6 Transit Network .......................................9 + 5.1.1. Routing Metrics .....................................9 + 5.1.2. Forwarding Address .................................10 + 5.2. Advertising IPv4 Addresses into Client Networks ...........10 + 6. Aggregation on IPv4 Addresses and Prefixes .....................10 + 7. Forwarding .....................................................10 + 8. Backdoor Connections ...........................................11 + 9. Prevention of Loops ............................................11 + 10. MTU Issues ....................................................11 + 11. Security Considerations .......................................12 + 12. Operational Considerations ....................................13 + 13. Acknowledgements ..............................................14 + 14. References ....................................................14 + 14.1. Normative References .....................................14 + 14.2. Informative References ...................................14 + +1. Introduction + + This document describes a routing scenario where IPv4 packets are + transported over an IPv6 network, based on [RFC6145] and [RFC6052], + along with a separate OSPFv3 routing table for IPv4-embedded IPv6 + routes in the IPv6 network. This document does not introduce any new + IPv6 transition mechanism. + + In this document, the following terminology is used: + + o An IPv4-embedded IPv6 address denotes an IPv6 address that + contains an embedded 32-bit IPv4 address constructed according to + the rules defined in [RFC6052]. + + o IPv4-embedded IPv6 packets are packets of which destination + addresses are IPv4-embedded IPv6 addresses. + + + + +Cheng, et al. Informational [Page 2] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + + o AFBR (Address Family Border Router) [RFC5565] refers to an edge + router that supports both IPv4 and IPv6 address families, but the + backbone network it connects to only supports either the IPv4 or + IPv6 address family. + + o AFXLBR (Address Family Translation Border Router) is defined in + this document. It refers to a border router that supports both + IPv4 and IPv6 address families located on the boundary of an IPv4- + only network and an IPv6-only network and that is capable of + performing IP header translation between IPv4 and IPv6 [RFC6145]. + +1.1. The Scenario + + Due to exhaustion of public IPv4 addresses, there has been a + continuing effort within the IETF to investigate and specify IPv6 + transitional techniques. In the course of the transition, it is + certain that networks based on IPv4 and IPv6 technologies, + respectively, will coexist at least for some time. One such scenario + is the interconnection of IPv4-only and IPv6-only networks, and in + particular, when an IPv6-only network serves as an interconnection + between several segregated IPv4-only networks. In this scenario, + IPv4 packets are transported over the IPv6 network between IPv4 + networks. In order to forward an IPv4 packet from a source IPv4 + network to the destination IPv4 network, IPv4 reachability + information must be exchanged between the IPv4 networks via some + mechanism. + + In general, running an IPv6-only network would reduce operational + expenditures and optimize operations as compared to an IPv4-IPv6 + dual-stack environment. Some proposed solutions allow the delivery + of IPv4 services over an IPv6-only network. This document specifies + an engineering technique that separates the routing table dedicated + to IPv4-embedded IPv6 destinations from the routing table used for + native IPv6 destinations. + + OSPFv3 is designed to support multiple instances. Maintaining a + separate routing table for IPv4-embedded IPv6 routes would simplify + implementation, troubleshooting, and operation; it would also prevent + overload of the native IPv6 routing table. A separate routing table + can be generated from a separate routing instance. + + + + + + + + + + + +Cheng, et al. Informational [Page 3] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + +1.2. Routing Solution per RFC 5565 + + The aforementioned scenario is described in [RFC5565], i.e., the + IPv4-over-IPv6 scenario, where the network core is IPv6-only and the + interconnected IPv4 networks are called IPv4 client networks. The + P Routers (Provider Routers) in the core only support IPv6, but the + AFBRs support IPv4 on interfaces facing IPv4 client networks and IPv6 + on interfaces facing the core. The routing solution defined in + [RFC5565] for this scenario is to run IBGP among AFBRs to exchange + IPv4 routing information in the core, and the IPv4 packets are + forwarded from one IPv4 client network to the other through a + softwire using tunneling