1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117
|
<pre>Internet Engineering Task Force (IETF) J. Arkko
Request for Comments: 6127 Ericsson
Category: Informational M. Townsley
ISSN: 2070-1721 Cisco
May 2011
<span class="h1">IPv4 Run-Out and IPv4-IPv6 Co-Existence Scenarios</span>
Abstract
When IPv6 was designed, it was expected that the transition from IPv4
to IPv6 would occur more smoothly and expeditiously than experience
has revealed. The growth of the IPv4 Internet and predicted
depletion of the free pool of IPv4 address blocks on a foreseeable
horizon has highlighted an urgent need to revisit IPv6 deployment
models. This document provides an overview of deployment scenarios
with the goal of helping to understand what types of additional tools
the industry needs to assist in IPv4 and IPv6 co-existence and
transition.
This document was originally created as input to the Montreal co-
existence interim meeting in October 2008, which led to the
rechartering of the Behave and Softwire working groups to take on new
IPv4 and IPv6 co-existence work. This document is published as a
historical record of the thinking at the time, but hopefully will
also help readers understand the rationale behind current IETF tools
for co-existence and transition.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see <a href="./rfc5741#section-2">Section 2 of RFC 5741</a>.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
<a href="http://www.rfc-editor.org/info/rfc6127">http://www.rfc-editor.org/info/rfc6127</a>.
<span class="grey">Arkko & Townsley Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
Provisions Relating to IETF Documents
(<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
<a href="#section-1">1</a>. Introduction ....................................................<a href="#page-2">2</a>
<a href="#section-2">2</a>. Scenarios .......................................................<a href="#page-4">4</a>
<a href="#section-2.1">2.1</a>. Reaching the IPv4 Internet .................................<a href="#page-4">4</a>
<a href="#section-2.1.1">2.1.1</a>. NAT444 ..............................................<a href="#page-5">5</a>
<a href="#section-2.1.2">2.1.2</a>. Distributed NAT .....................................<a href="#page-6">6</a>
<a href="#section-2.1.3">2.1.3</a>. Recommendation ......................................<a href="#page-8">8</a>
<a href="#section-2.2">2.2</a>. Running Out of IPv4 Private Address Space ..................<a href="#page-9">9</a>
<a href="#section-2.3">2.3</a>. Enterprise IPv6-Only Networks .............................<a href="#page-11">11</a>
<a href="#section-2.4">2.4</a>. Reaching Private IPv4-Only Servers ........................<a href="#page-13">13</a>
<a href="#section-2.5">2.5</a>. Reaching IPv6-Only Servers ................................<a href="#page-14">14</a>
<a href="#section-3">3</a>. Security Considerations ........................................<a href="#page-16">16</a>
<a href="#section-4">4</a>. Conclusions ....................................................<a href="#page-16">16</a>
<a href="#section-5">5</a>. References .....................................................<a href="#page-17">17</a>
<a href="#section-5.1">5.1</a>. Normative References ......................................<a href="#page-17">17</a>
<a href="#section-5.2">5.2</a>. Informative References ....................................<a href="#page-17">17</a>
<a href="#appendix-A">Appendix A</a>. Acknowledgments .......................................<a href="#page-20">20</a>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
This document was originally created as input to the Montreal
co-existence interim meeting in October 2008, which led to the
rechartering of the Behave and Softwire working groups to take on new
IPv4 and IPv6 co-existence work. This document is published as a
historical record of the thinking at the time, but hopefully will
also help readers understand the rationale behind current IETF tools
for co-existence and transition.
<span class="grey">Arkko & Townsley Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
When IPv6 was designed, it was expected that IPv6 would be enabled,
in part or in whole, while continuing to run IPv4 side-by-side on the
same network nodes and hosts. This method of transition is referred
to as "dual-stack" [<a href="./rfc4213" title=""Basic Transition Mechanisms for IPv6 Hosts and Routers"">RFC4213</a>] and has been the prevailing method
driving the specifications and available tools for IPv6 to date.
Experience has shown that large-scale deployment of IPv6 takes time,
effort, and significant investment. With IPv4 address pool depletion
on the foreseeable horizon [<a href="#ref-HUSTON-IPv4">HUSTON-IPv4</a>], network operators and
Internet Service Providers are being forced to consider network
designs that no longer assume the same level of access to unique
global IPv4 addresses. IPv6 alone does not alleviate this concern
given the basic assumption that all hosts and nodes will be dual-
stack until the eventual sunsetting of IPv4-only equipment. In
short, the time-frames for the growth of the IPv4 Internet, the
universal deployment of dual-stack IPv4 and IPv6, and the final
transition to an IPv6-dominant Internet are not in alignment with
what was originally expected.
While dual-stack remains the most well-understood approach to
deploying IPv6 today, current realities dictate a re-assessment of
the tools available for other deployment models that are likely to
emerge. In particular, the implications of deploying multiple layers
of IPv4 address translation need to be considered, as well as those
associated with translation between IPv4 and IPv6, which led to the
deprecation of [<a href="./rfc2766" title=""Network Address Translation - Protocol Translation (NAT-PT)"">RFC2766</a>] as detailed in [<a href="./rfc4966" title=""Reasons to Move the Network Address Translator - Protocol Translator (NAT-PT) to Historic Status"">RFC4966</a>]. This document
outlines some of the scenarios where these address and protocol
translation mechanisms could be useful, in addition to methods where
carrying IPv4 over IPv6 may be used to assist in transition to IPv6
and co-existence with IPv4. We purposefully avoid a description of
classic dual-stack methods, as well as IPv6-over-IPv4 tunneling.
