diff options
Diffstat (limited to 'doc/rfc/rfc3750.txt')
-rw-r--r-- | doc/rfc/rfc3750.txt | 1123 |
1 files changed, 1123 insertions, 0 deletions
diff --git a/doc/rfc/rfc3750.txt b/doc/rfc/rfc3750.txt new file mode 100644 index 0000000..7cf14cb --- /dev/null +++ b/doc/rfc/rfc3750.txt @@ -0,0 +1,1123 @@ + + + + + + +Network Working Group C. Huitema +Request for Comments: 3750 Microsoft +Category: Informational R. Austein + ISC + S. Satapati + Cisco Systems, Inc. + R. van der Pol + NLnet Labs + April 2004 + + + Unmanaged Networks IPv6 Transition Scenarios + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2004). All Rights Reserved. + +Abstract + + This document defines the scenarios in which IPv6 transition + mechanisms are to be used in unmanaged networks. In order to + evaluate the suitability of these mechanisms, we need to define the + scenarios in which these mechanisms have to be used. One specific + scope is the "unmanaged network", which typically corresponds to a + home or small office network. The scenarios are specific to a single + subnet, and are defined in terms of IP connectivity supported by the + gateway and the Internet Service Provider (ISP). We first examine + the generic requirements of four classes of applications: local, + client, peer to peer and server. Then, for each scenario, we infer + transition requirements by analyzing the needs for smooth migration + of applications from IPv4 to IPv6. + + + + + + + + + + + + + + +Huitema, et al. Informational [Page 1] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 + 2. Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 + 3. Applications . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 3.1. Local Applications . . . . . . . . . . . . . . . . . . . 5 + 3.2. Client Applications. . . . . . . . . . . . . . . . . . . 5 + 3.3. Peer-to-Peer Applications. . . . . . . . . . . . . . . . 5 + 3.4. Server Applications. . . . . . . . . . . . . . . . . . . 5 + 4. Application Requirements of an IPv6 Unmanaged Network. . . . . 6 + 4.1. Requirements of Local Applications . . . . . . . . . . . 6 + 4.2. Requirements of Client Applications. . . . . . . . . . . 7 + 4.2.1. Privacy Requirement of Client Applications . . . 7 + 4.3. Requirements of Peer-to-Peer Applications. . . . . . . . 8 + 4.4. Requirements of Server Applications. . . . . . . . . . . 9 + 5. Stages of IPv6 Deployment. . . . . . . . . . . . . . . . . . . 9 + 5.1. Case A, Host Deployment of IPv6 Applications . . . . . . 10 + 5.1.1. Application Support in Case A. . . . . . . . . . 10 + 5.1.2. Addresses and Connectivity in Case A . . . . . . 11 + 5.1.3. Naming Services in Case A. . . . . . . . . . . . 12 + 5.2. Case B, IPv6 Connectivity with Provider Support. . . . . 12 + 5.2.1. Application Support in Case B. . . . . . . . . . 12 + 5.2.2. Addresses and Connectivity in Case B . . . . . . 13 + 5.2.3. Naming Services in Case B. . . . . . . . . . . . 14 + 5.3. Case C, IPv6 Connectivity without Provider Support . . . 14 + 5.3.1. Application Support in Case C. . . . . . . . . . 15 + 5.3.2. Addresses and Connectivity in Case C . . . . . . 15 + 5.3.3. Naming Services in Case C. . . . . . . . . . . . 15 + 5.4. Case D, ISP Stops Providing Native IPv4 Connectivity . . 15 + 5.4.1. Application Support in Case D. . . . . . . . . . 16 + 5.4.2. Addresses and Connectivity in Case D . . . . . . 16 + 5.4.3. Naming Services in Case D. . . . . . . . . . . . 17 + 6. Security Considerations. . . . . . . . . . . . . . . . . . . . 17 + 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 18 + 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 18 + 8.1. Normative References. . . . . . . . . . . . . . . . . . . 18 + 8.2. Informative References. . . . . . . . . . . . . . . . . . 18 + 9. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 19 + 10. Full Copyright Statement . . . . . . . . . . . . . . . . . . . 20 + + + + + + + + + + + + +Huitema, et al. Informational [Page 2] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + +1. Introduction + + In order to evaluate the suitability of transition mechanisms from + IPv4 [RFC791] to IPv6 [RFC2460], we need to define the environment or + scope in which these mechanisms have to be used. One specific scope + is the "unmanaged networks", which typically correspond to home + networks or small office networks. + + This document studies the requirement posed by various transition + scenarios, and is organized in to four main sections. Section 2 + defines the topology that we are considering. Section 3 presents the + four classes of applications that we consider for unmanaged networks: + local applications, client applications, peer-to-peer applications, + and server applications. Section 4 studies the requirements of these + four classes of applications. Section 5 analyses how these + requirements translate into four configurations that we expect to + encounter during IPv6 deployment: gateways which do not provide IPv6, + dual-stack gateways connected to dual-stack ISPs, dual-stack gateways + connected to IPv4-only ISPs, and IPv6-capable gateways connected to + IPv6-only ISPs. While these four configurations are certainly not an + exhaustive list of possible configurations, we believe that they + represent the common cases for unmanaged networks. + +2. Topology + + The typical unmanaged network is composed of a single subnet, + connected to the Internet through a single Internet Service Provider + (ISP) connection. Several hosts may be connected to the subnet: + + +------+ + | Host +--+ + +------+ | + | + +------+ | + | Host +--+ +-------------- + +------+ | | + : +-----+ + : +---------+ | | + +--+ Gateway +------| ISP | Internet + : +---------+ | | + : +-----+ + +------+ | | + | Host +--+ +-------------- + +------+ | + | + +------+ | + | Host +--+ + +------+ + + + +Huitema, et al. Informational [Page 3] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + + Between the subnet and the ISP access link is a gateway, which may or + may not perform NAT and firewall functions. When the gateway + performs NAT functions [RFC3022], it generally allocates private IPv4 + addresses to the local hosts [RFC1918]. A key point of this + configuration is that the gateway is typically not "managed". In + most cases, it is a simple "appliance" that incorporates some static + policies. There are many cases in which the gateway is procured and + configured by the ISP. + + Note that there are also some cases in which we find two gateways + back to back, one managed by the ISP and the other added by the owner + of the unmanaged network. They are not covered in this memo because + most of them either require some management, or the gateway added by + the user can function as an L2 switch. + + The access link between the unmanaged network and the ISP might be + either a static, permanent connection or a dynamic connection such as + a dial-up or ISDN line. + + In a degenerate case, an unmanaged network might consist of a single + host, directly connected to an ISP. + + There are some cases in which the "gateway" is replaced by a layer-2 + bridge. In such deployments, the hosts have direct access to the ISP + service. In order to avoid lengthy developments, we will treat these + cases as if the gateway was not present, i.e., as if each host was + connected directly to the ISP. + + Our definition of unmanaged networks explicitly exclude networks + composed of multiple subnets. We will readily admit that some home + networks and some small business networks contain multiple subnets, + but in the current state of the technology, these multiple subnet + networks are not "unmanaged": some competent administrator has to + explicitly configure the routers. We will thus concentrate on single + subnet networks, where no such competent operator is expected. + +3. Applications + + Users may use or wish to use the unmanaged network services in four + types of applications: local, client, servers and peer-to-peers. + These applications may or may not run easily on today's networks + (some do, some don't). + + + + + + + + +Huitema, et al. Informational [Page 4] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + +3.1. Local Applications + + "Local applications" are only meant to involve the hosts that are + part of the unmanaged network. Typical examples would be file + sharing or printer sharing. + + Local applications work effectively in IPv4 unmanaged networks, even + when the gateway performs NAT or firewall functions. In fact, + firewall services at the gateway are often deemed desirable, as they + isolate the local applications from interference by Internet users. + +3.2. Client Applications + + "Client applications" are those that involve a client on the + unmanaged network and a server at a remote location. Typical + examples would be accessing a web server from a client inside the + unmanaged network, or reading and sending e-mail with the help of a + server outside the unmanaged network. + + Client applications tend to work correctly in IPv4 unmanaged + networks, even when the gateway performs NAT or firewall functions: + these translation and firewall functions are designed precisely to + enable client applications. + +3.3. Peer-to-Peer Applications + + There are really two kinds of "peer-to-peer" applications: ones which + only involve hosts on the unmanaged network, and ones which involve + both one or more hosts on the unmanaged network and one or more hosts + outside the unmanaged network. We will only consider the latter kind + of peer-to-peer applications, since the former can be considered a + subset of the kind of local applications discussed in section 3.1. + + Peer-to-peer applications often don't work well in unmanaged IPv4 + networks. Application developers often have to enlist the help of a + "relay server", in effect restructuring the peer-to-peer connection + into a pair of back-to-back client/server connections. + +3.4. Server Applications + + "Server applications" involve running a server in the unmanaged + network for use by other parties outside the network. Typical + examples would be running a web server or an e-mail server on one of + the hosts inside the unmanaged network. + + Deploying these servers in most unmanaged IPv4 networks requires some + special programming of the NAT or firewall [RFC2993], and is more + complex when the NAT only publishes a small number of global IP + + + +Huitema, et al. Informational [Page 5] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + addresses and relies on "port translation". In the common case in + which the NAT manages exactly one global IP address and relies on + "port translation", a given external port can only be used by one + internal server. + + Deploying servers usually requires providing each server with a + stable DNS name, and associating a global IPv4 address with