One document matched: draft-ietf-pcp-base-13.xml


<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-ietf-pcp-base-13" ipr="trust200902">
  <front>
    <title abbrev="Port Control Protocol (PCP)">Port Control Protocol
    (PCP)</title>

    <author fullname="Dan Wing" initials="D." role="editor" surname="Wing">
      <organization abbrev="Cisco">Cisco Systems, Inc.</organization>

      <address>
        <postal>
          <street>170 West Tasman Drive</street>

          <city>San Jose</city>

          <region>California</region>

          <code>95134</code>

          <country>USA</country>
        </postal>

        <email>dwing@cisco.com</email>
      </address>
    </author>

    <author fullname="Stuart Cheshire" initials="S." surname="Cheshire">
      <organization abbrev="Apple">Apple Inc.</organization>

      <address>
        <postal>
          <street>1 Infinite Loop</street>

          <city>Cupertino</city>

          <region>California</region>

          <code>95014</code>

          <country>USA</country>
        </postal>

        <phone>+1 408 974 3207</phone>

        <email>cheshire@apple.com</email>
      </address>
    </author>

    <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
      <organization>France Telecom</organization>

      <address>
        <postal>
          <street></street>

          <city>Rennes</city>

          <region></region>

          <code>35000</code>

          <country>France</country>
        </postal>

        <email>mohamed.boucadair@orange-ftgroup.com</email>
      </address>
    </author>

    <author fullname="Reinaldo Penno" initials="R." surname="Penno">
      <organization>Juniper Networks</organization>

      <address>
        <postal>
          <street>1194 N Mathilda Avenue</street>

          <city>Sunnyvale</city>

          <region>California</region>

          <code>94089</code>

          <country>USA</country>
        </postal>

        <email>rpenno@juniper.net</email>
      </address>
    </author>

    <author fullname="Paul Selkirk" initials="P." surname="Selkirk">
      <organization>Internet Systems Consortium</organization>

      <address>
        <postal>
          <street>950 Charter Street</street>

          <city>Redwood City</city>

          <region>California</region>

          <code>94063</code>

          <country>USA</country>
        </postal>

        <email>pselkirk@isc.org</email>
      </address>
    </author>

    <date />

    <workgroup>PCP working group</workgroup>

    <abstract>
      <t>The Port Control Protocol allows an IPv6 or IPv4 host to control how
      incoming IPv6 or IPv4 packets are translated and forwarded by a network
      address translator (NAT) or simple firewall, and also allows a host to
      optimize its outgoing NAT keepalive messages.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="introduction" title="Introduction">
      <t>The Port Control Protocol (PCP) provides a mechanism to control how
      incoming packets are forwarded by upstream devices such as NAT64, NAT44,
      and firewall devices, and a mechanism to reduce application keepalive
      traffic. PCP is primarily designed to be implemented in the context of
      both Carrier-Grade NATs (CGN) and small NATs (e.g., residential NATs).
      PCP allows hosts to operate servers for a long time (e.g., a webcam) or
      a short time (e.g., while playing a game or on a phone call) when behind
      a NAT device, including when behind a CGN operated by their Internet
      service provider.</t>

      <t>PCP allows applications to create mappings from an external IP
      address and port to an internal IP address and port. These mappings are
      required for successful inbound communications destined to machines
      located behind a NAT or a firewall.</t>

      <t>After creating a mapping for incoming connections, it is necessary to
      inform remote computers about the IP address and port for the incoming
      connection. This is usually done in an application-specific manner. For
      example, a computer game might use a rendezvous server specific to that
      game (or specific to that game developer), a SIP phone would use a SIP
      proxy, and a client using DNS-Based Service Discovery <xref
      target="DNS-SD"></xref> would use DNS Update <xref
      target="RFC2136"></xref> <xref target="RFC3007"></xref>. PCP does not
      provide this rendezvous function. The rendezvous function will support
      IPv4, IPv6, or both. Depending on that support and the application's
      support of IPv4 or IPv6, the PCP client will need an IPv4 mapping, an
      IPv6 mapping, or both.</t>

      <t>Many NAT-friendly applications send frequent application-level
      messages to ensure their session will not be timed out by a NAT. These
      are commonly called "NAT keepalive" messages, even though they are not
      sent to the NAT itself (rather, they are sent 'through' the NAT). These
      applications can reduce the frequency of those NAT keepalive messages by
      using PCP to learn (and influence) the NAT mapping lifetime. This helps
      reduce bandwidth on the subscriber's access network, traffic to the
      server, and battery consumption on mobile devices.</t>

      <t>Many NATs and firewalls have included application layer gateways
      (ALGs) to create mappings for applications that establish additional
      streams or accept incoming connections. ALGs incorporated into NATs may
      also modify the application payload. Industry experience has shown that
      these ALGs are detrimental to protocol evolution. PCP allows an
      application to create its own mappings in NATs and firewalls, reducing
      the incentive to deploy ALGs in NATs and firewalls.</t>
    </section>

    <section title="Scope">
      <section title="Deployment Scenarios">
        <t>PCP can be used in various deployment scenarios, including:<list
            style="symbols">
            <t><xref target="RFC3022">Basic NAT</xref></t>

            <t><xref target="RFC3022">Network Address and Port
            Translation</xref>, such as commonly deployed in residential NAT
            devices</t>

            <t><xref target="I-D.ietf-behave-lsn-requirements">Carrier-Grade
            NAT</xref></t>

            <t><xref target="I-D.ietf-softwire-dual-stack-lite">Dual-Stack
            Lite (DS-Lite)</xref></t>

            <t><xref target="I-D.miles-behave-l2nat">Layer-2 aware
            NAT</xref></t>

            <t><xref target="I-D.arkko-dual-stack-extra-lite">Dual-Stack Extra
            Lite</xref></t>

            <t>NAT64, both <xref target="RFC6145">Stateless</xref> and <xref
            target="RFC6146">Stateful</xref></t>

            <t>IPv4 and <xref target="RFC6092">IPv6 simple firewall
            control</xref></t>
          </list></t>
      </section>

      <section title="Supported Protocols">
        <t>The PCP OpCodes defined in this document are designed to support
        transport-layer protocols that use a 16-bit port number (e.g., TCP,
        UDP, SCTP, DCCP). Protocols that do not use a port number (e.g., IPsec
        ESP) are beyond the scope of this document, as is using PCP to request
        forwarding of all traffic to a single default host (often nicknamed a
        "DMZ").</t>
      </section>

      <section anchor="single_homed"
               title="Single-homed Customer Premises Network">
        <t>PCP assumes a single-homed IP address model. That is, for a given
        IP address of a host, only one default route exists to reach the
        Internet. This is important because after a PCP mapping is created and
        an inbound packet (e.g., TCP SYN) arrives at the host, the outbound
        response (e.g., TCP SYNACK) has to go through the same path so it is
        seen by the firewall or rewritten by the NAT. This restriction exists
        because otherwise there would need to be a PCP-enabled NAT for every
        egress (because the host could not reliably determine which egress
        path packets would take) and the client would need to be able to
        reliably make the same internal/external mapping in every NAT gateway,
        which in general is not possible (because the other NATs might have
        the necessary port mapped to another host).</t>
      </section>
    </section>

    <section anchor="terminology" title="Terminology">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref
      target="RFC2119">"Key words for use in RFCs to Indicate Requirement
      Levels"</xref>.</t>

      <t><list style="hanging">
          <t hangText="Internal Host:"><vspace blankLines="0" />A host served
          by a NAT gateway, or protected by a firewall. This is the host that
          receives the incoming traffic resulting from a PCP MAP request, or
          the host that initiated an implicit dynamic mapping (e.g., by
          sending a TCP SYN) across a firewall or a NAT.</t>

          <t hangText="Remote Host:"><vspace blankLines="0" />A host with
          which an Internal Host is communicating. This can include another
          Internal Host (or even the same Internal Host); if a NAT is
          involved, the NAT would need to hairpin the traffic.</t>

          <t hangText="Internal Address:"><vspace blankLines="0" />The address
          of an Internal Host served by a NAT gateway or protected by a
          firewall.</t>

          <t hangText="External Address:"><vspace blankLines="0" />The address
          of an Internal Host as seen by other Remote Peers on the Internet
          with which the Internal Host is communicating, after translation by
          any NAT gateways on the path. An External Address is generally a
          public routable (i.e., non-private) address. In the case of an
          Internal Host protected by a pure firewall, with no address
          translation on the path, its External Address is the same as its
          Internal Address.</t>

          <t hangText="Remote Peer Address:"><vspace blankLines="0" />The
          address of a Remote Peer, as seen by the Internal Host. A Remote
          Address is generally a public routable address. In the case of a
          Remote Peer that is itself served by a NAT gateway, the Remote
          Address may in fact be the Remote Peer's External Address, but since
          this remote translation is generally invisible to software running
          on the Internal Host, the distinction can safely be ignored for the
          purposes of this document.</t>

          <t hangText="Third Party:"><vspace blankLines="0" />In the common
          case, an Internal Host manages its own Mappings using PCP requests,
          and the Internal Address of those Mappings is the same as the source
          IP address of the PCP request packet. <vspace blankLines="1" /> In
          the case where one device is managing Mappings on behalf of some
          other device that does not implement PCP, the presence of the
          THIRD_PARTY Option in the MAP request signifies that the specified
          address, not the source IP address of the PCP request packet, should
          be used as the Internal Address for the Mapping.</t>

          <t hangText="Mapping, Port Mapping, Port Forwarding:"><vspace
          blankLines="0" />A NAT mapping creates a relationship between an
          internal IP address, protocol, and port and an external IP address,
          protocol, and port. More specifically, it creates a translation rule
          where packets destined to the external IP and port are translated to
          the internal IP and port, and vice versa. In the case of a pure
          firewall, the "Mapping" is the identity function, translating an
          internal port number to the same external port number. Firewall
          filtering, applied to that identity function, is separate from the
          mapping itself.</t>

          <t hangText="Mapping Types:"><vspace blankLines="0" />There are
          three different ways to create mappings: implicit dynamic mappings,
          explicit dynamic mappings, and static mappings. Implicit dynamic
          mappings are created as a result of a TCP SYN or outgoing UDP
          packet, and allow Internal Hosts to receive replies to their
          outbound packets. Explicit dynamic mappings are created as a result
          of PCP requests. Static mappings are created by manual configuration
          (e.g., via command-line interface or web page). Explicit and static
          mappings allow Internal Hosts to receive inbound traffic that is not
          in direct response to any immediately preceding outbound
          communication (i.e., allow Internal Hosts to operate a "server" that
          is accessible to other hosts on the Internet). Both implicit and
          explicit dynamic mappings are dynamic in the sense that they are
          created on demand, as requested (implicitly or explicitly) by the
          Internal Host, and have a lifetime. After the lifetime, the mapping
          is deleted unless the lifetime is extended by action by the Internal
          Host (e.g., sending more traffic or sending a new PCP MAP request).
          Static mappings differ from dynamic mappings in that their lifetime
          is effectively infinite (they exist until manually removed) but
          otherwise they behave exactly the same as an explicit dynamic
          mapping with an infinite lifetime. For example, a PCP MAP request to
          create a mapping that already exists as a static mapping will return
          a successful result, confirming that the requested mapping
          exists.</t>

          <t hangText="PCP Client:"><vspace blankLines="0" />A PCP software
          instance responsible for issuing PCP requests to a PCP server.
          Several independent PCP Clients can exist on the same host (just as
          several independent web browsers can exist on the same host).
          Several PCP Clients can be located in the same local network. A PCP
          Client can issue PCP requests on behalf of a third party device for
          which it is authorized to do so. An interworking function from
          Universal Plug and Play Internet Gateway Device (UPnP IGD, <xref
          target="IGD"></xref>) to PCP is another example of a PCP Client. A
          PCP server in a NAT gateway that is itself a client of another NAT
          gateway (nested NAT) may itself act as a PCP client to the upstream
          NAT.</t>

          <t hangText="PCP Server:"><vspace blankLines="0" />A NAT or firewall
          that implements the server-side of the PCP protocol, via which PCP
          clients request and manage explicit mappings. Rather than repeatedly
          using the awkward phrase "PCP-capable NAT gateway or firewall" this
          document uses the more compact term "PCP Server", but it should be
          understood that a PCP Server is not an entity that exists in
          isolation; it is a capability of a NAT or firewall. See also <xref
          target="relationship"></xref>.</t>

          <t hangText="Interworking Function:"><vspace blankLines="0" />A
          functional element responsible for interworking another protocol
          with PCP. For example interworking between <xref target="IGD">UPnP
          IGD</xref> with PCP.</t>

          <t hangText="Subscriber:"><vspace blankLines="0" /> The unit of
          billing for a commercial ISP. A subscriber may have a single IP
          address from the commercial ISP (which can be shared among multiple
          hosts using a NAT gateway, thereby making them appear to be a single
          host to the ISP) or may have multiple IP addresses provided by the
          commercial ISP. In either case, the IP address or addresses provided
          by the ISP may themselves be further translated by a large-scale NAT
          operated by the ISP.</t>

          <!--
          <t hangText="host:"><vspace blankLines="0" />a device which can have
          packets sent to it, as a result of PCP operations. A host is not
          necessarily a PCP client.</t>
-->

          <t hangText="5-tuple"><vspace blankLines="0" />The 5 pieces of
          information that uniquely identify a flow at a given place and time:
          transport protocol, source IP address and port, destination IP
          address and port. When NAT is being used, addresses and ports for a
          given flow are rewritten as packets pass through the NAT, so for the
          same flow Internal Hosts see Internal Addresses, and Remote Peers
          see External Addresses. Most NATs configure their Internal Hosts via
          DHCP to have different Internal Addresses. Some NATs (such as
          DS-Lite) may allow multiple Internal Hosts to use the same Internal
          Address at the same time, so those NATs need to use additional
          information (such as on which IPv6 tunnel the packet arrived) when
          determining the correct translation to External Address and Port for
          a packet.</t>
        </list></t>

      <section title="Note on Fixed-Size Addresses">
        <t>For simplicity in building and parsing request and response
        packets, PCP always uses fixed-size 128-bit IP address fields
        for both IPv6 addresses and IPv4 addresses.</t>

        <t>When the address field holds an IPv6 address, the fixed-size
        128-bit IP address field holds the IPv6 address stored as-is.</t>

        <t>When the address field holds an IPv4
	  address, <xref target="RFC4291">IPv4-mapped IPv6
	  addresses</xref> are used (::FFFF/96).  This has the first
	  80 bits set to zero and the next 16 set to one, while its
	  last 32 bits are filled with the IPv4 address.  This is
	  unambiguously distinguishable from a legal IPv6 address,
	  because <xref target="RFC4291">IPv4-mapped IPv6
	  address</xref> are not used as either the source or
	  destination address of actual IPv6 packets.</t>

        <t>When checking for an IPv4-mapped IPv6 address, all of the
        first 96 bits MUST be checked for the pattern -- it is not 
        sufficient to check for 0xFF in bits 90-96.</t>

        <t>The all-zeroes IPv6 address is expressed by filling the
        fixed-size 128-bit IP address field with all zeroes.  The
        all-zeroes IPv4 address is expressed as: 80 bits of zeros, 16
        bits of ones, and 32 bits of zeros.</t>
      </section>
    </section>

    <?rfc needLines="15" ?>

    <section anchor="relationship"
             title="Relationship between PCP Server and its NAT/firewall">
      <t>The PCP server receives and responds to PCP requests. The PCP server
      functionality is typically a capability of a NAT or firewall device, as
      shown in <xref target="diagram_pcp_server"></xref>. It is also possible
      for the PCP functionality to be provided by some other device, which
      communicates with the actual NAT or firewall via some other proprietary
      mechanism, as long as from the PCP client's perspective such split
      operation is indistinguishable from the integrated case.</t>

      <figure anchor="diagram_pcp_server" title="PCP-Enabled NAT or Firewall">
        <artwork align="center"><![CDATA[
                         +-----------------+
+------------+           | NAT or firewall |
| PCP client |-<network>-+      with       +---<Internet>
+------------+           |    PCP server   |
                         +-----------------+]]></artwork>
      </figure>
    </section>

    <section title="Common Request and Response Header Format">
      <t>All PCP messages contain a request (or response) header containing an
      OpCode, any relevant OpCode-specific information, and zero or more
      Options. The packet layout for the common header, and operation of the
      PCP client and PCP server, are described in the following sections. The
      information in this section applies to all OpCodes. Behavior of the
      OpCodes defined in this document is described in <xref
      target="map_opcodes"></xref> and <xref
      target="peer_opcodes"></xref>.</t>

      <section title="Request Header">
        <figure align="left" anchor="common_request"
                title="Common Request Packet Format">
          <preamble>All requests have the following format:</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Version = 1  |R|   OpCode    | PCP Client's Port (16 bits)   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                 Requested Lifetime (32 bits)                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|              PCP Client's IP Address (always 128 bits)        |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
:                                                               :
:             (optional) OpCode-specific information            :
:                                                               :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
:                                                               :
:             (optional) PCP Options                            :
:                                                               :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t>These fields are described below:<list style="hanging">
            <t hangText="Version:">This document specifies protocol version 1.
            <xref target="I-D.cheshire-nat-pmp">NAT-PMP</xref>, a precursor to
            PCP, specified protocol version 0. Should later updates to this
            document specify different message formats with a version number
            greater than 1, the first two bytes of those new message formats
            will continue to contain the version number and OpCode as shown
            here, so that a PCP server receiving a message format newer or
            older than the version(s) it understands can still parse enough of
            the message to correctly identify the version number, and
            determine whether the problem is that this server is too old and
            needs to be updated to work with the PCP client, or whether the
            PCP client is too old and needs to be updated to work with this
            server.</t>

            <t hangText="R:">Indicates Request (0) or Response (1). All
            Requests MUST use 0.</t>

            <t hangText="OpCode:">A seven-bit value specifying the operation
            to be performed. Opcodes are defined in <xref
            target="map_opcodes"></xref> and <xref
            target="peer_opcodes"></xref>.</t>

            <t hangText="PCP Client's Port:">The source port in the UDP header
            used by the PCP client when sending this PCP request.</t>

            <t hangText="Requested Lifetime:">An unsigned 32-bit integer, in
            seconds, ranging from 0 to 4,294,967,295 seconds. This is used by
            the MAP and PEER OpCodes defined in this document for their
            requested lifetime. Future OpCodes which don't need this field
            MUST set the field to zero on transmission and ignore it on
            reception.</t>

            <t hangText="PCP Client's IP Address:">The source IPv4 or IPv6
            address in the IP header used by the PCP client when sending this
            PCP request.</t>
          </list></t>

     </section>

      <section title="Response Header">
        <figure align="left" anchor="common_response"
                title="Common Response Packet Format">
          <preamble>All responses have the following format:</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Version = 1  |R|   OpCode    |   Reserved    |  Result Code  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Lifetime (32 bits)                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Epoch (32 bits)                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                   Reserved (96 bits)                          |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
:                                                               :
:             (optional) OpCode-specific response data          :
:                                                               :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
:             (optional) Options                                :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t>These fields are described below:<list style="hanging">
            <t hangText="Version:">Responses MUST use version 1.</t>

            <t hangText="R:">Indicates Request (0) or Response (1). All
            Responses MUST use 1.</t>

            <t hangText="OpCode:">The 7-bit OpCode value, copied from the
            request.</t>

            <t hangText="Reserved:">8 reserved bits, MUST be sent as 0, MUST
            be ignored when received. This is set by the server.</t>

            <t hangText="Result Code:">The result code for this response. See
            <xref target="result_codes"></xref> for values. This is set by the
            server.</t>

            <t hangText="Lifetime:">An unsigned 32-bit integer, in seconds,
            ranging from 0 to 4,294,967,295 seconds. On an error response,
            this indicates how long clients should assume they'll get the same
            error response from that PCP server if they repeat the same
            request. On a success response for the currently-defined PCP
            OpCodes -- MAP and PEER -- this indicates the lifetime for this
            mapping. If future OpCodes are defined that do not have a lifetime
            associated with them, then in success responses for those OpCodes
            the Lifetime MUST be set to zero on transmission and MUST be
            ignored on reception.</t>

            <t hangText="Epoch:">The server's Epoch value. See <xref
            target="epoch"></xref> for discussion. This value is set in both
            success and error responses.</t>
          </list></t>
      </section>

