v6ops J. Palet Martinez
Internet-Draft The IPv6 Company
Intended status: Informational A. D'Egidio
Expires: December 22, 2019 Telecentro
June 20, 2019

464XLAT Optimization
draft-palet-v6ops-464xlat-opt-cdn-caches-02

Abstract

This document proposes possible solutions to avoid certain drawbacks of IP/ICMP Translation Algorithm (SIIT) when the destinations are available with IPv6. When SIIT is used as a NAT46 and IPv4-only devices or applications initiate traffic flows to dual-stack CDNs (Content Delivery Networks), Caches or other network resources (in the operator network or Internet), those flows will be translated back to IPv4 by a NAT64. This is the case for 464XLAT and MAP-T.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on December 22, 2019.

Copyright Notice

Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.


Table of Contents

1. Introduction

Different transition mechanisms, typically in the group of the so-called IPv6-only with IPv4aaS (IPv4-as-a-Service), such as 464XLAT ([RFC6877]) or MAP-T ([RFC7599]), allow IPv4-only devices or applications to connect with IPv4 services in Internet, by means of a NAT46 SIIT (IP/ICMP Translation Algorithm) as described by [RFC7915].

This is done by the implementation of SIIT at the CE (Customer Edge) Router or sometimes at the end-device, for example, the UE (User Equipment) in cellular networks. This functionality is the CLAT (Customer Translator) in the case of 464XLAT.

The NAT46/CLAT (WAN side) is connected by IPv6-only to the operator network, which in turn, will have a reverse function, the NAT64 ([RFC6146]), known as PLAT (Provider Translator) in the case of 464XLAT. This allows to translate the IPv6-only flow back to IPv4, in order to forward it to Internet.

The translation of the packet headers is done using the IP/ICMP translation algorithm defined in [RFC7915] and algorithmically translating the IPv4 addresses to IPv6 addresses following [RFC6052].

In the case of 464XLAT, a DNS64 ([RFC6147]) optionally is in charge of the synthesis of AAAA records from the A records, so they can use a NAT64, without the need of doing a double-translation by means of the CLAT. However, the DNS64 is not useful for the IPv4-only devices or applications in the LANs, as they will not be able to use the AAAA records.

A typical 464XLAT deployment is depicted in Figure 1.

               +-------+     .-----.                     .-----.
               | IPv6  |    /       \                   /       \
   .-----.     |  CE   |   /  IPv6-  \     .-----.     /  IPv4   \
  /       \    |  or   +--(   only    )---( NAT64 )---(  Internet )
 /  LAN's  \   |  UE   |   \  Access /\    `-----´     \         /
(   Dual-   )--+       |    \       /  \                \       /
 \  Stack  /   | with  |     `--+--´    \   .-----.      `-----´
  \       /    | NAT46 |        |        \ /       \
   `-----´     | CLAT  |    +---+----+    /  IPv6   \ 
               |       |    |  DNS/  |   (  Internet )
               +-------+    |  DNS64 |    \         /
                            +--------+     \       /
                                            `-----´
            

Figure 1: Typical 464XLAT Deployment

As it can be observed in the preceding picture, the situation is the same, regardless of in case of a wired network with a CE Router or a cellular network where a UE is connecting other devices (which may be IPv4-only or have IPv4-only apps), by means of a tethering functionality.

If the operator is providing direct access to Content Delivery Networks (CDNs), caches, or other resources, and they are dual-stacked, the situation can be described as shown in Figure 2.

