From 4bfd864f10b68b71482b35c818559068ef8d5797 Mon Sep 17 00:00:00 2001 From: Thomas Voss Date: Wed, 27 Nov 2024 20:54:24 +0100 Subject: doc: Add RFC documents --- doc/rfc/rfc6732.txt | 675 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 675 insertions(+) create mode 100644 doc/rfc/rfc6732.txt (limited to 'doc/rfc/rfc6732.txt') diff --git a/doc/rfc/rfc6732.txt b/doc/rfc/rfc6732.txt new file mode 100644 index 0000000..073a72d --- /dev/null +++ b/doc/rfc/rfc6732.txt @@ -0,0 +1,675 @@ + + + + + + +Independent Submission V. Kuarsingh, Ed. +Request for Comments: 6732 Rogers Communications +Category: Informational Y. Lee +ISSN: 2070-1721 Comcast + O. Vautrin + Juniper Networks + September 2012 + + + 6to4 Provider Managed Tunnels + +Abstract + + 6to4 Provider Managed Tunnels (6to4-PMT) provide a framework that can + help manage 6to4 tunnels operating in an anycast configuration. The + 6to4-PMT framework is intended to serve as an option for operators to + help improve the experience of 6to4 operation when conditions of the + network may provide sub-optimal performance or break normal 6to4 + operation. 6to4-PMT supplies a stable provider prefix and forwarding + environment by utilizing existing 6to4 relays with an added function + of IPv6 Prefix Translation. This operation may be particularly + important in NAT444 infrastructures where a customer endpoint may be + assigned a non-RFC1918 address, thus breaking the return path for + anycast-based 6to4 operation. 6to4-PMT has been successfully used in + a production network, implemented as open source code, and + implemented by a major routing vendor. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This is a contribution to the RFC Series, independently of any other + RFC stream. The RFC Editor has chosen to publish this document at + its discretion and makes no statement about its value for + implementation or deployment. Documents approved for publication by + the RFC Editor are not a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6732. + + + + + + + + + +Kuarsingh, et al. Informational [Page 1] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + +Copyright Notice + + Copyright (c) 2012 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + +Table of Contents + + 1. Introduction ....................................................3 + 2. Motivation ......................................................3 + 3. 6to4 Provider Managed Tunnels ...................................5 + 3.1. 6to4 Provider Managed Tunnel Model .........................5 + 3.2. Traffic Flow ..............................................5 + 3.3. Prefix Translation ........................................6 + 3.4. Translation State .........................................7 + 4. Deployment Considerations and Requirements ......................7 + 4.1. Customer Opt-Out ...........................................7 + 4.2. Shared CGN Space Considerations ............................8 + 4.3. End-to-End Transparency ....................................8 + 4.4. Path MTU Discovery Considerations ..........................9 + 4.5. Checksum Management ........................................9 + 4.6. Application Layer Gateways .................................9 + 4.7. Routing Requirements .......................................9 + 4.8. Relay Deployments .........................................10 + 5. Security Considerations ........................................10 + 6. Acknowledgements ...............................................10 + 7. References .....................................................11 + 7.1. Normative References ......................................11 + 7.2. Informative References ....................................11 + + + + + + + + + + + + + + + + +Kuarsingh, et al. Informational [Page 2] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + +1. Introduction + + 6to4 [RFC3056] tunneling, along with the anycast operation described + in [RFC3068], is widely deployed in modern Operating Systems and + off-the-shelf gateways sold throughout retail and Original Equipment + Manufacturer (OEM) channels. Anycast-based 6to4 [RFC3068] allows for + tunneled IPv6 connectivity through IPv4 clouds without explicit + configuration of a relay address. Since the overall system utilizes + anycast forwarding