      <section anchor="options" title="Options">
        <t>A PCP OpCode can be extended with one or more Options. Options can
        be used in requests and responses. The decision about whether to
        include a given piece of information in the base OpCode format or in
        an Option is an engineering trade-off between packet size and code
        complexity. For information that is usually (or always) required,
        placing it in the fixed OpCode data results in simpler code to
        generate and parse the packet, because the information is a fixed
        location in the OpCode data, but wastes space in the packet in the
        event that field is all-zeroes because the information is not needed
        or not relevant. For information that is required less often, placing
        it in an Option results in slightly more complicated code to generate
        and parse packets containing that Option, but saves space in the
        packet when that information is not needed. Placing information in an
        Option also means that an implementation that never uses that
        information doesn't even need to implement code to generate and parse
        it. For example, a client that never requests mappings on behalf of
        some other device doesn't need to implement code to generate the
        THIRD_PARTY Option, and a PCP server that doesn't implement the
        necessary security measures to create third-party mappings safely
        doesn't need to implement code to parse the THIRD_PARTY Option.</t>

        <figure align="left" anchor="options-layout" title="Options Header">
          <preamble>Options use the following Type-Length-Value
          format:</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Option Code  |  Reserved     |       Option-Length           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
:                       (optional) data                         :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t>The description of the fields is as follows:<list style="hanging">
            <t hangText="Option Code:">8 bits. Its highest bit is the "O" bit
            and indicates if this Option is mandatory (0) or optional (1) to
            process.</t>

            <t hangText="Reserved:">8 bits. MUST be set to 0 on transmission
            and MUST be ignored on reception.</t>

            <t hangText="Option-Length:">16 bits. Indicates the length of the
            enclosed data, in 32-bit words. Options with length of 0 are
            allowed.</t>

            <t hangText="data:">Option data. The Option data MUST end on a
            32-bit boundary, padded with 0's when necessary.</t>
          </list></t>

        <t>The handling of an Option by the PCP client and PCP server MUST be
        specified in an appropriate document, which MUST include whether the
        PCP Option can appear in a request and/or response, whether it can
        appear more than once, and indicate what sort of Option data it
        conveys. If several Options are included in a PCP request, they MAY be
        encoded in any order by the PCP client, but MUST be processed by the
        PCP server in the order in which they appear.</t>

        <t>If, while processing an Option, an error is encountered that causes
        a PCP error response to be generated, the PCP request MUST cause no
        state change in the PCP server or the PCP-controlled device (i.e., it
        rolls back any changes it might have made while processing the
        request). The response MUST encode the Options in the same order, but
        MAY omit some PCP Options in the response, to indicate the PCP server
        does not understand that Option or that Option is not permitted to be
        included in responses by the definition of the Option itself.
        Additional Options included in the response (if any) MUST be included
        at the end. A certain Option MAY appear more than once in a request or
        in a response, if permitted by the definition of the Option itself. If
        the Option's definition allows the Option to appear only once but it
        appears more than once in a request, the PCP server MUST respond with
        the MALFORMED_OPTION result code; if this occurs in a response, the
        PCP client processes the first occurrence and ignores the other
        occurrences as if they were not present.</t>

        <t>If the "O" bit (high bit) in the OpCode is clear, a PCP server MUST
        process this Option. If the PCP server does not implement this Option,
        or cannot perform the function indicated by this Option (e.g., due to
        a parsing error with the Option), it MUST generate an error response
        with code UNSUPP_OPTION or MALFORMED_OPTION (as appropriate) and
        include the UNPROCESSED Option in the response (<xref
        target="unprocessed"></xref>).</t>

        <t>If the "O" bit is set, a PCP server MAY process or ignore this
        Option, entirely at its discretion.</t>

        <t>PCP clients are free to ignore any or all Options included in
        responses, although naturally if a client explicitly requests an
        Option where correct handling of that Option requires processing the
        Option data in the response, that client is expected to implement code
        to do that.</t>

        <t>Option definitions MUST include the information below:</t>

        <t><list style="empty">
            <t>This Option:<list style="empty">
                <?rfc subcompact="yes"?>

                <t>Name: <mnemonic></t>

                <t>Number: <value></t>

                <t>Purpose: <textual description></t>

                <t>Valid for OpCodes: <list of OpCodes></t>

                <t>Length: <rules for length></t>

                <t>May appear in: <requests/responses/both></t>

                <t>Maximum occurrences: <count></t>

                <?rfc subcompact="no"?>
              </list></t>
          </list></t>
      </section>

      <section anchor="result_codes" title="Result Codes">
        <t>The following result codes may be returned as a result of any
        OpCode received by the PCP server. The only success result code is 0;
        other values indicate an error. If a PCP server encounters multiple
        errors during processing of a request, it SHOULD use the most specific
        error message.<list style="hanging">
            <t hangText="0">SUCCESS, success</t>

            <t hangText="1">UNSUPP_VERSION, unsupported version.</t>

            <t hangText="2">MALFORMED_REQUEST, indicating the request could
            not be successfully parsed.</t>

            <t hangText="3">UNSUPP_OPCODE, unsupported OpCode.</t>

            <t hangText="4">UNSUPP_OPTION, unsupported Option. This error only
            occurs if the Option is in the mandatory-to-process range.</t>

            <t hangText="5">MALFORMED_OPTION, malformed Option (e.g., exists
            too many times, invalid length).</t>

            <t hangText="6">SERVER_OVERLOADED, server is processing too many
            PCP requests from this client or from other clients, and requests
            this client delay sending any other requests for the time
            indicated in Lifetime.</t>

            <t hangText="7">ADDRESS_MISMATCH, the source IP address or
port of the request packet does not match the contents of the PCP
Client's IP Address or UDP port.</t>
          </list></t>

        <t>Additional result codes, specific to the OpCodes and Options
        defined in this document, are listed in <xref
        target="map_result_codes"></xref> and <xref
        target="third_party"></xref>.</t>
      </section>
    </section>

    <section title="General PCP Operation">
      <t>PCP messages MUST be sent over <xref target="RFC0768">UDP</xref>.
      Every PCP request generates a response, so PCP does not need to run over
      a reliable transport protocol.</t>

      <t>PCP is idempotent, meaning that if the PCP client sends the same
      request multiple times (or the PCP client sends the request once and it
      is duplicated by the network), and the PCP server processes those
      requests multiple times, the result is the same as if the PCP server had
      processed only one of those duplicate requests.</t>

      <section title="General PCP Client: Generating a Request" anchor="general_generate_request">
        <t>This section details operation specific to a PCP client, for any
        OpCode. Procedures specific to the MAP OpCodes are described in <xref
        target="map_opcodes"></xref>, and procedures specific to the PEER
        OpCodes are described in <xref target="peer_opcodes"></xref>.</t>

        <t>Prior to sending its first PCP message, the PCP client determines
        which server to use. The PCP client performs the following steps to
        determine its PCP server: <list style="numbers">
            <t>if a PCP server is configured (e.g., in a configuration file or
            via DHCP), that single configuration source is used as the list
	    of PCP Server(s), else;</t>

            <t>the default router list (for IPv4 and IPv6) is used as the 
            of PCP Server(s).</t>
          </list></t>

        <t>For the purposes of this document, only a single PCP server address
        is supported. Should future specifications define configuration
        methods that provide a list of PCP server addresses, those
        specifications will define how clients select one or more addresses
        from that list.</t>

        <t>With that PCP server address, the PCP client formulates its PCP
        request. The PCP request contains a PCP common header, PCP OpCode and
        payload, and (possibly) Options. As with all UDP or TCP client
        software on any operating system, when several independent PCP clients
        exist on the same host, each uses a distinct source port number to
        disambiguate their requests and replies. The PCP client's source port
        SHOULD be randomly generated <xref target="RFC6056"></xref>.</t>

        <t>To assist with detecting an on-path NAT, he PCP header
        includes the source IP address and port of the PCP message
        itself.  On operating systems that support the sockets API,
        the following steps are RECOMMENDED to determine the correct
        source address and port to include in the PCP header:</t>

        <t><list style="numbers">
            <?rfc subcompact="yes"?>

            <t>Create a UDP socket.</t>

            <t>Bind the UDP socket.</t>

            <t>Call the getsockname() function to retrieve a sockaddr
            containing the source address and port the kernel will use for UDP
            packets sent through this socket.</t>

            <t>Place the address and port from this sockaddr in to the PCP
            client's source address and port fields in the PCP header.</t>

            <t>Send PCP requests using this bound UDP socket.</t>

            <?rfc subcompact="no"?>
          </list></t>


        <t>When attempting to contact a PCP server, the PCP client initializes
        a timer to 2 seconds. The PCP client sends a PCP message to the first
        server in its list of PCP servers. If no response is received before
        the timer expires, the timer is doubled (to 4 seconds) and the request
        is re-transmitted. If no response is received before the timer
        expires, the timer is doubled again (to 8 seconds) and the request is
        re-transmitted.</t>

        <t>Once a PCP client has successfully received a response from a PCP
        server on that interface, it sends subsequent PCP requests to that
        same server, with a retransmission timer of 2 seconds. If, after 2
        seconds, a response is not received from that PCP server, the same
        back-off algorithm described above is performed.</t>

        <!--
        <t>If, during its transmissions to a PCP server, the PCP client
        receives a hard or soft ICMP error (<xref target="RFC5461"></xref>),
        the ICMP error SHOULD be ignored.</t>

        <t>Upon receiving a response (success or error), the PCP client does
        not change to a different PCP server. That is, it does not "shop
        around" trying to find a PCP server to service its (same) request.</t>
-->
      </section>

      <section title="General PCP Server: Processing a Request">
        <t>This section details operation specific to a PCP server. Processing
        SHOULD be performed in the order of the following paragraphs.</t>

        <t>A PCP server MUST only accept normal (non-THIRD_PARTY) PCP
        requests from a client on the same interface it would normally
        receive packets from that client, and silently ignores PCP
        requests arriving on any other interface. For example, a
        residential NAT gateway only accepts PCP requests arriving on
        its (LAN) interface connecting to the internal network, and
        silently ignores PCP requests arriving on its external (WAN)
        interface. A PCP server which supports THIRD_PARTY requests
        MAY be configured to accept THIRD_PARTY requests on other
        interfaces from properly authorized clients.</t>

        <t>Upon receiving a request, the PCP server parses and validates it. A
        valid request contains a valid PCP common header, one valid PCP
        Opcode, and zero or more Options (which the server might or might not
        comprehend). If an error is encountered during processing, the server
        generates an error response which is sent back to the PCP client.
        Processing an OpCode and the Options are specific to each OpCode.</t>

        <t>If the server is overloaded by requests (from a particular client
        or from all clients), it MAY simply discard requests, as the requests
        will be retried by PCP clients, or it MAY generate the
        SERVER_OVERLOADED error response.</t>

        <t>If the received message is shorter than 4 octets or has the R bit
        set, the message is simply dropped. If the length of the message
        exceeds 1024 octets or is not a multiple of 4 octets, it is invalid.
        Invalid requests are handled by copying up to 1024 octets of the
        request into the response, setting the result code to
        MALFORMED_REQUEST, and zero-padding the response to a multiple of 4
        octets if necessary. If the version number is not supported, a
        response is generated with the UNSUPP_VERSION result code and the
        other steps detailed in <xref target="version"></xref>. If the OpCode
        is not supported, a response is generated with the UNSUPP_OPCODE
        result code.</t>

        <t>If the source IP address and port of the received packet do
        not match the contents of the PCP Client's IP Address and PCP
        Client's Port fields, a response is generated with the
        ADDRESS_MISMATCH result code. This is done to detect and
        prevent accidental use of PCP where a non-PCP-aware NAT exists
        between the PCP client and PCP server.</t>

        <t>Error responses have the same packet layout as success responses,
        with fields from the request copied into the response, and fields
        assigned by the PCP server are set as indicated in <xref
        target="common_response"></xref>.</t>
      </section>

      <section title="General PCP Client: Processing a Response">
        <t>The PCP client receives the response and verifies that the source
        IP address and port belong to the PCP server of an outstanding PCP
        request. It validates that the OpCode matches an outstanding PCP
        request. Responses shorter than 12 octets, longer than 1024 octets, or
        not a multiple of 4 octets are invalid and ignored, likely causing the
        request to be re-transmitted. The response is further matched by
        comparing fields in the response OpCode-specific data to fields in the
        request OpCode-specific data, as described by the processing for that
        OpCode. After these matches are successful, the PCP client checks the
        Epoch field to determine if it needs to restore its state to the PCP
        server (see <xref target="epoch"></xref>).</t>

        <t>If the result code is 0 (SUCCESS), the PCP client knows the
        request was successful.</t>

        <t>If the result code is not 0, the request failed. If the result code
        is UNSUPP_VERSION, processing continues as described in <xref
        target="version"></xref>. If the result code is SERVER_OVERLOADED, the
        PCP client SHOULD NOT send *any* further requests to that PCP server
        for the indicated error lifetime. For other error result codes, the
        PCP client SHOULD NOT resend the same request for the indicated error
        lifetime. If the PCP server indicates an error lifetime in excess of
        30 minutes, the PCP client MAY choose to set its retry timer to 30
        minutes.</t>

        <t>If the PCP client has discovered a new PCP server (e.g., connected
        to a new network), the PCP client SHOULD immediately begin
        communicating with this PCP server, without regard to hold times from
        communicating with a previous PCP server.</t>
      </section>

      <section anchor="mif" title="Multi-Interface Issues">
        <t>Hosts which desire a PCP mapping might be multi-interfaced (i.e.,
        own several logical/physical interfaces). Indeed, a host can be
        configured with several IPv4 addresses (e.g., WiFi and Ethernet) or
        dual-stacked. These IP addresses may have distinct reachability scopes
        (e.g., if IPv6 they might have global reachability scope as for Global
        Unicast Address (GUA, <xref target="RFC3587"></xref>) or limited scope
        as for <xref target="RFC4193">Unique Local Address (ULA)</xref>).</t>

        <t>IPv6 addresses with global reachability (e.g., GUA) SHOULD be used
        as the source address when generating a PCP request. IPv6 addresses
        without global reachability (e.g., <xref target="RFC4193">ULA</xref>),
        SHOULD NOT be used as the source interface when generating a PCP
        request. If <xref target="RFC4941">IPv6 privacy addresses</xref> are
        used for PCP mappings, a new PCP request will need to be issued
        whenever the IPv6 privacy address is changed. This PCP request SHOULD
        be sent from the IPv6 privacy address itself. It is RECOMMENDED that
        mappings to the previous privacy address be deleted.</t>

        <t>Due to the ubiquity of IPv4 NAT, IPv4 addresses with limited scope
        (e.g., <xref target="RFC1918">private addresses</xref>) MAY be used as
        the source interface when generating a PCP request.</t>

        <t>As mentioned in <xref target="single_homed"></xref>, only
        single-homed CP routers are in scope. Therefore, there is no viable
        scenario where a host located behind a CP router is assigned two
        Global Unicast Addresses belonging to different global IPv6
        prefixes.</t>

        <!--
Section 2.4, "Change of the Internal IP Address"

   When a new IP address is assigned to a host implementing a PCP Client,
   the PCP Client MUST install on the PCP server all the mappings it
   manages, using the new assigned IP address as the internal IP
   address.

This needs some additional discussion.  Let's take an example where
I have a computer with both WiFi and wired Ethernet connections
and I plug and unplug the Ethernet connection, or go in and out
of range of WiFi.  When do we want PCP to do something about
that change of connectivity?   Does the answer depend on IPv4,
IPv6, or dual stack running on that interface if we're doing PIN44,
PIN64, PIN46, PIN66?

Med: Good point. IMHO, the address selection should be done according to the-be-completed
section: http://tools.ietf.org/html/draft-ietf-pcp-base-02#section-6.1.3. Based on the
output of that process, the PCP Client can be triggered accordingly.


Or ... just recommend the internal IP address not be changed!
-->
      </section>

      <section anchor="epoch" title="Epoch">
        <t>Every PCP response sent by the PCP server includes an Epoch field.
        This field increments by 1 every second, and is used by the PCP client
        to determine if PCP state needs to be restored. If the PCP server
        resets or loses the state of its explicit dynamic Mappings (that is,
        those mappings created by PCP MAP requests), due to reboot, power
        failure, or any other reason, it MUST reset its Epoch time and begin
        counting again from 0. Similarly, if the public IP address(es) of the
        NAT (controlled by the PCP server) changes, the Epoch MUST be reset to
        0. A PCP server MAY maintain one Epoch value for all PCP clients, or
        MAY maintain distinct Epoch values (per PCP client, per interface, or
        based on other criteria); this choice is implementation-dependent.</t>

        <t>Whenever a client receives a PCP response, the client computes its
        own conservative estimate of the expected Epoch value by taking the
        Epoch value in the last packet it received from the gateway and adding
        7/8 (87.5%) of the time elapsed since that packet was received. If the
        Epoch value in the newly received packet is less than the client's
        conservative estimate by more than one second, then the client
        concludes that the PCP server lost state, and the client MUST
        immediately renew all its active port mapping leases as described in
        <xref target="reboot"></xref>.</t>

        <!--
        <t>When a client notices that the PCP server reduced its Epoch value,
        the PCP clients will send PCP requests to refresh their mappings. The
        PCP server needs to be scaled appropriately to accommodate this
        traffic. Because PCP lacks a mechanism to simultaneously inform all
        PCP clients of the Epoch value, the PCP clients will only flood the
        PCP server simultaneously when a power outage and restoration event
        causes state loss in both the PCP clients and PCP server.</t>
-->
      </section>

      <section anchor="version" title="Version Negotiation">
        <t>A PCP client sends its requests using PCP version number 1. Should
        later updates to this document specify different message formats with
        a version number greater than 1 it is expected that PCP servers will
        still support version 1 in addition to the newer version(s). However,
        in the event that a server returns a response with result code
        UNSUPP_VERSION, the client MAY log an error message to inform the user
        that it is too old to work with this server.</t>

        <t>When sending a response containing the UNSUPP_VERSION result code,
        the PCP message MUST be 12 octets long.</t>

        <t>If future PCP versions greater than 1 are specified, version
        negotiation is expected to proceed as follows: <list style="numbers">
            <t>If a client or server supports more than one version it SHOULD
            support a contiguous range of versions -- i.e., a lowest version
            and a highest version and all versions in between.</t>

            <t>Client sends first request using highest (i.e., presumably
            'best') version number it supports.</t>

            <t>If server supports that version it responds normally.</t>

            <t>If server does not support that version it replies giving a
            result containing the result code UNSUPP_VERSION, and the closest
            version number it does support (if the server supports a range of
            versions higher than the client's requested version, the server
            returns the lowest of that supported range; if the server supports
            a range of versions lower than the client's requested version, the
            server returns the highest of that supported range).</t>

            <t>If the client receives an UNSUPP_VERSION result containing a
            version it does support, it records this fact and proceeds to use
            this message version for subsequent communication with this PCP
            server (until a possible future UNSUPP_VERSION response if the
            server is later updated, at which point the version negotiation
            process repeats).</t>

            <t>If the client receives an UNSUPP_VERSION result containing a
            version it does not support then the client MAY log an error
            message to inform the user that it is too old to work with this
            server, and the client SHOULD set a timer to retry its request in
            30 minutes or the returned Lifetime value, whichever is
            smaller.</t>
          </list></t>
      </section>

      <section title="General PCP Option">
        <t>The following Option can appear in certain PCP responses, without
        regard to the OpCode.</t>

        <section anchor="unprocessed" title="UNPROCESSED Option">
          <t>If the PCP server cannot process a mandatory-to-process Option,
          for whatever reason, it includes the UNPROCESSED Option in the
          response, shown in <xref target="fig_unprocessed"></xref>. This
          helps with debugging interactions between the PCP client and PCP
          server. This Option MUST NOT appear more than once in a PCP
          response. The unprocessed Options are listed once, and the Option
          data is zero-filled to the necessary 32 bit boundary. If a certain
          Option appeared more than once in the PCP request, that Option value
          can appear once or as many times as it occurred in the request. The
          order of the Options in the PCP request has no relationship with the
          order of the Option values in this UNPROCESSED Option. This Option
          MUST NOT appear in a response unless the associated request
          contained at least one mandatory-to-process Option.</t>

          <figure anchor="fig_unprocessed" title="UNPROCESSED option">
            <preamble>The UNPROCESSED Option is formatted as follows, showing
            an example of two Option codes that were unprocessed:</preamble>

            <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option-code-1 | Option-code-2 |        padding                |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>

          <t>Padding: 0, 1, 2, or 3 octets. If the number of Option-codes is
          not a multiple of 4, padding is used to make it 32-bit aligned. The
          padding MUST be zeroed on sending, and MUST be ignored by the
          receiver.</t>