technology, such as MPLS, LSP, GRE, + L2TPv3, etc. + +1.3. An Alternative Routing Solution with OSPFv3 + + In this document, we propose an alternative routing solution for the + scenario described in Section 1.1 where several segregated IPv4 + networks, called IPv4 client networks, are interconnected by an IPv6 + network. The IPv6 network and the interconnected IPv4 networks may + or may not belong to the same Autonomous System (AS). We refer to + the border node on the boundary of an IPv4 client network and the + IPv6 network as an Address Family Translation Border Router (AFXLBR), + which supports both the IPv4 and IPv6 address families and is capable + of translating an IPv4 packet to an IPv6 packet, and vice versa, + according to [RFC6145]. The described scenario is illustrated in + Figure 1. + + + + + + + + + + + + + + + + + + + + + + + + +Cheng, et al. Informational [Page 4] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + + +--------+ +--------+ + | IPv4 | | IPv4 | + | Client | | Client | + | Network| | Network| + +--------+ +--------+ + | \ / | + | \ / | + | \ / | + | X | + | / \ | + | / \ | + | / \ | + +--------+ +--------+ + | AFXLBR | | AFXLBR | + +--| IPv4/6 |---| IPv4/6 |--+ + | +--------+ +--------+ | + +--------+ | | +--------+ + | IPv6 | | | | IPv6 | + | Client |----| |----| Client | + | Network| | IPv6 | | Network| + +--------+ | only | +--------+ + | | + | +--------+ +--------+ | + +--| AFXLBR |---| AFXLBR |--+ + | IPv4/6 | | IPv4/6 | + +--------+ +--------+ + | \ / | + | \ / | + | \ / | + | X | + | / \ | + | / \ | + | / \ | + +--------+ +--------+ + | IPv4 | | IPv4 | + | Client | | Client | + | Network| | Network| + +--------+ +--------+ + + Figure 1: Segregated IPv4 Networks Interconnected by an IPv6 Network + + Since the scenario occurs most commonly within an organization, an + IPv6 prefix can be locally allocated and used by AFXLBRs to construct + IPv4-embedded IPv6 addresses [RFC6052]. The embedded IPv4 address or + prefix belongs to an IPv4 client network that is connected to the + AFXLBR. An AFXLBR injects IPv4-embedded IPv6 addresses and prefixes + into the IPv6 network using OSPFv3, and it also installs + IPv4-embedded IPv6 routes advertised by other AFXLBRs. + + + +Cheng, et al. Informational [Page 5] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + + When an AFXLBR receives an IPv4 packet from a locally connected IPv4 + client network destined to a remote IPv4 client network, it + translates the IPv4 header to the relevant IPv6 header [RFC6145], and + in that process, the source and destination IPv4 addresses are + translated into IPv4-embedded IPv6 addresses, respectively [RFC6052]. + The resulting IPv6 packet is then forwarded to the AFXLBR that + connects to the destination IPv4 client network. The remote AFXLBR + derives the IPv4 source and destination addresses from the IPv4- + embedded IPv6 addresses, respectively [RFC6052], and translates the + header of the received IPv6 packet to the relevant IPv4 header + [RFC6145]. The resulting IPv4 packet is then forwarded according to + the IPv4 routing table maintained on the AFXLBR. + + There are use cases where the proposed routing solution is useful. + One case is that some border nodes do not participate in IBGP for the + exchange of routes, or IBGP is not used at all. Another case is when + tunnels are not deployed in the IPv6 network, or native IPv6 + forwarding is preferred. Note that with this routing solution, the + IPv4 and IPv6 header translation performed in both directions by the + AFXLBR is stateless. + +1.4. OSPFv3 Routing with a Specific Topology + + In general, IPv4-embedded IPv6 packets can be forwarded just like + native IPv6 packets with OSPFv3 running in the IPv6 network. + However, this would require that IPv4-embedded IPv6 routes be flooded + throughout the entire IPv6 network and stored on every router. This + is not desirable from a scaling perspective. Moreover, since all + IPv6 routes are stored in the same routing table, it would be + inconvenient to manage the resource required for routing and + forwarding based on traffic category, if so desired. + + To improve the situation, a separate OSPFv3 routing table dedicated + to the IPv4-embedded IPv6 topology can be constructed; that table + would be solely used for routing IPv4-embedded IPv6 packets in the + IPv6 network. The IPv4-embedded IPv6 topology includes all the + participating AFXLBRs and a set of P Routers providing redundant + connectivity with alternate routing paths. + + To realize this, a separate OSPFv3 instance is configured in the IPv6 + network [RFC5838]. This instance operates on all participating + AFXLBRs and a set of P routers that interconnect them. As a result, + there would be a dedicated