that + name, whether the address be that of the server itself or that of the + router acting as a firewall or NAT. Since updating DNS is a + management task, it falls somewhat outside the scope of an unmanaged + network. On the other hand, it is also possible to use out-of-band + techniques (such as cut-and-paste into an instant message system) to + pass around the address of the target server. + +4. Application Requirements of an IPv6 Unmanaged Network + + As we transition to IPv6, we must meet the requirements of the + various applications, which we can summarize in the following way: + applications that worked well with IPv4 should continue working well + during the transition; it should be possible to use IPv6 to deploy + new applications that are currently hard to deploy in IPv4 networks; + and the deployment of these IPv6 applications should be simple and + easy to manage, but the solutions should also be robust and secure. + + The application requirements for IPv6 Unmanaged Networks fall into + three general categories: connectivity, naming, and security. + Connectivity issues include the provision of IPv6 addresses and their + quality: do hosts need global addresses, should these addresses be + stable or, more precisely, what should the expected lifetimes of + these addresses be? Naming issues include the management of names + for the hosts: do hosts need DNS names, and is inverse name + resolution [DNSINADDR] a requirement? Security issues include + possible restriction to connectivity, privacy concerns and, generally + speaking, the security of the applications. + +4.1. Requirements of Local Applications + + Local applications require local connectivity. They must continue to + work even if the unmanaged network is isolated from the Internet. + + Local applications typically use ad hoc naming systems. Many of + these systems are proprietary; an example of a standard system is the + service location protocol (SLP) [RFC2608]. + + The security of local applications will usually be enhanced if these + applications can be effectively isolated from the global Internet. + + + + + +Huitema, et al. Informational [Page 6] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + +4.2. Requirements of Client Applications + + Client applications require global connectivity. In an IPv6 network, + we would expect the client to use a global IPv6 address, which will + have to remain stable for the duration of the client-server session. + + Client applications typically use the domain name system to locate + servers. In an IPv6 network, the client must be able to locate a DNS + resolver. + + Many servers try to look up a DNS name associated with the IP address + of the client. In an IPv4 network, this IP address will often be + allocated by the Internet service provider to the gateway, and the + corresponding PTR record will be maintained by the ISP. In many + cases, these PTR records are perfunctory, derived in an algorithmic + fashion from the IPv4 address; the main information that they contain + is the domain name of the ISP. Whether or not an equivalent function + should be provided in an IPv6 network is unclear. + +4.2.1. Privacy Requirement of Client Applications + + It is debatable whether the IPv6 networking service should be + engineered to enhance the privacy of the clients, and specifically + whether support for RFC 3041 [RFC3041] should be required. RFC 3041 + enables hosts to pick IPv6 addresses in which the host identifier is + randomized; this was designed to make sure that the IPv6 addresses + and the host identifier cannot be used to track the Internet + connections of a device's owner. + + Many observe that randomizing the host identifier portion of the + address is only a half measure. If the unmanaged network address + prefix remains constant, the randomization only hides which host in + the unmanaged network originates a given connection, e.g., the + children's computer versus their parents'. This would place the + privacy rating of such connections on a par with that of IPv4 + connections originating from an unmanaged network in which a NAT + manages a static IPv4 address; in both cases, the IPv4 address or the + IPv6 prefix can be used to identify the unmanaged network, e.g., the + specific home from which the connection originated. + + However, randomization of the host identifier does provide benefits. + First, if some of the hosts in the unmanaged network are mobile, the + randomization destroys any correlation between the addresses used at + various locations: the addresses alone could not be used to determine + whether a given connection originates from the same laptop moving + from work to home, or used on the road. Second, the randomization + removes any information that could be extracted from a hardwired host + identifier; for example, it will prevent outsiders from correlating a + + + +Huitema, et al. Informational [Page 7] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + serial number with a specific brand of expensive electronic + equipment, and to use this information for planning marketing + campaigns or possibly burglary attempts. + + Randomization of the addresses is not sufficient to guarantee + privacy. Usage can be tracked by a variety of other means, from + application level "cookies" to complex techniques involving data + mining and traffic analysis. However, we should not make a bad + situation