TOC |
|
This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 29, 2010.
Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs. This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators.
1.
Introduction
2.
Overview
3.
Background to DNS64 - DNSSEC interaction
4.
Terminology
5.
DNS64 Normative Specification
5.1.
Resolving AAAA queries and the answer section
5.1.1.
The answer when there is AAAA data
available
5.1.2.
The answer when there is an error
5.1.3.
Special exclusion set for AAAA records
5.1.4.
Dealing with CNAME and DNAME
5.1.5.
Data for the answer when performing synthesis
5.1.6.
Performing the synthesis
5.1.7.
Querying in parallel
5.2.
Generation of the IPv6 representations of IPv4 addresses
5.3.
Handling other RRs and the Additional Section
5.3.1.
PTR queries
5.3.2.
Handling the additional section
5.3.3.
Other records
5.4.
Assembling a synthesized response to a
AAAA query
5.5.
DNSSEC processing: DNS64 in recursive server mode
5.6.
DNS64 and multihoming
6.
Deployment notes
6.1.
DNS resolvers and DNS64
6.2.
DNSSEC validators and DNS64
7.
Security Considerations
8.
Contributors
9.
Acknowledgements
10.
References
10.1.
Normative References
10.2.
Informative References
Appendix A.
Deployment scenarios and examples
A.1.
Embed and Zero-Pad algorithm description
A.2.
An-IPv6-network-to-IPv4-Internet setup with DNS64 in DNS server mode
A.3.
An-IPv6-network-to-IPv4-Internet setup with DNS64 in stub-resolver mode
A.4.
IPv6-Internet-to-an-IPv4-network setup DNS64 in DNS server mode
Appendix B.
Motivations and Implications of synthesizing AAAA RR when real AAAA RR exists
§
Authors' Addresses
TOC |
This document specifies DNS64, a mechanism that is part of the toolbox for IPv6-IPv4 transition and co-existence. DNS64, used together with an IPv6/IPv4 translator such as NAT64 [I‑D.bagnulo‑behave‑nat64] (Bagnulo, M., Matthews, P., and I. Beijnum, “NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers,” March 2009.), allows an IPv6-only client to initiate communications by name to an IPv4-only server.
DNS64 is a mechanism for synthesizing AAAA resource records (RRs) from A RRs. A synthetic AAAA RR created by the DNS64 from an original A RR contains the same FQDN of the original A RR but it contains an IPv6 address instead of an IPv4 address. The IPv6 address is an IPv6 representation of the IPv4 address contained in the original A RR. The IPv6 representation of the IPv4 address is algorithmically generated from the IPv4 address returned in the A RR and a set of parameters configured in the DNS64 (typically, an IPv6 prefix used by IPv6 representations of IPv4 addresses and optionally other parameters).
Together with a IPv6/IPv4 translator, these two mechanisms allow an IPv6-only client to initiate communications to an IPv4-only server using the FQDN of the server.
These mechanisms are expected to play a critical role in the IPv4-IPv6 transition and co-existence. Due to IPv4 address depletion, it is likely that in the future, many IPv6-only clients will want to connect to IPv4-only servers. In the typical case, the approach only requires the deployment of IPv6/IPv4 translators that connect an IPv6-only network to an IPv4-only network, along with the deployment of one or more DNS64-enabled name servers. However, some advanced features require performing the DNS64 function directly by the end-hosts themselves.
TOC |
This section provides a non-normative introduction to the DNS64 mechanism.
We assume that we have an IPv6/IPv4 translator box connecting an IPv4 network and an IPv6 network. The IPv6/IPv4 translator device provides translation services between the two networks enabling communication between IPv4-only hosts and IPv6-only hosts. (NOTE: By IPv6-only hosts we mean hosts running IPv6-only applications, hosts that can only use IPv6, as well as the cases where only IPv6 connectivity is available to the client. By IPv4-only servers we mean servers running IPv4-only applications, servers that can only use IPv4, as well as the cases where only IPv4 connectivity is available to the server). The IPv6/IPv4 translator used in conjunction with DNS64 must allow communications initiated from the IPv6-only host to the IPv4-only host.
To allow an IPv6 initiator to do a standard AAAA RR DNS lookup to learn the address of the responder, DNS64 is used to synthesize a AAAA record from an A record containing a real IPv4 address of the responder, whenever the DNS64 service cannot retrieve a AAAA record for the requested host name. The DNS64 device appears as a regular recursive resolver for the IPv6 initiator. The DNS64 box receives an AAAA DNS query generated by the IPv6 initiator. It first attempts a recursive resolution for the requested AAAA records. If there is no AAAA record available for the target node (which is the normal case when the target node is an IPv4-only node), DNS64 performs a query for A records. If any A records are discovered, DNS64 creates a synthetic AAAA RR from the information retrieved in each A RR.
