Internet DRAFT - draft-shin-dstm-ports
draft-shin-dstm-ports
INTERNET-DRAFT Myung-Ki Shin
Expires: December 2005 ETRI
June 2005
Ports Option Support in DSTM
<draft-shin-dstm-ports-00.txt>
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other docu-
ments at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in pro-
gress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December, 2005.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
As an extension to the address allocation process for DSTM, this
document defines the ports option for DSTM. A DSTM server may also
provide a range of port numbers to be used by the client. This
would allow the use of the same IPv4 address by several DSTM nodes
at the same time, reducing the size of the required IPv4 address
pool.
Shin Expires December 2005 [Page 1]
INTERNET-DRAFT Ports Option Support in DSTM June 2005
Table of Contents:
1. Introduction .............................................. 2
2. Terminology ............................................... 2
3. DSTM Ports Option Overview ................................ 2
4. DSTM Host Requirements .................................... 3
4.1 Configuration of the IPv4 stack .......................... 3
5. DSTM Server Requirements .................................. 3
6. TEP Requirements .......................................... 3
7. Implementation Considerations ............................. 3
8. Applicability Statement ................................... 4
9. Security Considerations ................................... 4
Normative References ........................................ 5
Informative References ...................................... 5
Authors' Address ............................................ 5
1. Introduction
The Dual Stack Transition Mechanism (DSTM)[1] is based on the use
of IPv4-over-IPv6 tunnels to carry IPv4 traffic within an IPv6-only
network and provides a method to allocate a temporary IPv4 Address
to IPv6/IPv4 nodes.
When a DSTM node wants to talk to IPv4 only nodes, a temporary IPv4
Address is required, so that if the number of the DSTM nodes which
want to get IPv4 addresses increases at the same time, a lot of
IPv4 address will be needed.
As an extension to the address allocation process for DSTM, this
document defines the ports option for DSTM. A DSTM server may also
provide a range of port numbers to be used by the client. This
would allow the use of the same IPv4 address by several DSTM nodes
at the same time, reducing the size of the required IPv4 address
pool.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in RFC 2119 [2].
This document uses terminology specific to DSTM as defined in
section "Terminology" of the DSTM specification [1].
3. DSTM Ports Option Overview
As an extension to the address allocation process, when a DSTM node
wants to talk to IPv4 only nodes, a DSTM server MAY also provide a
Shin Expires December 2005 [Page 2]
INTERNET-DRAFT Ports Option Support in DSTM June 2005
range of port numbers to be used by the client. This would allow
the use of the same IPv4 address by several DSTM nodes at the same
time.
The DSTM nodes dynamically configure their IPv4 stack (with the
same IPv4 address shared by several DSTM nodes and newly assigned
ports) and establish 4over6 tunnels towards a TEP. In order to
identify the returning path of packets with the same IPv4 address,
the TEP SHOULD cache the port number as well as the association
between IPv4 and IPv6 source addresses.
4. DSTM Host Requirements
4.1 Configuration of the IPv4 stack
When a DSTM node wants to talk to IPv4 only nodes, the DSTM node
can detects the need of an IPv4 address. When the first IPv4
packet needs to be sent, the DSTM client MAY contact the DSTM
server to obtain a range of ports to be used as well as a temporary
IPv4 address and the IPv6 address of a TEP. This information is
used to configure the 4over6 interface. It is at this point that
the IPv4 stack is configured.
5. DSTM Server Requirements
The DSTM server MAY provide the port range to be used as well as a
temporary IPv4 address and the IPv6 address of a TEP. The DSTM
server has just to guaranty the uniqueness of the range of ports on
an IPv4 address for a period of time. This would allow the use of
the same IPv4 address by several nodes simultaneously.
The DTSM server MUST memorize the mapping between the IPv6 address
of the node requesting an address and the allocated IPv4 address
and port range. The range of ports is allocated by the server for a
fixed amount of time. This duration MUST be included in the
response. If the client needs the range of ports for a longer
period of time, the client MUST renew the lease.
6. TEP Requirements
When a tunnelled packet arrives to the IPv6 destination, the IPv6
header is removed and the packet is processed by the IPv4 layer.