          <t><list style="empty">
              <t>This Option:<list style="empty">
                  <?rfc subcompact="yes"?>

                  <t>Name: UNPROCESSED</t>

                  <t>Number: 0</t>

                  <t>Purpose: indicates which PCP Options in the request are
                  not supported by the PCP server</t>

                  <t>Valid for OpCodes: all</t>

                  <t>Length: 1 or more</t>

                  <t>May appear in: responses, and only if the result code is
                  non-zero.</t>

                  <t>Maximum occurrences: 1</t>

                  <?rfc subcompact="no"?>
                </list></t>
            </list></t>
        </section>
      </section>
    </section>

    <section anchor="opcode_introduction"
             title="Introduction to MAP and PEER OpCodes">
      <t>There are four uses for the MAP and PEER OpCodes defined in this
      document: a host operating a server and wanting an incoming connection
      (<xref target="operating_a_server"></xref>); a host operating a client
      and server on the same port (<xref target="pcp_symmetric"></xref>); a
      host operating a client and wanting to optimize the application
      keepalive traffic (<xref target="keepalives"></xref>); and a host
      operating a client and wanting to restore lost state in its NAT (<xref
      target="restoring"></xref>). These are discussed in the following
      sections.</t>

      <t>When operating a server (<xref target="operating_a_server"></xref>
      and <xref target="pcp_symmetric"></xref>) the PCP client knows if it
      wants an IPv4 listener, IPv6 listener, or both on the Internet. The PCP
      client also knows if it has an IPv4 address on itself or an IPv6
      interface on itself. It takes the union of this knowledge to decide
      which of its PCP servers to send the request (e.g., a PCP server on its
      IPv4 interface or its IPv6 interface), and if to send one or two MAP
      requests for each of its interfaces (e.g., if the PCP client has only an
      IPv4 address but wants both IPv6 and IPv4 listeners, it sends a MAP4
      request and a MAP6 request from its IPv4 interface. If the PCP client
      has both an IPv4 and IPv6 address, and only wants an IPv4 listener, it
      sends one MAP request from its IPv4 interface (if the PCP server
      supports NAT44 or IPv4 firewall) or one MAP request from its IPv6
      interface (if the PCP server supports NAT64)). The PCP client can simply
      request the desired mapping to determine if the PCP server supports the
      desired mapping. Applications that embed IP addresses in payloads (e.g.,
      FTP, SIP) will find it beneficial to avoid address family translation,
      if possible.</t>

      <t>It is REQUIRED that the PCP-controlled device assign the same
      external IP address to PCP-created explicit dynamic mappings and to
      implicit dynamic mappings for a given Internal Host. It is RECOMMENDED
      that static mappings for that Internal Host (e.g., those created by a
      command-line interface on the PCP server or PCP-controlled device) also
      be assigned to the same IP address. Once all internal addresses assigned
      to a given Internal Host have no implicit dynamic mappings and have no
      explicit dynamic mappings in the PCP-controlled device, a subsequent PCP
      request for that Internal Address MAY be assigned to a different
      External Address. Generally, this re-assignment would occur when a CGN
      device is load balancing newly-seen hosts to its public IPv4 address
      pool.</t>

      <!--
        <t>On many common platforms (i.e., those making use of the BSD sockets
        API), using PCP for purposes of application keepalives by issuing a
        PCP request followed by a dynamic connection to the server is
        difficult to implement properly. This is therefore NOT RECOMMENDED.
        Instead, client applications SHOULD first establish a dynamic
        connection to a server, and then issue a PCP request related to that
        connection, including the REMOTE_PEER Option.</t>
-->

      <section anchor="operating_a_server" title="For Operating a Server">
        <t>A host operating a server (e.g., a web server) listens for traffic
        on a port, but the server never initiates traffic from that port. For
        this to work across a NAT or a firewall, the host needs to (a) create
        a mapping from a public IP address and port to itself as described in
        <xref target="map_opcodes"></xref> and (b) publish that public IP
        address and port via some sort of rendezvous server (e.g., DNS, a SIP
        message, a proprietary protocol). Publishing the public IP address and
        port is out of scope of this specification. To accomplish (a), the
        host follows the procedures described in this section.</t>

        <t>As normal, the application needs to begin listening on a port.
        Then, the application constructs a PCP message with the appropriate
        MAP OpCode depending on if it is listening on an IPv4 or IPv6 address
        and if it wants a public IPv4 or IPv6 address.</t>

        <figure anchor="fig_operate_server"
                title="Pseudo-code for using PCP to operate a server">
          <preamble>The following pseudo-code shows how PCP can be reliably
          used to operate a server:</preamble>

          <artwork align="center"><![CDATA[
/* start listening on the local server port */
int s = socket(...);
bind(s, ...);
listen(s, ...);

getsockname(s, &internal_sockaddr, ...);
bzero(&external_sockaddr, sizeof(external_sockaddr));

while (1)
    {
    /* Note: the "time_to_send_pcp_request()" check below includes:
     * 1. Sending the first request
     * 2. Retransmitting requests due to packet loss
     * 3. Resending a request due to impending lease expiration
     * The PCP packet sent is identical in all cases, apart from the
     * Suggested External Address and Port which may change over time
     */
    if (time_to_send_pcp_request())
        pcp_send_map_request(internal_sockaddr.sin_port,
            internal_sockaddr.sin_addr,
            &external_sockaddr, /* will be zero the first time */
            requested_lifetime, &assigned_lifetime);

    if (pcp_response_received())
        update_rendezvous_server("Client Ident", external_sockaddr);

    if (received_incoming_connection_or_packet())
        process_it(s);

    if (other_work_to_do())
        do_it();

    /* ... */

    block_until_we_need_to_do_something_else();
    }]]></artwork>
        </figure>
      </section>

      <section anchor="pcp_symmetric"
               title="For Operating a Symmetric Client/Server">
        <t>A host operating a client and server on the same port (e.g., <xref
        target="RFC4961">Symmetric RTP</xref> or <xref target="RFC3581">SIP
        Symmetric Response Routing (rport)</xref>) first establishes a local
        listener, (usually) sends the local and public IP addresses and ports
        to a rendezvous service (which is out of scope of this document), and
        initiates an outbound connection from that same source address and
        same port. To accomplish this, the application uses the procedure
        described in this section.</t>

        <t>An application that is using the same port for outgoing connections
        as well as incoming connections MUST first signal its operation of a
        server using the PCP MAP OpCode, as described in <xref
        target="map_opcodes"></xref>, and receive a positive PCP response
        before it sends any packets from that port. <list style="empty">
            <t>Discussion: In general, a PCP client doesn't know in advance if
            it is behind a NAT or firewall. It can attempt to request a
            mapping using PCP, and if that succeeds then the client knows it
            has successfully created a mapping. If after multiple retries it
            has received no PCP response, then either the client is *not*
            behind a NAT or firewall and has unfettered connectivity, or the
            client *is* behind a NAT or firewall which doesn't support PCP
            (and the client may still have working connectivity by virtue of
            static mappings previously created manually by the user).
            Retransmitting PCP requests multiple times before giving up and
            assuming unfettered connectivity adds delay in that case.
            Initiating outbound TCP connections immediately without waiting
            for PCP avoids this delay, and will work if the NAT has
            endpoint-independent mapping (EIM) behavior, but may fail if the
            NAT has endpoint-dependent mapping (EDM) behavior. With an EDM
            NAT, implicit mappings created by outgoing TCP SYNs from a single
            Internal Address and Port to different Remote Peers and Ports may
            be allocated different External Ports, and a subsequent PCP MAP
            request for that Internal Address and Port may be allocated yet
            another different External Port. Waiting enough time to allow an
            explicit PCP MAP Mapping to be created (if possible) first ensures
            that the same External Port will then be used for all subsequent
            TCP SYNs sent from the specified Internal Address and Port. PCP
            supports both EIM and EDM NATs, so clients need to assume they may
            be dealing with an EDM NAT. In this case, the client will
            experience more reliable connectivity if it attempts explicit PCP
            MAP requests first, before initiating any outbound TCP connections
            from that Internal Address and Port. See also <xref
            target="EDM"></xref>.</t>
          </list></t>

        <?rfc needLines="47" ?>

        <figure anchor="fig_pseudocode_symmetric"
                title="Pseudo-code for using PCP to operate a symmetric client/server">
          <preamble>The following pseudo-code shows how PCP can be used to
          operate a symmetric client and server:</preamble>

          <artwork align="center"><![CDATA[
/* start listening on the local server port */
int s = socket(...);
bind(s, ...);
listen(s, ...);

getsockname(s, &internal_sockaddr, ...);
bzero(&external_sockaddr, sizeof(external_sockaddr));

while (1)
    {
    /* Note: the "time_to_send_pcp_request()" check below includes:
     * 1. Sending the first request
     * 2. Retransmitting requests due to packet loss
     * 3. Resending a request due to impending lease expiration
     * The PCP packet sent is identical in all cases, apart from the
     * Suggested External Address and Port which may change over time
     */
    if (time_to_send_pcp_request())
        pcp_send_map_request(internal_sockaddr.sin_port,
            internal_sockaddr.sin_addr,
            &external_sockaddr, /* will be zero the first time */
            requested_lifetime, &assigned_lifetime);

    if (pcp_response_received())
        update_rendezvous_server("Client Ident", external_sockaddr);

    if (received_incoming_connection_or_packet())
        process_it(s);

    if (need_to_make_outgoing_connection())
        make_outgoing_connection(s, ...);

    if (data_to_send())
        send_it(s);

    if (other_work_to_do())
        do_it();

    /* ... */

    block_until_we_need_to_do_something_else();
    }]]></artwork>

          <postamble></postamble>
        </figure>
      </section>

      <section anchor="keepalives" title="For Reducing NAT Keepalive Messages">
        <t>A host operating a client (e.g., XMPP client, SIP client) sends
        from a port, and may receive responses, but never accepts incoming
        connections from other Remote Peers on this port. It wants to ensure
        the flow to its Remote Peer is not terminated (due to inactivity) by
        an on-path NAT or firewall. To accomplish this, the application uses
        the procedure described in this section.</t>

        <t>Middleboxes such as NATs or firewalls need to see occasional
        traffic or will terminate their session state, causing application
        failures. To avoid this, many applications routinely generate
        keepalive traffic for the primary (or sole) purpose of maintaining
        state with such middleboxes. Applications can reduce such application
        keepalive traffic by using PCP. <list style="empty">
            <t>Note: For reasons beyond NAT, an application may find it useful
            to perform application-level keepalives, such as to detect a
            broken path between the client and server, keep state alive on the
            Remote Peer, or detect a powered-down client. These keepalives are
            not related to maintaining middlebox state, and PCP cannot do
            anything useful to reduce those keepalives.</t>
          </list></t>

        <t>To use PCP for this function, the application first connects to its
        server, as normal. Afterwards, it issues a PCP request with the PEER4
        or PEER6 OpCode as described in <xref target="peer_opcodes"></xref>.
        The PEER4 OpCode is used if from the host's point of view it is using
        IPv4 for its communication to its peer; PEER6 if from the host's point
        of view it is using IPv6 (e.g., a host behind NAT64 would use PEER6
        because from that host's point of view it is using IPv6). The same
        5-tuple as used for the connection to the server is placed into the
        PEER4 or PEER6 payload.</t>

        <figure anchor="fig_keepalive_pseudocode"
                title="Pseudo-code using PCP with a dynamic socket">
          <preamble>The following pseudo-code shows how PCP can be reliably
          used with a dynamic socket, for the purposes of reducing application
          keepalive messages:</preamble>

          <artwork align="center"><![CDATA[
int s = socket(...);
connect(s, &remote_peer, ...);

getsockname(s, &internal_sockaddr, ...);
bzero(&external_sockaddr, sizeof(external_sockaddr));

while (1)
    {
    /* Note: the "time_to_send_pcp_request()" check below includes:
     * 1. Sending the first request
     * 2. Retransmitting requests due to packet loss
     * 3. Resending a request due to impending lease expiration
     * The PCP packet sent is identical in all cases, apart from the
     * Suggested External Address and Port which may change over time
     */
    if (time_to_send_pcp_request())
        pcp_send_peer_request(internal_sockaddr.sin_port,
            internal_sockaddr.sin_addr,
            &external_sockaddr, /* will be zero the first time */
            remote_peer, requested_lifetime, &assigned_lifetime);

    if (data_to_send())
        send_it(s);

    if (other_work_to_do())
        do_it();

    /* ... */

    block_until_we_need_to_do_something_else();
    }]]></artwork>
        </figure>
      </section>

      <section anchor="restoring"
               title="For Restoring Lost Implicit TCP Dynamic Mapping State">
        <t>After a NAT loses state (e.g., because of a crash or power
        failure), it is useful for clients to re-establish TCP mappings on the
        NAT. This allows servers on the Internet to see traffic from the same
        IP address and port, so that sessions can be resumed exactly where
        they were left off. This can be useful for long-lived connections
        (e.g., instant messaging) or for connections transferring a lot of
        data (e.g., FTP). This can be accomplished by establishing a TCP
        connection normally and then sending a PEER request/response and
        remember the External Address and External Port. Later, when the NAT
        has lost state, the client can send a PEER request with the Suggested
        External Port and Suggested External Address remembered from the
        previous session, which will create a mapping in the NAT that
        functions exactly as an implicit dynamic mapping. The client then
        resumes sending TCP data to the server. <list style="empty">
            <t>Note: This procedure works well for TCP, provided the NAT only
            creates a new implicit dynamic mapping for TCP segments with the
            SYN bit set (i.e., the newly-booted NAT drops the re-transmitted
            data segments from the client because the NAT does not have an
            active mapping for those segments), and if the server is not
            sending data that elicits a RST from the NAT. This is not the case
            for UDP, because a new UDP mapping will be created (probably on a
            different port) as soon as UDP traffic is seen by the NAT.</t>
          </list></t>
      </section>
    </section>

    <section anchor="map_opcodes" title="MAP OpCodes">
      <t>This section defines two OpCodes which control forwarding from a NAT
      (or firewall) to an Internal Host. They are: <list hangIndent="12"
          style="hanging">
          <t hangText="  MAP4=1:">Create an explicit dynamic mapping, with
          address independent filtering, between an Internal Address and an
          External IPv4 address (e.g., NAT44, NAT64, or IPv4 firewall)</t>

          <t hangText="  MAP6=2:">Create a explicit dynamic mapping, with
          address independent filtering, between an Internal Address and an
          External IPv6 address (e.g., NAT46, or IPv6 firewall)</t>
        </list></t>

      <t>All compliant PCP Servers MUST support one or both MAP opcodes,
      appropriate to the address families they support (e.g., a traditional
      NAT44 gateway is not required to support MAP6). PCP Servers SHOULD
      provide a configuration option to allow administrators to disable MAP
      support if they wish.</t>

      <t>The internal address is the source IP address of the PCP request
      message itself, unless the THIRD_PARTY Option is used.</t>

      <t>Mappings created by PCP MAP requests are, by definition, Endpoint
      Independent Mappings with Endpoint Independent Filtering (unless the
      FILTER Option is used), even on a NAT that usually creates Endpoint
      Dependent Mappings or Endpoint Dependent Filtering for outgoing
      connections, since the purpose of an (unfiltered) MAP mapping is to
      receive inbound traffic from any remote endpoint, not from only one
      specific remote endpoint.</t>

      <t>Note also that all NAT mappings (created by PCP or otherwise) are by
      necessity bidirectional and symmetric. For any packet going in one
      direction (in or out) that is translated by the NAT, a reply going in
      the opposite direction needs to have the corresponding opposite
      translation done so that the reply arrives at the right endpoint. This
      means that if a client creates a MAP mapping, and then later sends an
      outgoing packet using the mapping's internal source port, the NAT should
      translate that packet's Internal Address and Port to the mapping's
      External Address and Port, so that replies addressed to the External
      Address and Port are correctly translated to the mapping's Internal
      Address and Port.</t>

      <t>The operation of the MAP OpCodes is described in this section.</t>

      <section title="MAP Operation Packet Formats">
        <t>The two MAP OpCodes (MAP4, MAP6) share a similar packet layout for
        both requests and responses. Because of this similarity, they are
        shown together. For both of the MAP OpCodes, if the assigned External
        IP address and assigned External Port in the PCP response always match
        the Internal IP Address and Port in the PCP request, then the
        functionality is purely a firewall; otherwise it pertains to a network
        address translator which might also perform firewall-like
        functions.</t>

        <figure anchor="map_request" title="MAP OpCode Request Packet Format">
          <preamble>The following diagram shows the format of the
          OpCode-specific information in a request for the MAP4 and MAP6
          OpCodes.</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol     |          Reserved (24 bits)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Internal Port          |   Suggested External Port     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|        Suggested External IP Address (always 128 bits)        |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t>These fields are described below:<list style="hanging">
            <t hangText="Requested lifetime (in common header):">Requested
            lifetime of this mapping, in seconds. The value 0 indicates
            "delete".</t>

            <t hangText="Protocol:">Upper-layer protocol associated with this
            OpCode. Values are taken from the <xref
            target="proto_numbers">IANA protocol registry</xref>. For example,
            this field contains 6 (TCP) if the OpCode is intended to create a
            TCP mapping. The value 0 has a special meaning for 'all
            protocols', and is used only for delete requests. This means that
            HOPOPT (which is protocol 0) cannot have a mapping managed using
            PCP.</t>

            <t hangText="Reserved:">24 reserved bits, MUST be sent as 0 and
            MUST be ignored when received.</t>

            <t hangText="Internal Port:">Internal port for the mapping. The
            value 0 indicates "all ports", and is only legal in a request if
            lifetime=0.</t>

            <t hangText="Suggested External Port:">Suggested external port for
            the mapping. This is useful for refreshing a mapping, especially
            after the PCP server loses state. If the PCP client does not know
            the external port, or does not have a preference, it uses 0.</t>

            <t hangText="Suggested External IP Address:">Suggested external
            IPv4 or IPv6 address. This is useful for refreshing a mapping,
            especially after the PCP server loses state. If the PCP server can
            fulfill the request, it will do so. If the PCP client does not
            know the external address, or does not have a preference, it MUST
            use 0.</t>
          </list></t>

        <figure anchor="map_response"
                title="MAP OpCode Response Packet Format">
          <preamble>The following diagram shows the format of OpCode-specific
          information in a response packet for the MAP4 and MAP6
          OpCodes:</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Protocol    |          Reserved (24 bits)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Internal Port           |    Assigned External Port     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|        Assigned External IP Address (always 128 bits)         |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t>These fields are described below:<list style="hanging">
            <t hangText="Lifetime (in common header):">On a success response,
            this indicates the lifetime for this mapping, in seconds. On an
            error response, this indicates how long clients should assume
            they'll get the same error response from the that PCP server if
            they repeat the same request.</t>

            <t hangText="Protocol:">Copied from the request.</t>

            <t hangText="Reserved:">24 reserved bits, MUST be sent as 0 and
            MUST be ignored when received.</t>

            <t hangText="Internal Port:">Internal port for the mapping, copied
            from request.</t>

            <t hangText="Assigned External Port:">On success responses, this
            is the assigned external port for the mapping. On error responses,
            the value from Suggested External Port is used.</t>

            <t hangText="Assigned External IP Address:">On success responses,
            this is the assigned external IPv4 or IPv6 address for the
            mapping; IPv4 or IPv6 address is indicated by the OpCode. On error
            responses, the value from Suggested External IP Address is
            used.</t>
          </list></t>
      </section>

      <section anchor="map_result_codes" title="MAP Operation Result Codes">
        <t>In addition to the general PCP result codes (<xref
        target="result_codes"></xref>), the following additional result codes
        may be returned as a result of the two MAP OpCodes received by the PCP
        server. Each error code below is classified as either a 'long
        lifetime' error or a 'short lifetime' error, which provides guidance
        to PCP server developers for the value of the Lifetime field for these
        errors. It is RECOMMENDED that short lifetime errors use 30 second
        lifetime and long lifetime errors use 30 minute lifetime.<list
            style="hanging">
            <t hangText="20">NETWORK_FAILURE, PCP server or the device it
            controls are experiencing a network failure of some sort (e.g.,
            has not obtained an External IP address). This is a short lifetime
            error.</t>

            <t hangText="21">NO_RESOURCES, e.g., NAT device cannot create more
            mappings at this time. This is a system-wide error, and different
            from USER_EX_QUOTA. This is a short lifetime error.</t>

            <t hangText="22">UNSUPP_PROTOCOL, unsupported Protocol. This is a
            long lifetime error.</t>