The FQDN of a synthetic AAAA RR is the same as that of the original A RR, but an IPv6 representation of the IPv4 address contained in the original A RR is included in the AAAA RR. The IPv6 representation of the IPv4 address is algorithmically generated from the IPv4 address and additional parameters configured in the DNS64. Among those parameters configured in the DNS64, there is at least one IPv6 prefix, called Pref64::/n. The IPv6 address representing IPv4 addresses included in the AAAA RR synthesized by the DNS64 function contain Pref64::/n and they also embed the original IPv4 address.
The same algorithm and the same Pref64::/n prefix or prefixes must be configured both in the DNS64 device and the IPv6/IPv4 translator, so that both can algorithmically generate the same IPv6 representation for a given IPv4 address. In addition, it is required that IPv6 packets addressed to an IPv6 destination that contains the Pref64::/n be delivered to the IPv6/IPv4 translator, so they can be translated into IPv4 packets.
Once the DNS64 has synthesized the AAAA RR, the synthetic AAAA RR is passed back to the IPv6 initiator, which will initiate an IPv6 communication with the IPv6 address associated with the IPv4 receiver. The packet will be routed to the IPv6/IPv4 translator which will forward it to the IPv4 network .
In general, the only shared state between the DNS64 and the IPv6/IPv4 translator is the Pref64::/n and an optional set of static parameters. The Pref64::/n and the set of static parameters must be configured to be the same on both; there is no communication between the DNS64 device and IPv6/IPv4 translator functions. The mechanism to be used for configuring the parameters of the DNS64 is beyond the scope of this memo.
The DNS64 function can be performed in two places.
One option is to locate the DNS64 function in recursive name servers serving end hosts. In this case, when an IPv6-only host queries the name server for AAAA RRs for an IPv4-only host, the name server can perform the synthesis of AAAA RRs and pass them back to the IPv6 only initiator. The main advantage of this mode is that current IPv6 nodes can use this mechanism without requiring any modification. This mode is called "DNS64 in DNS server mode".
The other option is to place the DNS64 function in the end hosts themselves, coupled to the local stub resolver. In this case, the stub resolver will try to obtain (real) AAAA RRs and in case they are not available, the DNS64 function will synthesize AAAA RRs for internal usage. This mode is compatible with some advanced functions like DNSSEC validation in the end host. The main drawback of this mode is its deployability, since it requires changes in the end hosts. This mode is called "DNS64 in stub-resolver mode"".
TOC |
DNSSEC presents a special challenge for DNS64, because DNSSEC is designed to detect changes to DNS answers, and DNS64 may alter answers coming from an authoritative server.
A recursive resolver can be security-aware or security-oblivious. Moreover, a security-aware recursive name server can be validating or non-validating, according to operator policy. In the cases below, the recursive server is also performing DNS64, and has a local policy to validate. We call this general case vDNS64, but in all the cases below the DNS64 functionality should be assumed needed.
DNSSEC includes some signaling bits that offer some indicators of what the query originator understands.
If a query arrives at a vDNS64 device with the DO bit set, the query originator is signaling that it understands DNSSEC. The DO bit does not indicate that the query originator will validate the response. It only means that the query originator can understand responses containing DNSSEC data. Conversely, if the DO bit is clear, that is evidence that the querying agent is not aware of DNSSEC.
If a query arrives at a vDNS64 device with the CD bit set, it is an indication that the querying agent wants all the validation data so it can do checking itself. By local policy, vDNS64 could still validate, but it must return all data to the querying agent anyway.
Here are the possible cases:
TOC |
This section provides definitions for the special terms used in the document.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.) [RFC2119].
- Authoritative server:
- A DNS server that can answer authoritatively a given DNS question.
- DNS64:
- A logical function that synthesizes DNS resource records (e.g AAAA records containing IPv6 addresses) from DNS resource records actually contained in the global DNS (e.g. A records containing IPv4 addresses).
- DNS64 recursor:
- A recursive resolver that provides the DNS64 functionality as part of its operation.
- Recursive resolver:
- A DNS server that accepts requests from one resolver, and asks another resolver for the answer on behalf of the first resolver.
- Synthetic RR:
- A DNS resource record (RR) that is not contained in any zone data file, but has been synthesized from other RRs. An example is a synthetic AAAA record created from an A record.
- IPv6/IPv4 translator:
- A device that translates IPv6 packets to IPv4 packets and vice-versa. It is only required that the communication initiated from the IPv6 side be supported.
For a detailed understanding of this document, the reader should also be familiar with DNS terminology from [RFC1034] (Mockapetris, P., “Domain names - concepts and facilities,” November 1987.),[RFC1035] (Mockapetris, P., “Domain names - implementation and specification,” November 1987.) and current NAT terminology from [RFC4787] (Audet, F. and C. Jennings, “Network Address Translation (NAT) Behavioral Requirements for Unicast UDP,” January 2007.). Some parts of this document assume familiarity with the terminology of the DNS security extensions outlined in [RFC4035] (Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, “Protocol Modifications for the DNS Security Extensions,” March 2005.).