worse. Other attacks to privacy may be possible, but this + is not a reason to enable additional tracking through IPv6 addresses. + + Randomization of the host identifier has some costs: the address + management in hosts is more complex for the hosts, reverse DNS + services are harder to provide, and the gateway may have to maintain + a larger cache of neighbor addresses; however, experience from + existing implementation shows that these costs are not overwhelming. + Given the limited benefits, it would be unreasonable to require that + all hosts use privacy addresses; however, given the limited costs, it + is reasonable to require that all unmanaged networks allow use of + privacy addresses by those hosts that choose to do so. + +4.3. Requirements of Peer-to-Peer Applications + + Peer-to-peer applications require global connectivity. In an IPv6 + network, we would expect the peers to use a global IPv6 address, + which will have to remain stable for the duration of the peer-to-peer + session. + + There are multiple aspects to the security of peer-to-peer + applications, many of which relate to the security of the rendezvous + system. If we assume that the peers have been able to safely + exchange their IPv6 addresses, the main security requirement is the + capability to safely exchange data between the peers without + interference by third parties. + + Private conversations by one of the authors with developers of peer- + to-peer applications suggest that many individuals would be willing + to consider an "IPv6-only" model if they can get two guarantees: + + 1) That there is no regression from IPv4, i.e., that all customers + who could participate in a peer-to-peer application using IPv4 can + also be reached by IPv6. + + 2) That IPv6 provides a solution for at least some of their hard + problems, e.g., enabling peers located behind an IPv4 NAT to + participate in a peer-to-peer application. + + + + + +Huitema, et al. Informational [Page 8] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + Requiring IPv6 connectivity for a popular peer-to-peer application + could create what economists refer to as a "network effect", which in + turn could significantly speed up the deployment of IPv6. + +4.4. Requirements of Server Applications + + Server applications require global connectivity, which in an IPv6 + network implies global addresses. In an IPv4 network utilizing a + NAT, for each service provided by a server, the NAT has to be + configured to forward packets sent to that service to the server that + offers the service. + + Server applications normally rely on the publication of the server's + address in the DNS. This, in turn, requires that the server be + provisioned with a "global DNS name". + + The DNS entries for the server will have to be updated, preferably in + real time, if the server's address changes. In practice, updating + the DNS can be slow, which implies that server applications will have + a better chance of being deployed if the IPv6 addresses remain + stable. + + The security of server applications depends mostly on the correctness + of the server, and also on the absence of collateral effects: many + incidents occur when the opening of a server on the Internet + inadvertently enables remote access to some other services on the + same host. + +5. Stages of IPv6 Deployment + + We expect the deployment of IPv6 to proceed from an initial state in + which there is little or no deployment, to a final stage in which we + might retire the IPv4 infrastructure. We expect this process to + stretch over many years; we also expect it to not be synchronized, as + different parties involved will deploy IPv6 at different paces. + + In order to get some clarity, we distinguish three entities involved + in the transition of an unmanaged network: the ISP (possibly + including ISP consumer premise equipment (CPE)), the home gateway, + and the hosts (computers and appliances). Each can support IPv4- + only, both IPv4 and IPv6, or IPv6-only. That gives us 27 + possibilities. We describe the most important cases. We will assume + that in all cases the hosts are a combination of IPv4-only, dual + stack, and (perhaps) IPv6-only hosts. + + + + + + + +Huitema, et al. Informational [Page 9] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + The cases we will consider are: + + A) a gateway that does not provide IPv6 at all; + B) a dual-stack gateway connected to a dual stack ISP; + C) a dual stack gateway connected to an IPV4-only ISP; and + D) a gateway connected to an IPv6-only ISP + + In most of these cases, we will assume that the gateway includes a + NAT: we realize that this is not always the case, but we submit that + it is common enough that we have to deal with it; furthermore, we + believe that the non-NAT variants of these cases map fairly closely + to this same set of cases. In fact, we can consider three non-NAT + variants: directly connected host; gateway acting as a bridge; and + gateway acting as a non-NAT IP router. + + The cases of directly connected hosts are, in effect, variants of + cases B, C, and D, in which the host can use all solutions available + to gateways: case B if the ISP is dual stack, case C if the ISP only + provides IPv4 connectivity, and case D if the ISP only provides IPv6 + connectivity. + + In the cases where the gateway is a bridge, the hosts are, in effect, + directly connected to the