Instead, this document focuses on scenarios that are driving tools we
have historically not been developing standard solutions around.
It should be understood that the scenarios in this document represent
new deployment models and are intended to complement, and not
replace, existing ones. For instance, dual-stack continues to be the
most recommended deployment model. Note that dual-stack is not
limited to situations where all hosts can acquire public IPv4
addresses. A common deployment scenario is running dual-stack on the
IPv6 side with public addresses, and on the IPv4 side with just one
public address and a traditional IPv4 NAT. Generally speaking,
offering native connectivity with both IP versions is preferred over
the use of translation or tunneling mechanisms when sufficient
address space is available.
<span class="grey">Arkko & Townsley Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Scenarios</span>
This section identifies five deployment scenarios that we believe
have a significant level of near-to-medium-term demand somewhere on
the globe. We will discuss these in the following sections, while
walking through a bit of the design space to get an understanding of
the types of tools that could be developed to solve each. In
particular, we want the reader to consider for each scenario what
type of new equipment must be introduced in the network, and where;
which nodes must be changed in some way; and which nodes must work
together in an interoperable manner via a new or existing protocol.
The five scenarios are:
o Reaching the IPv4 Internet with less than one global IPv4 address
per subscriber or subscriber household available (<a href="#section-2.1">Section 2.1</a>).
o Running a large network needing more addresses than those
available in private <a href="./rfc1918">RFC 1918</a> address space (<a href="#section-2.2">Section 2.2</a>).
o Running an IPv6-only network for operational simplicity as
compared to dual-stack, while still needing access to the global
IPv4 Internet for some, but not all, connectivity (<a href="#section-2.3">Section 2.3</a>).
o Reaching one or more privately addressed IPv4-only servers via
IPv6 (<a href="#section-2.4">Section 2.4</a>).
o Accessing IPv6-only servers from IPv4-only clients (<a href="#section-2.5">Section 2.5</a>).
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a>. Reaching the IPv4 Internet</span>
+----+ +---------------+
IPv4 host(s)-----+ GW +------IPv4-------------| IPv4 Internet |
+----+ +---------------+
<---private v4--->NAT<--------------public v4----------------->
Figure 1: Accessing the IPv4 Internet Today
Figure 1 shows a typical model for accessing the IPv4 Internet today,
with the gateway device implementing a Network Address and Port
Translation (NAPT, or more simply referred to in this document as
NAT). The NAT function serves a number of purposes, one of which is
to allow more hosts behind the gateway (GW) than there are IPv4
addresses presented to the Internet. This multiplexing of IP
addresses comes at great cost to the original end-to-end model of the
Internet, but nonetheless is the dominant method of access today,
particularly to residential subscribers.
<span class="grey">Arkko & Townsley Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
Taking the typical residential subscriber as an example, each
subscriber line is allocated one global IPv4 address for it to use
with as many devices as the NAT GW and local network can handle. As
IPv4 address space becomes more constrained and without substantial
movement to IPv6, it is expected that service providers will be
pressured to assign a single global IPv4 address to multiple
subscribers. Indeed, in some deployments this is already the case.
<span class="h4"><a class="selflink" id="section-2.1.1" href="#section-2.1.1">2.1.1</a>. NAT444</span>
When there is less than one address per subscriber at a given time,
address multiplexing must be performed at a location where visibility
to more than one subscriber can be realized. The most obvious place
for this is within the service provider network itself, requiring the
service provider to acquire and operate NAT equipment to allow
sharing of addresses across multiple subscribers. For deployments
where the GW is owned and operated by the customer, however, this
becomes operational overhead for the Internet Service Provider (ISP),
for which the ISP will no longer be able to rely on the customer and
the seller of the GW device.
This new address translation node has been termed a "Carrier Grade
NAT", or CGN [<a href="#ref-NISHITANI-CGN">NISHITANI-CGN</a>]. The CGN's insertion into the ISP
network is shown in Figure 2.
+----+ +---+ +-------------+
IPv4 host(s)-----+ GW +------IPv4---------+CGN+--+IPv4 Internet|
+----+ +---+ +-------------+
<---private v4--->NAT<----private v4------>NAT<----public v4--->
Figure 2: Employing Two NAT Devices: NAT444
This approach is known as "NAT444" or "Double-NAT" and is discussed
further in [<a href="#ref-NAT-PT" title=""A Comparison of Proposals to Replace NAT-PT"">NAT-PT</a>].
It is important to note that while multiplexing of IPv4 addresses is
occurring here at multiple levels, there is no aggregation of NAT
state between the GW and the CGN. Every flow that is originated in
the subscriber home is represented as duplicate state in the GW and
the CGN. For example, if there are 4 PCs in a subscriber home, each
with 25 open TCP sessions, both the GW and the CGN must track 100
sessions each for that subscriber line.
