diff options
Diffstat (limited to 'doc/rfc/rfc5158.txt')
-rw-r--r-- | doc/rfc/rfc5158.txt | 675 |
1 files changed, 675 insertions, 0 deletions
diff --git a/doc/rfc/rfc5158.txt b/doc/rfc/rfc5158.txt new file mode 100644 index 0000000..e64fdb0 --- /dev/null +++ b/doc/rfc/rfc5158.txt @@ -0,0 +1,675 @@ + + + + + + +Network Working Group G. Huston +Request for Comments: 5158 APNIC +Category: Informational March 2008 + + + 6to4 Reverse DNS Delegation Specification + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Abstract + + This memo describes the service mechanism for entering a delegation + of DNS servers that provide reverse lookup of 6to4 IPv6 addresses + into the 6to4 reverse zone file. The mechanism is based on a + conventional DNS delegation service interface, allowing the service + client to enter the details of a number of DNS servers for the + delegated domain. In the context of a 6to4 reverse delegation, the + client is primarily authenticated by its source address used in the + delegation request, and is authorized to use the function if its IPv6 + address prefix corresponds to an address from within the requested + 6to4 delegation address block. + + + + + + + + + + + + + + + + + + + + + + + + + + +Huston Informational [Page 1] + +RFC 5158 6to4 Reverse DNS March 2008 + + +1. Introduction + + 6to4 [RFC3056] defines a mechanism for allowing isolated IPv6 sites + to communicate using IPv6 over the public IPv4 Internet. This is + achieved through the use of a dedicated IPv6 global unicast address + prefix. A 6to4 'router' can use its IPv4 address value in + conjunction with this global prefix to create a local IPv6 site + prefix. Local IPv6 hosts use this site prefix to form their local + IPv6 address. + + This address structure allows any site that is connected to the IPv4 + Internet the ability to use IPv6 via automatically created IPv6 over + IPv4 tunnels. The advantage of this approach is that it allows the + piecemeal deployment of IPv6 using tunnels to traverse IPv4 network + segments. A local site can connect to an IPv6 network without + necessarily obtaining IPv6 services from its adjacent upstream + network provider. + + As noted in [6to4-dns], the advantage of this approach is that: "it + decouples deployment of IPv6 by the core of the network (e.g. + Internet Service Providers or ISPs) from deployment of IPv6 at the + edges (e.g. customer sites), allowing each site or ISP to deploy IPv6 + support in its own time frame according to its own priorities. With + 6to4, the edges may communicate with one another using IPv6 even if + one or more of their ISPs do not yet provide native IPv6 service." + + The particular question here is the task of setting up a set of + delegations that allows "reverse lookups" for this address space. + + "[This] requires that there be a delegation path for the IP + address being queried, from the DNS root to the servers for the + [DNS] zone which provides the PTR records for that IP address. + For ordinary IPv6 addresses, the necessary DNS servers and records + for IPv6 reverse lookups would be maintained by the each + organization to which an address block is delegated; the + delegation path of DNS records reflects the delegation of address + blocks themselves. However, for IPv6 addresses beginning with the + 6to4 address prefix, the DNS records would need to reflect IPv4 + address delegation. Since the entire motivation of 6to4 is to + decouple site deployment of IPv6 from infrastructure deployment of + IPv6, such records cannot be expected to be present for a site + using 6to4 - especially for a site whose ISP did not yet support + IPv6 in any form." [6to4-dns] + + + + + + + + +Huston Informational [Page 2] + +RFC 5158 6to4 Reverse DNS March 2008 + + + The desired characteristics of a reverse lookup delegation mechanism + are that it: + + * is deployable with minimal overhead or tool development + + * has no impact on existing DNS software and existing DNS + operations + + * performs name lookup efficiently + + * does not compromise any DNS security functions + +2. Potential Approaches + + There are a number of approaches to this problem, ranging from a + conventional explicit delegation structure to various forms of + modified server behaviors that attempt to guess the location of non- + delegated servers for fragments of this address space. These + approaches have been explored in some detail in terms of their + advantages and drawbacks in [6to4-dns], so only a summary of these + approaches will be provided here. + +2.1. Conventional Address Delegation + + The problem with this form of delegation is the anticipated piecemeal + deployment of 6to4 sites. The reason why an end site would use 6to4 + is commonly that the upstream Internet Service Provider does not + support an IPv6 transit service and the end site is using 6to4 to + tunnel through to IPv6 connectivity. A conventional end site + environment of this form would have the end site using provider-based + IPv4 addresses, where the end site's IPv4 address is a more specific + address block drawn from the upstream provider's address block, and + the end site would have an entry in the upstream provider's reverse + DNS zone file, or it would have authoritative local name servers that + are delegated from the upstream provider's DNS zone. In the case of + the 6to4 mapped IPv6 space, the upstream may not be providing any + IPv6-based services at