            <t hangText="23">NOT_AUTHORIZED, e.g., PCP server supports
            mapping, but the feature is disabled for this PCP client, or the
            PCP client requested a mapping that cannot be fulfilled by the PCP
            server's security policy. This is a long lifetime error.</t>

            <t hangText="24">USER_EX_QUOTA, mapping would exceed user's port
            quota. This is a short lifetime error.</t>

            <t hangText="25">CANNOT_PROVIDE_EXTERNAL_PORT is returned only if
            the request included the PREFER_FAILURE Option, because otherwise
            a new external port could have been allocated. See <xref
            target="prefer_failure"></xref> for processing details. The error
            lifetime depends on the reason for the failure.</t>

            <!--
            <t hangText="26">IMPLICIT_MAPPING_EXISTS, is returned
            only if the request included the PREFER_FAILURE Option,
            because otherwise a new external port could have been
            allocated.  See <xref target="prefer_failure"></xref> for
            processing information.  This is a short lifetime error.</t>
-->

            <t hangText="26">EXCESSIVE_REMOTE_PEERS, indicates the PCP server
            was not able to create the filters in this request. This result
            code MUST only be returned if the MAP request contained the FILTER
            Option. See <xref target="filter"></xref> for processing
            information. This is a long lifetime error.</t>

            <!--
            <t hangText="27">IMPLICIT_MAPPING_EXISTS, indicates the
            Internal Host already has an implicit dynamic mapping on
            its same internal port as the Internal Port in the MAP
            request.  This error is only returned if the condition
            described
            in <xref target="implicit_mapping_exists"></xref> occurs.
            This is a short lifetime error, in the hope that the PCP
            client can retry the request and the implicit dynamic
            mapping will no longer exist.</t>
-->
          </list></t>

        <t>Additional result codes may be returned if the THIRD_PARTY Option
        is used, see <xref target="third_party"></xref>.</t>
      </section>

      <section anchor="map-opcode_client_operation"
               title="Generating a MAP Request">
        <t>This section and <xref target="lifetime"></xref> describe the
        operation of a PCP client when sending requests with OpCodes MAP4 and
        MAP6.</t>

        <t>The request MAY contain values in the Suggested External Port and
        Suggested External IP Address fields. This allows the PCP client to
        attempt to rebuild lost state on the PCP server, which improves the
        chances of existing connections surviving, and helps the PCP client
        avoid having to change information maintained at its rendezvous
        server. Of course, due to other activity on the network (e.g., by
        other users or network renumbering), the PCP server may not be able
        grant the suggested External IP Address and Port, and in that case it
        will allocate a different External IP Address and Port.</t>

        <t>An existing mapping can have its lifetime extended by the PCP
        client. To do this, the PCP client sends a new MAP request indicating
        the internal port. The PCP MAP request SHOULD also include the
        currently allocated external IP address and port as the suggested
        external IP address and port, so that if the NAT gateway has lost
        state it can recreate the lost mapping with the same parameters.</t>

        <t>The PCP client SHOULD renew the mapping before its expiry time,
        otherwise it will be removed by the PCP server (see <xref
        target="lifetime"></xref>). In order to prevent excessive PCP chatter,
        it is RECOMMENDED to send a single renewal request packet when a
        mapping is halfway to expiration time, then, if no SUCCESS result is
        received, another single renewal request 3/4 of the way to expiration
        time, and then another at 7/8 of the way to expiration time, and so
        on, subject to the constraint that renewal requests MUST NOT be sent
        less than four seconds apart (a PCP client MUST NOT send a flood of
        ever-closer-together requests in the last few seconds before a mapping
        expires).</t>
      </section>

      <section anchor="map-opcode_server_operation"
               title="Processing a MAP Request">
        <t>This section and <xref target="lifetime"></xref> describe the
        operation of a PCP server when processing a request with the OpCodes
        MAP4 or MAP6. Processing SHOULD be performed in the order of the
        following paragraphs</t>

        <t>If the requested lifetime is non-zero, it indicates a request to
        create a mapping or extend the lifetime of an existing mapping.
        However, if the request also contains Internal Port equal to 0 or
        Protocol equal to 0, the server MUST generate a MALFORMED_REQUEST
        error.</t>

        <t>If the requested lifetime is zero, it indicates a request to delete
        an existing mapping or set of mappings.</t>

        <t>Processing of the lifetime is described in <xref
        target="lifetime"></xref>.</t>

        <t>If the PCP-controlled device is stateless (that is, it does not
        establish any per-flow state, and simply rewrites the address and/or
        port in a purely algorithmic fashion), the PCP server simply returns
        an answer indicating the external IP address and port yielded by this
        stateless algorithmic translation. This allows the PCP client to learn
        its external IP address and port as seen by remote peers. Examples of
        stateless translators include stateless NAT64 and 1:1 NAT44, both of
        which modify addresses but not port numbers.</t>

        <t>If an Option with value less than 128 exists (i.e., mandatory to
        process) but that Option does not make sense (e.g., the PREFER_FAILURE
        Option is included in a request with lifetime=0), the request is
        invalid and generates a MALFORMED_OPTION error.</t>

        <!--
        <t>If the REMOTE_PEER Option is not included in the request and it is
        impossible for the PCP-controlled device to establish a mapping
        because a conflicting dynamic mapping already exists, the PCP server
        responds with the error AMBIGUOUS (this is due to interactions with
        dynamic mappings, see <xref target="dynamic-interaction"></xref>).</t>
-->

        <t>If a mapping already exists for the requested Internal Address and
        Port, the PCP server MUST refresh the lifetime of that
        already-existing mapping, and return the already-existing External
        Address and Port in its response.</t>

        <t>If no mapping already exists for the requested Internal Address and
        Port, and the PCP server is able to create a mapping using the
        Suggested External Address and Port, it SHOULD do so. This is
        beneficial for re-establishing state lost when the PCP server loses
        its state (e.g., due to a reboot). If the PCP server cannot allocate
        the Suggested External Address and Port but can allocate some other
        External Address and Port (and the request did not contain the
        PREFER_FAILURE Option) the PCP server MUST do so and return the newly
        allocated External Address and Port in the response. Cases where a NAT
        gateway cannot allocate the Suggested External Address and Port
        include: <list style="symbols">
            <t>Where the Suggested External Address and Port is already
            allocated to another existing explicit, implicit, or static
            mapping (i.e., is already forwarding traffic to some other
            internal address and port; or</t>

            <t>Where the Suggested External Address and Port is already used
            by the NAT gateway for one of its own services (e.g., port 80 for
            the NAT gateway's own configuration pages); or</t>

            <t>When the Suggested External Address and Port is otherwise
            prohibited by the PCP server's policy.</t>
          </list></t>

        <t>By default, a PCP-controlled device MUST NOT create mappings for a
        protocol not indicated in the request. For example, if the request was
        for a TCP mapping, a UDP mapping MUST NOT be created.</t>

        <t>If the THIRD_PARTY Option is not present in the request, the source
        IP address of the PCP packet is used as the Internal Address for the
        mapping. If the THIRD_PARTY Option is present, the PCP server
        validates that the client is authorized to make mappings on behalf of
        the indicated Internal IP Address. This validation depends on the PCP
        deployment scenario; see <xref target="THIRD_PARTY_auth"></xref> for
        an example validation procedure. If the internal IP address in the PCP
        request is not authorized to make mappings on behalf of the indicated
        internal IP address, an error response MUST be generated with result
        code NOT_AUTHORIZED.</t>

        <t>Mappings typically consume state on the PCP-controlled device, and
        it is RECOMMENDED that a per-host and/or per-subscriber limit be
        enforced by the PCP server to prevent exhausting the mapping state. If
        this limit is exceeded, the result code USER_EX_QUOTA is returned.</t>

        <!--

<t>If an implicit dynamic mapping already exists for this same
Internal Host and same Internal Port indicated in the MAP request, the
PCP server SHOULD generate an IMPLICIT_MAPPING_EXISTS error.
See <xref target="implicit_mapping_exists"></xref> for a more detailed
explanation.</t>
-->

        <t>If all of the preceding operations were successful (did not
        generate an error response), then the requested mapping is created or
        refreshed as described in the request and a SUCCESS response is built.
        This SUCCESS response contains the same OpCode as the request, but
        with the "R" bit set.</t>
      </section>

      <section title="Processing a MAP Response">
        <t>This section describes the operation of the PCP client when it
        receives a PCP response for the OpCodes MAP4 or MAP6.</t>

        <t>After performing common PCP response processing, the response is
        further matched with an outstanding request by comparing the protocol,
        internal IP address, and internal port. On an error response, the
        assigned external address and assigned external port can also be used
        to match the responses (which is useful if several requests with the
        PREFER_FAILURE Option are outstanding). Other fields are not compared,
        because the PCP server sets those fields.</t>

        <t>On a successful response, the PCP client can use the External IP
        Address and Port as desired. Typically the PCP client will communicate
        the External IP Address and Port to another host on the Internet using
        an application-specific rendezvous mechanism such as DNS SRV records.</t>

        <t>The PCP client MUST also set a timer or otherwise schedule an event to
        renew the mapping before its lifetime expires. Renewing a mapping is
        performed by sending another MAP request, exactly as described above
        in <xref target="map-opcode_client_operation"></xref>, except that the
        Suggested External Address and Port SHOULD be set to the values
        received in the successful response. This allows the same mapping to
        be recreated in the event of PCP server state loss. From the PCP
        server's point of view a MAP request to renew a mapping is identical
        to a MAP request to request a new mapping, and is handled identically.
        Indeed, in the event of PCP server state loss, a renewal request from
        a PCP client will appear to the server to be a request for a new
        mapping, with a particular Suggested External Address and Port, which
        happens to be what the PCP server previously allocated. See also
<xref target="maintaining_mappings"></xref>.</t>

        <t>On an error response, clients SHOULD NOT repeat the same request to
        the same PCP server within the lifetime returned in the response.</t>
      </section>

      <section anchor="lifetime" title="Mapping Lifetime and Deletion">
        <t>The PCP client requests a certain lifetime, and the PCP server
        responds with the assigned lifetime. The PCP server MAY grant a
        lifetime smaller or larger than the requested lifetime. The PCP server
        SHOULD be configurable for permitted minimum and maximum lifetime, and
        the RECOMMENDED values are 120 seconds for the minimum value and 24
        hours for the maximum. It is RECOMMENDED that the server be
        configurable to restrict lifetimes to less than 24 hours, because
        mappings will consume ports even if the Internal Host is no longer
        interested in receiving the traffic or no longer connected to the
        network. These recommendations are not strict, and deployments should
        evaluate the trade offs to determine their own minimum and maximum
        lifetime values.</t>

        <t>Once a PCP server has responded positively to a mapping request for
        a certain lifetime, the port forwarding is active for the duration of
        the lifetime unless the lifetime is reduced by the PCP client (to a
        shorter lifetime or to zero) or until the PCP server loses its state
        (e.g., crashes). Mappings created by PCP MAP requests are not special
        or different from mappings created in other ways. In particular, it is
        implementation-dependent if outgoing traffic extends the lifetime of
        such mappings beyond the PCP-assigned lifetime. PCP clients MUST NOT
        depend on this behavior to keep mappings active, and MUST explicitly
        renew their mappings as required by the Lifetime field in PCP response
        messages.</t>

        <t>If the requested lifetime is zero (lifetime==0) then: <list
            style="symbols">
            <t>If the internal port is non-zero (port!=0) and protocol is
            non-zero (protocol!=0), it indicates a request to delete the
            indicated mapping immediately.</t>

            <t>If the internal port is zero (port==0) and the protocol is
            non-zero (protocol!=0), it indicates a request to delete all
            mappings for this Internal Address for the given transport
            protocol.</t>

            <t>If the internal port is non-zero (port!=0) and the protocol is
            zero (protocol==0), it indicates a request to delete all mappings
            for this Internal Address for the given port for all transport
            protocols.</t>

            <t>If the internal port is zero (port==0) and protocol is zero
            (protocol==0), it indicates a request to delete all mappings for
            this Internal Address for all transport protocols. This is useful
            when a host reboots or joins a new network, to clear out prior
            stale state from the NAT gateway before beginning to install new
            mappings.</t>
          </list>The suggested external address and port fields are ignored in
        requests where the requested lifetime is 0.</t>

        <t>If the PCP client attempts to delete a single static mapping (i.e.,
        a mapping created outside of PCP itself), the error NOT_AUTHORIZED is
        returned. If the PCP client attempts to delete an implicit dynamic
        mapping, the PCP server deletes the mapping and filtering and responds
        with the SUCCESS result code. If the PCP client attempts to delete a
        mapping that does not exist, the SUCCESS result code is returned (this
        is necessary for PCP to be idempotent). If the PCP MAP request was for
        port=0 (indicating 'all ports'), the PCP server deletes all of the
        explicit dynamic mappings it can (but not any implicit or static
        mappings), and returns a SUCCESS response. If the deletion request was
        properly formatted and successfully processed, a SUCCESS response is
        generated with lifetime of 0 and the server copies the protocol and
        internal port number from the request into the response. An explicit
        dynamic mapping MUST NOT have its lifetime reduced by transport
        protocol messages (e.g., TCP RST, TCP FIN).</t>

        <t>An application that forgets its PCP-assigned mappings (e.g., the
        application or OS crashes) will request new PCP mappings. This may
        consume port mappings, if the application binds to a different
        Internal Port every time it runs. The application will also likely
        initiate new implicit dynamic mappings without using PCP, which will
        also consume port mappings. If there is a port mapping quota for the
        Internal Host, frequent restarts such as this may exhaust the quota.
        PCP provides some protections against such port consumption: When a
        PCP client first acquires a new IP address (e.g., reboots or joins a
        new network), it SHOULD remove mappings that may already be
        instantiated for that new Internal Address. To do this, the PCP client
        sends a MAP request with protocol, internal port, and lifetime set to
        0. Some port mapping APIs (e.g., the "DNSServiceNATPortMappingCreate"
        API provided by Apple's Bonjour on Mac OS X, iOS, Windows, Linux <xref
        target="Bonjour"></xref>) automatically monitor for process exit
        (including application crashes) and automatically send port mapping
        deletion requests if the process that requested them goes away without
        explicitly relinquishing them.</t>

        <t>To reduce unwanted traffic and data corruption, External UDP and
        TCP ports SHOULD NOT be re-used for an interval (TIME_WAIT interval
        <xref target="RFC0793"></xref>). However, the PCP server SHOULD allow
        the previous user of the External Port to re-acquire the same port
        during that interval.</t>

        <t>As a side-effect of creating a mapping, ICMP messages associated
        with the mapping MUST be forwarded (and also translated, if
        appropriate) for the duration of the mapping's lifetime. This is done
        to ensure that ICMP messages can still be used by hosts, without
        application programmers or PCP client implementations needing to
        signal PCP separately to create ICMP mappings for those flows.</t>

<!-- duplicates the list above, but in the other way around.

       <t>The following list summarizes the sentinel values when deleting a
        mapping using lifetime=0:<list style="hanging">
            <t
            hangText="*  all ports, all protocols, all Internal Addresses for which the client is authorized:">internal
            address=0, via the THIRD_PARTY Option</t>

            <t hangText="*  all ports, all protocols:">internal port=0,
            protocol=0</t>

            <t hangText="*  all ports, specific protocol:">internal port=0,
            protocol={protocol value} (e.g., protocol=6 for TCP)</t>

            <t hangText="*  specific port, all protocols:">internal port={port
            number}, protocol=0</t>

            <t hangText="*  specific port, specific protocol:">internal
            port={port number}, protocol={protocol value} (e.g., port=12345,
            protocol=6 for TCP)</t>
          </list></t>
-->
      </section>

      <section anchor="renumbering" title="Address Change Events">
        <t>The customer premises router might obtain a new IP address. This
        can occur because of a variety of reasons including a reboot, power
        outage, DHCP lease expiry, or other action by the ISP. If this occurs,
        traffic forwarded to the host's previous address might be delivered to
        another host which now has that address. This affects both implicit
        dynamic mappings and explicit dynamic mappings. However, this same
        problem already occurs today when a host's IP address is re-assigned,
        without PCP and without an ISP-operated CGN. The solution is the same
        as today: the problems associated with host renumbering are caused by
        host renumbering and are eliminated if host renumbering is avoided.
        PCP defined in this document does not provide machinery to reduce the
        host renumbering problem.</t>

        <t>When an Internal Host changes its IP address (e.g., by having a
        different address assigned by the DHCP server) the NAT (or firewall)
        will continue to send traffic to the old IP address. Typically, the
        Internal Host will no longer receive traffic sent to that old IP
        address. Assuming the Internal Host wants to continue receiving
        traffic, it needs to install new mappings for its new IP address. The
        suggested external port field will not be fulfilled by the PCP server,
        in all likelihood, because it is still being forwarded to the old IP
        address. Thus, a mapping is likely to be assigned a new external port
        number and/or public IP address. Note that such host renumbering is
        not expected to happen routinely on a regular basis for most hosts,
        since most hosts renew their DHCP leases before they expire (or
        re-request the same address after reboot) and most DHCP servers honor
        such requests and grant the host the same address it was previously
        using before the reboot.</t>

        <t>A host might gain or lose interfaces while existing mappings are
        active (e.g., Ethernet cable plugged in or removed, joining/leaving a
        WiFi network). Because of this, if the PCP client is sending a PCP
        request to maintain state in the PCP server, it SHOULD ensure those
        PCP requests continue to use the same interface (e.g., when refreshing
        mappings). If the PCP client is sending a PCP request to create new
        state in the PCP server, it MAY use a different source interface or
        different source address.</t>
      </section>
    </section>

    <?rfc needLines="12" ?>

    <section anchor="peer_opcodes" title="PEER OpCodes">
      <t>This section defines two OpCodes for controlling dynamic connections.
      They are:<list hangIndent="12" style="hanging">
          <t hangText=" PEER4=3:">Create an explicit dynamic mapping, or set
          or query an implicit dynamic mapping to a remote peer's IPv4 address
          and port.</t>

          <t hangText=" PEER6=4:">Create an explicit dynamic mapping, or set
          or query an implicit dynamic mapping to a remote peer's IPv6 address
          and port.</t>
        </list>The use of these OpCodes is described in this section.</t>

      <t>All compliant PCP Servers MUST support one or both PEER opcodes,
      appropriate to the address families they support (e.g., a traditional
      NAT44 gateway is not required to support PEER6). PCP Servers SHOULD
      provide a configuration option to allow administrators to disable PEER
      support if they wish.</t>

      <t>Note that mappings created or managed using PCP PEER requests may be
      Endpoint Independent Mappings or Endpoint Dependent Mappings, with
      Endpoint Independent Filtering or Endpoint Dependent Filtering,
      consistent with the existing behavior of the NAT gateway or firewall in
      question for implicit mappings it creates automatically as a result of
      observing outgoing traffic from Internal Hosts.</t>

      <?rfc needLines="30" ?>

      <section title="PEER Operation Packet Formats">
        <t>The PEER OpCodes provide the ability for the PCP client to create,
        query and (possibly) extend the lifetime of a mapping and its
        associated filtering.</t>

        <t>The two PEER OpCodes (PEER4 and PEER6) share a similar packet
        layout for both requests and responses. Because of this similarity,
        they are shown together.</t>

        <figure anchor="peer_request"
                title="PEER OpCode Request Packet Format">
          <preamble>The following diagram shows the request packet format for
          PEER4 and PEER6. This packet format is aligned with the response
          packet format:</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol     |   Reserved (24 bits)                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Internal Port          |    Suggested External Port    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Remote Peer Port        |     Reserved (16 bits)        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|           Remote Peer IP Address (always 128 bits)            |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|        Suggested External IP address (always 128 bits)        |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t>These fields are described below:<list style="hanging">
            <t hangText="Requested Lifetime (in common header):">Requested
            lifetime of this mapping, in seconds. Note that, depending on the
            implementation of the PCP-controlled device, it may not be
            possible to reduce the lifetime of a mapping (or delete it, with
            requested lifetime=0) using PEER.</t>

            <t hangText="Protocol:">upper-level protocol associated with this
            OpCode. Values are taken from the <xref
            target="proto_numbers">IANA protocol registry</xref>. For example,
            this field contains 6 (TCP) if the OpCode is describing a TCP
            peer.</t>

            <t hangText="Reserved:">24 reserved bits, MUST be 0 on
            transmission and MUST be ignored on reception.</t>

            <t hangText="Internal Port:">Internal Port of the 5-tuple.</t>

            <t hangText="Suggested External Port:">Suggested external port for
            the mapping. This is useful for refreshing a mapping, especially
            after the PCP server loses state. If the PCP server can fulfill
            the request, it will do so. If the client is not attempting to
            re-create a mapping, it MUST use the value 0.</t>