in both directions, flow paths are difficult to + determine, tend to follow separate paths in either direction, and + often change based on network conditions. The return path is + normally uncontrolled by the local operator and can contribute to + poor performance for IPv6 and can also act as a breakage point. Many + of the challenges with 6to4 are described in [RFC6343]. A specific + critical use case for problematic anycast 6to4 operation is related + to conditions in which the consumer endpoints are downstream from a + northbound Carrier-Grade NAT (CGN) [RFC6264] function when assigned + non-RFC1918 IPv4 addresses, which are not routed on interdomain + links. + + Operators that are actively deploying IPv6 networks and operate + legacy IPv4 access environments may want to utilize the existing 6to4 + behavior in customer site resident hardware and software as an + interim option to reach the IPv6 Internet in advance of being able to + offer full native IPv6. Operators may also need to address the + brokenness related to 6to4 operation originating from behind a + provider NAT function. 6to4-PMT offers an operator the opportunity to + utilize IPv6 Prefix Translation to enable deterministic traffic flow + and an unbroken path to and from the Internet for IPv6-based traffic + sourced originally from these 6to4 customer endpoints. + + 6to4-PMT translates the prefix portion of the IPv6 address from the + 6to4-generated prefix to a provider-assigned prefix that is used to + represent the source. This translation will then provide a stable + forward and return path for the 6to4 traffic by allowing the existing + IPv6 routing and policy environment to control the traffic. 6to4-PMT + is primarily intended to be used in a stateless manner to maintain + many of the elements inherent in normal 6to4 operation. + Alternatively, 6to4-PMT can be used in a stateful translation mode + should the operator choose this option. + +2. Motivation + + Many operators endeavor to deploy IPv6 as soon as possible so as to + ensure uninterrupted connectivity to all Internet applications and + content through the IPv4 to IPv6 transition process. The IPv6 + preparations within these organizations are often faced with both + financial challenges and timing issues related to deploying IPv6 to + + + +Kuarsingh, et al. Informational [Page 3] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + + the network edge and related transition technologies. Many of the + new technologies available for IPv4 to IPv6 transition will require + the replacement of the organization's Customer Premises Equipment + (CPE) to support technologies like IPv6 Rapid Deployment (6RD) + [RFC5969], Dual-Stack Lite [RFC6333], and native dual-stack. + + Operators face a number of challenges related to home equipment + replacement. Operator-initiated replacement of this equipment will + take time due to the nature of mass equipment refresh programs or may + require the consumer to replace their own gear. Replacing consumer + owned and operated equipment, compounded by the fact that there is + also a general unawareness of what IPv6 is, also adds to the + challenges faced by operators. It is also important to note that + 6to4 is present in much of the equipment found in networks today that + do not as of yet, or will not, support 6RD and/or native IPv6. + + Operators may still be motivated to provide a form of IPv6 + connectivity to customers and would want to mitigate potential issues + related to IPv6-only deployments elsewhere on the Internet. + Operators also need to mitigate issues related to the fact that 6to4 + operation is often on by default, and may be subject to erroneous + behavior. The undesired behavior may be related to the use of + non-RFC1918 addresses on CPE equipment that operate behind large + operator NATs or other conditions as described in a general advisory + as laid out in [RFC6343]. + + 6to4-PMT allows an operator to help mitigate such challenges by + leveraging the existing 6to4 deployment base, while maintaining + operator control of access to the IPv6 Internet. It is intended for + use when better options, such as 6RD or native IPv6, are not yet + viable. One of the key objectives of 6to4-PMT is to also help + reverse the negative impacts of 6to4 in CGN