ISP, and for all practical matter, behave + as directly connected hosts. + + The case where the gateway is an IP router but not a NAT will be + treated as small variants in the analysis of case A, B, C, and D. + +5.1. Case A, Host Deployment of IPv6 Applications + + In this case, the gateway doesn't provide IPv6; the ISP may or may + not provide IPv6, but this is not relevant since the non-upgraded + gateway would prevent the hosts from using the ISP service. Some + hosts will try to get IPv6 connectivity in order to run applications + that require IPv6, or work better with IPv6. The hosts, in this + case, will have to handle the IPv6 transition mechanisms on their + own. + + There are two variations of this case, depending on the type of + service implemented by the gateway. In many cases, the gateway is a + direct obstacle to the deployment of IPv6, but a gateway which is + some form of bridge-mode CPE or which is a plain (neither filtering + nor NAT) router does not really fall into this category. + +5.1.1. Application Support in Case A + + The focus of Case A is to enable communication between a host on the + unmanaged network and some IPv6-only hosts outside of the network. + + + +Huitema, et al. Informational [Page 10] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + The primary focus in the immediate future, i.e., for the early + adopters of IPv6, will be peer-to-peer applications. However, as + IPv6 deployment progresses, we will likely find a situation where + some networks have IPv6-only services deployed, at which point we + would like case A client applications to be able to access those + services. + + Local applications are not a primary focus of Case A. At this stage, + we expect all clients in the unmanaged network to have either IPv4 + only or dual stack support. Local applications can continue working + using IPv4. + + Server applications are also not a primary focus of Case A. Server + applications require DNS support, which is difficult to engineer for + clients located behind a NAT, which is likely to be present in this + case. Besides, server applications presently cater mostly to IPv4 + clients; putting up an IPv6-only server is not very attractive. + + In contrast, peer-to-peer applications are probably both attractive + and easy to deploy: they are deployed in a coordinated fashion as + part of a peer-to-peer network, which means that hosts can all + receive some form of an IPv6 upgrade; they often provide their own + naming infrastructure, in which case they are not dependent on DNS + services. + +5.1.2. Addresses and Connectivity in Case A + + We saw in 5.1.1 that the likely motivation for deployment of IPv6 + connectivity in hosts in case A is a desire to use peer-to-peer and + client IPv6 applications. These applications require that all + participating nodes get some form of IPv6 connectivity, i.e., at + least one globally reachable IPv6 address. + + If the local gateway provides global IPv4 addresses to the local + hosts, then these hosts can individually exercise the mechanisms + described in case C, "IPv6 connectivity without provider support." + If the local gateway implements a NAT function, another type of + mechanism is needed. The mechanism to provide connectivity to peers + behind NAT should be easy to deploy, and light weight; it will have + to involve tunneling over a protocol that can easily traverse NAT, + either TCP or preferably UDP, as tunneling over TCP can result in + poor performance in cases of time-outs and retransmissions. If + servers are needed, these servers will, in practice, have to be + deployed as part of the "support infrastructure" for the peer-to-peer + network or for an IPv6-based service; economic reality implies that + the cost of running these servers should be as low as possible. + + + + + +Huitema, et al. Informational [Page 11] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + +5.1.3. Naming Services in Case A + + At this phase of IPv6 deployment, hosts in the unmanaged domain have + access to DNS services over IPv4 through the existing gateway. DNS + resolvers are supposed to serve AAAA records, even if they only + implement IPv4; the local hosts should thus be able to obtain the + IPv6 addresses of IPv6-only servers. + + Reverse lookup is difficult to provide for hosts on the unmanaged + network if the gateway is not upgraded. This is a potential issue + for client applications. Some servers require a reverse lookup as + part of accepting a client's connection, and may require that the + direct lookup of the corresponding name matches the IPv6 address of + the client. There is thus a requirement to provide either a reverse + lookup solution, or to make sure that IPv6 servers do not require + reverse lookup. + +5.2. Case B, IPv6 Connectivity with Provider Support + + In this case, the ISP and gateway are both dual stack. The gateway + can use native IPv6 connectivity to the ISP and can use an IPv6 + prefix allocated by the ISP. + +5.2.1. Application Support in Case B + + If the ISP and the gateway are dual-stack, client applications, + peer-to-peer applications, and server applications can all be enabled + easily on the unmanaged network. + + We expect the unmanaged network to include three kinds of hosts: + IPv4 only, IPv6-only, and dual stack. Obviously, dual stack hosts + can interact easily with either IPv4 only hosts or IPv6-only hosts, + but an