            <t hangText="Remote Peer Port:">Remote peer's port of the
            5-tuple.</t>

            <t hangText="Reserved:">16 reserved bits, MUST be 0 on
            transmission and MUST be ignored on reception.</t>

            <t hangText="Remote Peer IP Address:">This is the Remote peer's IP
            address from the perspective of the PCP client, so that the PCP
            client does not need to concern itself with NAT64 or NAT46 (which
            both cause the client's idea of the remote peer's IP address to
            differ from the remote peer's actual IP address). This field
            allows the PCP client and PCP server to disambiguate multiple
            connections from the same port on the Internal Host to different
            servers, and does not create or adjust the filtering associated
            with the mapping (for that, the FILTER option is used, <xref
            target="filter"></xref>).</t>

            <t hangText="Suggested External IP Address:">Suggested External IP
            Address for the mapping. If the client is not attempting to
            re-create a mapping, it MUST use the value 0.</t>
          </list></t>

        <t>When attempting to re-create a lost mapping, the Suggested External
        IP Address and Port are set to the External IP Address and Port fields
        received in a previous PEER response from the PCP server. On an
        initial PEER request, the External IP Address and Port are set to
        zero.</t>

        <figure anchor="peer_response"
                title="PEER OpCode Response Packet Format">
          <preamble>The following diagram shows the response packet format for
          PEER4 and PEER6:</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Protocol     |   Reserved (24 bits)                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Internal Port          |     External Port             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Remote Peer Port        |     Reserved (16 bits)        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|           Remote Peer IP Address (always 128 bits)            |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|          External IP Address (always 128 bits)                |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t><list style="hanging">
            <t hangText="Lifetime (in common header):">On a success response,
            this indicates the lifetime for this mapping, in seconds. On an
            error response, this indicates how long clients should assume
            they'll get the same error response from the PCP server if they
            repeat the same request.</t>

            <t hangText="Protocol:">Copied from the request.</t>

            <t hangText="Reserved:">24 reserved bits, MUST be 0 on
            transmission, MUST be ignored on reception.</t>

            <t hangText="Internal Port:">Copied from request.</t>

            <t hangText="External Port:">For success responses, this is the
            external port number, assigned by the NAT (or firewall) to this
            mapping. If firewall or 1:1 NAT, this will match the internal
            port.</t>

            <t hangText="Remote Peer port:">Copied from request.</t>

            <t hangText="Reserved:">16 reserved bits, MUST be 0 on
            transmission, MUST be ignored on reception.</t>

            <t hangText="Remote Peer IP Address:">Copied from the request.</t>

            <t hangText="External IP Address:">For success responses, this
            contains the External IP address, assigned by the NAT (or
            firewall) to this mapping. If the PCP-controlled device is a firewall, this will match the
            Internal IP address. For error responses, the value is copied from
            the request.</t>
          </list></t>
      </section>

      <section anchor="peer_result_codes" title="PEER Operation Result Codes">
        <t>In addition to the general PCP result codes (<xref
        target="result_codes"></xref>), the PCP server may return the same
        result codes for PEER OpCodes as for MAP OpCodes (see <xref
        target="map_result_codes"></xref>).</t>
      </section>

      <section anchor="peer_opcode_client_operation"
               title="Generating a PEER Request">
        <t>This section describes the operation of a client when generating
        the OpCodes PEER4 or PEER6.</t>

        <t>The PEER4 or PEER6 OpCodes MAY be sent before or after establishing
        bi-directional communication with the remote peer. If sent before,
        PEER4 or PEER6 OpCodes will create a mapping in the PCP-controlled
        device. If sent after, the PEER4 or PEER6 OpCodes query the state of
        the implicit dynamic mapping, recreate the implicit dynamic mapping if
        it as been lost, and possibly modify its lifetime (for the purpose
        described in <xref target="keepalives"></xref>).</t>

        <t>The PEER4 and PEER6 OpCodes contain a description of the remote
        peer address, from the perspective of the PCP client. Note that when
        the PCP-controlled device is performing address family translation
        (NAT46 or NAT64), the remote peer address from the perspective of the
        PCP client is different from the remote peer address on the other side
        of the address family translation device.</t>
      </section>

      <section anchor="peer-opcode_server_operation"
               title="Processing a PEER Request">
        <t>This section describes the operation of a server when receiving a
        request with the OpCode PEER4 or PEER6. Processing SHOULD be performed
        in the order of the following paragraphs.</t>

        <t>On receiving the PEER4 or PEER6 OpCode, the PCP server examines the
        mapping table. If the requested mapping does not yet exist yet, it is
        created, and the Suggested External Address and Port are honored (if
        possible; if not possible, a mapping to a different External Address
        and Port is created). By having PEER create such a mapping, we avoid a
        race condition between the PEER request or the initial outgoing packet
        arriving at the NAT gateway first, and allow PEER to be used to
        recreate an implicit dynamic mapping (see last paragraph of <xref
        target="reboot"></xref>).</t>

        <t>The PEER4 or PEER6 OpCode MAY reduce the lifetime of an existing
        mapping; this is implementation-dependent.</t>

        <t>If the PCP-controlled device can extend the lifetime of a mapping,
        the PCP server uses the smaller of its configured maximum lifetime
        value and the requested lifetime from the PEER request, and sets the
        lifetime to that value.</t>

        <t>If all of the proceeding operations were successful (did not
        generate an error response), then a SUCCESS response is generated,
        with the Lifetime field containing the lifetime of the mapping.</t>

        <t>After a successful PEER response is sent, it is
        implementation-specific if the PCP-controlled device destroys the
        mapping when the lifetime expires, or if the PCP-controlled device's
        implementation allows traffic to keep the mapping alive. Thus, if the
        PCP client wants the mapping to persist beyond the lifetime, it MUST
        refresh the mapping (by sending another PEER message) prior to the
        expiration of the lifetime. If the mapping is terminated by the TCP
        client or server (e.g., TCP FIN or TCP RST), the mapping will be
        destroyed normally; the mapping will not persist for the time
        indicated by Lifetime. This means the Lifetime in a PEER response
        indicates how long the mapping will persist in the absence of a
        transport termination message (e.g., TCP RST).</t>
      </section>

      <section title="Processing a PEER Response">
        <t>This section describes the operation of a client when processing a
        response with the OpCode PEER4 or PEER6.</t>

        <t>After performing common PCP response processing, the response is
        further matched with a request by comparing the protocol, internal IP
        address, internal port, remote peer address and remote peer port.
        Other fields are not compared, because the PCP server changes those
        fields to provide information about the mapping created by the
        OpCode.</t>

        <t>On a successful response, the application can use the assigned
        lifetime value to reduce its frequency of application keepalives for
        that particular NAT mapping. Of course, there may be other reasons,
        specific to the application, to use more frequent application
        keepalives. For example, the PCP assigned lifetime could be one hour
        but the application may want to maintain state on its server (e.g.,
        "busy" / "away") more frequently than once an hour.</t>

        <t>If the PCP client wishes to keep this mapping alive beyond the
        indicated lifetime, it SHOULD issue a new PCP request prior to the
        expiration. That is, inside->outside traffic is not sufficient to
        ensure the mapping will continue to exist. It is RECOMMENDED to send a
        single renewal request packet when a mapping is halfway to expiration
        time, then, if no SUCCESS response is received, another single renewal
        request 3/4 of the way to expiration time, and then another at 7/8 of
        the way to expiration time, and so on, subject to the constraint that
        renewal requests MUST NOT be sent less than four seconds apart (a PCP
        client MUST NOT ever-closer-together requests in the last few seconds
        before a mapping expires).</t>

        <t><list style="empty">
            <t>Note: implementations need to expect the PEER response may
            contain an External IP Address with a different family than the
            Remote Peer IP Address, e.g., when NAT64 or NAT46 are being
            used.</t>
          </list></t>
      </section>
    </section>

    <section anchor="map_peer_options"
             title="Options for MAP and PEER OpCodes">
      <t>This section describes Options for the MAP4, MAP6, PEER4 and PEER6
      OpCodes. These Options MUST NOT appear with other OpCodes, unless
      permitted by those OpCodes.</t>

      <section anchor="third_party"
               title="THIRD_PARTY Option for MAP and PEER OpCodes">
        <t>This Option is used when a PCP client wants to control a mapping to
        an Internal Host other than itself. This is used with both MAP and
        PEER OpCodes.</t>

        <t>A THIRD_PARTY Option MUST NOT contain the same address as the
        source address of the packet. A PCP server receiving a THIRD_PARTY
        Option specifying the same address as the source address of the packet
        MUST return a MALFORMED_REQUEST result code. This is because many PCP
        servers may not implement the THIRD_PARTY Option at all, and a client
        using the THIRD_PARTY Option to specify the same address as the source
        address of the packet will cause mapping requests to fail where they
        would otherwise have succeeded.</t>

        <t>Where possible, it may beneficial if a client using the THIRD_PARTY
        Option to create and maintain mappings on behalf of some other device
        can take steps to verify that the other device is still present and
        active on the network. Otherwise the client using the THIRD_PARTY
        Option to maintain mappings on behalf of some other device risks
        maintaining those mappings forever, long after the device that
        required them has gone. This would defeat the purpose of PCP mappings
        having a finite lifetime so that they can be automatically deleted
        after they are no longer needed.</t>

        <figure anchor="fig_third_party"
                title="THIRD_PARTY Option packet format">
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|    Internal IP Address (always 128 bits)                      |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t>The fields are described below:<list style="hanging">
            <t hangText="Internal IP Address:">Internal IP address for this
            mapping. If the option length is zero, there is no Internal IP
            address for this mapping and this indicates "all Internal IPv4 and
            IPv6 Addresses for which this client is authorized" which is used
            to delete all pre-existing mappings with the MAP Opcode.</t>
          </list></t>

        <t>This Option:<list style="empty">
            <?rfc subcompact="yes"?>

            <t>name: THIRD_PARTY</t>

            <t>Number: 4</t>

            <t>Purpose: Indicates the MAP or PEER request is for a host other
            than the host sending the PCP Option.</t>

            <t>Valid for OpCodes: MAP4, MAP6, PEER4, PEER6</t>

            <t>Length: 0 or 4</t>

            <t>May appear in: request. May appear in response only if it
            appeared in the associated request.</t>

            <t>Maximum occurrences: 1</t>

            <?rfc subcompact="no"?>
          </list></t>

        <t>The following additional result code may be returned as a result of
        using this Option. <list style="hanging">
            <t hangText="51">UNAUTH_THIRD_PARTY_INTERNAL_ADDRESS, indicating
            the internal IP address specified is not permitted (e.g., client
            is not authorized to make mappings for this Internal Address, or
            is otherwise prohibited.). This error can be returned for both MAP
            and PEER requests. If this is a MAP request, this is a long-term
            error.</t>
          </list></t>

        <t>A PCP server MAY be configured to permit or to prohibit the use of
        the THIRD_PARTY Option. If this Option is permitted, properly
        authorized clients may perform these operations on behalf of other
        hosts. If this Option is prohibited, and a PCP server receives a PCP
        MAP request with a THIRD_PARTY Option, it MUST generate a
        UNAUTH_THIRD_PARTY_INTERNAL_ADDRESS response.</t>

        <t>It is RECOMMENDED that customer premises equipment implementing a
        PCP Server be configured to prohibit third party mappings by default.
        With this default, if a user wants to create a third party mapping,
        the user needs to interact out-of-band with their customer premises
        router (e.g., using its HTTP administrative interface).</t>

        <t>It is RECOMMENDED that service provider NAT and firewall devices
        implementing a PCP Server be configured to permit the THIRD_PARTY
        Option, when sent by a properly authorized host. If the packet arrives
        from an unauthorized host, the PCP server MUST generate an
        UNAUTH_THIRD_PARTY_INTERNAL_ADDRESS error.</t>

        <t>Determining which PCP clients are authorized to use the
        THIRD_PARTY Option for which other hosts is
        deployment-dependent. For example, an ISP using Dual-Stack
        Lite could choose to allow a client connecting over a given
        IPv6 tunnel to manage mappings for any other host connecting
        over the same IPv6 tunnel, or the ISP could choose to allow
        only the DS-Lite B4 element to manage mappings for other hosts
        connecting over the same IPv6 tunnel. A cryptographic
        authentication and authorization model is outside the scope of
        this specification. Note that the THIRD_PARTY Option is not
        needed for today's common scenario of an ISP offering a single
        IP address to a customer who is using NAT to share that
        address locally, since in this scenario all the customer's
        hosts appear to be a single host from the point of view of the
        ISP.</t>

        <t>A PCP client can delete all PCP-created explicit dynamic mappings
        (i.e., those created by PCP MAP requests) that it is authorized to
        delete by sending a PCP MAP request including a zero-length
        THIRD_PARTY Option.</t>
      </section>

      <section anchor="prefer_failure"
               title="PREFER_FAILURE Option for MAP OpCodes">
        <t>This Option is only used with the MAP4 and MAP6 OpCodes.</t>

        <t>This Option indicates that if the PCP server is unable to map the
        Suggested External Port, then rather than returning an external port
        that it can allocate, the PCP server should instead allocate no
        external port and return an error. The error returned would be a
        general MAP error (e.g., NOT_AUTHORIZED) or the result code specific
        to this Option, CANNOT_PROVIDE_EXTERNAL_PORT.</t>

        <t>The result code CANNOT_PROVIDE_EXTERNAL_PORT is returned if the
        Suggested External Port cannot be mapped. This can occur because the
        External Port is already mapped to another host's implicit dynamic
        mapping, an explicit dynamic mapping, a static mapping, or the same
        Internal Address and Port has an implicit dynamic mapping which is
        mapped to a different External Port than requested. The server MAY set
        the Lifetime in the response to the remaining lifetime of the
        conflicting mapping, rounded up to the next larger integer number of
        seconds.</t>

        <!--
        <t>The result code IMPLICIT_MAPPING_EXISTS is returned if the
          requested external port cannot be mapped because an implicit
          dynamic mapping (from that same host's same internal port)
          already exists.  Existing implicit dynamic mappings from
          other internal hosts would not cause this error.
          <list style="empty"><t>Discussion: If the PREFER_FAILURE Option
          is not included, the IMPLICIT_MAPPING_EXISTS error IS never
          be sent.  This is because the NAT is either EIM (in which
          case an existing dynamic mapping is never a problem when
          processing a MAP request) or EDM which implements #2
          described in <xref target="EDM"></xref> to avoid
          bothering PCP clients with this error.</t></list></t>
-->

        <t>This Option exists solely for use by <xref
        target="I-D.bpw-pcp-upnp-igd-interworking">UPnP IGD
        interworking</xref>, where the semantics of UPnP IGD version 1 only
        allow the UPnP IGD client to dictate mapping a specific port. A PCP
        server MAY support this Option, if its designers wish to support
        downstream devices that perform UPnP IGD interworking. PCP servers MAY
        choose to rate-limit their handling of PREFER_FAILURE requests, to
        protect themselves from a rapid flurry of 65535 consecutive
        PREFER_FAILURE requests from clients probing to discover which
        external ports are available. PCP servers that are not intended to
        support downstream devices that perform UPnP IGD interworking are not
        required to support this Option. PCP clients other than UPnP IGD
        interworking clients SHOULD NOT use this Option because it results in
        inefficient operation, and they cannot safely assume that all PCP
        servers will implement it. It is anticipated that this Option will be
        deprecated in the future as more clients adopt PCP natively and the
        need for UPnP IGD interworking declines.</t>

        <t><list style="empty">
            <t>This Option:<list style="empty">
                <?rfc subcompact="yes"?>

                <t>Name: PREFER_FAILURE</t>

                <t>Number: 3</t>

                <t>Purpose: indicates that the PCP server should not create an
                alternative mapping if the suggested external port and address
                are not available.</t>

                <t>Valid for OpCodes: MAP4, MAP6</t>

                <t>Length: 0</t>

                <t>May appear in: requests</t>

                <t>Maximum occurrences: 1</t>

                <?rfc subcompact="no"?>
              </list></t>
          </list></t>
      </section>

      <section anchor="filter" title="FILTER Option for MAP OpCodes">
        <t>This Option indicates that filtering incoming packets is desired.
        The Remote Peer Port and Remote Peer IP Address indicate the permitted
        remote peer's source IP address and port for packets from the
        Internet. The remote peer prefix length indicates the length of the
        remote peer's IP address that is significant; this allows a single
        Option to permit an entire subnet. After processing this MAP request
        containing the FILTER Option and generating a successful response, the
        PCP-controlled device will drop packets received on its public-facing
        interface that don't match the filter fields. After dropping the
        packet, if its security policy allows, the PCP-controlled device MAY
        also generate an ICMP error in response to the dropped packet.</t>

        <figure anchor="fig_filter" title="FILTER Option layout">
          <preamble>The FILTER packet layout is described below:</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Reserved   | Prefix Length |      Remote Peer Port         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|     Remote Peer IP address (always 128 bits)                  |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>

        <t>These fields are described below:<list style="hanging">
            <t hangText="Reserved:">8 reserved bits, MUST be sent as 0 and
            MUST be ignored when received.</t>

            <t hangText="Prefix Length:">indicates how many bits of the IPv4
            or IPv6 address are relevant for this filter. The value 0
            indicates "no filter", and will remove all previous filters. See
            below for detail.</t>

            <t hangText="Remote Peer Port:">the port number of the remote
            peer. The value 0 indicates "all ports"</t>

            <t hangText="Remote Peer IP address:">The IP address of the remote
            peer.</t>
          </list></t>

        <t>This Option:<list style="empty">
            <?rfc subcompact="yes"?>

            <t>Name: FILTER</t>

            <t>Number: 2</t>

            <t>Purpose: specifies a filter for incoming packets</t>

            <t>Valid for OpCodes: MAP4, MAP6</t>

            <t>Length: 5</t>

            <t>May appear in: requests, and MUST appear in
            successfully-processed responses</t>

            <t>Maximum occurrences: as many as fit within maximum PCP message
            size</t>

            <?rfc subcompact="no"?>
          </list></t>

        <!--

This paragraph is detail justifying why FILTER is complicated with
PEER.  FILTER is only defined for MAP, so this detail is unnecessary.