environments. The + 6to4-PMT operation can also be used immediately with the default + parameters that are often enough to allow it to operate in a 6to4-PMT + environment. Once native IPv6 is available to the endpoint, the + 6to4-PMT operation is no longer needed and will cease to be used + based on correct address selection behaviors in end hosts [RFC6724]. + + 6to4-PMT thus helps operators remove the impact of 6to4 in CGN + environments, deals with the fact that 6to4 is often on by default, + and allows access to IPv6-only endpoints from IPv4-only addressed + equipment. Additionally, it provides relief from many challenges + related to mis-configurations in other networks that control return + flows via foreign relays. Due to the simple nature of 6to4-PMT, it + can also be implemented in a cost-effective and simple manner, + allowing operators to concentrate their energy on deploying native + IPv6. + + + + +Kuarsingh, et al. Informational [Page 4] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + +3. 6to4 Provider Managed Tunnels + +3.1. 6to4 Provider Managed Tunnel Model + + The 6to4 managed tunnel model behaves like a standard 6to4 service + between the customer IPv6 host or gateway, and the 6to4-PMT Relay + (within the provider domain). The 6to4-PMT Relay shares properties + with 6RD [RFC5969] by decapsulating and forwarding encapsulated IPv6 + flows within an IPv4 packet to the IPv6 Internet. The model provides + an additional function that translates the source 6to4 prefix to a + provider-assigned prefix that is not found in 6RD [RFC5969] or + traditional 6to4 operation. + + The 6to4-PMT Relay is intended to provide a stateless (or stateful) + mapping of the 6to4 prefix to a provider supplied prefix. + + | 6to4-PMT Operation | + + +-----+ 6to4 Tunnel +--------+ +------+ IPv6 +----+ + | CPE |-------------|6to4 BR |--| PT66 |--------- |Host| + +-----+ IPv4 +--------+ +------+ Provider +----+ + Network Prefix + Unified or Separate + Functions/Platforms + + Figure 1: 6to4-PMT Functional Model + + This mode of operation is seen as beneficial when compared to broken + 6to4 paths and/or environments where 6to4 operation may be functional + but highly degraded. + +3.2. Traffic Flow + + Traffic in the 6to4-PMT model is intended to be controlled by the + operator's IPv6 peering operations. Egress traffic is managed + through outgoing routing policy, and incoming traffic is influenced + by the operator-assigned prefix advertisements using normal + interdormain routing functions. + + The routing model is as predictable as native IPv6 traffic and legacy + IPv4-based traffic. Figure 2 provides a view of the routing topology + needed to support this relay environment. The diagram references + PrefixA as 2002::/16 and PrefixB as the example 2001:db8::/32. + + + + + + + + +Kuarsingh, et al. Informational [Page 5] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + + | 6to4 IPv4 Path | Native IPv6 Path | + ----------- ----------- ------------- + / IPv4 Net \ / IPv6 Net \ / IPv6 Internet \ + +------+ +--------+ +-------+ +---------+ + | CPE | PrefixA |6to4-PMT| PrefixB |Peering| |IPv6 HOST| + +------+ +--------+ +-------+ +---------+ + \ / \ / \ / + ---------- ------------ -------------- + + IPv4 6to4 IPv6 Provider IPv6 Prefix + Anycast Prefix Propagation + + Figure 2: 6to4-PMT Flow Model + + Traffic between two 6to4-enabled devices would use the IPv4 path for + communication according to [RFC3056] unless the local host still + prefers traffic via a relay. 6to4-PMT is intended to be deployed in + conjunction with the 6to4 relay function in an attempt to help + simplify its deployment. The model can also provide the ability for + an operator to forward both 6to4-PMT (translated) and normal 6to4 + flows (untranslated) simultaneously based on configured policy. + +3.3. Prefix Translation + + IPv6 Prefix Translation is a key part of the system as a whole. The + 6to4-PMT framework is a combination of two concepts: 6to4 [RFC3056] + and IPv6 Prefix Translation. IPv6 Prefix Translation, as used in + 6to4-PMT, has some similarities to concepts discussed in [RFC6296]. + 6to4-PMT would provide prefix translation based on specific rules + configured on the translator that maps the 6to4 2002::/16 prefix to + an appropriate provider assigned