IPv4 only host and an IPv6-only host cannot communicate + without a third party performing some kind of translation service. + Our analysis concludes that unmanaged networks should not have to + provide such translation services. + + The argument for providing translation services is that their + availability would accelerate the deployment of IPv6-only devices, + and thus the transition to IPv6. This is, however, a dubious + argument since it can also be argued that the availability of these + translation services will reduce the pressure to provide IPv6 at all, + and to just continue fielding IPv4-only devices. The remaining + pressure to provide IPv6 connectivity would just be the difference in + "quality of service" between a translated exchange and a native + interconnect. + + + + + +Huitema, et al. Informational [Page 12] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + The argument against translation service is the difficulty of + providing these services for all applications, compared to the + relative ease of installing dual stack solutions in an unmanaged + network. Translation services can be provided either by application + relays, such as HTTP proxies, or by network level services, such as + NAT-PT [RFC2766]. Application relays pose several operational + problems: first, one must develop relays for all applications; + second, one must develop a management infrastructure to provision the + host with the addresses of the relays; in addition, the application + may have to be modified if one wants to use the relay selectively, + e.g., only when direct connection is not available. Network level + translation poses similar problems: in practice, network level + actions must be complemented by "application layer gateways" that + will rewrite references to IP addresses in the protocol, and while + these relays are not necessary for every application, they are + necessary for enough applications to make any sort of generalized + translation quite problematic; hosts may need to be parameterized to + use the translation service, and designing the right algorithm to + decide when to translate DNS requests has proven very difficult. + + Not assuming translation services in the network appears to be both + more practical and more robust. If the market requirement for a new + device requires that it interact with both IPv4 and IPv6 hosts, we + may expect the manufacturers of these devices to program them with a + dual stack capability; in particular, we expect general purpose + systems, such as personal computers, to be effectively dual-stack. + The only devices that are expected to be capable of only supporting + IPv6 are those designed for specific applications, which do not + require interoperation with IPv4-only systems. We also observe that + providing both IPv4 and IPv6 connectivity in an unmanaged network is + not particularly difficult: we have a fair amount of experience using + IPv4 in unmanaged networks in parallel with other protocols, such as + IPX. + +5.2.2. Addresses and Connectivity in Case B + + In Case B, the upgraded gateway will act as an IPv6 router; it will + continue providing the IPv4 connectivity, perhaps using NAT. Nodes + in the local network will typically obtain: + + - IPv4 addresses (from or via the gateway), + - IPv6 link local addresses, and + - IPv6 global addresses. + + In some networks, NAT will not be in use and the local hosts will + actually obtain global IPv4 addresses. We will not elaborate on + this, as the availability of global IPv4 addresses does not bring any + additional complexity to the transition mechanisms. + + + +Huitema, et al. Informational [Page 13] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + To enable this scenario, the gateway needs to use a mechanism to + obtain a global IPv6 address prefix from the ISP, and advertise this + address prefix to the hosts in the unmanaged network; several + solutions will be assessed in a companion memo [EVAL]. + +5.2.3. Naming Services in Case B + + In case B, hosts in the unmanaged domain have access to DNS services + through the gateway. As the gateway and the ISP both support IPv4 + and IPv6, these services may be accessible by the IPv4-only hosts + using IPv4, by the IPv6-only hosts using IPv6, and by the dual stack + hosts using either. Currently, IPv4 only hosts usually discover the + IPv4 address of the local DNS resolver using DHCP; there must be a + way for IPv6-only hosts to discover the IPv6 address of the DNS + resolver. + + There must be a way to resolve the name of local hosts to their IPv4 + or IPv6 addresses. Typing auto-configured IPv6 addresses in a + configuration file is impractical; this implies either some form of + dynamic registration of IPv6 addresses in the local service, or a + dynamic address discovery mechanism. Possible solutions will be + compared in the evaluation draft [EVAL]. + + The requirement to support server applications in the unmanaged + network implies a requirement to publish the IPv6 addresses of local + servers in the DNS. There are multiple solutions, including domain + name delegation. If efficient reverse lookup functions are to be + provided, delegation of a fraction of the ip6.arpa tree is also + required. + + The response to a DNS request should not depend on the protocol by + which the request is transported: dual-stack hosts may use either + IPv4 or IPv6 to contact the local