IPv4-embedded IPv6 topology that is + maintained on all these routers, along with a dedicated IPv4-embedded + IPv6 routing table. This routing table in the IPv6 network is solely + for forwarding IPv4-embedded IPv6 packets. + + + + + +Cheng, et al. Informational [Page 6] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + + This document elaborates on how configuration is done with this + method and on related routing issues. + + This document only focuses on unicast routing for IPv4-embedded IPv6 + packets using OSPFv3. + +2. Requirements Language + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + +3. Provisioning + +3.1. Deciding on the IPv4-Embedded IPv6 Topology + + Before deploying configurations that use a separate OSPFv3 routing + table for IPv4-embedded IPv6 addresses and prefixes, a decision must + be made regarding the set of routers and their interfaces in the IPv6 + network that should be part of the IPv4-embedded IPv6 topology. + + For the purpose of this IPv4-embedded IPv6 topology, all AFXLBRs that + connect to IPv4 client networks MUST be members of this topology. An + AFXLBR MUST have at least one connection with a P Router in the IPv6 + network or another AFXLBR. + + The IPv4-embedded IPv6 topology is a subtopology of the entire IPv6 + network, and if all routers (including AFXLBRs and P routers) and all + their interfaces are included, the two topologies converge. + Generally speaking, when this subtopology contains more + interconnected P Routers, there would be more routing paths across + the IPv6 network from one IPv4 client network to the other; however, + this requires more routers in the IPv6 network to participate in + IPv4-embedded IPv6 routing. In any case, the IPv4-embedded IPv6 + topology MUST be continuous with no partitions. + +3.2. Maintaining a Dedicated IPv4-Embedded IPv6 Routing Table + + In an IPv6 network, in order to maintain a separate IPv6 routing + table that contains routes for IPv4-embedded IPv6 destinations only, + OSPFv3 needs to use the mechanism defined in [RFC5838]. + + It is assumed that the IPv6 network that is interconnected with IPv4 + networks as described in this document is under one administration, + and as such an OSPFv3 Instance ID (IID) is allocated locally and used + for OSPFv3 operation dedicated to unicast IPv4-embedded IPv6 routing + in an IPv6 network. This IID is configured on OSPFv3 router + interfaces that participate in the IPv4-embedded IPv6 topology. + + + +Cheng, et al. Informational [Page 7] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + + A locally configured OSPFv3 IID is allocated in the range 192 to 255, + inclusive, in the "OSPFv3 Instance ID Address Family Values" + registry; this range is reserved for "Private Use" [RFC6969]. This + IID must be used to encode the "Instance ID" field in the packet + header of OSPFv3 packets associated with the OSPFv3 instance. + + In addition, the AF-bit in the OSPFv3 Option field MUST be set. + + During Hello packet processing, an adjacency may only be established + when the received Hello packet contains the same Instance ID as the + Instance ID configured on the receiving OSPFv3 interface. This + insures that only interfaces configured as part of the OSPFv3 unicast + IPv4-embedded IPv6 topology are used for IPv4-embedded IPv6 unicast + routing. + + For more details, the reader is referred to [RFC5838]. + +4. Translation of IP Packets + + When transporting IPv4 packets across an IPv6 network via the + mechanism described above (Section 3.2), an IPv4 packet is translated + to an IPv6 packet at the ingress AFXLBR, and the IPv6 packet is + translated back to an IPv4 packet at the egress AFXLBR. IP packet + header translation is accomplished in a stateless manner according to + rules specified in [RFC6145]; the details of address translation are + explained in the next subsection. + +4.1. Address Translation + + Prior to address translation, an IPv6 prefix is allocated by the + operator, and it is used to form IPv4-embedded IPv6 addresses. + + The IPv6 prefix can either be the IPv6 well-known prefix (WKP) 64: + ff9b::/96 or a network-specific prefix that is unique to the + organization; for the latter case, the IPv6 prefix length may be 32, + 40, 48, 56, or 64. In either case, this IPv6 prefix is used during + the address translation between an IPv4 address and an IPv4-embedded + IPv6 address, as described in [RFC6052]. + + During translation from an IPv4 header to an IPv6 header at an + ingress AFXLBR, the source IPv4 address and destination IPv4 address + are translated into the corresponding source IPv6 address and + destination IPv6 address, respectively. During translation from an + IPv6 header to an IPv4 header at an egress AFXLBR, the source IPv6 + address