prefix. In most cases, a ::/32 + prefix would work best in 6to4-PMT that matches common Regional + Internet Registry (RIR) prefix assignments to operators. + + The provider can use any prefix mapping strategy they so choose, but + the simpler the better. Simple direct bitmapping can be used, or + more advanced forms of translation should the operator want to + achieve higher address compression. More advanced forms of + translation may require the use of stateful translation. + + Figure 3 shows a 6to4 Prefix with a Subnet-ID of "0000" mapped to a + provider-assigned, globally unique prefix (2001:db8::/32). With this + simple form of translation, there is support for only one Subnet-ID + per provider-assigned prefix. In characterization of deployed OSs + and gateways, a Subnet-ID of "0000" is the most common default case + followed by Subnet-ID "0001". Use of the Subnet-ID can be referenced + in [RFC4291]. It should be noted that in normal 6to4 operation, the + endpoint (network) has access to 65,536 (16-bits) Subnet IDs. In the + + + +Kuarsingh, et al. Informational [Page 6] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + + 6to4-PMT case as described above using the mapping in Figure 3, all + but the one Subnet-ID used for 6to4-PMT would still operate under + normal 6to4 operation. + + Pre-Relayed Packet [Provider Access Network Side] + + 0 16 32 48 64 80 96 112 128 Bits + | ---- | ---- | ---- | ---- | ---- | ---- | ---- | ---- | + 2002 : 0C98 : 2C01 : 0000 : xxxx : xxxx : xxxx : xxxx + | ---- | ---- | ---- | ---- | ---- | ---- | ---- | ---- | + | | | | | | + ---- ---- | | | | + | | | | | | + | ---- | ---- | ---- | ---- | ---- | ---- | ---- | ---- | + 2001 : 0db8 : 0c98 : 2c01 : xxxx : xxxx : xxxx : xxxx + | ---- | ---- | ---- | ---- | ---- | ---- | ---- | ---- | + + Post-Relayed Packet [Internet Side] + + Figure 3: 6to4-PMT Prefix Mapping + +3.4. Translation State + + It is preferred that the overall system use deterministic prefix + translation mappings such that stateless operation can be + implemented. This allows the provider to place N number of relays + within the network without the need to manage translation state. + Deterministic translation also allows a customer to employ inward + services using the translated (provider prefix) address. + + If stateful operation is chosen, the operator would need to validate + state and routing requirements particular to that type of deployment. + The full body of considerations for this type of deployment is not + within this scope of this document. + +4. Deployment Considerations and Requirements + +4.1. Customer Opt-Out + + A provider enabling this function should offer a method to allow + customers to opt-out of such a service should the customer choose to + maintain normal 6to4 operation irrespective of degraded performance. + In cases where the customer is behind a CGN device, the customer + would not be advised to opt-out and can be assisted in turning off + 6to4. + + + + + + +Kuarsingh, et al. Informational [Page 7] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + + Since the 6to4-PMT system is targeted at customers who are relatively + unaware of IPv6 and IPv4, and normally run network equipment with a + default configuration, an opt-out strategy is recommended. This + method provides 6to4-PMT operation for non-IPv6 savvy customers whose + equipment may turn on 6to4 automatically and allows savvy customers + to easily configure their way around the 6to4-PMT function. + + Capable customers can also disable anycast-based 6to4 entirely and + use traditional 6to4 or other tunneling mechanisms if they are so + inclined. This is not considered the normal case, and most endpoints + with auto-6to4 functions will be subject to 6to4-PMT operation since + most users are unaware of its existence. 