resolver, the choice of IPv4 or + IPv6 may be random, and the value of the response should not depend + on a random event. + + DNS transition issues in a dual IPv4/IPv6 network are discussed in + [DNSOPV6]. + +5.3. Case C, IPv6 Connectivity without Provider Support + + In this case, the gateway is dual stack, but the ISP is not. The + gateway has been upgraded and offers both IPv4 and IPv6 connectivity + to hosts. It cannot rely on the ISP for IPv6 connectivity, because + the ISP does not yet offer ISP connectivity. + + + + + + +Huitema, et al. Informational [Page 14] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + +5.3.1. Application Support in Case C + + Application support in case C should be identical to that of case B. + +5.3.2. Addresses and Connectivity in Case C + + The upgraded gateway will behave as an IPv6 router; it will continue + providing the IPv4 connectivity, perhaps using NAT. Nodes in the + local network will obtain: + + - IPv4 addresses (from or via the gateway), + - IPv6 link local addresses, + - IPv6 global addresses. + + There are two ways to bring immediate IPv6 connectivity on top of an + IPv4 only infrastructure: automatic tunnels, e.g., provided by the + 6TO4 technology [RFC3056], or configured tunnels. Both technologies + have advantages and limitations, which will be studied in another + document. + + There will be some cases where the local hosts actually obtain global + IPv4 addresses. We will not discuss this scenario, as it does not + make the use of transition technology harder, or more complex. Case + A has already examined how hosts could obtain IPv6 connectivity + individually. + +5.3.3. Naming Services in Case C + + The local naming requirements in case C are identical to the local + naming requirements of case B, with two differences: delegation of + domain names, and management of reverse lookup queries. + + A delegation of some domain name is required in order to publish the + IPv6 addresses of servers in the DNS. + + A specific mechanism for handling reverse lookup queries will be + required if the gateway uses a dynamic mechanism, such as 6to4, to + obtain a prefix independently of any IPv6 ISP. + +5.4. Case D, ISP Stops Providing Native IPv4 Connectivity + + In this case, the ISP is IPv6-only, so the gateway loses IPv4 + connectivity, and is faced with an IPv6-only service provider. The + gateway itself is dual stack, and the unmanaged network includes IPv4 + only, IPv6-only, and dual stack hosts. Any interaction between hosts + in the unmanaged network and IPv4 hosts on the Internet will require + the provision of some inter-protocol services by the ISP. + + + + +Huitema, et al. Informational [Page 15] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + +5.4.1. Application Support in Case D + + At this phase of the transition, IPv6 hosts can participate in all + types of applications with other IPv6 hosts. IPv4 hosts in the + unmanaged network will be able to perform local applications with + IPv4 or dual stack local hosts. + + As in case B, we will assume that IPv6-only hosts will not interact + with IPv4-only hosts, either local or remote. We must however assume + that IPv4-only hosts and dual stack hosts will want to interact with + IPv4 services available on the Internet: the inability to do so would + place the IPv6-only provider at a great commercial disadvantage + compared to other Internet service providers. + + There are three possible ways that an ISP can provide hosts in the + unmanaged network with access to IPv4 applications: by using a set of + application relays, by providing an address translation service, or + by providing IPv4-over-IPv6 tunnels. Our analysis concludes that a + tunnel service seems to be vastly preferable. + + We already mentioned the drawbacks of the application gateway + approach when analyzing case B: it is necessary to provide relays for + all applications, to develop a way to provision the hosts with the + addresses of these relays, and to modify the applications so that + they will only use the relays when needed. We also observe that in + an IPv6-only ISP, the application relays would only be accessible + over IPv6, and would thus not be accessible by the "legacy" IPv4-only + hosts. The application relay approach is thus not very attractive. + + Providing a network address and protocol translation service between + IPv6 and IPv4 would also have many drawbacks. As in case B, it will + have to be complemented by "application layer gateways" that will + rewrite references to IP addresses in the protocol; hosts may need to + be parameterized to use the translation service, and we would have to + solve DNS issues. The network level protocol translation service + doesn't appear to be very desirable. + + The preferable alternative to application relays and network address + translation is the provision of an IPv4-over-IPv6 service. + +5.4.2. Addresses and Connectivity in Case D + + The ISP assigns an IPv6 prefix to the unmanaged network, so hosts + have a global IPv6 address and use it for global IPv6 connectivity. + This will require delegation of an IPv6 address prefix, as + investigated in case C. + + + + + +Huitema, et al. Informational [Page 16] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + To enable IPv4 hosts and dual stack hosts accessibility to remote + IPv4 services, the ISP must provide the gateway with at least one + IPv4 