               +-------+     .-----.                     .-----.
               | IPv6  |    /       \                   /       \
   .-----.     |  CE   |   /  IPv6-  \     .-----.     /  IPv4   \
  /       \    |  or   +--(   only    )---( NAT64 )---(  Internet )
 /  LAN's  \   |  UE   |   \  Access /\    `-----´     \         /
(   Dual-   )--+       |    \       /  \                \       /
 \  Stack  /   | with  |     `--+--´    \   .-----.      `--+--´
  \       /    | NAT46 |        |        \ /       \         \
   `-----´     | CLAT  |    +---+----+    /  IPv6   \      .--+--.
               |       |    |  DNS/  |   (  Internet )    / Dual- \
               +-------+    |  DNS64 |    \         /----/  Stack  \
                            +--------+     \       /    (           )
                                            `-----´      \  CDNs/  /
                                                          \ Caches/
                                                           `-----´
            

Figure 2: Typical 464XLAT Deployment with CDNs/Caches

2. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

3. Problem Statement

If the devices or applications in the customer LAN are IPv6-capable, then the access to the CDNs, caches or other resources, will be made in an optimized way, by means of IPv6-only, not using the NAT64, as depicted in Figure 3.

               +-------+     .-----.                     .-----.
               | IPv6  |    /       \                   /       \
   .-----.     |  CE   |   /  IPv6-  \     .-----.     /  IPv4   \
  /       \    |  or   +--(   only    )---( NAT64 )---(  Internet )
 /  IPv6   \   |  UE   |   \  Access /\    `-----´     \         /
( capable   )--+       |    \       /  \                \       /
 \  apps   /   | with  |     `--+--´    \   .-----.      `--+--´
  \       /    | NAT46 |        |        \ /       \
   `-----´     | CLAT  |    +---+----+    /  IPv6   \      .--+--.
               |       |    |  DNS/  |   (  Internet )IPv6/ Dual- \
               +-------+    |  DNS64 |    \         /----/  Stack  \
                            +--------+     \       /    (           )
                                            `-----´      \  CDNs/  /
                                                          \ Caches/
                                                           `-----´
<---------------------- end-to-end IPv6 flow ---------------------->
            

Figure 3: 464XLAT access to CDNs/Caches by IPv6-capable apps

However, if the devices or applications are IPv4-only, for example, most of the SmartTVs and Set-Top-Boxes available today, a non-optimal double translation will occur (NAT46 at the CLAT and NAT64 at the PLAT), as illustrated in Figure 4.

               +-------+     .-----.                     .-----.
               | IPv6  |    /       \                   /       \
   .-----.     |  CE   |   /  IPv6-  \     .-----.     /  IPv4   \
  / IPv4- \    |  or   +--(   only    )---( NAT64 )---(  Internet )
 /  only   \   |  UE   |   \  Access /\    `-----´     \         /
(  SmartTV  )--+       |    \       /  \                \       /
 \   STB   /   | with  |     `--+--´    \   .-----.      `--+--´
  \ VoIP  /    | NAT46 |        |        \ /       \         \ IPv4
   `-----´     | CLAT  |    +---+----+    /  IPv6   \      .--+--.
               |       |    |  DNS/  |   (  Internet )    / Dual- \
               +-------+    |  DNS64 |    \         /    /  Stack  \
                            +--------+     \       /    (           )
                                            `-----´      \  CDNs/  /
                                                          \ Caches/
                                                           `-----´
<-------------------- IPv4 to IPv6 to IPv4 flow -------------------->
            

Figure 4: 464XLAT access to CDNs/Caches by IPv4-only apps

Clearly, this is a non-optimal situation, as it means that even if there is a dual-stack service, the NAT46/CLAT translated IPv4 to IPv6 traffic flow, is unnecessarily translated back to IPv4, traversing the stateful NAT64. This has a direct impact in the need to scale the NAT64 beyond what will be actually needed if possible solutions, in order to keep using the IPv6 path towards those services, are considered.

As shown in the Figure 4, this is also the case for many other services, not just CDNs or caches, such as VoIP access to the relevant operator infrastructure, which may be also dual-stack. This is true as well for many other dual-stack services, which may be directly reachable from the operator infrastructure, even if not part of it, for example peering agreements, services in IXs, etc. In general, this will become a more frequent situation for many other services, which are not yet dual-stack.