        <t>On networks with a NAT, there can be an interactions with
        EDM NATs and this OpCode
        (see <xref target="EDM"></xref>).  Because of this, the
        FILTER Option MUST only be used by a client that is operating
        a server (that is, using the MAP OpCode), as this ensures that
        no other application will be assigned the same port for its
        outgoing connection. It is RECOMMENDED that the PCP client
        avoid other use, because it will cause some UNSAF NAT
        traversal mechanisms <xref target="RFC3424"></xref> to fail
        where they would have otherwise succeeded, breaking other
        applications running on this same host.  Networks without a
        NAT do not have these restrictions.</t>
-->

        <t>The Prefix Length indicates how many bits of the IPv6 address or
        IPv4 address are used for the filter. For MAP4, a Prefix Length of 32
        indicates the entire IPv4 address is used. For MAP6, a Prefix Length
        of 128 indicates the entire IPv6 address is used. For MAP4 the minimum
        Prefix Length value is 0 and the maximum value is 32. For MAP6 the
        minimum Prefix Length value is 0 and the maximum value is 128. Values
        outside those range cause an MALFORMED_OPTION result code.</t>

        <t>If multiple occurrences of the FILTER Option exist in the
        same MAP request, they are processed in the same order
        received (as per normal PCP Option processing) and they MAY
        overlap the filtering requested. If an existing mapping exists
        (with or without a filter) and the server receives a MAP
        request with FILTER, the filters indicated in the new request
        are added to any existing filters. If a MAP request has a
        lifetime of 0 and contains the FILTER Option, the error
        MALFORMED_OPTION is returned.</t>

        <t>If any of occurrences of the FILTER Option in a request packet are
        not successfully processed then an error is returned (e.g.,
        MALFORMED_OPTION if one of the Options was malformed) and as with
        other PCP errors, returning an error causes no state to be changed in
        the PCP server or in the PCP-controlled device.</t>

        <t>To remove all existing filters, the Prefix Length 0 is used. There
        is no mechanism to remove a specific filter.</t>

        <t>To change an existing filter, the PCP client sends a MAP request
        containing two FILTER Options, the first Option containing a Prefix
        Length of 0 (to delete all existing filters) and the second containing
        the new remote peer's IP address and port. Other FILTER Options in
        that PCP request, if any, add more allowed Remote Peers.</t>

        <t>The PCP server or the PCP-controlled device is expected to have a
        limit on the number of remote peers it can support. This limit might
        be as small as one. If a MAP request would exceed this limit, the
        entire MAP request is rejected with the result code
        EXCESSIVE_REMOTE_PEERS, and the state on the PCP server is
        unchanged.</t>

        <t>All PCP servers MUST support at least one filter per MAP
        mapping.</t>

        <t>The use of the FILTER Option can be seen as a performance
        optimization. Since all software using PCP to receive incoming
        connections also has to deal with the case where may be directly
        connected to the Internet and receive unrestricted incoming TCP
        connections and UDP packets, if it wishes to restrict incoming traffic
        to a specific source address or group of source addresses such
        software already needs to check the source address of incoming traffic
        and reject unwanted traffic. However, the FILTER Option is a
        particularly useful performance optimization for battery powered
        wireless devices, because it can enable them to conserve battery power
        by not having to wake up just to reject a unwanted traffic.</t>
      </section>

      <!--
      <section title="EVEN_PLUS_ONE">
        <t><xref target="RFC3550">RTP</xref> has historically used an
        even-numbered port, and RTCP the next-higher port (often abbreviated
        as "port + 1"). Some equipment still expects RTP/RTCP on adjacent
        ports. To accommodate that, the PCP Option EVEN_PLUS_ONE can be used
        by the PCP client and server, with the following procedure.</t>

        <t><list style="empty">
            <t>[Ed. Note: Are there any other protocols that need adjacent
            ports?]</t>
          </list></t>

        <t>The procedure is for the PCP client to bind to two ports on its
        local interface. It then sends a PCP request for external port 0
        (indicating it will accept any port from the server) for one of those
        internal ports and includes the PCP Option EVEN_PLUS_ONE with this
        request. If the server understands this Option, it will choose an
        even-numbered external port and will reserve the next-higher port with
        a short timeout (suggested duration is 10 seconds) for this same PCP
        client to allocate in a subsequent PCP request. The PCP server sends a
        response and indicates it performed that operation by including the
        PCP Option EVEN_PLUS_ONE in the response. The PCP client then sends a
        second PCP request for the next-higher external port. Refreshing and
        deleting the ports works as normal.</t>

        <figure anchor="even_plus_one_message_flow"
                title="Message Flow, EVEN_PLUS_ONE">
          <preamble>A diagram of the message flow:</preamble>

          <artwork align="center"><![CDATA[
PCP Client                               PCP server
   |                                          |
   |....request ext-port=0, EVEN_PLUS_ONE....>|
   |<.response ext-port=23456, EVEN_PLUS_ONE..|
   |....request ext-port=23457...............>|
   |<-response ext-port=23457.................|
   |                                          |
]]></artwork>
        </figure>

        <t>The PCP Option EVEN_PLUS_ONE always has an Option-Length of 0. When
        the PCP client wants an even-numbered port and the next-higher
        adjacent port, it includes the PCP Option EVEN_PLUS_ONE in its PCP
        request. If the server understands the Option, has successfully mapped
        an even-numbered external-port, and temporarily reserved the
        next-higher port for this PCP client, the server MUST include the
        EVEN_PLUS_ONE Option in its response. If the server understands the
        Option, but was unsuccessful at mapping an even-numbered port or
        unsuccessful at temporarily reserving the next-higher port for this
        PCP client, the server MUST NOT include the EVEN_PLUS_ONE Option in
        its response. If the server receives a PCP request with the
        EVEN_PLUS_ONE Option for an odd-numbered requested-external-port, it
        MUST return an error.</t>

        <t>This Option is permitted with the following OpCodes: MAP44, MAP64,
        MAP46, MAP66.</t>
      </section>
-->

      <!--
        <section title="REMOTE_PEER">
          <t>Due to a pre-existing dynamic mapping, a PCP server may not be
          able to instantiate a filter on a specific port. It is thus
          recommended that applications bind to the source port (to prevent
          other applications from using that same source port) prior to using
          this PCP Option.</t>

          <t>In those situations, the Option REMOTE_PEER is necessary to
          disambiguate the mappings. This Option does not change filtering
          behavior of the NAT or firewall.</t>

          <figure>
            <artwork align="center"><![CDATA[ 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Reserved                   |   Remote Peer Port            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
:                                                               :
:     Remote Peer IP address (32 bits if MAP44 or MAP64,        :
:              1 28 bits if MAP46 or MAP66)                     :
:                                                               :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+]]></artwork>
          </figure>

          <t><list style="empty">
              <t>This Option:<list style="empty">
                  <t>value: 129</t>
                  <t>is valid for OpCodes: MAP44, MAP64, MAP46, or MAP66</t>
                  <t>is included in responses: MUST</t>
                  <t>length: 8 or 20</t>
                  <t>maximum occurrences:  1</t>
                </list></t>
            </list></t>
        </section>
-->
    </section>

    <!--
    <section title="NAT-PMP Transition">
      <t>Port Control Protocol (PCP) is a successor to NAT Port
      Mapping Protocol (NAT-PMP), and shares similar semantics,
      concepts, and packet formats. Because of this NAT-PMP and PCP
      can both use the same port, and use the NAT-PMP and PCP's
      version negotiation capabilities to determine which version to
      use.  This section describes how an orderly transition may be
      achieved.</t>

      <section title="NAT-PMP Clients Updated to Add PCP Support">
        <t>A client supporting both NAT-PMP and PCP SHOULD optimistically
        assume that the gateway supports PCP, since we expect that this will
        rapidly become the case, and we want to optimize for better
        performance in this case. A dual-mode client SHOULD send all its
        requests first using PCP packet format. If the gateway responds with a
        packet four or more bytes long, containing the following (NAT-PMP
        format) data in the first four bytes, then the dual-mode client SHOULD
        conclude that this NAT gateway supports only NAT-PMP, and SHOULD retry
        its request in the older NAT-PMP format.</t>

        <figure align="left" anchor="PMPGate"
                title="NAT-PMP Gateway Response to PCP Request">
          <preamble>NAT-PMP gateways respond to PCP requests with the
          following packet. The first byte (supported version) is zero. The
          second byte (OpCode) echoes back the request OpCode, with the top
          bit set. The third byte (high byte of the NAT-PMP result code) is
          zero. The fourth byte is 1 (NAT-PMP and PCP result code "Unsupported
          Version").</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| Version = 0 |R| OP = any    | Zero          |  Result = 1   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
      </section>

      <section title="NAT-PMP Gateways Updated to Add PCP Support">
        <t>A gateway supporting both NAT-PMP and PCP is able to handle and
        respond to requests using both packet formats. If the first byte of
        the packet is zero, a dual-mode gateway SHOULD parse the request as a
        NAT-PMP-format message and reply using a NAT-PMP-format response.
        Otherwise it should parse the request as a PCP-format message and
        respond accordingly.</t>

        <t>A PCP-only gateway receiving a NAT-PMP request (identified by the
        first byte being zero) MUST reply with the packet shown below, so that
        the NAT-PMP may log an error message informing the user that they need
        to update to a PCP-capable client.</t>

        <figure align="left" anchor="PCPGate"
                title="PCP Gateway Response to NAT-PMP Request">
          <preamble>PCP gateways respond to NAT-PMP requests (identified by
          the first byte being zero) with the following packet. The first byte
          (supported version) is 1. The second byte (OpCode) echoes back the
          request OpCode, with the top bit set. The third byte (high byte of
          the NAT-PMP result code) is zero. The fourth byte is 1 (NAT-PMP and
          PCP result code "Unsupported Version").</preamble>

          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| Version = 1 |R| OP = any    | Zero          |  Result = 1   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
      </section>
    </section>
-->

    <section anchor="implementation_considerations"
             title="Implementation Considerations">
      <t>This section provides non-normative guidance that may be useful to
      implementors.</t>

      <section anchor="EDM" title="Implementing MAP with EDM port-mapping NAT">
        <t>For implicit dynamic mappings, some existing NAT devices have
        endpoint-independent mapping (EIM) behavior while other NAT devices
        have endpoint-dependent mapping (EDM) behavior. NATs which have EIM
        behavior do not suffer from the problem described in this section. The
        IETF strongly encourages EIM behavior <xref
        target="RFC4787"></xref><xref target="RFC5382"></xref>.</t>

        <t>In such EDM NAT devices, the same external port may be used by an
        implicit dynamic mapping (from the same Internal Host or from a
        different Internal Host) and an explicit dynamic mapping. This
        complicates the interaction with the MAP4 and MAP6 OpCodes. With such
        NAT devices, there are two ways envisioned to implement the MAP4 and
        MAP6 OpCodes: <list style="numbers">
            <t>Have implicit dynamic mappings use a different set of public
            ports than explicit dynamic mappings (e.g., those created with
            MAP4 or MAP6), thus reducing the interaction problem between them;
            or</t>

            <t>On arrival of a packet (inbound from the Internet or outbound
            from an Internal Host), first attempt to use an implicit dynamic
            mapping to process that packet. If none match, then the incoming
            packet should use the explicit dynamic mapping to process that
            packet. This effectively 'prioritizes' implicit dynamic mappings
            above explicit dynamic mappings.</t>
          </list></t>
      </section>

      <section title="Lifetime of Explicit and Implicit Dynamic Mappings">
        <t>No matter if a NAT is EIM or EDM, it is possible that one (or more)
        implicit dynamic mappings, using the same internal port on the
        Internal Host, might be created before or after a MAP request. When
        this occurs, it is important that the NAT honor the Lifetime returned
        in the MAP response. Specifically, if a mapping was created with the
        MAP OpCode, the implementation needs to ensure that termination of an
        implicit dynamic mapping (e.g., via a TCP FIN handshake) does not
        prematurely destroy the MAP-created mapping. On a NAT that implements
        endpoint-independent mapping with endpoint-independent filtering, this
        could be implemented by extending the lifetime of the implicit dynamic
        mapping to the lifetime of the explicit dynamic mapping.</t>
      </section>

      <section anchor="failure" title="PCP Failure Scenarios">
        <t>If an event occurs that causes the PCP server to lose explicit
        dynamic mapping state (such as a crash or power outage), the mappings
        created by PCP are lost. Such loss of state is rare in a service
        provider environment (due to redundant power, disk drives for storage,
        etc.), but more common in a residential NAT device which does not
        write this information to non-volatile memory. Of course, due to
        outright failure of service provider equipment (e.g., software
        malfunction), state may still be lost.</t>

        <t>The Epoch allows a client to deduce when a PCP server may have lost
        its state. When the Epoch value is observed to be smaller than
        expected, the PCP client can attempt to recreate the mappings
        following the procedures described in this section.</t>

        <section anchor="reboot" title="Recreating Mappings">
          <!--
          <t>The PCP server SHOULD store mappings in persistent storage so
          when it is powered off or rebooted, it remembers the port mapping
          state of the network. Due to the physical architecture of some PCP
          servers, this is not always achievable (e.g., some non-volatile
          memory can withstand only a certain number of writes, so writing PCP
          mappings to such memory is generally avoided).</t>

          <t>However, maintaining this state is not essential for correct
          operation.
-->

          <t>A mapping renewal packet is formatted identically to an original
          mapping request; from the point of view of the client it is a
          renewal of an existing mapping, but from the point of view of a
          newly rebooted PCP server it appears as a new mapping request. In
          the normal process of routinely renewing its mappings before they
          expire, a PCP client will automatically recreate all its lost
          mappings.</t>

          <t>When the PCP server loses state and begins processing new PCP
          messages, its Epoch is reset and begins counting again from zero
          (per the procedure of <xref target="epoch"></xref>). As the result
          of receiving a packet where the Epoch field indicates that a reboot
          or similar loss of state has occurred, the client can renew its port
          mappings sooner, without waiting for the normal routine renewal
          time.</t>
        </section>

        <section title="Maintaining Mappings" anchor="maintaining_mappings">
          <t>A PCP client refreshes a mapping by sending a new PCP request
          containing information from the earlier PCP response. The PCP server
          will respond indicating the new lifetime. It is possible, due to
          reconfiguration or failure of the PCP server, that the public IP
          address and/or public port, or the PCP server itself, has changed
          (due to a new route to a different PCP server). To detect such
          events more quickly, the PCP client may find it beneficial to use
          shorter lifetimes (so that it communicates with the PCP server more
          often). If the PCP client has several mappings, the Epoch value only
          needs to be retrieved for one of them to verify the PCP server has
          not lost explicit dynamic mapping state.</t>

          <t>If the client wishes to check the PCP server's Epoch, it sends a
          PCP request for any one of the client's mappings. This will return
          the current Epoch value. In that request the PCP client could extend
          the mapping lifetime (by asking for more time) or maintain the
          current lifetime (by asking for the same number of seconds that it
          knows are remaining of the lifetime).</t>

          <t>If a PCP client changes its Internal IP Address (e.g., because
          the Internal Host has moved to a new network), and the PCP client
          wishes to still receive incoming traffic, it needs create new
          mappings on that new network. New mappings will typically also
          require an update to the application-specific rendezvous server if
          the External Address or Port are different to the previous values
          (see <xref target="operating_a_server"></xref> and <xref
          target="renumbering"></xref>).</t>
        </section>
      </section>
    </section>

    <!--
    <section anchor="scenarios" title="Deployment Scenarios">
      <section title="Dual-Stack Lite">
        <t>The interesting components in a Dual-Stack Lite deployment are the
        B4 element (which is the customer premises router) and the
        Address Family Transition Router (AFTR) element. The AFTR element
        terminates the IPv6-over-IPv4 tunnel and also implements a
        Carrier-Grade NAT44 function. The B4 element does not need to perform
        a NAT function (and usually does not perform a NAT function), but it
        does operate its own DHCP server and is the local network's default
        router.</t>

          <t>Various PCP deployment scenarios can be considered to control the
          PCP server in the AFTR element:<list style="numbers">
              <t>If UPnP IGD and NAT-PMP <xref
              target="I-D.cheshire-nat-pmp"></xref> are used in the LAN: an
              interworking function is required to be implemented by the B4
              element to ensure interworking between the protocol used in the
              LAN and PCP. Details of this interworking function are left for future work.</t>


              <t>Hosts behind the B4 element will either include a PCP client, UPnP IGD client, NAT-PMP client, or combination of these three.  <list style="letters">
                  <t>if a UPnP IGD client, the B4 element will need to include
                  an interworking function from UPnP IGD to PCP.</t>

                  <t>if a PCP client, the PCP client will communicate
                  directly with its nearest PCP server (e.g., built
                  into its B4 element).</t>
<t>if a NAT-PMP client, the NAT-PMP client will communicate with its default gateway (its B4 element), which will proxy NAT-PMP to the Dual-Stack Lite AFTR element.  Details of this proxy function are left for future work.</t>
                </list></t>

              <t>The B4 element includes a PCP client which is invoked by an
              HTTP-based configuration (as is common today). The internal IP
              address field in the PCP payload would be the Internal Host used
              in the port forwarding configuration.</t>
            </list></t>

          <t>In Dual-Stack Lite, the B4 element encapsulates its PCP messages
          into the IPv6 tunnel towards the AFTR element.  When proxying
          for other hosts, the B4 element will use the THIRD_PARTY
          Option with the MAP and PEER OpCodes.</t>
      </section>

      <section title="NAT64">
        <t>Hosts behind a NAT64 device can make use of PCP in order to
        perform port reservation (to get a publicly routable IPv4
        port).  For example, in such situations, the IPv6 host can use
        the MAP4 OpCode to operate a server that listens on the IPv4
        Internet.</t>

        <t>If the IANA-assigned IP address is used for the discovery of the
        PCP server, that IPv4 address can be placed into the IPv6 destination
        address following that particular network's well-known prefix or
        network-specific prefix, per <xref target="RFC6052"></xref>.</t>

      </section>

      <section title="NAT44 and NAT444">
        <t>Residential subscribers in NAT44 (and NAT444) deployments are
        usually given one IPv4 address, but may also be given several IPv4
        addresses. These addresses are not routable on the IPv4 Internet, but
        are routable between the subscriber's home and the ISP's CGN. To
        accommodate multiple hosts within a home, especially when provided
        insufficient IPv4 addresses for the number of devices in the home,
        subscribers operate a NAT device. When this occurs in conjunction
        with an upstream NAT44, this is nicknamed "NAT444".</t>


<list style="empty">
            <t>[Ed. Note: Does PCP need a mechanism to detect a
            non-PCP-supporting NAT between a PCP client and a PCP server? Or
            can that problem be detected by relying on the failure of PCP
            server Discovery? This is tracked as PCP Issue #25 <xref
            target="PCP-Issues"></xref>.]</t>
          </list></t>

      </section>

      <section title="IPv6 Simple Firewall">
        <t>Many IPv6 deployments will include a <xref target="RFC6092">simple
        firewall</xref>, which permits outgoing packets to initiate
        bi-directional communication but blocks unsolicited incoming packets,
        which is similar to PCP's security model that allows a host to create
        a mapping to itself. In many situations, especially residential
        networks that lack an IT staff, the security provided by an IPv6
        simple firewall and the security provided by PCP are compatible. In
        such situations, the IPv6 simple firewall and the IPv6 host can use
        the MAP6 OpCode to allow unsolicited incoming packets, so the host can
        operate a server.</t>
      </section>
    </section>
-->

    <!--
    <section anchor="upnp-interworking"
             title="Interworking with UPnP IGD 1.0 and 2.0">
      <t><list style="empty">
          <t>[Ed. Note: This UPnP IGD Interworking section will likely be
          moved to a separate document which will fully describe how a proxy
          needs to translate UPnP IGD messages into PCP messages. This is
          tracked as PCP Issue #28 <xref target="PCP-Issues"></xref>.]</t>
        </list></t>

      <t>The following diagram shows how UPnP IGD can be interworked with PCP,
      using an interworking function (IWF).</t>

      <figure align="center" anchor="igd-interworking-function"
              title="Network Diagram, Interworking UPnP IGD and PCP">
        <artwork><![CDATA[

xxx
]]></artwork>
      </figure>

      <section title="UPnP IGD 1.0 with AddPortMapping Action">
        <t>In <xref target="IGD">UPnP IGD 1.0</xref> it is only possible to
        request a specific port using the AddPortMapping action. Requiring a
        specific port is incompatible with both (1) a Carrier-Grade NAT and
        with (2) widely-deployed applications. Regarding (1), another
        subscriber is likely to already be using the same port, so it will be
        unavailable to this application to operate a server. Regarding (2), if
        the same popular application exists on two devices behind the same
        NAT, they cannot both get the same port. PCP cannot correct this
        behavior of UPnP IGD:1, but PCP does work with this behavior.</t>

        <t>Due to this incompatibility with address sharing and popular
        applications, future hosts and applications will either support UPnP
        IGD 2.0's AddAnyPortMapping method (see <xref
        target="upnp-2-interworking"></xref>) or, more likely, will support
        PCP natively.</t>

        <t>When a requested port assignment fails, most UPnP IGD control
        points will retry the port assignment requesting the next higher port
        or requesting a random port. These UPnP IGD requests are translated to
        PCP requests and sent to the PCP server. The requests include the
        PREFER_FAILURE Option, which causes the PCP server to return an error
        if it cannot allocate the requested port. The interworking function
        translates the PCP error response to a UPnP IGD error response. This
        repeats until the UPnP IGD client gives up or until the PCP server is
        able to return the requested port.</t>

        <figure align="left" anchor="message-flow-upnp-1"
                title="Message Flow: Interworking from UPnP IGD 1.0 AddPortMapping action to PCP">
          <preamble>Message flow would be similar to this:</preamble>

          <artwork align="center"><![CDATA[
UPnP Control Point             in-home CPE                 PCP server

xxx
]]></artwork>
        </figure>
      </section>

      <section anchor="upnp-2-interworking"
               title="UPnP IGD 2.0 with AddAnyPortMapping Action">
        <t>If the UPnP IGD control point and the UPnP IGD interworking
        function both implement <xref target="IGD-2">UPnP IGD 2.0</xref> and
        the UPnP IGD control point uses IGD 2's new AddAnyPortMapping action,
        only one round-trip is necessary. This is because AddAnyPortMapping
        has semantics similar to PCP's semantics, allowing the PCP server to
        assign any port.</t>

        <figure align="left" anchor="message-flow-upnp-2"
                title="Message Flow: Interworking from UPnP IGD 2.0 AddAnyPortMapping action to PCP">
          <preamble>Message flow would be similar to this:</preamble>

