<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-v6ops-nat64-wkp-1918-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="nat64-wkp-1918">NAT64 WKP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-v6ops-nat64-wkp-1918-01"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author fullname="Jen Linkova">
      <organization>Google, LLC</organization>
      <address>
        <email>furry13@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="27"/>
    <area>Operations and Management</area>
    <workgroup>IPv6 Operations</workgroup>
    <keyword>ipv6</keyword>
    <keyword>nat64</keyword>
    <keyword>wkp</keyword>
    <abstract>
      <?line 56?>

<t>This document removes the requirement introduced in Section 3.1 of RFC6052 that
the NAT64 Well-Known Prefix 64:FF9B::/96 <bcp14>MUST NOT</bcp14> be used to represent
non-global IPv4 addresses, such as those defined in <xref target="RFC1918"/> or listed in
Section 3 of <xref target="RFC5735"/>. The proposed change enables IPv6-only nodes to reach
IPv4-only services with non-global addresses by leveraging the Well-Known
Prefix.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-v6ops-nat64-wkp-1918/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IPv6 Operations Working Group mailing list (<eref target="mailto:v6ops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/v6ops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/v6ops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/furry13/6052-update-wkp1918"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Section 3.1 of <xref target="RFC6052"/> prohibits IPv4/IPv6 translators from using the
Well-Known Prefix (WKP, 64:FF9B::/96) to represent non-global IPv4 addresses,
such as those defined in <xref target="RFC1918"/> or listed in Section 3 of <xref target="RFC5735"/>.</t>
      <t>This restriction is relatively straightforward to implement in DNS64 <xref target="RFC6147"/>:
a DNS64 server simply avoids synthesizing an AAAA record using the WKP if the
original A record contains a non-global IPv4 address. However, this requirement
introduces significant operational challenges for systems that do not rely on
DNS64 and instead use local synthesis such as CLAT (Customer-side Translator,
<xref target="RFC6877"/>), or similar approaches.</t>
      <t>Enterprise and other closed networks often require IPv6-only nodes to
communicate with both internal (e.g., using RFC1918 addresses) and external
(Internet) IPv4-only destinations. The restriction in Section 3.1 of RFC6052
prevents such networks from utilizing the WKP and, consequently, from relying
on public DNS64 servers (e.g. forwarding requests for external zones to public
DNS64) which utilize the WKP in order to maximize compatibility.</t>
      <t>Using two NAT64 prefixes — the WKP for Internet destinations and a
Network-Specific Prefix (NSP) for non-global IPv4 addresses — is not a feasible
solution for nodes performing local synthesis or running CLAT. None of the
widely deployed NAT64 Prefix Discovery mechanisms (<xref target="RFC7050"/>, <xref target="RFC8781"/>)
provide a method to map a specific NAT64 prefix to a subset of IPv4 addresses
for which it should be used.</t>
      <t>According to Section 3 of <xref target="RFC7050"/>, a node must use all learned prefixes when
performing local IPv6 address synthesis. Consequently, if a node discovers both
the WKP and the NSP, it will use both prefixes to represent global IPv4
addresses. This duplication significantly complicates security policies,
troubleshooting, and other operational aspects of the network.</t>
      <t>Prohibiting the WKP from representing non-global IPv4 addresses offers no
substantial benefit to IPv6-only or IPv6-mostly deployments. Simultaneously, it
substantially complicates network design and the behavior of nodes.</t>
      <t>Given the recent operational experience in deploying IPv6-only and IPv6-mostly
networks, it is desirable to allow translators to use a single prefix
(including the WKP) to represent all IPv4 addresses, regardless of their global
or non-global status. This simplification would greatly improve the utility of
the WKP in enterprise networks.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="terminology">
        <name>Terminology</name>
        <t>This document reuses the Terminology section of <xref target="RFC6052"/>.</t>
      </section>
    </section>
    <section anchor="rfc6052-update">
      <name>RFC6052 Update</name>
      <t>This document updates Section 3.1 of <xref target="RFC6052"/> ("Restrictions on the Use of the
Well-Known Prefix") as follows:</t>
      <t>OLD TEXT:</t>
      <t>===</t>
      <t>The Well-Known Prefix <bcp14>MUST NOT</bcp14> be used to represent non-global IPv4 addresses,
such as those defined in <xref target="RFC1918"/> or listed in Section 3 of <xref target="RFC5735"/>. Address
translators <bcp14>MUST NOT</bcp14> translate packets in which an address is composed of the
Well-Known Prefix and a non- global IPv4 address; they <bcp14>MUST</bcp14> drop these packets.</t>
      <t>===</t>
      <t>NEW TEXT:</t>
      <t>===</t>
      <t>The Well-Known Prefix <bcp14>MAY</bcp14> be used to represent non-global IPv4 addresses, such
as those defined in <xref target="RFC1918"/> or listed in Section 3 of <xref target="RFC5735"/>. Address
translators <bcp14>MUST</bcp14> translate packets in which an address is composed of the
Well-Known Prefix and a non-global IPv4 address unless configured otherwise.