and destination IPv6 address are translated into the + corresponding source IPv4 address and destination IPv4 address, + respectively. Note that address translation is accomplished in a + stateless manner. + + + +Cheng, et al. Informational [Page 8] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + + When an IPv6 WKP is used, [RFC6052] allows only global IPv4 addresses + to be embedded in the IPv6 address. An IPv6 address composed of a + WKP and a non-global IPv4 address is hence invalid, and packets that + contain such an address received by an AFXLBR are dropped. + + In the case where both the IPv4 client networks and the IPv6 transit + network belong to the same organization, non-global IPv4 addresses + may be used with a network-specific prefix [RFC6052]. + +5. Advertising IPv4-Embedded IPv6 Routes + + In order to forward IPv4 packets to the proper destination across an + IPv6 network, IPv4 reachability information needs to be disseminated + throughout the IPv6 network. This is performed by AFXLBRs that + connect to IPv4 client networks using OSPFv3. + + With the scenario described in this document, i.e., a set of AFXLBRs + that interconnect multiple IPv4 client networks with an IPv6 network, + the IPv4 networks and IPv6 networks belong to the same or separate + Autonomous Systems (ASs), and as such, these AFXLBRs behave as AS + Boundary Routers (ASBRs). + +5.1. Advertising IPv4-Embedded IPv6 Routes through an IPv6 Transit + Network + + IPv4 addresses and prefixes in an IPv4 client network are translated + into IPv4-embedded IPv6 addresses and prefixes, respectively, using + the IPv6 prefix allocated by the operator and the method specified in + [RFC6052]. These routes are then advertised by one or more attached + ASBRs into the IPv6 transit network using AS-External-LSAs [RFC5340], + i.e., with advertising scope comprising the entire Autonomous System. + +5.1.1. Routing Metrics + + By default, the metric in an AS-External-LSA that carries an IPv4- + embedded IPv6 address or prefixes is a Type 1 external metric, which + is comparable to the link state metric, and we assume that in most + cases OSPFv2 is used in client IPv4 networks. This metric is added + to the metric of the intra-AS path to the ASBR during the OSPFv3 + route calculation. Through ASBR configuration, the metric can be set + to a Type 2 external metric, which is considered much larger than the + metric for any intra-AS path. Refer to the OSPFv3 specification + [RFC5340] for more details. In either case, an external metric may + take the same value as in an IPv4 network (using OSPFv2 or another + routing protocol) but may also be specified based on some routing + policy, the details of which are beyond the scope of this document. + + + + + +Cheng, et al. Informational [Page 9] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + +5.1.2. Forwarding Address + + If the "Forwarding Address" field of an OSPFv3 AS-External-LSA is + used to carry an IPv6 address, that address must also be an + IPv4-embedded IPv6 address where the embedded IPv4 address is the + destination address in an IPv4 client network. However, since an + AFXLBR sits on the border of an IPv4 network and an IPv6 network, it + is RECOMMENDED that the "Forwarding Address" field not be used, so + that the AFXLBR can make the forwarding decision based on its own + IPv4 routing table. + +5.2. Advertising IPv4 Addresses into Client Networks + + IPv4-embedded IPv6 routes injected into the IPv6 network from one + IPv4 client network MAY be advertised into another IPv4 client + network after the associated destination addresses and prefixes are + translated back to IPv4 addresses and prefixes, respectively. This + operation is similar to normal OSPFv3 operation, wherein an + AS-External-LSA can be advertised in a non-backbone area by default. + + An IPv4 client network can limit which advertisements it receives + through configuration. + + For the purpose of this document, IPv4-embedded IPv6 routes MUST NOT + be advertised into any IPv6 client networks that are also connected + to the IPv6 transit network. + +6. Aggregation on IPv4 Addresses and Prefixes + + In order to reduce the amount of Link State Advertisements (LSAs) + that are injected into the IPv6 network, an implementation should + provide mechanisms to aggregate IPv4 addresses and prefixes at an + AFXLBR prior to advertisement as IPv4-embedded IPv6 addresses and + prefixes. In general, the aggregation practice should be based on + routing policy, which is beyond the scope of this document. + +7. Forwarding + + There are three cases applicable to forwarding IP packets in the + scenario described in this document: + + 1. On an AFXLBR, if an IPv4 packet is received on an interface + connecting