          <artwork align="center"><![CDATA[
UPnP Control Point           in-home CPE                 PCP server

xxx

]]></artwork>
        </figure>
      </section>

      <section title="Lifetime Maintenance">
        <t>UPnP IGD 1.0 and 2.0 provide a lifetime (PortMappingLeaseDuration),
        but it is seldom used by UPnP IGD control points, and does not allow
        the UPnP IGD to override the requested duration. Thus, the UPnP
        IGD/PCP interworking function is responsible for extending the
        lifetime of mappings that are still interesting to the UPnP IGD
        control point.</t>

        <t><list style="empty">
            <t>Note: It can be an implementation advantage, where possible,
            for the UPnP IGD/PCP interworking function to request a port
            mapping lifetime only while that client is active and connected.
            For example, creating a PCP mapping that is equal to the client's
            remaining DHCP lifetime is one useful approach.</t>
          </list></t>
      </section>
    </section>

-->

    <section title="Deployment Considerations">
      <section title="Ingress Filtering">
        <t>As with implicit dynamic mappings created by outgoing TCP packets,
        explicit dynamic mappings created via PCP use the source IP address of
        the packet as the Internal Address for the mappings. Therefore <xref
        target="RFC2827">ingress filtering</xref> should be used on the path
        between the Internal Host and the PCP Server to prevent the injection
        of spoofed packets onto that path.</t>
      </section>

      <section anchor="quota" title="Mapping Quota">
        <t>On PCP-controlled devices that create state when a mapping is
        created (e.g., NAT), the PCP server SHOULD maintain per-host and/or
        per-subscriber quotas for mappings. It is implementation-specific
        whether the PCP server uses a separate quotas for implicit, explicit,
        and static mappings, a combined quota for all of them, or some other
        policy.</t>
      </section>
    </section>

    <section anchor="security" title="Security Considerations">
      <!--
      <t>This document defines Port Control Protocol and two types of OpCodes,
      PEER and MAP. The PEER OpCode allows creating, querying and extending (if
      permitted) the lifetime of an existing implicit dynamic mapping, so a
      host can reduce its keepalive messages. The MAP OpCode allows creating,
      querying and extending a mapping so a host can receive incoming
      unsolicited connections from the Internet in order to run a server.</t>
-->

      <t>The PEER OpCode can create a mapping (which behaves exactly as if an
      implicit dynamic mapping were created (e.g., by a TCP SYN)). In that
      case, the security implications for PEER are similar to MAP, described
      below. When PEER is used to create, query or extend an existing mapping,
      it does not introduce any new security considerations, unless the
      THIRD_PARTY Option is included. Discussion of the THIRD_PARTY Option is
      below.</t>

      <t>Internet service providers do not generally filter traffic
      from the Internet towards their subscribers (with the exception
      of wireless providers who are interested in protecting both
      their radio access network and their subscriber's battery
      lifetime). However, when an ISP introduces stateful address
      sharing with a NAT device, such filtering will occur as a side
      effect of the NAT device. Filtering occurs as a side-effect of
      IPv4 NAT devices and may also occur with some IPv6 CPE
      devices <xref target="RFC6092"></xref>.  Unlike the PEER OpCode,
      the MAP OpCode allows a PCP client to create a mapping so that a
      host can receive inbound traffic and operate a server.  In some
      deployments the ability to accept connections from any host on
      the Internet may be considered a security issue. Security
      considerations for the MAP OpCode are described in the following
      sections.</t>

      <section title="Denial of Service">
        <t>Because of the state created in a NAT or firewall, a per-host
        and/or per-subscriber quota will likely exist for both implicit
        dynamic mappings and explicit dynamic mappings. A host might make an
        excessive number of implicit or explicit dynamic mappings, consuming
        an inordinate number of ports, causing a denial of service to other
        hosts. Thus, <xref target="quota"></xref> recommends that hosts be
        limited to a reasonable number of explicit dynamic mappings.</t>

        <t>An attacker, on the path between the PCP client and PCP server, can
        drop PCP requests, drop PCP responses, or spoof a PCP error, all of
        which will effective deny service. Through such actions, the PCP
        client would not be aware the PCP server might have actually processed
        the PCP request.</t>
      </section>

      <section title="Ingress Filtering">
        <t>It is important to prevent a host from fraudulently creating,
        deleting, or refreshing a mapping (or filtering) for another host,
        because this can expose the other host to unwanted traffic and
        consumes the other host's mapping quota. Both implicit and explicit
        dynamic mappings are created based on the source IP address in the
        packet, and hence depend on ingress filtering to guard against spoof
        source IP addresses. Thus, PCP relies on the same ingress filtering as
        today's implicit dynamic mappings and PCP does not create a new
        requirement for ingress filtering.</t>
      </section>

      <section anchor="THIRD_PARTY_auth"
               title="Authorizing THIRD_PARTY Internal Address">
        <t>The THIRD_PARTY Option contains a Internal Address field, which
        allows a PCP client to create, extend, or delete an implicit or
        explicit dynamic mapping for another host, as described in <xref
        target="third_party"></xref>.</t>

        <t>In most cases PCP Servers will reject all THIRD_PARTY requests.</t>

        <t>The one scenario were it is currently envisaged that THIRD_PARTY
        will be used is for DS-Lite deployments where the B4 devices
        implements an UPnP IGD Interworking gateway which handles IGD requests
        from clients on the local network and makes PCP mapping requests on
        their behalf, or the B4 devices implements an administrative web-based
        interface to allow users to manually create mapping requests. In this
        case it is envisaged that the DS-Lite PCP server will be configured to
        allow only B4 devices to make THIRD_PARTY requests, and only on behalf
        of other Internal Hosts sharing the same DS-Lite IPv6 tunnel. Since
        the B4 device is itself the DS-Lite IPv6 tunnel endpoint, it is in a
        position to guard against spoof packets being injected into that
        tunnel using the B4 device's IPv4 source address, so the DS-Lite PCP
        server can trust that packets received over the DS-Lite IPv6 tunnel
        with the B4 device's source IPv4 address did in fact originate from
        the B4 device.</t>

        <!--

        <t>When the Target Address is an IPv4 address, and does not
        match the PCP request's source IP address or address family,
        the following validation occurs:<list style="hanging">

            <t hangText="DS-Lite, Encapsulation Mode:">If the source
            address of the PCP request is not 192.0.0.6, the PCP server
            MUST generate an UNAUTH_TARGET_ADDRESS response code.</t>

            <t hangText="DS-Lite, Plain Mode:">The B4 element is the
            terminus of the DS-Lite IPv6 tunnel, and thus any PCP
            request received was sent by the B4 element itself.
            DS-Lite allows any IPv4 address within the DS-Lite tunnel,
            so any IPv4 Target Address is permitted.</t>

            <t hangText="NAT44 with one subscriber address:">The PCP server
            MUST generate an UNAUTH_TARGET_ADDRESS response code.</t>

            <t hangText="NAT44 with multiple subscriber
            addresses:">The PCP server determines the address
            range for the subscriber that sent this PCP request,
            as described for "all other configurations", below.</t>
          </list></t>

        <t>When the Target Address is an IPv6 address, and does not
        match the PCP request's source address or address family, the
        following validation occurs:<list style="hanging">

            <t hangText="DS-Lite, Encapsulation Mode:">If the source
IPv6 address is not the B4 element's IPv6 address, the PCP server MUST
generate an UNAUTH_TARGET_ADDRESS response code.</t>
</list></t>

        <t>All Other Configurations:  all other configurations

            <t hangText="all other configurations:">
This requires the
            PCP server interface with the service provider's database
            to determine if the Target Address belongs to the same
            subscriber. The specific interaction is beyond the scope
            of this document, but might be a database query or might
            be a configuration table on the PCP server (e.g.,
            subscribers with a certain network prefix all have an IPv4
            /24, others have an IPv4 /32, and others have an have an
            IPv6 /32).  Within that range, if the source IP address of
            the PCP request is not the highest-numbered host assigned
            to the subscriber, the PCP server MUST generate an
            UNAUTH_SOURCE_ADDRESS response code.  If the Target
            Address does not belong to the same subscriber, the PCP
            server MUST generate an UNAUTH_TARGET_ADDRESS response
            code.</t>


        </list></t>
-->
      </section>

      <!--
      <section title="Interference by Other Applications on Same Host">
        <t>An application running on a host can send PCP messages which create
        or delete mappings for ports related to other applications on that
        same host. This is by design. To reduce interference with other
        applications, it is strongly RECOMMENDED that applications
        implementing PCP themselves refrain from performing the delete-all MAP
        function (lifetime=0, port=0). Instead, it is RECOMMENDED that the MAP
        delete-all function be performed by the underlying operating
        system.</t>
      </section>
-->

      <section anchor="theft" title="Theft of mapping">
        <t>In the time between when a PCP server loses state and the PCP
        client notices the lower than expected Epoch value, it is possible
        that the PCP client's mapping will be acquired by another host (via an
        explicit dynamic mapping or implicit dynamic mapping). This means
        incoming traffic will be sent to a different host ("theft"). A
        mechanism to immediately inform the PCP client of state loss would
        reduce this interval, but would not eliminate this threat. The PCP
        client can reduce this interval by using a relatively short lifetime;
        however, this increases the amount of PCP chatter. This threat is
        reduced by using persistent storage of explicit dynamic mappings in
        the PCP server (so it does not lose explicit dynamic mapping state),
        or by ensuring the previous external IP address and port cannot be
        used by another host (e.g., by using a different IP address pool).</t>
      </section>
    </section>

    <section anchor="iana" title="IANA Considerations">
      <t>IANA is requested to perform the following actions:</t>

      <section anchor="iana_port" title="Port Number">
        <t>PCP will use port 5351 (currently assigned by IANA to <xref
        target="I-D.cheshire-nat-pmp">NAT-PMP</xref>). We request that IANA
        re-assign that same port number to PCP, and relinquish UDP port
        44323.</t>

        <t>[Note to RFC Editor: Please remove the text about relinquishing
        port 44323 prior to publication.]</t>
      </section>

      <section anchor="iana_opcodes" title="OpCodes">
        <t>IANA shall create a new protocol registry for PCP OpCodes,
        initially populated with the values in <xref
        target="map_opcodes"></xref>, <xref target="peer_opcodes"></xref>,
	and the value 0 for the "no-op" operation <xref
        target="I-D.cheshire-pcp-recovery">PCP Rapid Recovery</xref>. The
        value 127 is reserved.</t>

        <t>Additional OpCodes in the range 5-95 can be created via <xref
        target="RFC5226">Specification Required</xref>, and the range 96-126 is for
        <xref target="RFC5226">Private Use</xref>.</t>
      </section>

      <section anchor="iana_result_codes" title="Result Codes">
        <t>IANA shall create a new registry for PCP result codes, numbered
        0-255, initially populated with the result codes from <xref
        target="result_codes"></xref>, <xref
        target="map_result_codes"></xref>, and <xref
        target="third_party"></xref>. The values 0 and 255 are reserved.</t>

        <t>Additional Result Codes can be defined via <xref
        target="RFC5226">Specification Required</xref>.</t>
      </section>

      <section anchor="iana_ie" title="Options">
        <t>IANA shall create a new registry for PCP Options, numbered 0-255
        with an associated mnemonic. The values 0-127 are
        mandatory-to-process, and 128-255 are optional to process. The initial
        registry contains the Options described in <xref
        target="map_peer_options"></xref>. The Option values 127 and 255 are
        reserved.</t>

        <t>Additional PCP Option codes in the ranges 5-63 and 128-191
        can be created via <xref target="RFC5226">Specification
        Required</xref>, and the ranges 64-126 and 192-254 are
        for <xref target="RFC5226">Private Use</xref>.</t>
      </section>
    </section>

    <section title="Acknowledgments">
      <t>Thanks to Xiaohong Deng, Alain Durand, Christian Jacquenet, Jacni
      Qin, Simon Perreault, and James Yu for their comments and review. Thanks
      to Simon Perreault for highlighting the interaction of dynamic
      connections with PCP-created mappings.</t>

      <t>Thanks to Francis Dupont for his several thorough reviews of the
      specification, which improved the protocol significantly.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.0768"?>

      <?rfc include="reference.RFC.2119"?>

      <?rfc include='reference.RFC.2136'?>

      <?rfc include="reference.RFC.2827"?>

      <?rfc include='reference.RFC.3007'?>

      <?rfc include='reference.RFC.4193'?>

      <?rfc include="reference.RFC.5226"?>

      <?rfc include='reference.RFC.6056'?>

      <reference anchor="proto_numbers"
                 target="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml">
        <front>
          <title>Protocol Numbers</title>

          <author fullname="IANA" surname="IANA">
            <organization></organization>
          </author>

          <date year="2010" />
        </front>
      </reference>
    </references>

    <references title="Informative References">
      <?rfc include='reference.RFC.0793'?>

      <?rfc include='reference.RFC.1918'?>

      <?rfc include='reference.RFC.3022'?>

      <?rfc include='reference.RFC.3581'?>

      <?rfc include='reference.RFC.3587'?>

      <?rfc include='reference.RFC.4291'?>

      <?rfc include='reference.RFC.4787'?>

      <?rfc include='reference.RFC.4941'?>

      <?rfc include='reference.RFC.4961'?>

      <?rfc include='reference.RFC.5382'?>

      <?rfc include='reference.RFC.6092'?>

      <?rfc include='reference.RFC.6145'?>

      <?rfc include='reference.RFC.6146'?>

      <?rfc include='reference.I-D.miles-behave-l2nat'?>

      <?rfc include='reference.I-D.ietf-softwire-dual-stack-lite'?>

      <?rfc include='reference.I-D.bpw-pcp-upnp-igd-interworking'?>

      <?rfc include='reference.I-D.ietf-behave-lsn-requirements'?>

      <?rfc include='reference.I-D.cheshire-nat-pmp'?>

      <?rfc include='reference.I-D.cheshire-pcp-recovery'?>

      <?rfc include='reference.I-D.arkko-dual-stack-extra-lite'?>

      <!--
      <?rfc include='reference.RFC.5461'?>
      <?rfc include='reference.RFC.3424'?>
-->

      <reference anchor="DNS-SD">
        <front>
          <title>DNS-Based Service Discovery</title>

          <author fullname="Stuart Cheshire" initials="S" surname="Cheshire">
            <organization></organization>
          </author>

          <author fullname="Marc Krochmal" initials="M" surname="Krochmal">
            <organization></organization>
          </author>

          <date day="14" month="February" year="2011" />

          <abstract>
            <t>This document specifies how DNS resource records are named and
            structured to facilitate service discovery. Given a type of
            service that a client is looking for, and a domain in which the
            client is looking for that service, this allows clients to
            discover a list of named instances of that desired service, using
            standard DNS queries. This is referred to as DNS-based Service
            Discovery, or DNS-SD.</t>
          </abstract>
        </front>

        <seriesInfo name="Internet-Draft"
                    value="draft-cheshire-dnsext-dns-sd-09" />

        <format target="http://www.ietf.org/internet-drafts/draft-cheshire-dnsext-dns-sd-09.txt"
                type="TXT" />
      </reference>

      <reference anchor="Bonjour"
                 target="http://en.wikipedia.org/wiki/Bonjour_(software)">
        <front>
          <title>Bonjour</title>

          <author></author>

          <date />
        </front>
      </reference>

      <reference anchor="IGD"
                 target="http://upnp.org/specs/gw/UPnP-gw-WANIPConnection-v1-Service.pdf">
        <front>
          <title>WANIPConnection:1</title>

          <author fullname="UPnP Gateway Committee"
                  surname="UPnP Gateway Committee">
            <organization>UPnP Forum</organization>
          </author>

          <date month="November" year="2001" />
        </front>
      </reference>

      <!--
      <reference anchor="IGD-2"
                 target="http://upnp.org/specs/gw/UPnP-gw-WANIPConnection-v2-Service.pdf">
        <front>
          <title>Internet Gateway Device (IGD) V 2.0</title>

          <author fullname="UPnP Gateway Committee"
                  surname="UPnP Gateway Committee">
            <organization>UPnP Forum</organization>
          </author>

          <date month="September" year="2010" />
        </front>
      </reference>
-->

      <!--
      <reference anchor="PCP-Issues"
                 target="http://trac.tools.ietf.org/wg/pcp/trac/report/1">
        <front>
          <title>PCP Active Tickets</title>

          <author fullname="PCP Working Group" surname="PCP Working Group">
            <organization>IETF</organization>
          </author>

          <date month="January" year="2011" />
        </front>
      </reference>
-->

      <!--
      <reference anchor="I-D.bpw-pcp-proxy">
        <front>
          <title>Port Control Protocol (PCP) Proxy Function</title>

          <author fullname="Mohammed Boucadair" initials="M"
                  surname="Boucadair">
            <organization></organization>
          </author>

          <author fullname="Reinaldo Penno" initials="R" surname="Penno">
            <organization></organization>
          </author>

          <author fullname="Dan Wing" initials="D" surname="Wing">
            <organization></organization>
          </author>

          <author fullname="Francis Dupont" initials="F" surname="Dupont">
            <organization></organization>
          </author>

          <date day="27" month="February" year="2011" />

          <abstract>
            <t>This document specifies the behavior of a PCP Proxy element,
            for instance implemented in Customer Premises routers.</t>
          </abstract>
        </front>

        <seriesInfo name="Internet-Draft" value="draft-bpw-pcp-proxy-00" />

        <format target="http://www.ietf.org/internet-drafts/draft-bpw-pcp-proxy-00.txt"
                type="TXT" />
      </reference>
-->

      <!--
      <reference anchor="I-D.wing-pcp-nested-nat">
        <front>
          <title>Using PCP With One Nested NAT</title>

          <author fullname="Dan Wing" initials="D" surname="Wing">
            <organization></organization>
          </author>

          <date month="January" year="2011" />
        </front>

        <seriesInfo name="Internet-Draft" value="draft-wing-pcp-nested-nat-00" />

        <format target="http://www.ietf.org/internet-drafts/draft-wing-pcp-nested-nat-00.txt"
                type="TXT" />
      </reference>
-->
    </references>

    <section title="NAT-PMP Transition">
      <t>The Port Control Protocol (PCP) is a successor to the NAT Port
      Mapping Protocol, <xref target="I-D.cheshire-nat-pmp">NAT-PMP</xref>,
      and shares similar semantics, concepts, and packet formats. Because of
      this NAT-PMP and PCP both use the same port, and use NAT-PMP and PCP's
      version negotiation capabilities to determine which version to use. This
      section describes how an orderly transition may be achieved.</t>

      <t>A client supporting both NAT-PMP and PCP SHOULD send its request
      using the PCP packet format. This will be received by a NAT-PMP server
      or a PCP server. If received by a NAT-PMP server, the response will be
      as indicated by <xref target="I-D.cheshire-nat-pmp">the NAT-PMP
      specification</xref>, which will cause the client to downgrade to
      NAT-PMP and re-send its request in NAT-PMP format. If received by a PCP
      server, the response will be as described by this document and
      processing continues as expected.</t>

      <t>A PCP server supporting both NAT-PMP and PCP can handle requests in
      either format. The first byte of the packet indicates if it is NAT-PMP
      (first byte zero) or PCP (first byte non-zero).</t>

      <t>A PCP-only gateway receiving a NAT-PMP request (identified by the
      first byte being zero) will interpret the request as a version mismatch.
      Normal PCP processing will emit a PCP response that is compatible with
      NAT-PMP, without any special handling by the PCP server.</t>
    </section>

    <section title="Change History">
      <t>[Note to RFC Editor: Please remove this section prior to
      publication.]</t>

      <section title="Changes from draft-ietf-pcp-base-12 to -13">
        <t><list style="symbols">
	    <t>All addresses are 128 bits.  IPv4 addresses are
represented by IPv4-mapped IPv6 addresses (::FFFF/96)</t>
<t>PCP request header now includes PCP client's port (in addition
to the client's IP address, which was in -12).</t>
<t>new ADDRESS_MISMATCH error.</t>
<t>removed PROCESSING_ERROR error, which was too similar to 
MALFORMED_REQUEST.</t>
<t>Tweaked text describing how PCP client deals with multiple PCP
server addresses (<xref target="general_generate_request"></xref>)</t>
<t>clarified that when overloaded, the server can send 
SERVER_OVERLOADED (and drop requests) or simply drop requests.</t>
<t>Clarified how PCP client chooses MAP4 or MAP6, depending on the
presence of its own IPv6 or IPv4 interfaces
(<xref target="opcode_introduction"></xref>).</t>
<t>compliant PCP server MUST support MAPx and PEERx, SHOULD support
ability to disable support.</t>
<t>clarified that MAP-created mappings have no filtering, and
PEER-created mappings have whatever filtering and mapping
behavior is normal for that particular NAT / firewall.</t>
<t>Integrated WGLC feedback (small changes to abstract,
definitions, and small edits throughout the document)</t>
<t>allow new Options to be defined with a specification
(rather than standards action)</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-11 to -12">
        <t><list style="symbols">
            <t>added implementation note that MAP and implicit dynamic
            mappings have independent mapping lifetimes.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-10 to -11">
        <t><list style="symbols">
            <t>clarified what can cause CANNOT_PROVIDE_EXTERNAL_PORT error to
            be generated.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-09 to -10">
        <t><list style="symbols">
            <t>Added External_AF field to PEER requests. Made PEER's Suggested
            External IP Address and Assigned External IP Address always be 128
            bits long.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-08 to -09">
        <t><list style="symbols">
            <t>Clarified in PEER OpCode introduction (<xref
            target="peer_opcodes"></xref>) that they can also create mappings
            (as well as query and set existing mappings).</t>