TOC |
A DNS64 is a logical function that synthesizes AAAA records from A records. The DNS64 function may be implemented in a stub resolver, in a recursive resolver, or in an authoritative name server.
The implementation SHOULD support mapping of IPv4 address ranges to separate IPv6 prefixes for AAAA record synthesis. This allows handling of special use IPv4 addresses [I‑D.iana‑rfc3330bis] (Cotton, M. and L. Vegoda, “Special Use IPv4 Addresses,” August 2009.). Multicast address handling is further specified in [I‑D.venaas‑behave‑mcast46] (Venaas, S., Asaeda, H., SUZUKI, S., and T. Fujisaki, “An IPv4 - IPv6 multicast translator,” July 2009.).
TOC |
When the DNS64 receives a query for RRs of type AAAA and class IN, it first attempts to retrieve non-synthetic RRs of this type and class, either by performing a query or, in the case of an authoritative server, by examining its own results.
TOC |
If the query results in one or more AAAA records in the answer section, the result is returned to the requesting client as per normal DNS semantics, except in the case where any of the AAAA records match a special exclusion set of prefixes, considered in Section 5.1.3 (Special exclusion set for AAAA records). If there is (non-excluded) AAAA data available, DNS64 SHOULD NOT include synthetic AAAA RRs in the response (see Appendix B (Motivations and Implications of synthesizing AAAA RR when real AAAA RR exists) for an analysis of the motivations for and the implications of not complying with this recommendation). By default DNS64 implementations MUST NOT synthesize AAAA RRs when real AAAA RRs exist.
TOC |
If the query results in a response with an error code other than 0, the result is handled according to normal DNS operation -- that is, either the resolver tries again using a different server from the authoritative NS RRSet, or it returns the error to the client. This stage is still prior to any synthesis having happened, so a response to be returned to the client does not need any special assembly than would usually happen in DNS operation.
TOC |
Some IPv6 addresses are not actually usable by IPv6-only hosts. If they are returned to IPv6-only querying agents as AAAA records, therefore, the goal of decreasing the number of failure modes will not be attained. Examples include AAAA records with addresses in the ::ffff/96 network, and possibly (depending on the context) AAAA records with the site's Pref::64/n or the well-known prefix. A DNS64 implementation SHOULD provide a mechanism to specify IPv6 prefix ranges to be treated as though the AAAA containing them were an empty answer. An implementation SHOULD include the ::ffff/96 network in that range by default. Failure to provide this facility will mean that clients querying the DNS64 function may not be able to communicate with hosts that would be reachable from a dial-stack host.
When the DNS64 performs its initial AAAA query, if it receives an answer with only AAAA records containing addresses in the target range(s), then it MUST treat the answer as though it were an empty answer, and proceed accordingly. If it receives an answer with at least one AAAA record containing an address outside any of the target ranges, then it MAY build an answer section for a response including only the AAAA record(s) that do not contain any of the addresses inside the excluded ranges. That answer section is used in the assembly of a response as detailed in Section 5.4 (Assembling a synthesized response to a AAAA query). Alternatively, it MAY treat the answer as though it were an empty answer, and proceed accordingly. It MUST NOT return the offending AAAA records as part of a response.
TOC |
If the response contains a CNAME or a DNAME, then the CNAME or DNAME chain is followed until the first terminating A or AAAA record is reached. This may require the DNS64 to ask for an A record, in case the response to the original AAAA query is a CNAME or DNAME without an AAAA record to follow. The resulting AAAA or A record is treated like any other AAAA or A case, as appropriate.
When assembling the answer section, the original CNAME or DNAME RR is included as part of the answer, and the synthetic AAAA, if appropriate, is included.
TOC |
If the query results in no error but an empty answer section in the response, the DNS64 resolver attempts to retrieve A records for the name in question. If this new A RR query results in an empty answer or in an error, then the empty result or error is used as the basis for the answer returned to the querying client. (Transient errors may result in retrying the query, depending on the operation of the resolver; this is just as in Section 5.1.2 (The answer when there is an error).) If instead the query results in one or more A RRs, the DNS64 synthesizes AAAA RRs based on the A RRs according to the procedure outlined in Section 5.1.6 (Performing the synthesis). The DNS64 resolver then returns the synthesized AAAA records in the answer section to the client, removing the A records that form the basis of the synthesis.
TOC |
A synthetic AAAA record is created from an A record as follows:
TOC |
DNS64 MAY perform the query for the AAAA RR and for the A RR in parallel, in order to minimize the delay. However, this would result in performing unnecessary A RR queries in the case no AAAA RR synthesis is required. A possible trade-off would be to perform them sequentially but with a very short interval between them, so if we obtain a fast reply, we avoid doing the additional query. (Note that this discussion is relevant only if the DNS64 function needs to perform external queries to fetch the RR. If the needed RR information is available locally, as in the case of an authoritative server, the issue is no longer relevant.)