all, and therefore would not be expected to + have a 6to4 reverse DNS delegation for its IPv4 address block. The + general observation is that 6to4 IPv6 reverse DNS delegations cannot + necessarily always precisely match the corresponding IPv4 reverse DNS + delegations. + + + + + + + + + + +Huston Informational [Page 3] + +RFC 5158 6to4 Reverse DNS March 2008 + + + Sub-delegations of IPv4 provider address space are not consistently + recorded, and any 6to4 reverse zone operator would be required to + undertake reverse zone delegations in the absence of reliable current + address assignment information, undertaking a "hop over" of the + upstream provider's address block. Similarly, a delegated entity may + need to support the same "hop over" when undertaking further + delegations in their reverse zone. + +2.2. Guessing a Non-Delegated 6to4 Reverse Server + + One way to avoid such unreliable delegations is to alter server + behavior for reverse servers in this zone. Where no explicit + delegation information exists in the zone file, the server could look + up the in-addr.arpa domain for the servers for the equivalent IPv4 + address root used in the 6to4 address. These servers could then be + queried for the IPv6 PTR query. + + The issues with fielding altered server behaviors for this domain are + not to be taken lightly, and the delegation chain for IPv4 will not + be the same for 6to4 in any case. An isolated 6to4 site uses a + single IPv4 /32 address, and it is improbable that a single address + would have explicit in-addr.arpa delegation. In other words, it is + not likely that the delegation for IPv4 would parallel that of 6to4. + +2.3. Locating Local Servers at Reserved Addresses + + Another approach uses an altered server to resolve non-delegated 6to4 + reverse queries. The 6to4 query is decoded to recover the original + 6to4 IP address. The site-specific part of the address is rewritten + to a constant value, and this value is used as the target of a lookup + query. This requires that a 6to4 site should reserve local + addresses, and configure reverse servers on these addresses. Again, + this is a weak approach in that getting the DNS to query non- + delegated addresses is a case of generation of spurious traffic. + +2.4. Synthesized Responses + + The final approach considered here is to synthesize an answer when no + explicit delegation exists. This approach would construct a pseudo + host name using the IPv6 query address as the seed. Given that the + host name has no valid forward DNS mapping, then this becomes a case + of transforming one invalid DNS object into another. + + + + + + + + + +Huston Informational [Page 4] + +RFC 5158 6to4 Reverse DNS March 2008 + + +2.5. Selecting a Reasonable Approach + + It would appear that the most reasonable approach from this set of + potential candidates is to support a model of conventional standard + delegation. The consequent task is to reduce the administrative + overheads in managing the zone, supporting delegation of reverse zone + files on a basis of providing a delegation capability directly to + each 6to4 site. + +3. 6to4 Networks Address Use + + A 6to4 client network is an isolated IPv6 network composed as a set + of IPv6 hosts and a dual stack (IPv4 and IPv6) local router connected + to the local IPv6 network and the external IPv4 network. + + An example of a 6to4 network is as follows: + + +-------------+ + IPv6-in-IPv4 packets (A)| | IPv6 packets + ------------------------| 6to4router |-------------------------- + | | | | | | | + +-------------+ local IPv6 clients + + IPv4 network IPv6 network + + Figure 1 + + The IPv4 address used as part of the generation of 6to4 addresses for + the local IPv6 network is that of the external IPv4 network interface + address (labelled '(A)' in the above diagram). For example, if the + interface (A) has the IPv4 address 192.0.2.1, then the local IPv6 + clients will use a common IPv6 address prefix of the form 2002: + {192.0.2.1}::/48 (or (2002:C000:201::/48 in hex notation). All the + local IPv6 clients share this common /48 address prefix, irrespective + of any local IPv4 address that such host may use if they are + operating in a dual stack mode. + + + + + + + + + + + + + + + +Huston Informational [Page 5] + +RFC 5158 6to4 Reverse DNS March 2008 + + + An example of a 6to4 network with addressing: + + +-------------+ + IPv4 network (A)| | IPv6 network + -------------------| 6to4router |------------- + 192.0.2.1| | | | | interface identifier + +-------------+ 1A | | local IPv6 address + 2002:C000:201::1A + | | + 1B | + 2002:C000:201::1B + | + 1C + 2002:C000:201::1C + + Figure 2 + +4. Delegation Administration + + This specification uses a single delegation level in the + 2.0.0.2.ip6.arpa zone (the ip6.arpa zone is specified in [RFC3596]), + delegating zones only at the 48th bit position. This corresponds + with individual delegations related to a single /32 IPv4 address, or + the equivalent of a single 6to4 local site. + + The zone files containing the end site delegations are to be operated + with a low TTL (configured to be a time value in the scale of hours + rather than days or weeks), and updates for delegation requests in + the 2.0.0.2.ipv6.arpa zone are to be made using dynamic DNS updates + [RFC2136]. + + The delegation system is to be self-driven by clients residing within + 6to4 networks. The 6to4 reverse DNS delegation function is to be + accessible only by clients using 6to4 IPv6 source addresses, and the + only delegation that can be managed is that corresponding to the /48 + prefix of the IPv6 source address of the client. + + This service is to operate the delegation management service using + web-based server access using Transport Layer Security (TLS) + [RFC4346] (accessible via a "https:" URL). This is intended to + ensure that the source address-driven delegation selection function + cannot be disrupted through proxy caching of the web server's + responses, and also to ensure that the delegation service cannot be + readily mimicked. + + The service is to be found at https://6to4.nro.net + + + + + +Huston Informational [Page 6] + +RFC 5158 6to4 Reverse DNS March 2008 + + + This service is implemented by web servers that are operated on a + dual-stack IPv4 / IPv6 server, accessible via SSL. The web server's + actions will be determined by the source address of the client. If + the client uses a 6to4 source address, the server will present a + delegation interface for the corresponding 6to4 reverse zone. + Otherwise, the server will provide a description of the delegation + process. + + When accessed by a 6to4 source address, the interface presented by + the delegation service is a conventional DNS delegation interface, + allowing the client to enter the details of a number of DNS servers + for the corresponding reverse domain. The targets of the DNS + delegation are checked by the delegation manager using IPv4 and IPv6, + according to the addresses of the targets, to ensure that they are + responding, that they are configured consistently, and are + authoritative for the delegated domain. If these conditions are met, + the delegation details are entered into the zone at the primary + master. In order to avoid the server being used as a denial of + service platform, the server should throttle the number of DNS + delegation requests made to any single IP address, and also throttle + the number of redelegation requests for any single 6to4 zone. + + In other cases the system provides diagnostic information to the + client. + + The benefits of this structure include a fully automated mode of + operation. The service delivery is on demand and the system only + permits self-operation of the delegation function. + + The potential issues with this structure include: + + o Clients inside a 6to4 site could alter the delegation details + without the knowledge of the site administrator. It is noted that + this is intended for small-scale sites. Where there are potential + issues of unauthorized access to this delegation function, the + local site administrator could take appropriate access control + measures. + + o IPv4 DHCP-based 6to4 sites, or any 6to4 site that uses + dynamically-assigned external IPv4 interface addresses, could + inherit nonsense reverse entries created by previous users of the + dynamically assigned address. In this case, the client site could + request delegation of the reverse zone as required. More + generally, given the potentially for inheritance of 'stale' + reverse DNS information in this context, in those cases where the + issues of potential inheritance of 'stale' reverse DNS information + is a concern, it is recommended that a 6to4 site either use a + static IPv4 address in preference to a dynamically-assigned + + + +Huston Informational [Page 7] + +RFC 5158 6to4 Reverse DNS March 2008 + + + address, or ensure that the reverse delegation information is + updated using the service mechanism described here upon each + dynamic address assignment event. + + o The approach does not scale efficiently, as there is the potential + that the flat zone file may grow considerably. However, it is + noted that 6to4 is intended to be a transition mechanism useful + for a limited period of time in a limited context of an isolated + network where other forms of a tunnelled connection is not + feasible. It is envisaged that at some point the density of IPv6 + adoption in stub network would provide adequate drivers for + widespread adoption of native IPv6 services, obviating the need + for continued scaling of 6to4 support services. An estimate of + the upper bound of the size of the 6to4 reverse delegation zone + would be of the order of millions of entries. It is also noted + that the value of a reverse delegation is a questionable + proposition and many deployment environments have no form of + reverse delegation. + + o It is also conceivable that an enterprise network could decide to + use 6to4 internally in some form of private context, with the + hosts only visible in internal DNS servers. In this mechanism the + reverse delegation, if desired, would need to be implemented in an + internal private (non-delegated) corresponding zone of the 6to4 + reverse domain space. + + There may be circumstances where an IPv4 address controller wishes to + "block" the ability for users of these addresses to use this 6to4 + scheme. Scenarios that would motivate this concern would include + situations when the IPv4 provider is also offering an IPv6 service, + and native IPv6 should be deployed instead of 6to4. In such + circumstances the 6to4 reverse zone operator should allow for such a + 6to4 reverse delegation blocking function upon application to the + delegation zone operator. + + For a delegation to be undertaken the following conditions should + hold: + + o The 6to4 site must have