NAT444 has the enticing property that it seems, at first glance, that
the CGN can be deployed without any change to the GW device or other
node in the network. While it is true that a GW that can accept a
lease for a global IPv4 address would very likely accept a translated
<span class="grey">Arkko & Townsley Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
IPv4 address as well, the CGN is neither transparent to the GW nor to
the subscriber. In short, it is a very different service model to
offer a translated IPv4 address versus a global IPv4 address to a
customer. While many things may continue to work in both
environments, some end-host applications may break, and GW port-
mapping functionality will likely cease to work reliably. Further,
if addresses between the subscriber network and service provider
network overlap [<a href="#ref-ISP-SHARED-ADDR">ISP-SHARED-ADDR</a>], ambiguous routes in the GW could
lead to misdirected or black-holed traffic. Resolving this overlap
through allocation of new private address space is difficult, as many
existing devices rely on knowing what address ranges represent
private addresses [<a href="#ref-IPv4-SPACE-ISSUES">IPv4-SPACE-ISSUES</a>].
Network operations that had previously been tied to a single IPv4
address for a subscriber would need to be considered when deploying
NAT444 as well. These may include troubleshooting, operations,
accounting, logging and legal intercept, Quality of Service (QoS)
functions, anti-spoofing and security, backoffice systems, etc.
Ironically, some of these considerations overlap with the kinds of
considerations one needs to perform when deploying IPv6.
Consequences aside, NAT444 service is already being deployed in some
networks for residential broadband service. It is safe to assume
that this trend will likely continue in the face of tightening IPv4
address availability. The operational considerations of NAT444 need
to be well-documented.
NAT444 assumes that the global IPv4 address offered to a residential
subscriber today will simply be replaced with a single translated
address. In order to try and circumvent performing NAT twice, and
since the address being offered is no longer a global address, a
service provider could begin offering a subnet of translated IPv4
addresses in hopes that the subscriber would route IPv4 in the GW
rather than NAT. The same would be true if the GW was known to be an
IP-unaware bridge. This makes assumptions on whether the ISP can
enforce policies, or even identify specific capabilities, of the GW.
Once we start opening the door to making changes at the GW, we have
increased the potential design space considerably. The next section
covers the same problem scenario of reaching the IPv4 Internet in the
face of IPv4 address depletion, but with the added wrinkle that the
GW can be updated or replaced along with the deployment of a CGN (or
CGN-like) node.
<span class="h4"><a class="selflink" id="section-2.1.2" href="#section-2.1.2">2.1.2</a>. Distributed NAT</span>
Increasingly, service providers offering "triple-play" services own
and manage a highly functional GW in the subscriber home. These
managed GWs generally have rather tight integration with the service
<span class="grey">Arkko & Townsley Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
provider network and applications. In these types of deployments, we
can begin to consider what other possibilities exist besides NAT444
by assuming cooperative functionality between the CGN and the GW.
If the connection between the GW and the CGN is a point-to-point link
(a common configuration between the GW and the "IP edge" in a number
of access architectures), NAT-like functionality may be "split"
between the GW and the CGN rather than performing NAT444 as described
in the previous section.
one frac addr one public addr
+----+ +---+ +-------------+
IPv4 host(s)-----+ GW +-----p2p link------+CGN+--+IPv4 Internet|
+----+ +---+ +-------------+
<---private v4---> NAT <----public v4--->
(distributed,
over a p2p link)
Figure 3: Distributed-NAT Service
In this approach, multiple GWs share a common public IPv4 address,
but with separate, non-overlapping port ranges. Each such address/
port range pair is defined as a "fractional address". Each home
gateway can use the address as if it were its own public address,
except that only a limited port range is available to the gateway.
The CGN is aware of the port ranges, which may be assigned in
different ways, for instance during DHCP lease acquisition or
dynamically when ports are needed [<a href="#ref-v6OPS-APBP">v6OPS-APBP</a>]. The CGN directs
traffic to the fractional address towards that subscriber's GW
device. This method has the advantage that the more complicated
aspects of the NAT function (Application Level Gateways (ALGs), port
mapping, etc.) remain in the GW, augmented only by the restricted
port range allocated to the fractional address for that GW. The CGN
is then free to operate in a fairly stateless manner, forwarding
traffic based on IP address and port ranges and not tracking any
individual flows from within the subscriber network. There are
obvious scaling benefits to this approach within the CGN node, with
the tradeoff of complexity in terms of the number of nodes and
protocols that must work together in an interoperable manner.
Further, the GW is still receiving a global IPv4 address, albeit only
a "portion" of one in terms of available port usage. There are still
outstanding questions in terms of how to handle protocols that run
directly over IP and cannot use the divided port number ranges, and
how to handle fragmented packets, but the benefit is that we are no
longer burdened by two layers of NAT as in NAT444.
<span class="grey">Arkko & Townsley Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
Not all access architectures provide a natural point-to-point link
between the GW and the CGN to tie into. Further, the CGN may not be
incorporated into the IP edge device in networks that do have point-
to-point links. For these cases, we can build our own point-to-point
link using a tunnel. A tunnel is essentially a point-to-point link
that we create when needed [<a href="#ref-INTAREA-TUNNELS">INTAREA-TUNNELS</a>]. This is illustrated in
Figure 4.
one frac addr one public addr
+----+ +---+ +-------------+
IPv4 host(s)-----+ GW +======tunnel=======+CGN+--+IPv4 Internet|
+----+ +---+ +-------------+
<---private v4---> NAT <----public v4--->
(distributed,
over a tunnel)
Figure 4: Point-to-Point Link Created through a Tunnel
Figure 4 is essentially the same as Figure 3, except the data link is
created with a tunnel. The tunnel could be created in any number of
ways, depending on the underlying network.