6to4-PMT is targeted as an + option for stable IPv6 connectivity for average consumers. + +4.2. Shared CGN Space Considerations + + 6to4-PMT operation can also be used to mitigate a known problem with + 6to4 occurring when shared address space [RFC6598] or Global Unicast + Addresses (GUA) are used behind a CGN and not routed on the Internet. + Non-RFC1918, yet unrouted (on interdomain links) address space would + cause many deployed OSs and network equipment to potentially + auto-enable 6to4 operation even without a valid return path (such as + behind a CGN function). The operator's desire to use non-RFC1918 + addresses, such as shared address space [RFC6598], is considered + highly likely based on real world deployments. + + Such hosts, in normal cases, would send 6to4 traffic to the IPv6 + Internet via the anycast relay, which would in fact provide broken + IPv6 connectivity, since the return path flow is built using an IPv4 + address that is not routed or assigned to the source network. The + use of 6to4-PMT would help reverse these effects by translating the + 6to4 prefix to a provider-assigned prefix, masking this automatic and + undesired behavior. + +4.3. End-to-End Transparency + + The 6to4-PMT mode of operation removes the traditional end-to-end + transparency of 6to4. Remote hosts would connect to a 6to4-PMT- + serviced host using a translated IPv6 address versus the original + 6to4 address based on the 2002::/16 well-known prefix. This can be + seen as a disadvantage of the 6to4-PMT system. This lack of + transparency should also be contrasted with the normal operating + state of 6to4 that provides connectivity that is uncontrolled and + often prone to high latency. The lack of transparency is, however, a + better form of operation when extreme poor performance, broken IPv6 + connectivity, or no IPv6 connectivity is considered as the + alternative. + + + + +Kuarsingh, et al. Informational [Page 8] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + +4.4. Path MTU Discovery Considerations + + The MTU will be subject to a reduced value due to standard 6to4 + tunneling operation. Under normal 6to4 operation, the 6to4 service + agent would send an ICMP Packet Too Big Message as part of Path MTU + discovery as described in [RFC4443] and [RFC1981], respectively. In + 6to4-PMT operation, the PMT Service agent should be aware of the + reduced 6to4 MTU and send ICMP messages using the translated address + accordingly. + + It is also possible to pre-constrain the MTU at the upstream router + from the 6to4-PMT service agents that would then have the upstream + router send the appropriate ICMP Packet Too Big Messages. + +4.5. Checksum Management + + Checksum management for 6to4-PMT can be implemented in one of two + ways. The first deployment model is based on the stateless 6to4-PMT + operational mode. In this case, checksum modifications are made + using the method described in [RFC3022], Section 4.2. The checksum + is modified to match the parameters of the translated address of the + source 6to4-PMT host. In the second deployment model in which + stateful 6to4-PMT translation is used, the vendor can implement + checksum-neutral mappings as defined in [RFC6296]. + +4.6. Application Layer Gateways + + Vendors can choose to deploy Application Layer Gateways (ALGs) on + their platforms that perform 6to4-PMT if they so choose. No ALGs + were deployed as part of the open source and vendor product + deployments of 6to4-PMT. In the vendor deployment case, the same + rules were used as with their NPTv6 [RFC6296] base code. + +4.7. Routing Requirements + + The provider would need to advertise the well-known IP address range + used for normal anycast 6to4 [RFC3068] operation within the local + IPv4 routing environment. This advertisement would attract the 6to4 + upstream traffic to a local relay. To control this environment and + make sure all northbound traffic lands on a provider-controlled + relay, the operator may filter the anycast range from being + advertised from customer endpoints toward the local network (upstream + propagation). + + The provider would not be able to control route advertisements inside + the customer domain, but that use case is not in scope for this + document. In that case, it is likely that the end network/customer + understands 6to4 and is maintaining their own relay environment and + + + +Kuarsingh, et al. Informational [Page 9] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + + therefore would not be subject to the operators 6to4 and/or PMT + operation. + + Within their own network, the provider would also likely want to + advertise the 2002::/16 range to help bridge traditional 6to4 traffic + within the network (native IPv6 to 6to4-PMT-based endpoint). It + would also be