One document matched: draft-ietf-v6ops-6to4-to-historic-04.xml


<?xml version="1.0"?>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc toc="no" ?>
<?rfc tocompact="yes" ?>
<?rfc compact="yes" ?>
<?rfc subcompact="yes" ?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<?rfc comments="yes" ?>
<?rfc inline="yes" ?>

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml'>
<!ENTITY rfc1918 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.1918.xml'>
<!ENTITY rfc2026 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2026.xml'>
<!ENTITY rfc5226 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.5226.xml'>
<!ENTITY rfc3056 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3056.xml'>
<!ENTITY rfc3068 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3068.xml'>
<!ENTITY rfc3964 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3964.xml'>
<!ENTITY rfc5156 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.5156.xml'>
<!ENTITY rfc5158 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.5158.xml'>
<!ENTITY rfc5969 PUBLIC '' 
  'http://xml.resource.org/public/rfc/bibxml/reference.RFC.5969.xml'>
<!ENTITY I-D.ietf-v6ops-tunnel-security-concerns SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-v6ops-tunnel-security-concerns.xml'>
<!ENTITY I-D.ietf-v6ops-tunnel-loops SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-v6ops-tunnel-loops.xml'>
<!ENTITY I-D.ietf-6man-rfc3484-revise SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-6man-rfc3484-revise.xml'>
<!ENTITY I-D.ietf-v6ops-6to4-advisory SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-v6ops-6to4-advisory.xml'>

]>

<rfc category="info" ipr="trust200902" docName="draft-ietf-v6ops-6to4-to-historic-04.txt" obsoletes="3056, 3068">
<front>

<title abbrev="6to4 to Historic status">
  Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to
  Historic status
</title>


<author initials="O" surname="Troan" fullname="Ole Troan">
  <organization abbrev="">Cisco</organization>
  <address>
    <postal>
      <street></street>
      <city>Oslo</city> 
      <region></region>
      <code></code>
      <country>Norway</country>
    </postal>
    <email>ot@cisco.com</email>
  </address>
</author> 

<date year="2011" />
<area>Internet</area>
<workgroup>v6ops WG</workgroup>

<!------------------------------------------------>
<!--  SECTION 0:  Abstract                      -->
<!------------------------------------------------>
<abstract>
  <t>Experience with the "Connection of IPv6 Domains via IPv4 Clouds
  (6to4)" IPv6 transitioning mechanism has shown that the mechanism is
  unsuitable for widespread deployment and use in the Internet. This
  document requests that RFC3056 and the companion document "An
  Anycast Prefix for 6to4 Relay Routers" RFC3068 are moved to historic
  status.</t>
</abstract>
</front>

<middle>

<!------------------------------------------------>
<!--  SECTION 1:  Introduction                  -->
<!------------------------------------------------>

<section title="Introduction">
  <t>There would appear to be no evidence of any substantial
  deployment of the variant of 6to4 described in <xref
  target="RFC3056"></xref>. Its extension specified in "An Anycast
  Prefix for 6to4 Relay Routers" <xref target="RFC3068"></xref> has
  been shown to have severe practical problems when used in the
  Internet. This document requests that RFC3056 and RFC3068 be moved
  to Historic status <xref target="RFC2026">as defined in section
  4.2.4</xref>.</t>

  <t>6to4 was designed to help transitioning the Internet from IPv4 to
  IPv6. It has been a good mechanism for experimenting with IPv6, but
  because of the high failure rates seen with 6to4 <xref
  target="HUSTON"></xref>, end users may end up disabling IPv6 on
  hosts, and content providers are reluctant to make content available
  over IPv6.</t>

  <t><xref target="I-D.ietf-v6ops-6to4-advisory"></xref> analyses the
  known operational issues and describes a set of suggestions to
  improve 6to4 reliability, given the widespread presence of hosts and
  customer premises equipment that support it.</t>

  <t>The IETF sees no evolutionary future for the mechanism and it is
  not recommended to include this mechanism in new
  implementations.</t>

  <t>6rd <xref target="RFC5969"></xref> utilizes the same
  encapsulation and base mechanism as 6to4, and could be viewed as a
  superset of 6to4 (6to4 could be achieved by setting the 6rd prefix
  to 2002::/16). However, the deployment model is such that 6rd can
  avoid the problems described here. In this sense, 6rd can be viewed
  as superseding 6to4 as described in section 4.2.4 of <xref
  target="RFC2026"></xref></t>

