Skip to main content

Basic Transition Mechanisms for IPv6 Hosts and Routers
draft-ietf-v6ops-mech-v2-07

Revision differences

Document history

Date Rev. By Action
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Scott Hollenbeck
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Margaret Wasserman
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Alex Zinin
2005-04-04
07 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-03-31
07 Amy Vezza IESG state changed to Approved-announcement sent
2005-03-31
07 Amy Vezza IESG has approved the document
2005-03-31
07 Amy Vezza Closed "Approve" ballot
2005-03-30
07 David Kessens State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by David Kessens
2005-03-30
07 David Kessens Note field has been cleared by David Kessens
2005-03-30
07 David Kessens State Change Notice email list have been change to fred@cisco.com, kurtis@kurtis.pp.se from
2005-03-30
07 (System) New version available: draft-ietf-v6ops-mech-v2-07.txt
2004-09-16
07 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2004-09-16
07 Amy Vezza
[Note]: 'Back to clear Steve''s DISCUSS and for review of other minor changes. html diffs are available from:
http://www.netcore.fi/pekkas/ietf/temp/ Participant in PROTO Team pilot:
Working …
[Note]: 'Back to clear Steve''s DISCUSS and for review of other minor changes. html diffs are available from:
http://www.netcore.fi/pekkas/ietf/temp/ Participant in PROTO Team pilot:
Working Group Chair Followup of DISCUSS Comments
http://www.ietf.org/internet-drafts/draft-ietf-proto-wgchair-discuss-pilot-01.txt' added by Amy Vezza
2004-09-16
07 Harald Alvestrand
[Ballot comment]
Reviewed by Joel Halpern, Gen-ART

His review:

This draft is ready for publication as a Proposed Standard RFC.

Minor comment:

The description of …
[Ballot comment]
Reviewed by Joel Halpern, Gen-ART

His review:

This draft is ready for publication as a Proposed Standard RFC.

Minor comment:

The description of tunneling seems to say that it is only for use by
routers.  It does say that the decision about using tunnels should be
based on routing information.  It would be helpful if there were a
short section on "method selection" which stated, for at least most
common circumstances, which method should be used and why.
2004-09-11
07 Steven Bellovin [Ballot comment]
-
2004-09-10
07 Steven Bellovin [Ballot comment]
I think -- but I'm not certain -- that [V64IPSEC] should be a normative reference here.
2004-09-10
07 Steven Bellovin
[Ballot discuss]
3.3: what is the benefit of using TTL 255 here?  Please delete that.  (I see that it's left over from a hint to …
[Ballot discuss]
3.3: what is the benefit of using TTL 255 here?  Please delete that.  (I see that it's left over from a hint to use GSTM; I asked that that be deleted.  But why leave the TTL suggestion in that case?)  Frankly, I think the entire paragraph is useless, since the remaining text boils down to "do it the standard way".)
2004-09-10
07 David Kessens
[Note]: 'Back to clear Steve''s DISCUSS and for review of other minor changes.

html diffs are available from:
http://www.netcore.fi/pekkas/ietf/temp/

Participant in PROTO Team pilot:
Working …
[Note]: 'Back to clear Steve''s DISCUSS and for review of other minor changes.

html diffs are available from:
http://www.netcore.fi/pekkas/ietf/temp/

Participant in PROTO Team pilot:
Working Group Chair Followup of DISCUSS Comments
http://www.ietf.org/internet-drafts/draft-ietf-proto-wgchair-discuss-pilot-01.txt' added by David Kessens
2004-09-08
07 David Kessens
[Note]: '
Back to clear Steve''s DISCUSS and for review of other minor changes.

Participant in PROTO Team pilot:
Working Group Chair Followup of DISCUSS …
[Note]: '
Back to clear Steve''s DISCUSS and for review of other minor changes.

