<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-ma-6man-ra-dns64-flag-01" ipr="trust200902">
  <front>
    <title abbrev="DNS64 flag for DNS RA Option">Updates to DNS64
    Functionality Advertisement for DNS RA Option</title>

    <author fullname="Chenhao Ma" initials="C" surname="Ma">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>machh@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Chongfeng Xie" initials="C" surname="Xie">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>xiechf@cernet.edu.cn</email>
      </address>
    </author>

    <date day="25" month="February" year="2026"/>

    <area>Internet Area</area>

    <workgroup>IPv6 Maintenance</workgroup>

    <keyword>IPv6-only DNS64</keyword>

    <abstract>
      <t>This document defines a new flag in the DNS RA Option to advertise
      the DNS64 functionality. This extension enables automatic configuration
      of DNS64 resolution, improving deployability in IPv6 transition
      scenarios.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>DNS Extensions for Network Address Translation from IPv6 clients to
      IPv4 servers (DNS64)<xref target="RFC6147"/> is a widely deployed
      mechanism for IPv6-only networks requiring access to IPv4-only services.
      <xref target="I-D.ma-v6ops-5g-ipv6only"/>introduce the reasons for using
      RA to deliver DNS64 address configuration. This document defines a new
      flag in the DNS RA option<xref target="RFC8106"/> to communicate DNS64
      server address to hosts.</t>

      <section title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>
      </section>
    </section>

    <section title="Use Cases">
      <t>This section describes the key use cases that motivate the
      introduction of a new IPv6 Router Advertisement option to explicitly
      signal the availability of DNS64-capable resolvers.</t>

      <section title="Use Case 1: Coexistence of IPv6-Only and Dual-Stack Users on the Same Network">
        <t>Operators may wish to gradually migrate users from dual-stack to
        IPv6-only without relying on APN isolation or separate network slices.
        In such scenarios: </t>

        <t>IPv6-only users&nbsp;require DNS64 to access IPv4-only content.
        </t>

        <t>Dual-stack users&nbsp;should continue using standard DNS resolvers
        to avoid unnecessary translation and performance impact on NAT64
        gateways. </t>

        <t>If both user groups share the same network, the operator needs a
        mechanism to selectively provide DNS64 server addresses only to
        IPv6-only hosts. Using RDNSS to distribute DNS server addresses would
        apply to all users, potentially overloading NAT64 gateways with
        traffic from dual-stack hosts. The proposed option enables the network
        to explicitly indicate which resolvers are DNS64-capable, allowing
        hosts to make informed decisions.</t>
      </section>

      <section title="Use Case 2:Phased Rollout of DNS64 Services">
        <t>Operators often roll out new services gradually to manage risk and
        validate performance. For example: </t>

        <t>Initially, only 10% of IPv6-only users are directed to DNS64
        resolvers. </t>

        <t>Over time, this percentage is increased until full deployment is
        achieved. </t>

        <t>With RDNSS alone, all users receive the same DNS server addresses,
        making phased rollout difficult without complex per-user configuration
        or multiple network slices. The proposed option allows operators to
        control which hosts receive DNS64 resolver information based on
        network policies (e.g., by selectively sending Router Advertisements
        with or without the new option). This enables fine-grained,
        incremental deployment without requiring per-host configuration
        changes.</t>
      </section>

      <section title="Use Case 3:Multiple DNS Server Tiers with Different Capabilities">
        <t>In some deployments, operators operate multiple DNS server tiers:
        </t>

        <t>Tier 1: Standard DNS resolvers (non-DNS64) for dual-stack and
        IPv4-only users. </t>

        <t>Tier 2: DNS64-capable resolvers for IPv6-only users.</t>

        <t>Both tiers may serve the same network prefix. Without explicit
        signaling, IPv6-only hosts cannot distinguish which resolvers support
        DNS64. They would need to either: </t>

        <t>Probe each resolver (increasing signaling overhead and latency), or
        </t>