</section>

<!-------------------------------------------------------------------------------->
<!--  SECTION 2: REQUIREMENTS LANGUAGE                                         --->
<!-------------------------------------------------------------------------------->

<section anchor="sec:conventions" title="Conventions">
  <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
  NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"
  in this document are to be interpreted as described in RFC 2119
  <xref target="RFC2119"/>.</t>
</section> <!-- conventions -->

<!------------------------------------------------------------>
<!--  SECTION 3:  6to4 analysis -->
<!------------------------------------------------------------>
<section anchor="sec:proc-rules" title="6to4 operational problems">
  <t>6to4 is a mechanism designed to allow isolated IPv6 islands to
  reach each other using IPv6 over IPv4 automatic tunneling. To reach
  the native IPv6 Internet the mechanism uses relay routers both in
  the forward and reverse direction. The mechanism is supported in
  many IPv6 implementations. With the increased deployment of IPv6,
  the mechanism has been shown to have a number of fundamental
  shortcomings.</t>

  <t>6to4 depends on relays both in the forward and reverse direction
  to enable connectivity with the native IPv6 Internet. A 6to4 node
  will send IPv4 encapsulated IPv6 traffic to a 6to4 relay, that is
  connected both to the 6to4 cloud and to native IPv6. In the reverse
  direction a 2002::/16 route is injected into the native IPv6 routing
  domain to attract traffic from native IPv6 nodes to a 6to4 relay
  router. It is expected that traffic will use different relays in the
  forward and reverse direction. RFC3068 adds an extension that allows
  the use of a well known IPv4 anycast address to reach the nearest
  6to4 relay in the forward direction.</t>

  <t>One model of 6to4 deployment as described in section 5.2,
  RFC3056, suggests that a 6to4 router should have a set of managed
  connections (via BGP connections) to a set of 6to4 relay
  routers. While this makes the forward path more controlled, it does
  not guarantee a functional reverse path. In any case this model has
  the same operational burden has manually configured tunnels and has
  seen no deployment in the public Internet.</t>

  <t>List of some of the known issues with 6to4:</t>
  <t><list style="symbols">
    <t>Use of relays. 6to4 depends on an unknown third- party to
    operate the relays between the 6to4 cloud and the native IPv6
    Internet.</t>

    <t>The placement of the relay can lead to increased latency, and in
    the case the relay is overloaded packet loss.</t>

    <t>There is generally no customer relationship or even a way for
    the end-user to know who the relay operator is, so no support is
    possible.</t>

    <t>In case of the reverse path 6to4 relay and the anycast forward
    6to4 relay, these have to be open for any address. Only limited by
    the scope of the routing advertisement. 6to4 relays can be used to
    anonymize traffic and inject attacks into IPv6 that are very
    difficult to trace.</t>

    <t>6to4 may black hole traffic in the case where protocol (41) is
    blocked in intermediate firewalls. Even if a firewall sent an
    ICMP message unreachable back, an IPv4 ICMP message rarely
    contains enough of the original IPv6 packet so that it can be
    relayed back to the IPv6 sender. That makes this problem hard to
    detect and react upon by the sender of the packet.</t>

    <t>As 6to4 tunnels across the Internet, the IPv4 addresses used
    must be globally reachable. RFC3056 states that a private address
    <xref target="RFC1918"></xref> MUST NOT be used. 6to4 will not
    work in networks that employ other addresses with limited
    topological span.</t>

  </list></t>

</section>

<section title="Deprecation">
  <t>This document formally deprecates the 6to4 transition mechanism
  and the IPv6 6to4 prefix defined in <xref target="RFC3056"></xref>,
  i.e., 2002::/16. The prefix MUST NOT be reassigned for other use
  except by a future IETF standards action.</t>

  <t>It is expected that disabling 6to4 in the IPv6 Internet will take
  some time. The initial approach is to make the 6to4 a service of
  "last resort" in host implementations, ensure that the 6to4 service
  is disabled by default in 6to4 routers, and deploy native IPv6
  service. In order to limit the impact of end-users, it is
  recommended that operators retain their existing 6to4 relay routers
  and follow the recommendations found in <xref
  target="I-D.ietf-v6ops-6to4-advisory"></xref>. When traffic levels
  diminish, these routers can be decommissioned.</t>

  <t><list style="numbers">
    <t>IPv6 nodes SHOULD treat 6to4 as a service of "last resort" as
    recommended in <xref
    target="I-D.ietf-6man-rfc3484-revise"></xref></t>