At this point, we have used a tunnel or point-to-point link with
coordinated operation between the GW and the CGN in order to keep
most of the NAT functionality in the GW.
Given the assumption of a point-to-point link between the GW and the
CGN, the CGN could perform the NAT function, allowing private,
overlapping space to all subscribers. For example, each subscriber
GW may be assigned the same 10.0.0.0/8 address space (or all <a href="./rfc1918">RFC 1918</a>
[<a href="./rfc1918" title=""Address Allocation for Private Internets"">RFC1918</a>] space for that matter). The GW then becomes a simple
"tunneling router", and the CGN takes on the full NAT role. One can
think of this design as effectively a layer-3 VPN, but with Virtual-
NAT tables rather than Virtual-Routing tables.
<span class="h4"><a class="selflink" id="section-2.1.3" href="#section-2.1.3">2.1.3</a>. Recommendation</span>
This section deals strictly with the problem of reaching the IPv4
Internet with limited public address space for each device in a
network. We explored combining NAT functions and tunnels between the
GW and the CGN to obtain similar results with different design
tradeoffs. The methods presented can be summarized as:
a. Double-NAT (NAT444)
b. Single-NAT at CGN with a subnet and routing at the GW
<span class="grey">Arkko & Townsley Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
c. Tunnel/link + fractional IP (NAT at GW, port-routing at CGN)
d. Tunnel/link + Single-NAT with overlapping <a href="./rfc1918">RFC 1918</a> ("Virtual NAT"
tables and routing at the GW)
In all of the methods above, the GW could be logically moved into a
single host, potentially eliminating one level of NAT by that action
alone. As long as the hosts themselves need only a single IPv4
address, methods b and d obviously are of little interest. This
leaves methods a and c as the more interesting methods in cases where
there is no analogous GW device (such as a campus network).
This document recommends the development of new guidelines and
specifications to address the above methods. Cases where the home
gateway both can and cannot be modified should be addressed.
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a>. Running Out of IPv4 Private Address Space</span>
In addition to public address space depletion, very large privately
addressed networks are reaching exhaustion of <a href="./rfc1918">RFC 1918</a> space on local
networks as well. Very large service provider networks are prime
candidates for this. Private address space is used locally in ISPs
for a variety of things, including:
o Control and management of service provider devices in subscriber
premises (cable modems, set-top boxes, and so on).
o Addressing the subscriber's NAT devices in a Double-NAT
arrangement.
o "Walled garden" data, voice, or video services.
Some providers deal with this problem by dividing their network into
parts, each on its own copy of the private space. However, this
limits the way services can be deployed and what management systems
can reach what devices. It is also operationally complicated in the
sense that the network operators have to understand which private
scope they are in.
Tunnels were used in the previous section to facilitate distribution
of a single global IPv4 address across multiple endpoints without
using NAT, or to allow overlapping address space to GWs or hosts
connected to a CGN. The kind of tunnel or link was not specified.
If the tunnel used carries IPv4 over IPv6, the portion of the IPv6
network traversed naturally need not be IPv4-capable, and need not
utilize IPv4 addresses, private or public, for the tunnel traffic to
traverse the network. This is shown in Figure 5.
<span class="grey">Arkko & Townsley Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
IPv6-only network
+----+ +---+ +-------------+
IPv4 host--------+ GW +=======tunnel========+CGN+--+IPv4 Internet|
+----+ +---+ +-------------+
<---private v4----> <----- v4 over v6 -----> <---public v4---->
Figure 5: Running IPv4 over an IPv6-Only Network
Each of the four approaches (a, b, c, and d) from the <a href="#section-2.1">Section 2.1</a>
scenario could be applied here, and for brevity each iteration is not
specified in full here. The models are essentially the same, just
that the tunnel is over an IPv6 network and carries IPv4 traffic.
Note that while there are numerous solutions for carrying IPv6 over
IPv4, this reverse mode is somewhat of an exception (one notable
exception being the Softwire working group, as seen in [<a href="./rfc4925" title=""Softwire Problem Statement"">RFC4925</a>]).
Once we have IPv6 to the GW (or host, if we consider the GW embedded
in the host), enabling IPv6 and IPv4 over the IPv6 tunnel allows for
dual-stack operation at the host or network behind the GW device.
This is depicted in Figure 6:
+----+ +-------------+
IPv6 host-----+ | +------------------+IPv6 Internet|
| +---IPv6-----+ +-------------+
dual-stack host-+ GW |
| | +---+ +-------------+
IPv4 host-----+ +===v4-over-v6 tunnel====+CGN+--+IPv4 Internet|
+----+ +---+ +-------------+
<-----------private v4 (partially in tunnel)-->NAT<---public v4---->
<-----------------------------public v6---------------------------->
Figure 6: "Dual-Stack Lite" Operation over an IPv6-Only Network
In [<a href="#ref-DUAL-STACK-LITE">DUAL-STACK-LITE</a>], this is referred to as "dual-stack lite",
bowing to the fact that it is dual-stack at the gateway, but not at
the network. As introduced in <a href="#section-2.1">Section 2.1</a>, if the CGN here is a full
functioning NAT, hosts behind a dual-stack lite gateway can support
IPv4-only and IPv6-enabled applications across an IPv6-only network
without provisioning a unique IPv4 address to each gateway. In fact,
every gateway may have the same address.