advised that the local 6to4-PMT operator not leak the + well-known 6to4 anycast IPv4 prefix to neighboring Autonomous Systems + to prevent PMT operation for neighboring networks. Policy + configuration on the local 6to4-PMT Relay can also be used to + disallow PMT operation should the local provider service downstream + customer networks. + +4.8. Relay Deployments + + The 6to4-PMT function can be deployed onto existing 6to4 relays (if + desired) to help minimize network complexity and cost. 6to4-PMT has + already been developed on Linux-based platforms that are package + add-ons to the traditional 6to4 code. The only additional + considerations beyond normal 6to4 relay operation would include the + need to route specific IPv6 provider prefix ranges used for 6to4-PMT + operation towards peers and transit providers. + +5. Security Considerations + + 6to4-PMT operation would be subject to the same security concerns as + normal 6to4 operation as described in [RFC6169]. 6to4-PMT is also + not plainly perceptible by external hosts, and local entities appear + as native IPv6 hosts to the external hosts. + +6. Acknowledgements + + Thanks to the following people for their textual contributions and/or + guidance on 6to4 deployment considerations: Dan Wing, Wes George, + Scott Beuker, JF Tremblay, John Brzozowski, Chris Metz, and Chris + Donley. + + Additional thanks to the following for assisting with the coding and + testing of 6to4-PMT: Marc Blanchet, John Cianfarani, Tom Jefferd, Nik + Lavorato, Robert Hutcheon, and Ida Leung. + + + + + + + + + + + +Kuarsingh, et al. Informational [Page 10] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + +7. References + +7.1. Normative References + + [RFC3056] Carpenter, B. and K. Moore, "Connection of IPv6 Domains + via IPv4 Clouds", RFC 3056, February 2001. + + [RFC3068] Huitema, C., "An Anycast Prefix for 6to4 Relay Routers", + RFC 3068, June 2001. + +7.2. Informative References + + [RFC1981] McCann, J., Deering, S., and J. Mogul, "Path MTU Discovery + for IP version 6", RFC 1981, August 1996. + + [RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network + Address Translator (Traditional NAT)", RFC 3022, January + 2001. + + [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing + Architecture", RFC 4291, February 2006. + + [RFC4443] Conta, A., Deering, S., and M. Gupta, Ed., "Internet + Control Message Protocol (ICMPv6) for the Internet + Protocol Version 6 (IPv6) Specification", RFC 4443, March + 2006. + + [RFC5969] Townsley, W. and O. Troan, "IPv6 Rapid Deployment on IPv4 + Infrastructures (6rd) -- Protocol Specification", RFC + 5969, August 2010. + + [RFC6169] Krishnan, S., Thaler, D., and J. Hoagland, "Security + Concerns with IP Tunneling", RFC 6169, April 2011. + + [RFC6264] Jiang, S., Guo, D., and B. Carpenter, "An Incremental + Carrier-Grade NAT (CGN) for IPv6 Transition", RFC 6264, + June 2011. + + [RFC6296] Wasserman, M. and F. Baker, "IPv6-to-IPv6 Network Prefix + Translation", RFC 6296, June 2011. + + [RFC6333] Durand, A., Droms, R., Woodyatt, J., and Y. Lee, + "Dual-Stack Lite Broadband Deployments Following IPv4 + Exhaustion", RFC 6333, August 2011. + + [RFC6343] Carpenter, B., "Advisory Guidelines for 6to4 Deployment", + RFC 6343, August 2011. + + + + +Kuarsingh, et al. Informational [Page 11] + +RFC 6732 6to4 Provider Managed Tunnels September 2012 + + + [RFC6598] Weil, J., Kuarsingh, V., Donley, C., Liljenstolpe, C., and + M. Azinger, "IANA-Reserved IPv4 Prefix for Shared Address + Space", BCP 153, RFC 6598, April 2012. + + [RFC6724] Thaler, D., Ed., Draves, R., Matsumoto, A., and T. Chown, + "Default Address Selection for Internet Protocol Version 6 + (IPv6)", RFC 6724, September 2012. + +Authors' Addresses + + Victor Kuarsingh (editor) + Rogers Communications + 8200 Dixie Road + Brampton, Ontario L6T 0C1 + Canada + + EMail: victor.kuarsingh@gmail.com + URI: http://www.rogers.com + + + Yiu L. Lee + Comcast + One Comcast Center + Philadelphia, PA 19103 + U.S.A. + + EMail: yiu_lee@cable.comcast.com + URI: http://www.comcast.com + + + Olivier Vautrin + Juniper Networks + 1194 N Mathilda Avenue + Sunnyvale, CA 94089 + U.S.A. + + EMail: olivier@juniper.net + URI: http://www.juniper.net + + + + + + + + + + + + + +Kuarsingh, et al. Informational [Page 12] + -- cgit v1.2.3