address, using some form of IPv4-over-IPv6 tunneling. Once such + addresses have been provided, the gateway effectively acquires dual- + stack connectivity; for hosts inside the unmanaged network, this will + be indistinguishable from the IPv4 connectivity obtained in case B or + C. + +5.4.3. Naming Services in Case D + + The loss of IPv4 connectivity has a direct impact on the provision of + naming services. In many IPv4 unmanaged networks, hosts obtain their + DNS configuration parameters from the local gateway, typically + through the DHCP service. If the same mode of operation is desired + in case D, the gateway will have to be provisioned with the address + of a DNS resolver and with other DNS parameters, and this + provisioning will have to use IPv6 mechanisms. Another consequence + is that the DNS service in the gateway will only be able to use IPv6 + connectivity to resolve queries; if local hosts perform DNS + resolution autonomously, they will have the same restriction. + + On the surface, this seems to indicate that the local hosts will only + be able to resolve names if the domain servers are accessible through + an IPv6 address documented in an AAAA record. However, the DNS + services are just one case of "IPv4 servers accessed by IPv6 hosts": + it should be possible to simply send queries through the IPv4 + connectivity services to reach the IPv4 only servers. + + The gateway should be able to act as a recursive DNS name server for + the remaining IPv4 only hosts. + +6. Security Considerations + + Security considerations are discussed as part of the applications' + requirements. They include: + + - the guarantee that local applications are only used locally, + - the protection of the privacy of clients + - the requirement that peer-to-peer connections are only used by + authorized peers + - the requirement that tunneling protocols used for IPv6 access over + IPv4 be designed for secure use + - the related requirement that servers in the infrastructure + supporting transition scenarios be designed so as to not be + vulnerable to abuse. + + + + + + +Huitema, et al. Informational [Page 17] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + The security solutions currently used in IPv4 networks include a + combination of firewall functions in the gateway, authentication and + authorization functions in the applications, encryption and + authentication services provided by IP security, Transport Layer + Security and application specific services, and host-based security + products, such as anti-virus software and host firewalls. The + applicability of these tools in IPv6 unmanaged networks will be + studied in a another document. + +7. Acknowledgements + + This document has benefited from the comments of the members of the + IETF V6OPS working group, and from extensive reviews by Chris + Fischer, Tony Hain, Kurt Erik Lindqvist, Erik Nordmark, Pekka Savola, + and Margaret Wasserman. + +8. References + +8.1. Normative References + + [RFC791] Postel, J., "Internet Protocol", STD 5, RFC 791, + September 1981. + + [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 + (IPv6) Specification", RFC 2460, December 1998. + +8.2. Informative References + + [EVAL] Evaluation of Transition Mechanisms for Unmanaged + Networks, Work in Progress. + + [RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. + J. and E. Lear, "Address Allocation for Private + Internets", BCP 5, RFC 1918, February 1996. + + [RFC2608] Guttman, E., Perkins, C., Veizades, J. and M. Day, + "Service Location Protocol, Version 2", RFC 2608, June + 1999. + + [RFC3056] Carpenter, B. and K. Moore, "Connection of IPv6 Domains + via IPv4 Clouds", RFC 3056, February 2001. + + [RFC3022] Srisuresh, P. and K. Egevang. "Traditional IP Network + Address Translator (Traditional NAT)", RFC 3022, January + 2001. + + [RFC2993] Hain, T., "Architectural Implications of NAT", RFC 2993, + November 2000. + + + +Huitema, et al. Informational [Page 18] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + + [RFC3041] Narten, T. and R. Draves, "Privacy Extensions for + Stateless Address Autoconfiguration in IPv6", RFC 3041, + January 2001. + + [RFC2766] Tsirtsis, G. and P. Srisuresh, "Network Address + Translation - Protocol Translation (NAT-PT)", RFC 2766, + February 2000. + + [DNSOPV6] Durand, A., Ihren, J. and P. Savola, "Operational + Considerations and Issues with IPv6 DNS", Work in + Progress. + + [DNSINADDR] Senie, D., "Requiring DNS IN-ADDR Mapping", Work in + Progress. + +9. Authors' Addresses + + Christian Huitema + Microsoft Corporation + One Microsoft Way + Redmond, WA 98052-6399 + + EMail: huitema@microsoft.com + + Rob Austein + Internet Systems Consortium + 950 Charter Street + Redwood City, CA 94063 + USA + + EMail: sra@isc.org + + Suresh Satapati + Cisco Systems, Inc. + San Jose, CA 95134 + USA + + EMail: satapati@cisco.com + + Ronald van der Pol + NLnet Labs + Kruislaan 419 + 1098 VA Amsterdam + NL + + EMail: Ronald.vanderPol@nlnetlabs.nl + + + + + +Huitema, et al. Informational [Page 19] + +RFC 3750 Unmanaged Networks IPv6 Transition Scenarios April 2004 + + +10. Full Copyright Statement + + Copyright (C) The Internet Society (2004). This document is subject + to the rights, licenses and restrictions contained in BCP 78 and + except as set forth therein, the authors retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + +Huitema, et al. Informational [Page 20] + |