Implementations <bcp14>MAY</bcp14> choose not to translate such packets by default. Such
implementation <bcp14>SHOULD</bcp14> have a configuration knob to enable translation for such
packets.</t>
      <t>===</t>
      <t>As noted in Errata 5547 (<xref target="EID5547"/>):</t>
      <t><tt>
IPv4 packets with private destination addresses are routinely translated to IPv4 packets with global destination addresses in NAT44.
Similarly, an IPv6 packet with a destination address representing a private IPv4 address [RFC6052] can be translated to an IPv4 packet with a global destination address by NAT64 [RFC6146].
If a 464XLAT CLAT cannot translate a private IPv4 address to an IPv6 address using the NAT64 /96 prefix and that IPv4 address [RFC6052], then the packet may not be translated to an IPv4 packet with a global address by the 464XLAT PLAT (stateful NAT64). This changes the intent of the sender, and in so doing violates the end to end principle.
</tt></t>
      <t>Removing the requirement introduced in RFC 6052 Section 3.1 addresses this
errata.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>There may be cases when it is desirable to ignore translation of private use
IPv4 addressing due to internal policy or overlapping internal networks. It is
important to note, however, that overlapping networks in IPv6 translated
addresses are also overlapping in IPv4, and so behavior will be similar across
protocols in the vast majority of use cases. In environments reliant on
<xref target="RFC7050"/> may be required to create configurations which address the filtering
of private use IPv4 addressing if there is an expectation of compliance with
the original section 3.1.</t>
      <section anchor="existing-behavior">
        <name>Existing Behavior</name>
        <t>Testing of existing non-mobile CLAT implementations has shown that there is
significant lack of support for compliance with the original test of <xref target="RFC6052"/>
section 3.1, indicating the operational behaviors of devices utilizing a client
side translator (CLAT) are aligned with the proposed text at present, and that
compliance with the existing text will cause potential operational overhead as
adjustments to current practice will be required.</t>
        <t>Further, where client side translation and local synthesis is used, it is
currently not possible to employ more than one translation prefix, as none of
the widely deployed NAT64 Prefix Discovery mechanisms (<xref target="RFC7050"/>, <xref target="RFC8781"/>)
provide a method to map a specific NAT64 prefix to a subset of IPv4 addresses
for which it should be used.</t>
      </section>
      <section anchor="use-of-network-specific-prefix">
        <name>Use of Network Specific Prefix</name>
        <t>Use of a network specific prefix such as provided by <xref target="RFC8215"/> does not
preclude the removal of section 3.1 as a <bcp14>MUST</bcp14> requirement. If a network employs
a network specific prefix the behavior of synthesizing a private use IPv4
address is not prevented by standard. The use of a network specific prefix
implies the existence of a local mechanism for synthesizing IPv6 addresses
based on that specific prefix, and thereby rules out use of a public DNS64
resolver in the vast majority of cases, as large scale public DNS64 resolvers
use the WKP to maximize compatibility.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Legitimizing packets where the IPv6 destination address is composed of the WKP
and a non-global IPv4 address does not, inherently, introduce new security
considerations. Whether a specific traffic flow between an IPv6-only source and
a non-global IPv4 destination (or any flow to a non-global IPv4 destination) is
legitimate is a matter of local network topology and administrative policy.