For simplicity, across the rest of this document, references to CDNs/caches, should be understood, unless otherwise stated, as any dual-stacked resources.

This document looks into different possible solution approaches in order to optimize the IPv4-only SIIT translation providing a direct path to IPv6-capable services, as depicted in Figure 5.

               +-------+     .-----.                     .-----.
               | IPv6  |    /       \                   /       \
   .-----.     |  CE   |   /  IPv6-  \     .-----.     /  IPv4   \
  / IPv4- \    |  or   +--(   only    )---( NAT64 )---(  Internet )
 /  only   \   |  UE   |   \  Access /\    `-----´     \         /
(  SmartTV  )--+       |    \       /  \                \       /
 \   STB   /   | with  |     `--+--´    \   .-----.      `--+--´
  \ VoIP  /    | NAT46 |        |        \ /       \
   `-----´     | CLAT  |    +---+----+    /  IPv6   \      .--+--.
               |       |    |  DNS/  |   (  Internet )IPv6/ Dual- \
               +-------+    |  DNS64 |    \         /----/  Stack  \
                            +--------+     \       /    (           )
                                            `-----´      \  CDNs/  /
                                                          \ Caches/
                                                           `-----´
<------------------------ IPv4 to IPv6 flow ------------------------>
            

Figure 5: Optimized 464XLAT access to CDNs/Caches by IPv4-only apps

4. Solution Approaches

4.1. Approach 1: DNS/Routing-based Solution

Because the IPv4-only devices will not be able to query for AAAA records, the NAT46/CLAT/CE will translate the IPv4 addresses from the A record for the CDN/cache destination, using the WKP or NSP, as configured by the operator.

If the CDN/cache provider is able to configure, in the relevant interfaces of the CDN/caches, the same IPv6 addresses that will naturally result as the translated destination addresses for the queried A records, preceded by the WKP or NSP, then having more specific routing prefixes, will result in traffic to those destinations being directly forwarded towards those interfaces, instead of needing to traverse the NAT64.

For example, let's suppose a provider using the WKP (64:ff9b::/96) and a SmartTV querying for www.example.com:

www.example.com                   A       192.0.2.1
NAT46/CLAT translated to                  64:ff9b::192.0.2.1
CDN IPv6 interface must be                64:ff9b::192.0.2.1
Operator must have a specific route to    64:ff9b::192.0.2.1

Note: Examples using text representation as per Section 2.3 of [RFC6052].

Because the WKP is non-routable, this solution will only be possible if the CDN/cache is in the same ASN as the provider network, or somehow interconnected without routing thru Internet.

This solution has the additional drawback of the operational complexity/issues added to the operation of the CDN/cache, and the need to synchronize any IPv4 interface address changes with the relevant IPv6 ones, and possibly with routing.

4.2. Approach 2: NAT46/CLAT/DNS-proxy-EAM-based Solution

If the NAT46/CLAT/CE, as commonly is the case, is also a DNS proxy/stub resolver, it is possible to modify the behavior and create an "internal" interaction among both of them.

The assumption is that, typically a dual-stack device will prefer using IPv6 as the DNS transport. So, when there is a DNS query, transported with IPv4, for an A record, and there is not a query for the AAAA record from the same IPv4 source (to the same destination), the DNS proxy/stub resolver can infer that it is an IPv4-only device or application.

Note that if the detection of the IPv4-only device or application is done incorrectly (either not detecting it or by a false detection), no harm is caused, as in the worst case, optimization will not be performed (at least at the time being, it may be performed later on).

In the case of an IPv4-only detected device or application, the DNS proxy/stub resolver can actually perform an additional AAAA query, unless the information is already present in the Additional Section, as per Section 3 of [RFC3596]. If the response doesn’t contain the WKP or NSP, it means that the destination is IPv6-capable, so the NAT46/CLAT can create/update an entry for an Explicit Address Mapping [RFC7757].