While the high-level problem space in this scenario is how to
alleviate local usage of IPv4 addresses within a service provider
network, the solution direction identified with IPv6 has interesting
operational properties that should be pointed out. By tunneling IPv4
over IPv6 across the service provider network, the separate problems
<span class="grey">Arkko & Townsley Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
of transitioning the service provider network to IPv6, deploying IPv6
to subscribers, and continuing to provide IPv4 service can all be
decoupled. The service provider could deploy IPv6 internally, turn
off IPv4 internally, and still carry IPv4 traffic across the IPv6
core for end users. In the extreme case, all of that IPv4 traffic
need not be provisioned with different IPv4 addresses for each
endpoint, as there is not IPv4 routing or forwarding within the
network. Thus, there are no issues with IPv4 renumbering, address
space allocation, etc. within the network itself.
It is recommended that the IETF develop tools to address this
scenario for both a host and the GW. It is assumed that both
endpoints of the tunnel can be modified to support these new tools.
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a>. Enterprise IPv6-Only Networks</span>
This scenario is about allowing an IPv6-only host or a host that has
no interfaces connected to an IPv4 network to reach servers on the
IPv4 Internet. This is an important scenario for what we sometimes
call "greenfield" deployments. One example is an enterprise network
that wishes to operate only IPv6 for operational simplicity, but
still wishes to reach the content in the IPv4 Internet. For
instance, a new office building may be provisioned with IPv6 only.
This is shown in Figure 7.
+----+ +-------------+
| +------------------+IPv6 Internet+
| | +-------------+
IPv6 host-----------------+ GW |
| | +-------------+
| +------------------+IPv4 Internet+
+----+ +-------------+
<-------------------------public v6----------------------------->
<-------public v6--------->NAT<----------public v4-------------->
Figure 7: Enterprise IPv6-Only Network
Other cases that have been mentioned include "greenfield" wireless
service provider networks and sensor networks. This enterprise IPv6-
only scenario bears a striking resemblance to the <a href="#section-2.2">Section 2.2</a>
scenario as well, if one considers a particularly large enterprise
network that begins to resemble a service provider network.
In the <a href="#section-2.2">Section 2.2</a> scenario, we dipped into design space enough to
illustrate that the service provider was able to implement an IPv6-
only network to ease their addressing problems via tunneling. This
came at the cost of touching two devices on the edges of this
<span class="grey">Arkko & Townsley Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
network; both the GW and the CGN have to support IPv6 and the
tunneling mechanism over IPv6. The greenfield enterprise scenario is
different from that one in the sense that there is only one place
that the enterprise can easily modify: the border between its network
and the IPv4 Internet. Obviously, the IPv4 Internet operates the way
it already does. But in addition, the hosts in the enterprise
network are commercially available devices, personal computers with
existing operating systems. While we consider in this scenario that
all of the devices on the network are "modern" dual-stack-capable
devices, we do not want to have to rely upon kernel-level
modifications to these operating systems. This restriction drives us
to a "one box" type of solution, where IPv6 can be translated into
IPv4 to reach the public Internet. This is one situation where new
or improved IETF specifications could have an effect on the user
experience in these networks. In fairness, it should be noted that
even a network-based solution will take time and effort to deploy.
This is essentially, again, a tradeoff between one new piece of
equipment in the network, or a cooperation between two.
One approach to deal with this environment is to provide an
application-level proxy at the edge of the network (GW). For
instance, if the only application that needs to reach the IPv4
Internet is the web, then an HTTP/HTTPS proxy can easily convert
traffic from IPv6 into IPv4 on the outside.
Another more generic approach is to employ an IPv6-to-IPv4 translator
device. Different types of translation schemes are discussed in
[<a href="#ref-NAT-PT" title=""A Comparison of Proposals to Replace NAT-PT"">NAT-PT</a>], [<a href="./rfc6144" title=""Framework for IPv4/IPv6 Translation"">RFC6144</a>], [<a href="./rfc6145" title=""IP/ICMP Translation Algorithm"">RFC6145</a>], and [<a href="./rfc6052" title=""IPv6 Addressing of IPv4/IPv6 Translators"">RFC6052</a>]. NAT64 is one example
of a translation scheme falling under this category [<a href="./rfc6147" title=""DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers"">RFC6147</a>]
[<a href="./rfc6146" title=""Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers"">RFC6146</a>].
Translation will in most cases have some negative consequences for
the end-to-end operation of Internet protocols. For instance, the
issues with Network Address Translation - Protocol Translation
(NAT-PT) [<a href="./rfc2766" title=""Network Address Translation - Protocol Translation (NAT-PT)"">RFC2766</a>] have been described in [<a href="./rfc4966" title=""Reasons to Move the Network Address Translator - Protocol Translator (NAT-PT) to Historic Status"">RFC4966</a>]. It is important
to note that the choice of translation solution, and the assumptions
about the network in which it is used, impact the consequences. A
translator for the general case has a number of issues that a
translator for a more specific situation may not have at all.
It is recommended that the IETF develop tools to address this
scenario. These tools need to allow existing IPv6 hosts to operate
unchanged.