TOC |
DNS64 supports multiple algorithms for the generation of the IPv6 representation of an IPv4 address. The constraints imposed on the generation algorithms are the following:
The same algorithm to create an IPv6 address from an IPv4 address MUST be used by both the DNS64 to create the IPv6 address to be returned in the synthetic AAAA RR from the IPv4 address contained in original A RR, and by the IPv6/IPv4 translator to create the IPv6 address to be included in the destination address field of the outgoing IPv6 packets from the IPv4 address included in the destination address field of the incoming IPv4 packet.
The algorithm MUST be reversible, i.e. it MUST be possible to extract the original IPv4 address from the IPv6 representation.
The input for the algorithm MUST be limited to the IPv4 address, the IPv6 prefix (denoted Pref64::/n) used in the IPv6 representations and optionally a set of stable parameters that are configured in the DNS64 (such as fixed string to be used as a suffix).
[anchor9] (Note in document: TBD1 in the passage above is to be substituted by whatever prefix is assigned by IANA to be the well-known prefix.)If we note n the length of the prefix Pref64::/n, then n MUST the less or equal than 96. If a Pref64::/n is configured through any means in the DNS64 (such as manually configured, or other automatic mean not specified in this document), the default algorithm MUST use this prefix. If no prefix is available, the algorithm MUST use the Well-Known prefix TBD1 defined in [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.)
DNS64 MUST support the following algorithms for generating IPv6 representations of IPv4 addresses defined in [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.):
Zero-Pad And Embed, defined in section 3.2.3 of [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.)
Compensation-Pad And Embed, defined in section of 3.2.4 of [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.)
Embed And Zero-Pad, defined in section of 3.2.5 of [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.)
Preconfigured Mapping Table, defined in section of 3.2.6 of [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.)
The default algorithm used by DNS64 must be Embed and Zero-Pad. While the normative description of the algorithms is provided in [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.), an sample description of the algorithm and its application to different scenarios is provided in Appendix A (Deployment scenarios and examples) for illustration purposes.
TOC |
TOC |
If a DNS64 nameserver receives a PTR query for a record in the IP6.ARPA domain, it MUST strip the IP6.ARPA labels from the QNAME, reverse the address portion of the QNAME according to the encoding scheme outlined in section 2.5 of [RFC3596] (Thomson, S., Huitema, C., Ksinant, V., and M. Souissi, “DNS Extensions to Support IP Version 6,” October 2003.) , and examine the resulting address to see whether its prefix matches the locally-configured Pref64::/n. There are two alternatives for a DNS64 nameserver to respond to such PTR queries. A DNS64 node MUST provide one of these, and SHOULD NOT provide both at the same time unless different IP6.ARPA zones require answers of different sorts.
The first option is for the DNS64 nameserver to respond authoritatively for its prefixes. If the address prefix matches any Pref64::/n used in the site, either a LIR prefix or a well-known prefix used for NAT64 as defined in [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.), then the DNS64 server MAY answer the query using locally-appropriate RDATA. The DNS64 server MAY use the same RDATA for all answers. Note that the requirement is to match any Pref64::/n used at the site, and not merely the locally-configured Pref64::/n. This is because end clients could ask for a PTR record matching an address received through a different (site-provided) DNS64, and if this strategy is in effect, those queries should never be sent to the global DNS. The advantage of this strategy is that it makes plain to the querying client that the prefix is one operated by the DNS64 site, and that the answers the client is getting are generated by the DNS64. The disadvantage is that any useful reverse-tree information that might be in the global DNS is unavailable to the clients querying the DNS64.
The second option is for the DNS64 nameserver to synthesize a CNAME mapping the IP6.ARPA namespace to the corresponding IN-ADDR.ARPA name. The rest of the response would be the normal DNS processing. The CNAME can be signed on the fly if need be. The advantage of this approach is that any useful information in the reverse tree is available to the querying client. The disadvantage is that it adds additional load to the DNS64 (because CNAMEs have to be synthesized for each PTR query that matches the Pref64::/n), and that it may require signing on the fly. In addition, the generated CNAME could correspond to an unpopulated in-addr.arpa zone, so the CNAME would provide a reference to a non-existent record.
If the address prefix does not match any of the Pref64::/n, then the DNS64 server MUST process the query as though it were any other query -- i.e. a recursive nameserver MUST attempt to resolve the query as though it were any other (non-A/AAAA) query, and an authoritative server MUST respond authoritatively or with a referral, as appropriate.
TOC |
DNS64 synthesis MUST NOT be performed on any records in the additional section of synthesized answers. The DNS64 MUST pass the additional section unchanged.