to an IPv4 segregated client network with a + destination IPv4 address belonging to another IPv4 client + network, the header of the packet is translated to the + corresponding IPv6 header as described in Section 4, and the + packet is then forwarded to the destination AFXLBR that + advertised the IPv4-embedded IPv6 address into the IPv6 network. + + + +Cheng, et al. Informational [Page 10] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + + 2. On an AFXLBR, if an IPv4-embedded IPv6 packet is received and the + embedded destination IPv4 address is in its IPv4 routing table, + the header of the packet is translated to the corresponding IPv4 + header as described in Section 4, and the packet is then + forwarded accordingly. + + 3. On any router that is within the IPv4-embedded IPv6 topology + subset of the IPv6 network, if an IPv4-embedded IPv6 packet is + received and a route is found in the IPv4-embedded IPv6 routing + table, the packet is forwarded to the IPv6 next hop, just like + the handling for a normal IPv6 packet, without any translation. + + The classification of an IPv4-embedded IPv6 packet is done according + to the IPv6 prefix of the destination address, which is either the + WKP (i.e., 64:ff9b::/96) or locally allocated as defined in + [RFC6052]. + +8. Backdoor Connections + + In some deployments, IPv4 client networks are interconnected across + the IPv6 network but are also directly connected to each other. The + direct connections between IPv4 client networks, sometimes called + "backdoor" connections, can certainly be used to transport IPv4 + packets between IPv4 client networks. In general, backdoor + connections are preferred over the IPv6 network, since no address + family translation is required. + +9. Prevention of Loops + + If an LSA sent from an AFXLBR into a client network could then be + received by another AFXLBR, it would be possible for routing loops to + occur. To prevent loops, an AFXLBR MUST set the DN bit [RFC4576] in + any LSA that it sends to a client network. The AFXLBR MUST also + ignore any LSA received from a client network that already has the DN + bit set. + +10. MTU Issues + + In the IPv6 network, there are no new MTU issues introduced by this + document. If a separate OSPFv3 instance (per [RFC5838]) is used for + IPv4-embedded IPv6 routing, the MTU handling in the IPv6 network is + the same as that of the default OSPFv3 instance. + + However, the MTU in the IPv6 network may be different than that of + IPv4 client networks. Since an IPv6 router will never fragment a + packet, the packet size of any IPv4-embedded IPv6 packet entering the + IPv6 network must be equal to or less than the MTU of the IPv6 + network. In order to achieve this requirement, it is recommended + + + +Cheng, et al. Informational [Page 11] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + + that AFXLBRs perform IPv6 path discovery among themselves. The + resulting MTU, after taking into account the difference between the + IPv4 header length and the IPv6 header length, must be "propagated" + into IPv4 client networks, e.g., included in the OSPFv2 Database + Description packet. + + The details of passing the proper MTU into IPv4 client networks are + beyond the scope of this document. + +11. Security Considerations + + There are several security aspects that require attention in the + deployment practices described in this document. + + In the OSPFv3 transit network, the security considerations for OSPFv3 + are handled as usual, and in particular, authentication mechanisms + described in [RFC6506] can be deployed. + + When a separate OSPFv3 instance is used to support IPv4-embedded IPv6 + routing, the same Security Association (SA) [RFC4552] MUST be used by + the embedded IPv4 address instance as other instances utilizing the + same link, as specified in [RFC5838]. + + Security considerations as documented in [RFC6052] must also be + thought through and properly implemented, including the following: + + o The IPv6 prefix that is used to carry an embedded IPv4 address + (refer to Section 4.1) must be configured by the authorized + operator on all participating AFXLBRs in a secure manner. This is + to help prevent a malicious attack resulting in network + disruption, denial of service, and possible information + disclosure. + + o Effective mechanisms (such as reverse path checking) must be + implemented in the IPv6 transit network (including AFXLBRs) to + prevent spoofing of embedded IPv4 addresses, which otherwise might + be used as source addresses of malicious packets. + + o If firewalls are used in IPv4 and/or IPv6 networks, configuration + of the routers must be consistent, so that there are no holes in + IPv4 address filtering. + + The details of