This way, an EAM Table (EAMT used for short, across the rest of this document) is maintained automatically by the DNS proxy/stub resolver in the NAT46/CLAT, and the NAT46/CLAT is responsible to prioritize any available entries in the EAMT, versus the use of the synthetic AAAA.

In order to create the EAMT entry, to determine if there is an AAAA record after an A record query, it is suggested to use the same delay value (50 milliseconds) as the "Resolution Delay" indicated by Happy Eyeballs [RFC8305]. This avoids a slight NAT64 overload and changing destination addresses which may impact some applications, at the cost of a small extra delay for each initial communication, when the EAMT entry doesn't yet exist.

Following this approach, the IPv6-native path will take precedence and traffic will not be forwarded to the NAT64.

Using the same example as in the previous section:

www.example.com                   A       192.0.2.1
                                  AAAA    2001:db8::a:b:c:d
EAMT entry                     192.0.2.1  2001:db8::a:b:c:d
NAT46/CLAT translated to                  2001:db8::a:b:c:d
CDN IPv6 interface already is             2001:db8::a:b:c:d
Operator already has a specific route to  2001:db8::a:b:c:d

This approach uses the existing IPv4 and IPv6 addresses in the A and AAAA records, respectively, so no additional complexity/issues added to the CDN/caches operations.

The information in the EAMT MUST be kept timely-synchronized with the AAAA records TTL's. In order to achieve that, each EAMT entry MUST update with each A query, the TTL of the relevant AAAA record. Update of RFC7757 ? TBD.

The EAMT entries MUST expire on the AAAA TTL expiry.

If multiple A and/or AAAA records are available, the DNS proxy/stub resolver MUST follow existing procedures to choose each one. In other words, the chosen pair of A/AAAA records doesn't present any different result compared with a situation when this mechanism is not used.

This mechanism performs the same in both cases, if a DNS64 is used or if it is not used. This is explained because the mechanism is only relevant for destinations which don't have AAAA records, and in those cases DNS64 is not relevant.

If a dual-stack host is issuing the A query using IPv4 transport, and the AAAA query using IPv6 transport, or using different IPv4 addresses for the A and AAAA queries, the EAMT will be created even if may not be used, because the device should prefer IPv6. If the host is preferring IPv4 for connecting the CDN/cache, it will be actually using the NAT46/CLAT and then IPv6, so the mechanism will be correcting an undesirable behavior. This is a special case, which actually seems to be an incoherent host or application implementation.

Happy Eyeballs [RFC8305] is not affected by this mechanism because both, the A and the AAAA queries should be issued by the host as soon after one another as possible. Furthermore, Happy Eyeballs is only present in dual-stack hosts. However, if the same NAT46/CLAT/CE is serving IPv4-only hosts and dual-stack hosts and both of them are using the same destinations, an EAMT entry will be created for that destination. Consequently, a Happy Eyeballs fallback to IPv4 will actually be using the relevant EAMT entry IPv6 destination. This has the disadvantage that the IPv4-IPv6-IPv4 translation path can't be used by Happy Eyeballs-enabled applications. However, this is actually a good thing in the sense that an operator is interested in knowing as soon as possible, if its IPv6-only network is not performing correctly, because that means also IPv4 will not be working. If the issue is related to extra IPv6 delay versus the IPv4 delay, Happy Eyeballs will not be able to offer a significative advantage here, but it looks like an acceptable trade-off.