TOC |
If the DNS64 is in recursive resolver mode, then it SHOULD also serve the zones specified in [I‑D.ietf‑dnsop‑default‑local‑zones] (Andrews, M., “Locally-served DNS Zones,” April 2010.), rather than forwarding those queries elsewhere to be handled.
All other RRs MUST be returned unchanged.
TOC |
The DNS64 uses different pieces of data to build the response returned to the querying client.
The query that is used as the basis for synthesis results either in an error, an answer that can be used as a basis for synthesis, or an empty (authoritative) answer. If there is an empty answer, then the DNS64 responds to the original querying client with the answer the DNS64 received to the original AAAA query. Otherwise, the response is assembled as follows.
The header fields are set according to the usual rules for recursive or authoritative servers, depending on the role that the DNS64 is serving. The question section is copied from the original AAAA query. The answer section is populated according to the rules in Section 5.1.6 (Performing the synthesis). The authority and additional sections are copied from the response to the A query that the DNS64 performed.
TOC |
We consider the case where the recursive server that is performing DNS64 also has a local policy to validate the answers according to the procedures outlined in [RFC4035] (Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, “Protocol Modifications for the DNS Security Extensions,” March 2005.) Section 5. We call this general case vDNS64.
The vDNS64 uses the presence of the DO and CD bits to make some decisions about what the query originator needs, and can react accordingly:
TOC |
Synthetic AAAA records may be constructed on the basis of the network context in which they were constructed. Therefore, a synthetic AAAA received from one interface MUST NOT be used to resolve hosts via another network interface. Because it will be hard (if not impossible) for a multihomed system to tell whether a given AAAA is synthetic, a host SHOULD treat any AAAA record received on a given interface as local to that interface; the alternative risks communication failures when the AAAA is used to communicate on another interface. See the discussion in [I‑D.savolainen‑mif‑dns‑server‑selection] (Savolainen, T., “DNS Server Selection on Multi-Homed Hosts,” February 2010.).
TOC |
While DNS64 is intended to be part of a strategy for aiding IPv6 deployment in an internetworking environment with some IPv4-only and IPv6-only networks, it is important to realise that it is incompatible with some things that may be deployed in an IPv4-only or dual-stack context.
TOC |
Full-service resolvers that are unaware of the DNS64 function can be (mis)configured to act as mixed-mode iterative and forwarding resolvers. In a native-IPv4 context, this sort of configuration may appear to work. It is impossible to make it work properly without it being aware of the DNS64 function, because it will likely at some point obtain IPv4-only glue records and attempt to use them for resolution. The result that is returned will contain only A records, and without the ability to perform the DNS64 function the resolver will simply be unable to answer the necessary AAAA queries.
TOC |
Existing DNSSEC validators (i.e. that are unaware of DNS64) will reject all the data that comes from the DNS64 as having been tampered with. If it is necessary to have validation behind the DNS64, then the validator must know how to perform the DNS64 function itself. Alternatively, the validating host may establish a trusted connection with the DNS64, and allow the DNS64 to do all validation on its behalf.
TOC |
See the discussion on the usage of DNSSEC and DNS64 described in the document.
TOC |
Dave Thaler
Microsoft
dthaler@windows.microsoft.com
TOC |
This draft contains the result of discussions involving many people, including the participants of the IETF BEHAVE Working Group. The following IETF participants made specific contributions to parts of the text, and their help is gratefully acknowledged: Mark Andrews, Jari Arkko, Rob Austein, Timothy Baldwin, Fred Baker, Marc Blanchet, Cameron Byrne, Brian Carpenter, Hui Deng, Francis Dupont, Ed Jankiewicz, Peter Koch, Suresh Krishnan, Ed Lewis, Xing Li, Matthijs Mekking, Hiroshi Miyata, Simon Perrault, Teemu Savolainen, Jyrki Soini, Dave Thaler, Mark Townsley, Stig Venaas, Magnus Westerlund, Florian Weimer, Dan Wing, Xu Xiaohu.
Marcelo Bagnulo and Iljitsch van Beijnum are partly funded by Trilogy, a research project supported by the European Commission under its Seventh Framework Program.