security handling are beyond the scope of this + document. + + + + + + + +Cheng, et al. Informational [Page 12] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + +12. Operational Considerations + + This document puts together some mechanisms based on existing + technologies developed by the IETF as an integrated solution to + transport IPv4 packets over an IPv6 network using a separate OSPFv3 + routing table. There are several aspects of these mechanisms that + require attention for deployment and operation. + + The tunnel-based solution documented in [RFC5565] and the solution + proposed in this document are both used for transporting IPv4 packets + over an IPv6 network, using different mechanisms. The two methods + are not related to each other, and they can coexist in the same + network if so deployed, without any conflict. + + If one approach is to be deployed, the operator will decide which + approach to use. Note that each approach has its own characteristics + and requirements. For example, the tunnel-based solution requires a + mesh of inter-AFBR softwires (tunnels) spanning the IPv6 network, as + well as IBGP to exchange routes between AFBRs [RFC5565]; the approach + in this document requires AFXLBRs that are capable of performing + IPv4-IPv6 packet header translation per [RFC6145]. + + To deploy the solution as documented here, some configurations are + required. An IPv6 prefix must first be chosen that is used to form + all the IPv4-embedded IPv6 addresses and prefixes advertised by + AFXLBRs in the IPv6 network; refer to Section 4.1 for details. The + IPv4-embedded IPv6 routing table is created by using a separate + OSPFv3 instance in the IPv6 network. As described in Section 3.2, + this configuration is accomplished according to the mechanism + described in [RFC5838]. + + Note that this document does not change any behavior of OSPFv3, and + the existing or common practice should apply in the context of + scalability. For example, the amount of routes that are advertised + by OSPFv3 is one key concern. With the solution as described in this + document, IPv4-embedded IPv6 addresses and prefixes will be injected + by AFXLBRs into some part of the IPv6 network (see Section 3.1 for + details), and a separate routing table will be used for IPv4-embedded + IPv6 routing. Care must be taken during network design such that 1) + aggregations are performed on IPv4 addresses and prefixes before + being advertised in the IPv6 network as described in Section 6, and + 2) estimates are made as to the amount of IPv4-embedded IPv6 routes + that would be disseminated in the IPv6 network and to the size of the + separate OSPFv3 routing table. + + + + + + + +Cheng, et al. Informational [Page 13] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + +13. Acknowledgements + + Many thanks to Acee Lindem, Dan Wing, Joel Halpern, Mike Shand, and + Brian Carpenter for their comments. + +14. References + +14.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC4576] Rosen, E., Psenak, P., and P. Pillay-Esnault, "Using a + Link State Advertisement (LSA) Options Bit to Prevent + Looping in BGP/MPLS IP Virtual Private Networks (VPNs)", + RFC 4576, June 2006. + + [RFC5565] Wu, J., Cui, Y., Metz, C., and E. Rosen, "Softwire Mesh + Framework", RFC 5565, June 2009. + + [RFC5838] Lindem, A., Mirtorabi, S., Roy, A., Barnes, M., and R. + Aggarwal, "Support of Address Families in OSPFv3", + RFC 5838, April 2010. + + [RFC6145] Li, X., Bao, C., and F. Baker, "IP/ICMP Translation + Algorithm", RFC 6145, April 2011. + + [RFC6969] Retana, A. and D. Cheng, "OSPFv3 Instance ID Registry + Update", RFC 6969, July 2013. + +14.2. Informative References + + [RFC4552] Gupta, M. and N. Melam, "Authentication/Confidentiality + for OSPFv3", RFC 4552, June 2006. + + [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF + for IPv6", RFC 5340, July 2008. + + [RFC6052] Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X. + Li, "IPv6 Addressing of IPv4/IPv6 Translators", RFC 6052, + October 2010. + + [RFC6506] Bhatia, M., Manral, V., and A. Lindem, "Supporting + Authentication Trailer for OSPFv3", RFC 6506, + February 2012. + + + + + + +Cheng, et al. Informational [Page 14] + +RFC 6992 Routing for IPv4-Embedded IPv6 Packets July 2013 + + +Authors' Addresses + + Dean Cheng + Huawei Technologies + 2330 Central Expressway + Santa Clara, California 95050 + USA + + EMail: dean.cheng@huawei.com + + + Mohamed Boucadair + France Telecom + Rennes, 35000 + France + + EMail: mohamed.boucadair@orange.com + + + Alvaro Retana + Cisco Systems + 7025 Kit Creek Rd. + Research Triangle Park, North Carolina 27709 + USA + + EMail: aretana@cisco.com + + + + + + + + + + + + + + + + + + + + + + + + + +Cheng, et al. Informational [Page 15] + |