<span class="grey">Arkko & Townsley Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
<span class="h3"><a class="selflink" id="section-2.4" href="#section-2.4">2.4</a>. Reaching Private IPv4-Only Servers</span>
This section discusses the specific problem of IPv4-only-capable
server farms that no longer can be allocated a sufficient number of
public addresses. It is expected that for individual servers,
addresses are going to be available for a long time in a reasonably
easy manner. However, a large server farm may require a large enough
block of addresses that it is either not feasible to allocate one or
it becomes economically desirable to use the addresses for other
purposes.
Another use case for this scenario involves a service provider that
is capable of acquiring a sufficient number of IPv4 addresses, and
has already done so. However, the service provider also simply
wishes to start to offer an IPv6 service but without yet touching the
server farm (that is, without upgrading the server farm to IPv6).
One option available in such a situation is to move those servers and
their clients to IPv6. However, moving to IPv6 involves not just the
cost of the IPv6 connectivity, but the cost of moving the application
itself from IPv4 to IPv6. So, in this case, the server farm is IPv4-
only, there is an increasing cost for IPv4 connectivity, and there is
an expensive bill for moving server infrastructure to IPv6. What can
be done?
If the clients are IPv4-only as well, the problem is a hard one.
This issue is dealt with in more depth in <a href="#section-2.5">Section 2.5</a>. However,
there are important cases where large sets of clients are IPv6-
capable. In these cases, it is possible to place the server farm in
private IPv4 space and arrange some of the gateway service from IPv6
to IPv4 to reach the servers. This is shown in Figure 8.
+----+
IPv6 host(s)-------(Internet)-----+ GW +------Private IPv4 servers
+----+
<---------public v6--------------->NAT<------private v4---------->
Figure 8: Reaching Servers in Private IPv4 Space
One approach to implement this is to use NAT64 to translate IPv6 into
private IPv4 addresses. The private IPv4 addresses are mapped into
IPv6 addresses within one or more known prefixes. The GW at the edge
of the server farm is aware of the mapping, as is the Domain Name
<span class="grey">Arkko & Townsley Informational [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
System (DNS). AAAA records for each server name are given an IPv6
address that corresponds to the mapped private IPv4 address. Thus,
each privately addressed IPv4 server is given a public IPv6
presentation. No Application Level Gateway for DNS (DNS-ALG) is
needed in this case, contrary to what NAT-PT would require, for
instance.
This is very similar to the <a href="#section-2.3">Section 2.3</a> scenario where we typically
think of a small site with IPv6 needing to reach the public IPv4
Internet. The difference here is that we assume not a small IPv6
site, but the whole of the IPv6 Internet needing to reach a small
IPv4 site. This example was driven by the enterprise network with
IPv4 servers, but could be scaled down to the individual subscriber
home level as well. Here, the same technique could be used to, say,
access an IPv4 webcam in the home from the IPv6 Internet. All that
is needed is the ability to update AAAA records appropriately, an
IPv6 client (which could use Teredo [<a href="./rfc4380" title=""Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)"">RFC4380</a>] or some other method to
obtain IPv6 reachability), and the NAT64 mechanism. In this sense,
this method looks much like a "NAT/firewall bypass" function.
An argument could be made that since the host is likely dual-stack,
existing port-mapping services or NAT traversal techniques could be
used to reach the private space instead of IPv6. This would have to
be done anyway if the hosts are not all IPv6-capable or connected.
However, in cases where the hosts are all IPv6-capable, the
alternative techniques force additional limitations on the use of
port numbers. In the case of IPv6-to-IPv4 translation, the full port
space would be available for each server, even in the private space.
It is recommended that the IETF develop tools to address this
scenario. These tools need to allow existing IPv4 servers to operate
unchanged.
<span class="h3"><a class="selflink" id="section-2.5" href="#section-2.5">2.5</a>. Reaching IPv6-Only Servers</span>
This scenario is predicted to become increasingly important as IPv4
global connectivity sufficient for supporting server-oriented content
becomes significantly more difficult to obtain than global IPv6
connectivity. Historically, the expectation has been that for
connectivity to IPv6-only devices, devices would either need to be
IPv6-connected, or dual-stack with the ability to set up an IPv6-
over-IPv4 tunnel in order to access the IPv6 Internet. Many "modern"
device stacks have this capability, and for them this scenario does
not present a problem as long as a suitable gateway to terminate the
tunnel and route the IPv6 packets is available. But, for the server
operator, it may be a difficult proposition to leave all IPv4-only
devices without reachability. Thus, if a solution for IPv4-only
devices to reach IPv6-only servers were realizable, the benefits
<span class="grey">Arkko & Townsley Informational [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
would be clear. Not only could servers move directly to IPv6 without
trudging through a difficult dual-stack period, but they could do so
without risk of losing connectivity with the IPv4-only Internet.
Unfortunately, realizing this goal is complicated by the fact that
IPv4 to IPv6 is considered "hard" since of course IPv6 has a much
larger address space than IPv4. Thus, representing 128 bits in
32 bits is not possible, barring the use of techniques similar to
NAT64, which uses IPv6 addresses to represent IPv4 addresses as well.
The main questions regarding this scenario are about timing and
priority. While the expectation that this scenario may be of
importance one day is readily acceptable, at the time of this
writing, there are few or no IPv6-only servers of importance (beyond
some contrived cases) that the authors are aware of. The difficulty
of making a decision about this case is that, quite possibly, when
there is sufficient pressure on IPv4 such that we see IPv6-only
servers, the vast majority of hosts will either have IPv6
connectivity or the ability to tunnel IPv6 over IPv4 in one way or
another.