TOC |
TOC |
[RFC2119] | Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML). |
[RFC1034] | Mockapetris, P., “Domain names - concepts and facilities,” STD 13, RFC 1034, November 1987 (TXT). |
[RFC1035] | Mockapetris, P., “Domain names - implementation and specification,” STD 13, RFC 1035, November 1987 (TXT). |
[RFC2671] | Vixie, P., “Extension Mechanisms for DNS (EDNS0),” RFC 2671, August 1999 (TXT). |
[RFC2672] | Crawford, M., “Non-Terminal DNS Name Redirection,” RFC 2672, August 1999 (TXT). |
[RFC2765] | Nordmark, E., “Stateless IP/ICMP Translation Algorithm (SIIT),” RFC 2765, February 2000 (TXT). |
[RFC4787] | Audet, F. and C. Jennings, “Network Address Translation (NAT) Behavioral Requirements for Unicast UDP,” BCP 127, RFC 4787, January 2007 (TXT). |
[I-D.ietf-behave-tcp] | Guha, S., Biswas, K., Ford, B., Sivakumar, S., and P. Srisuresh, “NAT Behavioral Requirements for TCP,” draft-ietf-behave-tcp-08 (work in progress), September 2008 (TXT). |
[I-D.ietf-behave-nat-icmp] | Srisuresh, P., Ford, B., Sivakumar, S., and S. Guha, “NAT Behavioral Requirements for ICMP protocol,” draft-ietf-behave-nat-icmp-12 (work in progress), January 2009 (TXT). |
[I-D.thaler-behave-translator-addressing] | Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” draft-thaler-behave-translator-addressing-00 (work in progress), July 2009 (TXT). |
TOC |
TOC |
In this section, we first provide a description of the default address transformation algorithm and then we walk through some sample scenarios that are expected to be common deployment cases. It should be noted that is provided for illustrative purposes and this section is not normative. The normative definition of DNS64 is provided in Section 5 (DNS64 Normative Specification) and the normative definition of the address transformation algorithm is provided in [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.).
There are two main different setups where DNS64 is expected to be used (other setups are possible as well, but these two are the main ones identified at the time of this writing).
One possible setup that is expected to be common is the case of an end site or an ISP that is providing IPv6-only connectivity or connectivity to IPv6-only hosts that wants to allow the communication from these IPv6-only connected hosts to the IPv4 Internet. This case is called An-IPv6-network-to-IPv4-Internet. In this case, the IPv6/IPv4 Translator is used to connect the end site or the ISP to the IPv4 Internet and the DNS64 function is provided by the end site or the ISP.
The other possible setup that is expected is an IPv4 site that wants that its IPv4 servers to be reachable from the IPv6 Internet. This case is called IPv6-Internet-to-an-IPv4-network. It should be noted that the IPv4 addresses used in the IPv4 site can be either public or private. In this case, the IPv6/IPv4 Translator is used to connect the IPv4 end site to the IPv6 Internet and the DNS64 function is provided by the end site itself.
In this section we illustrate how the DNS64 behaves in the different scenarios that are expected to be common. We consider then 3 possible scenarios, namely:
The notation used is the following: upper case letters are IPv4 addresses; upper case letters with a prime(') are IPv6 addresses; lower case letters are ports; prefixes are indicated by "P::X", which is an IPv6 address built from an IPv4 address X by adding the prefix P, mappings are indicated as "(X,x) <--> (Y',y)".
TOC |
In this section we describe the default algorithm for the generation of IPv6 address from IPv4 address to be implemented in the DNS64.
The only parameter required by the default algorithm is an IPv6 prefix. This prefix is used to map IPv4 addresses into IPv6 addresses, and is denoted Pref64. If we note n the length of the prefix Pref64, then n must the less or equal than 96. If an Pref64 is configured through any means in the DNS64 (such as manually configured, or other automatic mean not specified in this document), the default algorithm must use this prefix. If no prefix is available the algorithm must use the Well-Know prefix (include here the prefix to be assigned by IANA) defined in [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.)
The input for the algorithm are:
The IPv4 address: X
The IPv6 prefix: Pref64::/n
The IPv6 address is generated by concatenating the prefix Pref64::/n, the IPv4 address X and optionally (in case n is strictly smaller than 96) an all-zero suffix. So, the resulting IPv6 address would be Pref64:X::
Reverse algorithm
We next describe the reverse algorithm of the algorithm described in the previous section. This algorithm allows to generate and IPv4 address from an IPv6 address. This reverse algorithm is NOT implemented by the DNS64 but it is implemented in the IPv6/IPv4 translator that is serving the same domain the DNS64.
The only parameter required by the default algorithm is an IPv6 prefix. This prefix is the one originally used to map IPv4 addresses into IPv6 addresses, and is denoted Pref64.
The input for the algorithm are:
The IPv6 address: X'
The IPv6 prefix: Pref64::/n
First, the algorithm checks that the fist n bits of the IPv6 address X' match with the prefix Pref64::/n i.e. verifies that Pref64::/n = X'/n.
If this is not the case, the algorithm ends and no IPv4 address is generated.
If the verification is successful, then the bits between the n+1 and the n+32 of the IPv6 address X' are extracted to form the IPv4 address.
TOC |
In this example, we consider an IPv6 node located in an IPv6-only site that initiates a communication to an IPv4 node located in the IPv4 Internet.
The scenario for this case is depicted in the following figure:
+---------------------------------------+ +-----------+ |IPv6 site +-------------+ |IP Addr: | | | +----+ | Name server | +-------+ T | IPv4 | | | H1 | | with DNS64 | |64Trans|------| Internet | | +----+ +-------------+ +-------+ +-----------+ | |IP addr: Y' | | | |IP addr: X | --------------------------------- | +----+ +---------------------------------------+ | H2 | +----+
The figure shows an IPv6 node H1 which has an IPv6 address Y' and an IPv4 node H2 with IPv4 address X.