configured a minimum of one primary and + one secondary server for the 6to4 IPv6 reverse address zone. + + o At the time of the delegation request, the primary and secondary + servers must be online, reachable, correctly configured, and in a + mutually consistent state with respect to the 6to4 reverse zone. + In this context, "mutually consistent" implies the same SOA RR and + identical NS RRSets. + + + + + +Huston Informational [Page 8] + +RFC 5158 6to4 Reverse DNS March 2008 + + + o The 6to4 reverse delegation service will only accept delegation + requests associated with the 6to4 source address of the requesting + client. + + The approach described here, of a fully automated system driven by + the site administrators of the 6to4 client networks, appears to + represent an appropriate match of the operational requirements of + managing reverse DNS domains for 6to4 addresses. + + For maintenance of the reverse delegation zones the service maintains + an email contact point for each active delegation, derived from the + zone's SOA contact address (SOA RNAME), or explicitly entered in the + delegation interface. This contact point would be informed upon any + subsequent change of delegation details. + + The 6to4 reverse DNS management system also undertakes a periodic + sweep of all active delegations, so that each delegation is checked + every 30 days. If the delegation fails this integrity check the + email contact point is informed of the problem, and a further check + is scheduled for 14 days later. If this second check fails, the + delegation is automatically removed, and a further notice is issued + to the contact point. + +5. Security Considerations + + This system offers a rudimentary level of assurance in attempting to + ensure that delegation requests from a 6to4 site can only direct the + delegation of the corresponding 6to4 reverse DNS domain and no other. + + Address-based authentication is not a very robust method from a + security perspective, as addresses can be readily spoofed. + Accordingly, reverse delegation information does not provide reliable + information in either validating a domain name or in validating an IP + address, and no conclusions should be drawn from the presence or + otherwise of a reverse DNS mapping for any IP address. + + The service management interface allows a 6to4 client to insert any + server name as a DNS server, potentially directing the delegation + test system to make a DNS query to any nominated system. The server + throttles the number of requests made to any single IP address to + mitigate the attendant risk of a high volume of bogus DNS queries + being generated by the server. For similar reasons, the server also + throttles the number of redelegation requests for any single 6to4 + zone. + + For a general threat analysis of 6to4, especially the additional risk + of address spoofing in 2002::/16, see [RFC3964]. + + + + +Huston Informational [Page 9] + +RFC 5158 6to4 Reverse DNS March 2008 + + + Section 4 notes that the local site administrator could take + appropriate access control measures to prevent clients inside a 6to4 + site performing unauthorized changes to the delegation details. This + may be in the form of a firewall configuration, regarding control of + access to the service from the interior of a 6to4 site, or a similar + mechanism that enforces local access policies. + +6. IANA Considerations + + The IANA has delegated the 2.0.0.2.ip6.arpa domain according to + delegation instructions provided by the Internet Architecture Board. + +7. Acknowledgements + + The author acknowledges the prior work of Keith Moore in preparing a + document that enumerated a number of possible approaches to undertake + the delegation and discovery of reverse zones. The author + acknowledges the assistance of George Michaelson and Andrei + Robachevsky in preparing this document, and Peter Koch, Pekka Savola, + Jun-ichiro Itojun Hagino, and Catherine Meadows for their helpful + review comments. + +8. References + +8.1. Normative References + + [RFC2136] Vixie, P., Thomson, S., Rekhter, Y., and J. Bound, + "Dynamic Updates in the Domain Name System (DNS UPDATE)", + RFC 2136, April 1997. + + [RFC3056] Carpenter, B. and K. Moore, "Connection of IPv6 Domains + via IPv4 Clouds", RFC 3056, February 2001. + + [RFC3596] Thomson, S., Huitema, C., Ksinant, V., and M. Souissi, + "DNS Extensions to Support IP Version 6", RFC 3596, + October 2003. + + [RFC4346] Dierks, T. and E. Rescorla, "The Transport Layer Security + (TLS) Protocol Version 1.1", RFC 4346, April 2006. + +8.2. Informative References + + [6to4-dns] Moore, K., "6to4 and DNS", Work in Progress, April 2003. + + [RFC3964] Savola, P. and C. Patel, "Security Considerations for + 6to4", RFC 3964, December 2004. + + + + + +Huston Informational [Page 10] + +RFC 5158 6to4 Reverse DNS March 2008 + + +Author's Address + + Geoff Huston + APNIC + + EMail: gih@apnic.net + URI: http://www.apnic.net + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Huston Informational [Page 11] + +RFC 5158 6to4 Reverse DNS March 2008 + + +Full Copyright Statement + + Copyright (C) The IETF Trust (2008). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND + THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS + OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF + THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + + + + + + + + + + + +Huston Informational [Page 12] + |