This discussion makes assumptions about what a "server" is as well.
For the majority of applications seen on the IPv4 Internet to date,
this distinction has been more or less clear. This clarity is
perhaps in no small part due to the overhead today in creating a
truly end-to-end application in the face of the fragmented addressing
and reachability brought on by the various NATs and firewalls
employed today. However, current notions of a "server" are beginning
to shift, as we see more and more pressure to connect people to one
another in an end-to-end fashion -- with peer-to-peer techniques, for
instance -- rather than simply content server to client. Thus, if we
consider an "IPv6-only server" as what we classically consider an
"IPv4 server" today, there may not be a lot of demand for this in the
near future. However, with a more distributed model of the Internet
in mind, there may be more opportunities to employ IPv6-only
"servers" that we would normally extrapolate from based on past
experience with applications.
It is recommended that the IETF address this scenario, though perhaps
with a slightly lower priority than the others. In any case, when
new tools are developed to support this, it should be obvious that we
cannot assume any support for updating legacy IPv4 hosts in order to
reach the IPv6-only servers.
<span class="grey">Arkko & Townsley Informational [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Security Considerations</span>
Security aspects of the individual solutions are discussed in more
depth elsewhere, for instance in [<a href="#ref-DUAL-STACK-LITE">DUAL-STACK-LITE</a>], [<a href="./rfc6144" title=""Framework for IPv4/IPv6 Translation"">RFC6144</a>],
[<a href="./rfc6147" title=""DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers"">RFC6147</a>], [<a href="./rfc6145" title=""IP/ICMP Translation Algorithm"">RFC6145</a>], [<a href="./rfc6146" title=""Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers"">RFC6146</a>], [<a href="#ref-NAT-PT" title=""A Comparison of Proposals to Replace NAT-PT"">NAT-PT</a>], and [<a href="./rfc4966" title=""Reasons to Move the Network Address Translator - Protocol Translator (NAT-PT) to Historic Status"">RFC4966</a>]. This
document highlights just three issues:
o Any type of translation may have an impact on how certain
protocols can pass through. For example, IPsec needs support for
NAT traversal, and the proliferation of NATs implies an even
higher reliance on these mechanisms. It may also require
additional support for new types of translation.
o Some solutions have a need to modify results obtained from DNS.
This may have an impact on DNS security, as discussed in
[<a href="./rfc4966" title=""Reasons to Move the Network Address Translator - Protocol Translator (NAT-PT) to Historic Status"">RFC4966</a>]. Minimization or even elimination of such problems is
essential, as discussed in [<a href="./rfc6147" title=""DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers"">RFC6147</a>].
o Tunneling solutions have their own security issues, for instance
the need to secure tunnel endpoint discovery or to avoid opening
up denial-of-service or reflection vulnerabilities [<a href="./rfc6169" title=""Security Concerns with IP Tunneling"">RFC6169</a>].
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Conclusions</span>
The authors believe that the scenarios outlined in this document are
among the top of the list of those that should be addressed by the
IETF community in short order. For each scenario, there are clearly
different solution approaches with implementation, operations, and
deployment tradeoffs. Further, some approaches rely on existing or
well-understood technology, while some require new protocols and
changes to established network architecture. It is essential that
these tradeoffs be considered, understood by the community at large,
and in the end well-documented as part of the solution design.
After writing the initial version of this document, the Softwire
working group was rechartered to address the <a href="#section-2.2">Section 2.2</a> scenario
with a combination of existing tools (tunneling, IPv4 NATs) and some
minor new ones (DHCP options) [<a href="#ref-DUAL-STACK-LITE">DUAL-STACK-LITE</a>]. Similarly, the
Behave working group was rechartered to address scenarios from
Sections <a href="#section-2.3">2.3</a>, <a href="#section-2.4">2.4</a>, and <a href="#section-2.5">2.5</a>. At the time this document is being
published, proposals to address scenarios from <a href="#section-2.1">Section 2.1</a> are still
under consideration for new IETF work items.
This document set out to list scenarios that are important for the
Internet community. While it introduces some design elements in
order to understand and discuss tradeoffs, it does not list detailed
requirements. In large part, the authors believe that exhaustive and
detailed requirements would not be helpful at the expense of
<span class="grey">Arkko & Townsley Informational [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
embarking on solutions, given our current state of affairs. We do
not expect any of the solutions to be perfect when measured from all
vantage points. When looking for opportunities to deploy IPv6,
reaching too far for perfection could result in losing these
opportunities if we are not attentive. Our goal with this document
is to support the development of tools to help minimize the tangible
problems that we are experiencing now, as well as those problems that
we can best anticipate down the road, in hopes of steering the
Internet on its best course from here.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. References</span>
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. Normative References</span>
[<a id="ref-RFC1918">RFC1918</a>] Rekhter, Y., Moskowitz, R., Karrenberg, D., de Groot, G.,
and E. Lear, "Address Allocation for Private Internets",
<a href="https://www.rfc-editor.org/bcp/bcp5">BCP 5</a>, <a href="./rfc1918">RFC 1918</a>, February 1996.
[<a id="ref-RFC4213">RFC4213</a>] Nordmark, E. and R. Gilligan, "Basic Transition Mechanisms
for IPv6 Hosts and Routers", <a href="./rfc4213">RFC 4213</a>, October 2005.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. Informative References</span>
[<a id="ref-RFC2766">RFC2766</a>] Tsirtsis, G. and P. Srisuresh, "Network Address
Translation - Protocol Translation (NAT-PT)", <a href="./rfc2766">RFC 2766</a>,
February 2000.