        <t>Be statically configured (reducing operational flexibility). </t>

        <t>The proposed option allows the network to explicitly advertise the
        DNS64 capability, enabling hosts to select the appropriate resolver
        without additional probing.</t>
      </section>

      <section title="Use Case 4: Avoiding Dependency on Host-Side Synthesis">
        <t>While host-side synthesis (e.g., using Pref64 options as defined in
        RFC 8781) is a valid approach, it requires host support and may not be
        available on all devices. In many real-world deployments: </t>

        <t>Legacy or constrained devices may not support host-side synthesis.
        </t>

        <t>Operators may prefer centralized translation for policy control,
        logging, or security reasons. </t>

        <t>For such environments, DNS64 remains a necessary component. The
        proposed option enhances DNS64 deployments by giving operators better
        control over which hosts use DNS64, without requiring host-side
        modifications beyond initial implementation of the option.</t>
      </section>

      <section title="Summary of Benefits">
        <t>Need 1: Coexistence of IPv6-only and dual-stack users. Allows
        selective signaling of DNS64 resolvers to IPv6-only hosts.</t>

        <t>Need 2: Phased rollout. Enables incremental deployment without
        per-host configuration.</t>

        <t>Need 3: Multiple DNS server tiers. Lets hosts distinguish
        DNS64-capable resolvers from standard ones.</t>

        <t>Need 4: Centralized translation control. Supports operators who
        prefer DNS64 over host-side synthesis.</t>
      </section>
    </section>

    <section title="Relationship with Existing Technologies">
      <t>This section clarifies how the proposed DNS64 Router Advertisement
      option relates to existing mechanisms, emphasizing that it is intended
      as a&nbsp;complementary tool&nbsp;rather than a replacement for
      established solutions.</t>

      <section title="Relationship with Pref64 Option (RFC 8781)">
        <t>The&nbsp;Pref64 option&nbsp;(RFC 8781) is used to advertise the
        IPv6 prefix used for DNS64-based address synthesis,
        enabling&nbsp;host-side synthesis. This approach allows IPv6-only
        hosts to synthesize IPv4-embedded addresses locally without involving
        a DNS64 server. </t>

        <t>The proposed DNS64 option addresses a&nbsp;different problem: it
        signals which DNS servers are&nbsp;DNS64-capable, enabling hosts to
        select the appropriate resolver. The two options
        are&nbsp;complementary: </t>

        <t>Pref64 option&nbsp;enables host-side synthesis. </t>

        <t>DNS64 option&nbsp;enables network-side DNS64 selection. </t>

        <t>Operators may choose to deploy: </t>

        <t>Pref64 only&nbsp;(for hosts that support local synthesis), </t>

        <t>DNS64 option only&nbsp;(for networks relying on centralized DNS64
        translation), or </t>

        <t>Both&nbsp;(for networks supporting a mix of host types and
        deployment strategies). </t>

        <t>Neither option replaces the other; they serve different operational
        needs.</t>
      </section>

      <section title="Relationship with RDNSS (RFC 8106)">
        <t>RDNSS&nbsp;(Recursive DNS Server) is the standard mechanism for
        distributing DNS server addresses via Router Advertisements. However,
        RDNSS alone&nbsp;cannot indicate whether a DNS server supports DNS64
        functionality. This limitation leads to the operational challenges
        described in the use cases: </t>

        <t>IPv6-only hosts cannot distinguish DNS64-capable resolvers from
        standard ones. </t>

        <t>Dual-stack hosts may unintentionally use DNS64 resolvers,
        increasing load on NAT64 gateways. </t>

        <t>The proposed option&nbsp;extends RDNSS&nbsp;by adding capability
        signaling. It does not replace RDNSS; rather, it builds upon it to
        provide richer information to hosts. In implementations, the DNS64
        option would typically be carried alongside RDNSS options in the same
        RA message.</t>
      </section>

      <section title="Relationship with PDP Context / APN Isolation">
        <t>PDP context&nbsp;or&nbsp;APN (Access Point Name) isolation&nbsp;is
        a mechanism used in mobile networks to separate users into different
        logical networks. Operators can assign: </t>