            <t>More clearly explained how PEER can re-create an implicit
            dynamic mapping, for purposes of rebuilding state to maintain an
            existing session (e.g., long-lived TCP connection to a
            server).</t>

            <t>Added Suggested External IP Address to the PEER OpCodes, to
            allow more robust rebuilding of connections. Added related text to
            the PEER server processing section.</t>

            <t>Removed text encouraging PCP server to statefully remember its
            mappings from <xref target="reboot"></xref>, as it didn't belong
            there. Text in <xref target="theft"></xref> already encourages
            persistent storage.</t>

            <t>More clearly discussed how PEER is used to re-establish TCP
            mapping state. Moved it to a new section, as well (it is now <xref
            target="restoring"></xref>).</t>

            <t>MAP errors now copy the Requested IP Address (and port) fields
            to Assigned IP Address (and port), to allow PCP client to
            distinguish among many outstanding requests when using
            PREFER_FAILURE.</t>

            <t>Mapping theft can also be mitigated by ensuring hosts can't
            re-use same IP address or port after state loss.</t>

            <t>the UNPROCESSED option is renumbered to 0 (zero), which ensures
            no other option will be given 0 and be unable to be expressed by
            the UNPROCESSED option (due to its 0 padding).</t>

            <t>created new Implementation Considerations section (<xref
            target="implementation_considerations"></xref>) which discusses
            non-normative things that might be useful to implementors. Some
            new text is in here, and the Failure Scenarios text (<xref
            target="failure"></xref>) has been moved to here.</t>

            <t>Tweaked wording of EDM NATs in <xref target="EDM"></xref> to
            clarify the problem occurs both inside->outside and
            outside->inside.</t>

            <t>removed "Interference by Other Applications on Same Host"
            section from security considerations.</t>

            <t>fixed zero/non-zero text in <xref
            target="lifetime"></xref>.</t>

            <t>removed duplicate text saying MAP is allowed to delete an
            implicit dynamic mapping. It is still allowed to do that, but it
            didn't need to be said twice in the same paragraph.</t>

            <t>Renamed error from UNAUTH_TARGET_ADDRESS to
            UNAUTH_THIRD_PARTY_INTERNAL_ADDRESS.</t>

            <t>for FILTER option, removed unnecessary detail on how FILTER
            would be bad for PEER, as it is only allowed for MAP anyway.</t>

            <t>In Security Considerations, explain that PEER can create a
            mapping which makes its security considerations the same as
            MAP.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-07 to -08">
        <t><list style="symbols">
            <t>moved all MAP4-, MAP6-, and PEER-specific options into a single
            section.</t>

            <t>discussed NAT port-overloading and its impact on MAP (new
            section <xref target="EDM"></xref>), which allowed removing the
            IMPLICIT_MAPPING_EXISTS error.</t>

            <t>eliminated NONEXIST_PEER error (which was returned if a PEER
            request was received without an implicit dynamic mapping already
            being created), and adjusted PEER so that it creates an implicit
            dynamic mapping.</t>

            <t>Removed Deployment Scenarios section (which detailed NAT64,
            NAT44, Dual-Stack Lite, etc.).</t>

            <t>Added Client's IP Address to PCP common header. This allows
            server to refuse a PCP request if there is a mismatch with the
            source IP address, such as when a non-PCP-aware NAT was on the
            path. This should reduce failure situations where PCP is deployed
            in conjunction with a non-PCP-aware NAT. This addition was
            consensus at IETF80.</t>

            <t>Changed UNSPECIFIED_ERROR to PROCESSING_ERROR. Clarified that
            MALFORMED_REQUEST is for malformed requests (and not related to
            failed attempts to process the request).</t>

            <t>Removed MISORDERED_OPTIONS. Consensus of IETF80.</t>

            <t>SERVER_OVERLOADED is now a common PCP error (instead of
            specific to MAP).</t>

            <t>Tweaked PCP retransmit/retry algorithm again, to allow more
            aggressive PCP discovery if an implementation wants to do
            that.</t>

            <t>Version negotiation text tweaked to soften NAT-PMP reference,
            and more clearly explain exactly what UNSUPP_VERSION should
            return.</t>

            <t>PCP now uses NAT-PMP's UDP port, 5351. There are no normative
            changes to NAT-PMP or PCP to allow them both to use the same port
            number.</t>

            <t>New Appendix A to discuss NAT-PMP / PCP interworking.</t>

            <t>improved pseudocode to be non-blocking.</t>

            <t>clarified that PCP cannot delete a static mapping (i.e., a
            mapping created by CLI or other non-PCP means).</t>

            <t>moved theft of mapping discussion from Epoch section to
            Security Considerations, (<xref target="theft"></xref>).</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-06 to -07">
        <t><list style="symbols">
            <t>tightened up THIRD_PARTY security discussion. Removed "highest
            numbered address", and left it as simply "the CPE's IP
            address".</t>

            <t>removed UNABLE_TO_DELETE_ALL error.</t>

            <t>renumbered Opcodes</t>

            <t>renumbered some error codes</t>

            <t>assigned value to IMPLICIT_MAPPING_EXISTS.</t>

            <t>UNPROCESSED can include arbitrary number of option codes.</t>

            <t>Moved lifetime fields into common request/response headers</t>

            <t>We've noticed we're having to repeatedly explain to people that
            the "requested port" is merely a hint, and the NAT gateway is free
            to ignore it. Changed name to "suggested port" to better convey
            this intention.</t>

            <t>Added NAT-PMP transition section</t>

            <t>Separated Internal Address, External Address, Remote Peer
            Address definition</t>

            <t>Unified Mapping, Port Mapping, Port Forwarding definition</t>

            <t>adjusted so DHCP configuration is non-normative.</t>

            <t>mentioned PCP refreshes need to be sent over the same
            interface.</t>

            <t>renamed the REMOTE_PEER_FILTER option to FILTER.</t>

            <t>Clarified FILTER option to allow sending an ICMP error if
            policy allows.</t>

            <t>for MAP, clarified that if the PCP client changed its IP
            address and still wants to receive traffic, it needs to send a new
            MAP request.</t>

            <t>clarified that PEER requests have to be sent from same
            interface as the connection itself.</t>

            <t>for MAP opcode, text now requires mapping be deleted when
            lifetime expires (per consensus on 8-Mar interim meeting)</t>

            <t>PEER OpCode: better description of remote peer's IP address,
            specifically that it does not control or establish any filtering,
            and explaining why it is 'from the PCP client's perspective'.</t>

            <t>Removed latent text allowing DMZ for 'all protocols'
            (protocol=0). Which wouldn't have been legal, anyway, as protocol
            0 is assigned by IANA to HOPOPT (thanks to James Yu for catching
            that one).</t>

            <t>clarified that PCP server only listens on its internal
            interface.</t>

            <t>abandoned 'target' term and reverted to simplier 'internal'
            term.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-05 to -06">
        <t><list style="symbols">
            <t>Dual-Stack Lite: consensus was encapsulation mode. Included a
            suggestion that the B4 will need to proxy PCP-to-PCP and
            UPnP-to-PCP.</t>

            <t>defined THIRD_PARTY option to work with the PEER OpCode, too.
            This meant moving it to its own section, and having both MAP and
            PEER OpCodes reference that common section.</t>

            <t>used "target" instead of "internal", in the hopes that
            clarifies internal address used by PCP itself (for sending its
            packets) versus the address for MAPpings.</t>

            <t>Options are now required to be ordered in requests, and
            ordering has to be validated by the server. Intent is to ease
            server processing of mandatory-to-implement options.</t>

            <t>Swapped Option values for the mandatory- and
            optional-to-process Options, so we can have a simple
            lowest..highest ordering.</t>

            <t>added MISORDERED_OPTIONS error.</t>

            <t>re-ordered some error messages to cause MALFORMED_REQUEST
            (which is PCP's most general error response) to be error 1,
            instead of buried in the middle of the error numbers.</t>

            <t>clarified that, after successfully using a PCP server, that PCP
            server is declared to be non-responsive after 5 failed
            retransmissions.</t>

            <t>tightened up text (which was inaccurate) about how long general
            PCP processing is to delay when receiving an error and if it
            should honor OpCode-specific error lifetime. Useful for MAP errors
            which have an error lifetime. (This all feels awkward to have only
            some errors with a lifetime.)</t>

            <t>Added better discussion of multiple interfaces, including
            highlighting WiFi+Ethernet. Added discussion of using IPv6 Privacy
            Addresses and RFC1918 as source addresses for PCP requests. This
            should finish the section on multi-interface issues.</t>

            <t>added some text about why server might send SERVER_OVERLOADED,
            or might simply discard packets.</t>

            <t>Dis-allow internal-port=0, which means we dis-allow using PCP
            as a DMZ-like function. Instead, ports have to be mapped
            individually.</t>

            <t>Text describing server's processing of PEER is tightened
            up.</t>

            <t>Server's processing of PEER now says it is
            implementation-specific if a PCP server continues to allow the
            mapping to exist after a PEER message. Client's processing of PEER
            says that if client wants mapping to continue to exist, client has
            to continue to send recurring PEER messages.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-04 to -05">
        <t><list style="symbols">
            <t>tweaked PCP common header packet layout.</t>

            <t>Re-added port=0 (all ports).</t>

            <t>minimum size is 12 octets (missed that change in -04).</t>

            <t>removed Lifetime from PCP common header.</t>

            <t>for MAP error responses, the lifetime indicates how long the
            server wants the client to avoid retrying the request.</t>

            <t>More clearly indicated which fields are filled by the server on
            success responses and error responses.</t>

            <t>Removed UPnP interworking section from this document. It will
            appear in <xref
            target="I-D.bpw-pcp-upnp-igd-interworking"></xref>.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-03 to -04">
        <t><list style="symbols">
            <t>"Pinhole" and "PIN" changed to "mapping" and "MAP".</t>

            <t>Reduced from four MAP OpCodes to two. This was done by
            implicitly using the address family of the PCP message itself.</t>

            <t>New option THIRD_PARTY, to more carefully split out the case
            where a mapping is created to a different host within the
            home.</t>

            <t>Integrated a lot of editorial changes from Stuart and
            Francis.</t>

            <t>Removed nested NAT text into another document, including the
            IANA-registered IP addresses for the PCP server.</t>

            <t>Removed suggestion (MAY) that PCP server reserve UDP when it
            maps TCP. Nobody seems to need that.</t>

            <t>Clearly added NAT and NAPT, such as in residential NATs, as
            within scope for PCP.</t>

            <t>HONOR_EXTERNAL_PORT renamed to PREFER_FAILURE</t>

            <t>Added 'Lifetime' field to the common PCP header, which replaces
            the functions of the 'temporary' and 'permanent' error types of
            the previous version.</t>

            <t>Allow arbitrary Options to be included in PCP response, so that
            PCP server can indicate un-supported PCP Options. Satisfies PCP
            Issue #19</t>

            <t>Reduced scope to only deal with mapping protocols that have
            port numbers.</t>

            <t>Reduced scope to not support DMZ-style forwarding.</t>

            <t>Clarified version negotiation.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-02 to -03">
        <t><list style="symbols">
            <t>Adjusted abstract and introduction to make it clear PCP is
            intended to forward ports and intended to reduce application
            keepalives.</t>

            <t>First bit in PCP common header is set. This allows DTLS and
            non-DTLS to be multiplexed on same port, should a future update to
            this specification add DTLS support.</t>

            <t>Moved subscriber identity from common PCP section to MAP*
            section.</t>

            <t>made clearer that PCP client can reduce mapping lifetime if it
            wishes.</t>

            <t>Added discussion of host running a server, client, or symmetric
            client+server.</t>

            <t>Introduced PEER4 and PEER6 OpCodes.</t>

            <t>Removed REMOTE_PEER Option, as its function has been replaced
            by the new PEER OpCodes.</t>

            <t>IANA assigned port 44323 to PCP.</t>

            <t>Removed AMBIGUOUS error code, which is no longer needed.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-01 to -02">
        <t><list style="symbols">
            <t>more error codes</t>

            <t>PCP client source port number should be random</t>

            <t>PCP message minimum 8 octets, maximum 1024 octets.</t>

            <t>tweaked a lot of text in section 7.4, "Opcode-Specific Server
            Operation".</t>

            <t>opening a mapping also allows ICMP messages associated with
            that mapping.</t>

            <t>PREFER_FAILURE value changed to the mandatory-to-process
            range.</t>

            <t>added text recommending applications that are crashing obtain
            short lifetimes, to avoid consuming subscriber's port quota.</t>
          </list></t>
      </section>

      <section title="Changes from draft-ietf-pcp-base-00 to -01">
        <t><list style="symbols">
            <t>Significant document reorganization, primarily to split base
            PCP operation from OpCode operation.</t>

            <t>packet format changed to move 'protocol' outside of PCP common
            header and into the MAP* opcodes</t>

            <t>Renamed Informational Elements (IE) to Options.</t>

            <t>Added REMOTE_PEER (for disambiguation with dynamic ports),
            REMOTE_PEER_FILTER (for simple packet filtering), and
            PREFER_FAILURE (to optimize UPnP IGD interworking) options.</t>

            <t>Is NAT or router behind B4 in scope?</t>

            <t>PCP option MAY be included in a request, in which case it MUST
            appear in a response. It MUST NOT appear in a response if it was
            not in the request.</t>

            <t>Result code most significant bit now indicates
            permanent/temporary error</t>

            <t>PCP Options are split into mandatory-to-process ("P" bit), and
            into Specification Required and Private Use.</t>

            <t>Epoch discussion simplified.</t>
          </list></t>
      </section>
    </section>

    <!--

    <section anchor="discovery_analysis"
             title="Analysis of Techniques to Discover PCP Server">
      <t><list style="empty">
          <t>[Ed. Note: This Appendix will be removed in a later version of
          this document. It is included here for reference and discussion
          purposes. This is tracked as PCP Issue #8 <xref
          target="PCP-Issues"></xref>.]</t>
        </list></t>

      <t><list style="empty">
          <t>Discussion Note: A deployment model is a non-PCP aware NAT in a
          home, and a PCP-aware CGN operated by the ISP. For example, the home
          users purchased a NAT last year at a computer shop (to extend their
          home's WiFi network). This could work by having the host use UPnP
          IGD with the in-home NAT, and the host use PCP with the LSN. But
          this deployment model is impossible with several of the mechanisms
          below. Is this deployment model important, or can we wait for PCP to
          be enabled on CPE?</t>
        </list></t>

      <t>Several mechanisms for discovering the PCP server can be envisaged as
      listed below:</t>

      <t><list style="numbers">
          <t>A special-purpose IPv4 or IPv6 address, assigned by IANA, which
          is routed normally until it hits a PCP server, which responds. <list
              style="empty">
              <t>Analysis: This solution can be deployed in the context of
              DS-Lite architecture. Concretely, a well-known IPv4 address can
              be used to reach a PCP server in the device that provides
              the AFTR capabilities. Since all IPv4 messages issued by a
              DS-Lite CP router will be encapsulated in IPv6, no state
              synchronisation issues will be experienced because PCP messages
              will be handled by the appropriate PCP server.</t>

              <t>In some deployment scenarios (e.g., deployment of several
              stateful NAT64/NAT46 in the same domain), the use of this
              address is not recommended since PCP messages, issued by a given
              host, may be handled by a PCP server in a NAT node
              which is not involved to handle IP packets issued from that
              host. The use of this special-purpose IP address may induce
              session failures and therefore the customer may experience
              troubles when accessing its services.</t>

              <t>Consequently, the use of a special-purpose IPv4 address is
              suitable for DS-Lite NAT44. As for NAT46/NAT64, this is left to
              the Service Providers according to their deployment
              configuration.</t>

              <t>The special-use address MUST NOT be advertised in the global
              routing table. Packets with that destination address SHOULD be
              filtered so they are not transmitted on the Internet.</t>
            </list></t>

          <t>Assume the default router is a PCP server, and send PCP packets
          to the IP address of the default router. <list style="empty">
              <t>Analysis: This solution is not suitable for DS-Lite NAT44 nor
              for all variants of NAT64/NAT46. <list style="empty">
                  <t>In the context of DS-Lite: There is no default IPv4
                  router configured in the CP router. All outgoing IPv4
                  traffic is encapsulated in IPv6 and then forwarded to a
                  pre-configured DS-Lite AFTR device. Furthermore, if IPv6 is
                  used to reach the PCP server, the first router may not be
                  the one which implements the AFTR.</t>

                  <t>For NAT64/NAT46 scenarios: The NAT function is not
                  implemented by the first router, therefore this solution
                  candidate does not allow to discover a valid PCP server.</t>
                </list></t>

              <t>Therefore, this alternative is not recommended.</t>
            </list></t>

          <t>Service Location Protocol (<xref
          target="RFC2608">SLP</xref>).<list style="empty">
              <t>Analysis: This solution is not suitable in scenarios where
              multicast is not enabled. SLP is a chatty protocol. Also, as
              with UPnP IGD's use of SSDP, SLP will discover NAT gateways
              which exist on the local network, but are not actually on the
              path that packets will take from the Internal Host to the
              Internet, leading to the situation where Internal Hosts create
              apparently-successful mappings, which are in fact completely
              worthless for the purpose of establishing useful communication
              with Remote Hosts on the Internet. This alternative is not
              recommended.</t>
            </list></t>

          <t>NAPTR. The host would issue a DNS query for a NAPTR record,
          formed from some bits of the host's IPv4 or IPv6 address. For
          example, a host with the IPv6 address 2001:db8:1:2:3:4:567:89ab
          would first send an NAPTR query for
          3.0.0.0.2.0.0.0.1.0.0.0.8.b.d.0.1.0.0.2.IP6.ARPA (20 elements,
          representing a /64 network prefix), which returns the PCP server's
          IPv6 address. A similar scheme can be used with IPv4 using, for
          example, the first 24 bits of the IPv4 address.<list style="empty">
              <t>Analysis: This solution candidate requires more configuration
              effort by the Service Provider so as to redirect a given client
              to the appropriate PCP server. Any change of the engineering
              policies (e.g., introduce new LSN device, load-based
              dimensioning, load-balancing, etc.) would require to update the
              zone configuration. This would be a hurdle for the flexibility
              of the operational networks. Adherence to DNS is not encouraged
              and means which allows for more flexibility are to be
              promoted.</t>

              <t>Therefore, this mechanism is not recommended.</t>
            </list></t>

          <t>New DHCPv6/DHCP option and/or a RA option to convey an FQDN of a
          PCP server.<list style="empty">
              <t>Analysis: Since DS-Lite and NAT64/NAT46 are likely to be
              deployed in provider-provisioned environments, DHCP (both DHCPv6
              and IPv4 DHCP) is convenient to provision the address/FQDN of
              the PCP server.</t>
            </list></t>
        </list></t>
    </section>
-->

    <!--
<section title="Contributors' Addresses">
<t>The following individuals contributed substantial text to this
   document and are listed in alphabetical order:</t>

      <figure>
        <artwork align="left"><![CDATA[
   Stuart Cheshire
   Apple Inc.
   1 Infinite Loop
   Cupertino, California  95014
   USA

   Phone: +1 408 974 3207
   Email: cheshire@apple.com


   Mohamed Boucadair
   France Telecom
   Rennes,   35000
   France

   Email: mohamed.boucadair@orange-ftgroup.com


   Reinaldo Penno
   Juniper Networks
   1194 N Mathilda Avenue
   Sunnyvale, California  94089
   USA

   Email: rpenno@juniper.net


   Francis Dupont
   Internet Systems Consortium

   Email: fdupont@isc.org
]]></artwork>
      </figure>
</section>
-->
  </back>
</rfc>

PAFTECH AB 2003-20262026-04-23 04:38:11