[<a id="ref-RFC4380">RFC4380</a>] Huitema, C., "Teredo: Tunneling IPv6 over UDP through
Network Address Translations (NATs)", <a href="./rfc4380">RFC 4380</a>,
February 2006.
[<a id="ref-RFC4925">RFC4925</a>] Li, X., Dawkins, S., Ward, D., and A. Durand, "Softwire
Problem Statement", <a href="./rfc4925">RFC 4925</a>, July 2007.
[<a id="ref-RFC4966">RFC4966</a>] Aoun, C. and E. Davies, "Reasons to Move the Network
Address Translator - Protocol Translator (NAT-PT) to
Historic Status", <a href="./rfc4966">RFC 4966</a>, July 2007.
[<a id="ref-RFC6052">RFC6052</a>] Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X.
Li, "IPv6 Addressing of IPv4/IPv6 Translators", <a href="./rfc6052">RFC 6052</a>,
October 2010.
[<a id="ref-NAT-PT">NAT-PT</a>] Wing, D., Ward, D., and A. Durand, "A Comparison of
Proposals to Replace NAT-PT", Work in Progress,
September 2008.
<span class="grey">Arkko & Townsley Informational [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
[<a id="ref-DUAL-STACK-LITE">DUAL-STACK-LITE</a>]
Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Dual-
Stack Lite Broadband Deployments Following IPv4
Exhaustion", Work in Progress, May 2011.
[<a id="ref-RFC6144">RFC6144</a>] Baker, F., Li, X., Bao, C., and K. Yin, "Framework for
IPv4/IPv6 Translation", <a href="./rfc6144">RFC 6144</a>, April 2011.
[<a id="ref-RFC6145">RFC6145</a>] Li, X., Bao, C., and F. Baker, "IP/ICMP Translation
Algorithm", <a href="./rfc6145">RFC 6145</a>, April 2011.
[<a id="ref-RFC6146">RFC6146</a>] Bagnulo, M., Matthews, P., and I. van Beijnum, "Stateful
NAT64: Network Address and Protocol Translation from IPv6
Clients to IPv4 Servers", <a href="./rfc6146">RFC 6146</a>, April 2011.
[<a id="ref-RFC6147">RFC6147</a>] Bagnulo, M., Sullivan, A., Matthews, P., and I. van
Beijnum, "DNS64: DNS Extensions for Network Address
Translation from IPv6 Clients to IPv4 Servers", <a href="./rfc6147">RFC 6147</a>,
April 2011.
[<a id="ref-INTAREA-TUNNELS">INTAREA-TUNNELS</a>]
Touch, J. and M. Townsley, "Tunnels in the Internet
Architecture", Work in Progress, March 2010.
[<a id="ref-v6OPS-APBP">v6OPS-APBP</a>]
Despres, R., "A Scalable IPv4-IPv6 Transition Architecture
Need for an Address-Port-Borrowing-Protocol (APBP)", Work
in Progress, July 2008.
[<a id="ref-HUSTON-IPv4">HUSTON-IPv4</a>]
Huston, G., "IPv4 Address Report", available
at <a href="http://www.potaroo.net">http://www.potaroo.net</a>, December 2010.
[<a id="ref-NISHITANI-CGN">NISHITANI-CGN</a>]
Perreault, S., Ed., Yamagata, I., Miyakawa, S., Nakagawa,
A., and H. Ashida, "Common Requirements for IP Address
Sharing Schemes", Work in Progress, March 2011.
[<a id="ref-ISP-SHARED-ADDR">ISP-SHARED-ADDR</a>]
Yamagata, I., Miyakawa, S., Nakagawa, A., Yamaguchi, J.,
and H. Ashida, "ISP Shared Address", Work in Progress,
September 2010.
<span class="grey">Arkko & Townsley Informational [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
[<a id="ref-IPv4-SPACE-ISSUES">IPv4-SPACE-ISSUES</a>]
Azinger, M. and L. Vegoda, "Issues Associated with
Designating Additional Private IPv4 Address Space", Work
in Progress, January 2011.
[<a id="ref-RFC6169">RFC6169</a>] Krishnan, S., Thaler, D., and J. Hoagland, "Security
Concerns with IP Tunneling", <a href="./rfc6169">RFC 6169</a>, April 2011.
<span class="grey">Arkko & Townsley Informational [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc6127">RFC 6127</a> IPv4 and IPv6 Co-Existence May 2011</span>
<span class="h2"><a class="selflink" id="appendix-A" href="#appendix-A">Appendix A</a>. Acknowledgments</span>
Discussions with a number of people including Dave Thaler, Thomas
Narten, Marcelo Bagnulo, Fred Baker, Remi Despres, Lorenzo Colitti,
Dan Wing, and Brian Carpenter, and feedback during the Internet Area
open meeting at IETF 72, were essential to the creation of the
content in this document.
Authors' Addresses
Jari Arkko
Ericsson
Jorvas 02420
Finland
EMail: jari.arkko@piuha.net
Mark Townsley
Cisco
Paris 75006
France
EMail: townsley@cisco.com
Arkko & Townsley Informational [Page 20]
</pre>
|