A IPv6/IPv4 Translator connects the IPv6 network to the IPv4 Internet. This IPv6/IPv4 Translator has a prefix (called Pref64::/n) an IPv4 address T assigned to its IPv4 interface.
The other element involved is the local name server. The name server is a dual-stack node, so that H1 can contact it via IPv6, while it can contact IPv4-only name servers via IPv4.
The local name server needs to know the prefix assigned to the local IPv6/IPv4 Translator (Pref64::/n). For the purpose of this example, we assume it learns this through manual configuration.
For this example, assume the typical DNS situation where IPv6 hosts have only stub resolvers, and always query a name server that performs recursive lookups (henceforth called "the recursive nameserver").
The steps by which H1 establishes communication with H2 are:
TOC |
The scenario for this case is depicted in the following figure:
+---------------------------------------+ +-----------+ |IPv6 site +-------+ |IP addr: | | | +---------------+ | Name | +-------+ T | IPv4 | | | H1 with DNS64 | | Server| |64Trans|------| Internet | | +---------------+ +-------+ +-------+ +-----------+ | |IP addr: Y' | | | |IP addr: X | --------------------------------- | +----+ +---------------------------------------+ | H2 | +----+
The figure shows an IPv6 node H1 which has an IPv6 address Y' and an IPv4 node H2 with IPv4 address X. Node H1 is implementing the DNS64 function.
A IPv6/IPv4 Translator connects the IPv6 network to the IPv4 Internet. This IPv6/IPv4 Translator has a prefix (called Pref64::/n) and an IPv4 address T assigned to its IPv4 interface.
H1 needs to know the prefix assigned to the local IPv6/IPv4 Translator (Pref64::/n). For the purpose of this example, we assume it learns this through manual configuration.
Also shown is a name server. For the purpose of this example, we assume that the name server is a dual-stack node, so that H1 can contact it via IPv6, while it can contact IPv4-only name servers via IPv4.
For this example, assume the typical situation where IPv6 hosts have only stub resolvers and always query a name server that provides recursive lookups (henceforth called "the recursive name server"). The recursive name server does not perform the DNS64 function.
The steps by which H1 establishes communication with H2 are:
TOC |
In this example, we consider an IPv6 node located in the IPv6 Internet site that initiates a communication to a IPv4 node located in the IPv4 site.
This scenario can be addressed without using any form of DNS64 function. This is so because it is possible to assign a fixed IPv6 address to each of the IPv4 servers. Such an IPv6 address would be constructed as the Pref64::/n concatenated with the IPv4 address of the IPv4 server and an all-zero padding. Note that the IPv4 address can be a public or a private address; the latter does not present any additional difficulty, since the LIR prefix must be used a Pref64 (in this scenario the usage of the WK prefix is not supported). Once these IPv6 addresses have been assigned to represent the IPv4 servers in the IPv6 Internet, real AAAA RRs containing these addresses can be published in the DNS under the site's domain. This is the recommended approach to handle this scenario, because it does not involve synthesizing AAAA records at the time of query. Such a configuration is easier to troubleshoot in the event of problems, because it always provides the same answer to every query.
However, there are some more dynamic scenarios, where synthesizing AAAA RRs in this setup may be needed. In particular, when DNS Update [RFC2136] (Vixie, P., Thomson, S., Rekhter, Y., and J. Bound, “Dynamic Updates in the Domain Name System (DNS UPDATE),” April 1997.) is used in the IPv4 site to update the A RRs for the IPv4 servers, there are two options: One option is to modify the server that receives the dynamic DNS updates. That would normally be the authoritative server for the zone. So the authoritative zone would have normal AAAA RRs that are synthesized as dynamic updates occur. The other option is modify the authoritative server to generate synthetic AAAA records for a zone, possibly based on additional constraints, upon the receipt of a DNS query for the AAAA RR. The first option -- in which the AAAA is synthesized when the DNS update message is received, and the data published in the relevant zone -- is recommended over the second option (i.e. the synthesis upon receipt of the AAAA DNS query). This is because it is usually easier to solve problems of misconfiguration and so on when the DNS responses are not being generated dynamically. For completeness, the DNS64 behavior that we describe in this section covers the case of synthesizing the AAAA RR when the DNS query arrives. Nevertheless, such a configuration is NOT RECOMMENDED. Troubleshooting configurations that change the data depending on the query they receive is notoriously hard, and the IPv4/IPv6 translation scenario is complicated enough without adding additional opportunities for possible malfunction.