In the case the DNS is modified, or some devices or applications use other DNS servers, the possible scenarios and the implications are:

  1. Devices configured to use a DNS proxy/resolver which is not the CE/NAT46/CLAT. In this case this optimization will not work, because the EAMT entry will not be created based on their own flows. Nevertheless, the EAMT entry may be created by other devices using the same destinations. However, the lack of EAMT entry, will not impact negatively in the user’s devices/applications (the optimization is not performed). It should be noticed that users commonly, don't change the configuration of devices such as SmartTVs or STBs (if they do, some other functionalities, such as CDN/caches optimizations may not work as well), so this only happens typically if the vendor is doing it on-purpose and for good well-known reasons.
  2. DNS privacy/encryption. Hosts or applications that use mechanisms for DNS privacy/encryption, such as DoT ([RFC7858], [RFC8094]), DoH ([RFC8484]) or DoQ ([I-D.huitema-quic-dnsoquic]), will not make use of the stub/proxy resolver, so the same considerations as for the previous case apply.
  3. Users that modify the DNS in their Operating Systems. This is quite frequent, however commonly Operating Systems are dual-stack, so aren't part of the problem statement described by this document and will not be adversely affected.
  4. Users that modify the DNS in the CE. This is less common. In this case, this optimization is not adversely affected, because it doesn't depend on the operator DNS, it works only based on the internal CE interaction between the NAT46/CLAT and the stub/proxy resolver. Note that it may be affected if the operator offers different "DNS views" or "split DNS", however this is not related to this optimization and will anyway impact in the other possible operator optimizations.
  5. Combinations of the above ones. No further impact, than the one already described, is observed.

4.3. Approach 3: NAT46/CLAT-provider-EAM-based Solution

Instead of using the DNS proxy/stub resolver to create the EAMT entries, the operator may push this table (or parts of it) into the CE/NAT46/CLAT, by using configuration/management mechanisms.

This solution has the advantage of not being affected by any DNS changes from the user (the EAMT is created by the operator) and ensures a complete control from the operator. However, it may impact the cases of devices with a DNS configured by the vendor.

In general, most of the considerations from the previous approach will apply.

One more advantage of this solution is that the EAMT pairs doesn't need to match the "real" IPv4/IPv6 addresses available in the A/AAAA records, as shown in the next example.

www.example.com                   A       192.0.2.1
                                  AAAA    2001:db8::a:b:c:d
EAMT pulled/pushed entry       192.0.2.1  2001:db8::f:e:d:c
NAT46/CLAT translated to                  2001:db8::f:e:d:c
CDN IPv6 interface already is             2001:db8::f:e:d:c
Operator already has a specific route to  2001:db8::f:e:d:c

EAMT may contain TTLs which probably are derived from DNS ones, or alternatively, a global TTL for the full table.

An alternative way to configure the table, is that the CE is actually pulling the table (or parts of it) from the operator infrastructure. In this case it will be mandatory that the entries have individual TTLs, again probably derived from the DNS ones.

The major drawback of this approach is that it requires a new protocol, or an extension to existing ones, in order to push or pull the EAMT, in addition to the possible impact in terms of bandwidth each time the CEs reboot, or an EAMT must be pushed to all the CEs, etc.

5. IPv6-only Services become accessible to IPv4-only devices/apps

One of the issues with the IPv6 deployment, is that those services which become IPv6-only in Internet, aren't reachable by IPv4-only devices and applications. This means that new content providers must support dual-stack even for new services, even while IPv4 public addresses aren't available.

If NAT46/CLAT/DNS-proxy-EAM approach (Section 4.2) is chosen, it can be complemented to resolve this issue, by means of making sure that IPv6-only destinations have one A resource record (even an invalid one), despite they aren't actually connected to IPv4. This will mean that those services will work fine if there is a NAT46/CLAT, and will have no impact if that one doesn't exist, not a different situation than not having an A resource record.

In fact, it may become an incentive for the IPv6 deployment in Internet services and provides the option to use an IPv4 address (maybe anycast) for the "non-valid" A resource record, that points to a "universal" web page (maybe hosted by IETF?) that displays a warning such as "Sorry, you don't IPv6 support in your operator, so this service is not available for you".

6. Conclusions

NAT46/CLAT/DNS-proxy-EAM approach (Section 4.2) seems the right solution for optimizing the access to dual-stack services, whether they are located inside or outside the ISP.