The IPv4 packet will then be forwarded by the TEP using the IPv4
infrastructure. The TEP SHOULD cache the source port number as
well as the association between the IPv4 and IPv6 source addresses,
in order to identify the returning path of packets with the same
IPv4 address.
Shin Expires December 2005 [Page 3]
INTERNET-DRAFT Ports Option Support in DSTM June 2005
7. Implementation Considerations
The DSTM node MUST assign the port range provided by the DSTM
server to an interface, instead of existing port range, supporting
the client's IPv4 stack implementation.
Once the IPv4 Address valid lifetime expires the port range MUST be
deleted as well as the IPv4 address from the respective interface.
When the DSTM server, or DSTM node, provides a range of ports, if
the ports are not availabe in a remote node, or the proposed range
are exhausted in a DSTM node, implementation MAY allow re-
allocation of another range of ports. It may well be
implementation dependent.
If the port range option is provided in a DSTM doamin, IPv4 ARP on
the DSTM nodes SHOULD be disabled.
8. Applicability Statement
The motivation of ports option in DSTM is to allow the use of the
same IPv4 address by several DSTM nodes at the same time, reducing
the size of the required IPv4 address pool. Even if the IPv4
address pool is exhausted in the DSTM server, the ports option may
help to establesh new sessions for IPv4 communications on DSTM
nodes. It will allow for a maximum of 63K TCP and 63K UDP sessions
per IPv4 address.
Basically, the ports option is limited to only TCP and UDP
applications. ICMP messages may not work. In order to solve this
problem, the ports option can adopt an idea on using the query
identifier in ICMP message [5]. ICMP messages packets (i.e., ICMP
query messages), with the exception of REDIRECT message type, may
be tunneled similar to that of TCP/UDP packets, in that the range
of identifiers used in ICMP message header will be uniquely
assigned to the DSTM nodes. The identifier field in ICMP query
messages is set by Query sender and returned unchanged in response
message from the Query responder. So, as the TEP caches the tuple
of {IPv6 source address, IPv4 source address, source port number,
ICMP query identifier}, ICMP queries of all types from the DSTM
nodes are uniquely identified for bi-directional forwarding on the
TEP. In order to do so, the DSTM server SHOULD provide the range
of query identifiers to be used as well as the range of ports.
As well, there are operational concerns with that about path MTU
discovery in the case tunnels are used. At this time, one way to
look at it is to make recommendation on MTU, for example limit MTU
to 512 on the DSTM link.
The ports option is limited to client applications that do not
insist on choosing their own source port number. With the ports
Shin Expires December 2005 [Page 4]
INTERNET-DRAFT Ports Option Support in DSTM June 2005
option, inbound traffic (from IPv4 only nodes outside the IPv6
domain) is restricted to one server per service. This document
does not address yet the case that two nodes sharing the same IPv4
address communicate together.
9. Security Considerations
The ports option can meet all of the security considerations
mentioned in DSTM specification [1].
Normative References
[1] J. Bound et al., Dual Stack Transition Mechanism (DSTM), <draft-
bound-dstm-exp-02.txt>, January 2005, (work in progress).
[2] S. Bradner, Key words for use in RFCs to indicate Requirement
Levels. RFC 2119, March 1997.
Informative References
[3] R. Droms (ed) et. al. Dynamic Host Configuration Protocol for IPv6
(DHCPv6), RFC 3315, July 2003.
[4] M. Blanchet, F. Parent, IPv6 Tunnel Broker with the Tunnel Setup
Protocol (TSP)", <draft-blanchet-v6ops- tunnelbroker-tsp-01.txt>
(work in progress), June 2004.
[5] P. Srisuresh el al., Traditional IP Network Address Translator
(Traditional NAT), RFC 3022, January 2001.
Authors' Addresses
Myung-Ki Shin
ETRI PEC
161 Gajeong-dong Yuseong-gu, 305-350 Korea
Tel : +82 42 860 4847
Fax : +82 42 861 5404
E-mail : mkshin@pec.etri.re.kr
Shin Expires December 2005 [Page 5]
INTERNET-DRAFT Ports Option Support in DSTM June 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Shin Expires December 2005 [Page 6]