        <t>IPv4-only PDP contexts, </t>

        <t>Dual-stack PDP contexts, or </t>

        <t>IPv6-only PDP contexts. </t>

        <t>This approach works but has&nbsp;operational trade-offs: </t>

        <t>Requires per-user configuration and management. </t>

        <t>May increase operational complexity when introducing new service
        tiers. </t>

        <t>Does not easily support per-user percentage-based rollout without
        complex provisioning systems. </t>

        <t>The proposed option operates at the&nbsp;IP layer, not at the PDP
        context layer. It provides a&nbsp;finer-grained, more
        flexible&nbsp;mechanism that works within a single network slice or
        PDP context. Operators can combine both approaches: </t>

        <t>Use PDP context for coarse-grained separation (e.g., IPv6-only
        users in a dedicated context). </t>

        <t>Use the proposed option for fine-grained control within that
        context (e.g., gradually enabling DNS64 for a subset of IPv6-only
        users). </t>

        <t>The option is&nbsp;not a replacement&nbsp;for PDP context
        isolation, but rather a complementary tool for operators seeking more
        flexible IPv6-only deployment strategies.</t>
      </section>

      <section title="Relationship with Host-Side DNS64 Detection">
        <t>Some have suggested that hosts could detect DNS64 capability by:
        </t>

        <t>Probing DNS servers (e.g., by querying for AAAA records of known
        IPv4-only domains), or </t>

        <t>Using well-known addresses or special-purpose domains. </t>

        <t>While technically possible, these approaches have&nbsp;limitations:
        </t>

        <t>Increased latency: Probing adds delay to DNS resolution. </t>

        <t>Signaling overhead: Repeated probes consume network and server
        resources. </t>

        <t>Uncertainty: Results may be ambiguous or change over time. </t>

        <t>No network control: The operator cannot centrally control which
        hosts use DNS64. </t>

        <t>The proposed option provides a&nbsp;deterministic, low-overhead,
        operator-controlled&nbsp;alternative. It does not prohibit hosts from
        using detection mechanisms; rather, it offers a more efficient and
        controllable method when network-side signaling is available.</t>
      </section>
    </section>

    <section title="DNS64 Flag">
      <t>Based on <xref target="RFC8106"/>, this specification introduces a
      'T' flag bit allocated in the leftmost bit of the Reserved field to
      signal the presence of DNS64 server addresses in the option payload.
      Figure 1 shows the format of the DNS64 option.</t>

      <figure align="left">
        <artwork name=""><![CDATA[0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |    Length     |T|         Reserved            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Lifetime                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|            DNS64 Server Address(es) (128-bit IPv6)            |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 Figure 1:DNS64 RA Option format                                              ]]></artwork>
      </figure>

      <t>Fields:<list style="symbols">
          <t>Type: 8-bit identifier: 25</t>

          <t>Length: 8-bit unsigned integer.</t>

          <t>Flag T: 1-bit integer. set to indicate DNS64 server addresses are
          in the option payload.</t>

          <t>Lifetime: 32-bit unsigned integer.</t>

          <t>DNS64 Server Address(es): One or more 128-bit IPv6 addresses of
          the DNS64.</t>
        </list></t>
    </section>

    <section title="Security Considerations">
      <t>This memo does not introduce any new security problems.
      Considerations are described in Section 7 in <xref
      target="RFC8106"/></t>
    </section>

    <section title="IANA Considerations">
      <t>This document requests allocation for the Flag T.</t>
    </section>

    <section title="Acknowledgements">
      <t>Thanks to Lorenzo Colitti, Nick Buraglio, Jordi Palet, Jen Linkova,
      Philipp S. Tiesel,Ted Lemon for the discussions, the feedback, and all
      contribution.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.RFC.2119'?>

      <?rfc include='reference.RFC.6147'?>

      <?rfc include='reference.RFC.8106'?>

      <?rfc include='reference.RFC.8174'?>

      <?rfc include='reference.RFC.4861'?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.I-D.ma-v6ops-5g-ipv6only'?>
    </references>
  </back>
</rfc>