Having this type of optimization facilitates and increases the usage of IPv6, even for IPv4-only devices and applications, at the same time that decreases the use of the NAT64.

SIIT already has a SHOULD for EAM support. TBD. 464XLAT may be updated by this document so the CLAT has a MUST for EAM support.

TBD. Should we recommend having A “null” records for IPv6-only services in Internet? A web page IPv4-only hosted by IETF(?) showing “sorry this web page/service is only available from IPv6 enabled operators”?.

TBD. Other risks to consider ? If a CE is misconfigured, even a small percentage of broken CEs may bring the content providers to switch back to IPv4-only. So possible failure cases need to be carefully considered for every possible solution approach.

TBD. Should a way to manually exclude EAMT entries be considered? May be a manual config in the CPE and by means of operator config. This is way-out to ensure nothing is broken by surprise and is not solvable.

7. Security Considerations

This document does not have any new specific security considerations. TBD.

8. IANA Considerations

This document does not have any new specific IANA considerations.

9. Acknowledgements

The authors would like to acknowledge the inputs of Erik Nygren, Fred Baker and TBD ...

10. References

10.1. Normative References

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997.
[RFC3596] Thomson, S., Huitema, C., Ksinant, V. and M. Souissi, "DNS Extensions to Support IP Version 6", STD 88, RFC 3596, DOI 10.17487/RFC3596, October 2003.
[RFC6052] Bao, C., Huitema, C., Bagnulo, M., Boucadair, M. and X. Li, "IPv6 Addressing of IPv4/IPv6 Translators", RFC 6052, DOI 10.17487/RFC6052, October 2010.
[RFC6146] Bagnulo, M., Matthews, P. and I. van Beijnum, "Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers", RFC 6146, DOI 10.17487/RFC6146, April 2011.
[RFC6147] Bagnulo, M., Sullivan, A., Matthews, P. and I. van Beijnum, "DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers", RFC 6147, DOI 10.17487/RFC6147, April 2011.
[RFC6877] Mawatari, M., Kawashima, M. and C. Byrne, "464XLAT: Combination of Stateful and Stateless Translation", RFC 6877, DOI 10.17487/RFC6877, April 2013.
[RFC7599] Li, X., Bao, C., Dec, W., Troan, O., Matsushima, S. and T. Murakami, "Mapping of Address and Port using Translation (MAP-T)", RFC 7599, DOI 10.17487/RFC7599, July 2015.
[RFC7757] Anderson, T. and A. Leiva Popper, "Explicit Address Mappings for Stateless IP/ICMP Translation", RFC 7757, DOI 10.17487/RFC7757, February 2016.
[RFC7915] Bao, C., Li, X., Baker, F., Anderson, T. and F. Gont, "IP/ICMP Translation Algorithm", RFC 7915, DOI 10.17487/RFC7915, June 2016.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017.
[RFC8305] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2: Better Connectivity Using Concurrency", RFC 8305, DOI 10.17487/RFC8305, December 2017.

10.2. Informative References

[I-D.huitema-quic-dnsoquic] Huitema, C., Shore, M., Mankin, A., Dickinson, S. and J. Iyengar, "Specification of DNS over Dedicated QUIC Connections", Internet-Draft draft-huitema-quic-dnsoquic-06, March 2019.
[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D. and P. Hoffman, "Specification for DNS over Transport Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May 2016.
[RFC8094] Reddy, T., Wing, D. and P. Patil, "DNS over Datagram Transport Layer Security (DTLS)", RFC 8094, DOI 10.17487/RFC8094, February 2017.
[RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018.

Authors' Addresses

Jordi Palet Martinez The IPv6 Company Molino de la Navata, 75 La Navata - Galapagar, Madrid 28420 Spain EMail: jordi.palet@theipv6company.com URI: http://www.theipv6company.com/
Alejandro D'Egidio Telecentro Argentina EMail: adegidio@telecentro.net.ar