However, existing NAT64 implementations compliant with RFC 6052 are expected to
drop such packets. Administrators may be relying on this implicit filtering as
a built-in security mechanism to prevent unauthorized access to private IPv4
infrastructure, rather than implementing explicit security policies. This
reliance is particularly prevalent in managed NAT64 (PLAT) environments.</t>
      <t>Modifying the recommended behavior to allow such address compositions may, in
the absence of explicit filtering, enable traffic flows that were previously
prohibited by the translator's default logic. To mitigate this risk, existing
managed NAT64 implementations compliant with RFC 6052 <bcp14>SHOULD NOT</bcp14> alter their
default dropping behavior. Instead, they <bcp14>SHOULD</bcp14> provide a configuration knob to
enable this functionality, ensuring that the transition to supporting
non-global addresses is an intentional administrative action accompanied by a
review of local security policies.</t>
      <t>Furthermore, administrators should not rely on the internal verification logic
of the translator to enforce security boundaries. Instead, explicit polcies
such as access control lists (ACLs), firewall policies or NAT rules must be
used to define authorized traffic patterns through the translator.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6052">
          <front>
            <title>IPv6 Addressing of IPv4/IPv6 Translators</title>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document discusses the algorithmic translation of an IPv6 address to a corresponding IPv4 address, and vice versa, using only statically configured information. It defines a well-known prefix for use in algorithmic translations, while allowing organizations to also use network-specific prefixes when appropriate. Algorithmic translation is used in IPv4/IPv6 translators, as well as other types of proxies and gateways (e.g., for DNS) used in IPv4/IPv6 scenarios. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6052"/>
          <seriesInfo name="DOI" value="10.17487/RFC6052"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC5735">
          <front>
            <title>Special Use IPv4 Addresses</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document obsoletes RFC 3330. It describes the global and other specialized IPv4 address blocks that have been assigned by the Internet Assigned Numbers Authority (IANA). It does not address IPv4 address space assigned to operators and users through the Regional Internet Registries, nor does it address IPv4 address space assigned directly by IANA prior to the creation of the Regional Internet Registries. It also does not address allocations or assignments of IPv6 addresses or autonomous system numbers. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5735"/>
          <seriesInfo name="DOI" value="10.17487/RFC5735"/>
        </reference>
        <reference anchor="RFC6146">
          <front>
            <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document describes stateful NAT64 translation, which allows IPv6-only clients to contact IPv4 servers using unicast UDP, TCP, or ICMP. One or more public IPv4 addresses assigned to a NAT64 translator are shared among several IPv6-only clients. When stateful NAT64 is used in conjunction with DNS64, no changes are usually required in the IPv6 client or the IPv4 server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6146"/>
          <seriesInfo name="DOI" value="10.17487/RFC6146"/>
        </reference>
        <reference anchor="RFC6147">
          <front>
            <title>DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs. This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6147"/>
          <seriesInfo name="DOI" value="10.17487/RFC6147"/>
        </reference>
        <reference anchor="RFC6877">
          <front>
            <title>464XLAT: Combination of Stateful and Stateless Translation</title>
            <author fullname="M. Mawatari" initials="M." surname="Mawatari"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <author fullname="C. Byrne" initials="C." surname="Byrne"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This document describes an architecture (464XLAT) for providing limited IPv4 connectivity across an IPv6-only network by combining existing and well-known stateful protocol translation (as described in RFC 6146) in the core and stateless protocol translation (as described in RFC 6145) at the edge. 464XLAT is a simple and scalable technique to quickly deploy limited IPv4 access service to IPv6-only edge networks without encapsulation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6877"/>
          <seriesInfo name="DOI" value="10.17487/RFC6877"/>
        </reference>
        <reference anchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC8215">
          <front>
            <title>Local-Use IPv4/IPv6 Translation Prefix</title>
            <author fullname="T. Anderson" initials="T." surname="Anderson"/>
            <date month="August" year="2017"/>
            <abstract>
              <t>This document reserves the IPv6 prefix 64:ff9b:1::/48 for local use within domains that enable IPv4/IPv6 translation mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8215"/>
          <seriesInfo name="DOI" value="10.17487/RFC8215"/>
        </reference>
        <reference anchor="EID5547" target="https://www.rfc-editor.org/errata/eid5547">
          <front>
            <title>Errata ID 5547: NAT64 Well-Known Prefix SHOULD NOT be used for Private Use IPv4 Addresses</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 249?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Mohamed Boucadair, Nick Buraglio, Lorenzo
Colitti, Suresh Krishnan, Ted Lemon, Jordi Palet for their helpful comments and
suggestions on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