The scenario for this case is depicted in the following figure:
+-----------+ +----------------------------------------+ | | | IPv4 site +-------------+ | | IPv6 | +-------+ +----+ | Name server | | | Internet |------|64Trans| | H2 | | with DNS64 | | +-----------+ +-------+ +----+ +-------------+ | |IP addr: Y' | | |IP addr: X | | +----+ | ----------------------------------- | | H1 | +----------------------------------------+ +----+
The figure shows an IPv6 node H1 which has an IPv6 address Y' and an IPv4 node H2 with IPv4 address X.
A IPv6/IPv4 Translator connects the IPv4 network to the IPv6 Internet. This IPv6/IPv4 Translator has a prefix (called Pref64::/n).
Also shown is the authoritative name server for the local domain with DNS64 functionality. For the purpose of this example, we assume that the name server is a dual-stack node, so that H1 or a recursive resolver acting on the request of H1 can contact it via IPv6, while it can be contacted by IPv4-only nodes to receive dynamic DNS updates via IPv4.
The local name server needs to know the prefix assigned to the local IPv6/IPv4 Translator (Pref64::/n). For the purpose of this example, we assume it learns this through manual configuration.
The steps by which H1 establishes communication with H2 are:
TOC |
The motivation for synthesizing AAAA RR when a real AAAA RR exists is to support the following scenario:
An IPv4-only server application (e.g. web server software) is running on a dual-stack host. There may also be dual-stack server applications also running on the same host. That host has fully routable IPv4 and IPv6 addresses and hence the authoritative DNS server has an A and a AAAA record as a result.
An IPv6-only client (regardless of whether the client application is IPv6-only, the client stack is IPv6-only, or it only has an IPv6 address) wants to access the above server.
The client issues a DNS query to a DNS64 recursor.
If the DNS64 only generates a synthetic AAAA if there's no real AAAA, then the communication will fail. Even though there's a real AAAA, the only way for communication to succeed is with the translated address. So, in order to support this scenario, the administrator of a DNS64 service may want to enable the synthesis of AAAA RR even when real AAAA RR exist.
The implication of including synthetic AAAA RR when real AAAA RR exist is that translated connectivity may be preferred over native connectivity in some cases where the DNS64 is operated in DNS server mode.
RFC3484 [RFC3484] (Draves, R., “Default Address Selection for Internet Protocol version 6 (IPv6),” February 2003.) rules use longest prefix match to select which is the preferred destination address to use. So, if the DNS64 recursor returns both the synthetic AAAA RR and the real AAAA RR, then if the DNS64 is operated by the same domain as the initiating host, and a global unicast prefix (called the LIR prefix as defined in [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.)) is used, then the synthetic AAAA RR is likely to be preferred.
This means that without further configuration:
In the case of An IPv6 network to the IPv4 internet, the host will prefer translated connectivity if LIR prefix is used. If the Well-Known (WK) prefix defined in [I‑D.thaler‑behave‑translator‑addressing] (Thaler, D., “IPv6 Addressing of IPv6/IPv4 Translators,” July 2009.) is used, it will probably prefer native connectivity.
In the case of the IPv6 Internet to an IPv4 network, it is possible to bias the selection towards the real AAAA RR if the DNS64 recursor returns the real AAAA first in the DNS reply, when the LIR prefix is used (the WK prefix usage is not recommended in this case)
In the case of the IPv6 to IPv4 in the same network, for local destinations (i.e., target hosts inside the local site), it is likely that the LIR prefix and the destination prefix are the same, so we can use the order of RR in the DNS reply to bias the selection through native connectivity. If a WK prefix is used, the longest prefix match rule will select native connectivity.
So this option introduces problems in the following cases:
An IPv6 network to the IPv4 internet with the LIR prefix
IPv6 to IPv4 in the same network when reaching external destinations and the LIR prefix is used.
In any case, the problem can be solved by properly configuring the RFC3484 [RFC3484] (Draves, R., “Default Address Selection for Internet Protocol version 6 (IPv6),” February 2003.) policy table, but this requires effort on the part of the site operator.
TOC |
Marcelo Bagnulo | |
UC3M | |
Av. Universidad 30 | |
Leganes, Madrid 28911 | |
Spain | |
Phone: | +34-91-6249500 |
Fax: | |
Email: | marcelo@it.uc3m.es |
URI: | http://www.it.uc3m.es/marcelo |
Andrew Sullivan | |
Shinkuro | |
4922 Fairmont Avenue, Suite 250 | |
Bethesda, MD 20814 | |
USA | |
Phone: | +1 301 961 3131 |
Email: | ajs@shinkuro.com |
Philip Matthews | |
Unaffiliated | |
600 March Road | |
Ottawa, Ontario | |
Canada | |
Phone: | +1 613-592-4343 x224 |
Fax: | |
Email: | philip_matthews@magma.ca |
URI: | |
Iljitsch van Beijnum | |
IMDEA Networks | |
Av. Universidad 30 | |
Leganes, Madrid 28911 | |
Spain | |
Phone: | +34-91-6246245 |
Email: | iljitsch@muada.com |