    <t>Implementations capable of acting as 6to4 routers SHOULD NOT
    enable 6to4 without explicit user configuration. In particular,
    enabling IPv6 forwarding on a device, SHOULD NOT automatically
    enable 6to4.</t>
  </list></t>

  <t>Existing implementations and deployments MAY continue to use 6to4.</t>

  <t>The references to 6to4 should be removed as soon as practical
  from the revision of the Special-Use IPv6 Addresses <xref
  target="RFC5156"></xref>.</t>

  <t>Incidental references to 6to4 should be removed from other IETF
  documents if and when they are updated.  These documents include
  RFC3162, RFC3178, RFC3790, RFC4191, RFC4213, RFC4389, RFC4779,
  RFC4852, RFC4891, RFC4903, RFC5157, RFC5245, RFC5375, RFC5971, and
  RFC6071.</t>

</section>

<!------------------------------------------------>
<!--  SECTION 4:  IANA Considerations           -->
<!------------------------------------------------>
<section title="IANA Considerations">
  <t>IANA is requested to mark the 2002::/16 prefix as "deprecated",
  pointing to this document. Reassignment of the prefix for any usage
  requires justification via an IETF Standards Action <xref
  target="RFC5226"></xref>.</t>

  <t>IANA is requested to mark the 2.0.0.2.ip6.arpa domain <xref
  target="RFC5158"></xref> as "deprecated", pointing to this
  document. Redelegation of the domain for any usage requires
  justification via an IETF Standards Action <xref
  target="RFC5226"></xref>.</t>

  <t>IANA is requested to mark the 192.88.99.0/24 prefix <xref
  target="RFC3068"></xref> as "deprecated", pointing to this
  document. Redelegation of the domain for any usage requires
  justification via an IETF Standards Action <xref
  target="RFC5226"></xref>.</t>
</section>

<!------------------------------------------------>
<!--  SECTION 5:  Security Considerations      	-->
<!------------------------------------------------>
<section title="Security Considerations">
  <t>There are no new security considerations pertaining to this
  document. General security issues with tunnels are listed in <xref
  target="I-D.ietf-v6ops-tunnel-security-concerns"></xref> and more
  specifically to 6to4 in <xref target="RFC3964"></xref> and <xref
  target="I-D.ietf-v6ops-tunnel-loops"></xref>.</t>
</section>

<!------------------------------------------------>
<!--  SECTION 6:  Acknowledgements     			-->
<!------------------------------------------------>
<section title="Acknowledgements">
  <t>The authors would like to acknowledge Tore Anderson, Dmitry
  Anipko, Jack Bates, Cameron Byrne, Gert Doering, Ray Hunter, Joel
  Jaeggli, Kurt Erik Lindqvist, Jason Livingood, Keith Moore, Tom
  Petch, Daniel Roesen and Mark Townsley, James Woodyatt, for their
  contributions and discussions on this topic.</t>
  <t>Special thanks go to Fred Baker, Geoff Huston, Brian Carpenter,
  and Wes George for their significant contributions.</t>
  <t>Many thanks to Gunter Van de Velde for documenting the harm
  caused by non-managed tunnels and to stimulate the creation of this
  document.</t>
</section>

</middle>

<back>

<!------------------------------------------------>
<!--  SECTION 8.1:  Normative References		-->
<!------------------------------------------------>
<references title="Normative References">
  &rfc2119;
  &rfc2026;
  &rfc3056;
  &rfc3068;
  &rfc5156;
  &rfc5226;
</references>

<references title="Informative References">
  &rfc1918;
  &rfc3964;
  &rfc5158;
  &rfc5969;
  &I-D.ietf-v6ops-6to4-advisory;
  &I-D.ietf-6man-rfc3484-revise;
  &I-D.ietf-v6ops-tunnel-security-concerns;
  &I-D.ietf-v6ops-tunnel-loops;
  <reference anchor="HUSTON" target="http://www.potaroo.net/ispcol/2010-12/6to4fail.html">
    <front>
      <title>Flailing IPv6</title>
          <author fullname="Geoff Huston" surname="Huston">
            <organization></organization>
          </author>
          <date month="December" year="2010" />
    </front>
  </reference>
</references>

<!------------------------------------------------>
<!--  SECTION 8.2:  Informative References		-->
<!------------------------------------------------>

</back>
</rfc>

PAFTECH AB 2003-20262026-04-24 08:12:22