Participant in PROTO Team pilot:
Working Group Chair Followup of DISCUSS Comments
http://www.ietf.org/internet-drafts/draft-ietf-proto-wgchair-discuss-pilot-01.txt' added by David Kessens
2004-09-08
07 David Kessens Telechat date was changed to 2004-09-16 from 2004-05-13 by David Kessens
2004-09-08
07 David Kessens Back to clear Steve's DISCUSS and for review of other minor changes.
2004-09-08
07 David Kessens State Changes to IESG Evaluation from IESG Evaluation::AD Followup by David Kessens
2004-09-08
07 David Kessens Back to clear Steve's DISCUSS and for review of other minor changes.
2004-09-08
07 David Kessens Placed on agenda for telechat - 2004-09-16 by David Kessens
2004-09-01
06 (System) New version available: draft-ietf-v6ops-mech-v2-06.txt
2004-08-26
05 (System) New version available: draft-ietf-v6ops-mech-v2-05.txt
2004-08-09
07 Scott Hollenbeck [Ballot Position Update] Position for Scott Hollenbeck has been changed to No Objection from Discuss by Scott Hollenbeck
2004-08-09
07 Alex Zinin [Ballot Position Update] Position for Alex Zinin has been changed to No Objection from Discuss by Alex Zinin
2004-08-08
07 Margaret Cullen [Ballot Position Update] Position for Margaret Wasserman has been changed to No Objection from Discuss by Margaret Wasserman
2004-07-22
04 (System) New version available: draft-ietf-v6ops-mech-v2-04.txt
2004-06-15
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2004-06-15
03 (System) New version available: draft-ietf-v6ops-mech-v2-03.txt
2004-05-13
07 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2004-05-13
07 Steven Bellovin
[Ballot discuss]
Please remove the GSTM suggestion.  It's a very inappropriate mechanism in this case.

Section 5: it's *not* that hard to learn the source …
[Ballot discuss]
Please remove the GSTM suggestion.  It's a very inappropriate mechanism in this case.

Section 5: it's *not* that hard to learn the source address of a tunnel endpoint.

The security section seems to say "just use IPsec".  That's not nearly enough detail on how to do it interoperably.
2004-05-13
07 Thomas Narten [Ballot Position Update] New position, No Objection, has been recorded for Thomas Narten by Thomas Narten
2004-05-13
07 Allison Mankin [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin
2004-05-13
07 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2004-05-13
07 Scott Hollenbeck
[Ballot discuss]
This text confuses me somewhat:

  DNS resolver libraries on IPv6/IPv4 nodes MUST be capable of handling
  both AAAA and A records.  …
[Ballot discuss]
This text confuses me somewhat:

  DNS resolver libraries on IPv6/IPv4 nodes MUST be capable of handling
  both AAAA and A records.  However, when a query locates an AAAA
  record holding an IPv6 address, and an A record holding an IPv4
  address, the resolver library MAY filter or order the results
  returned to the application in order to influence the version of IP
  packets used to communicate with that node.  In terms of filtering,
  the resolver library has three alternatives:

  -    Return only the IPv6 address(es) to the application.

  -    Return only the IPv4 address(es) to the application.

  -    Return both types of addresses to the application.

So the resolver can receive a DNS result and remove portions of the answer?  Allowing the resolver to decide which portions of the answer are returned doesn't sound like a good idea to me.
2004-05-13
07 Scott Hollenbeck [Ballot Position Update] Position for Scott Hollenbeck has been changed to Discuss from Undefined by Scott Hollenbeck
2004-05-13
07 Scott Hollenbeck [Ballot comment]
Section 7.2 should be titled "Informative References", not "Non-normative References".
2004-05-13
07 Scott Hollenbeck [Ballot Position Update] New position, Undefined, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2004-05-13
07 Bert Wijnen [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen
2004-05-13
07 Harald Alvestrand [Ballot Position Update] New position, No Objection, has been recorded for Harald Alvestrand by Harald Alvestrand
2004-05-13
07 Alex Zinin
[Ballot discuss]
It may be worth adding to the document that implementations should consider
dynamically changing the state of the configured tunnels depending on the …
[Ballot discuss]
It may be worth adding to the document that implementations should consider
dynamically changing the state of the configured tunnels depending on the
resolvability of the tunnel's end-point address in the IPv4 routing table. This
comes really handy in deployments with some redundancy and floating static
routes.

Section 3.6:

>    In addition, the node should perform ingress filtering [RFC2827] on
>    the IPv6 source address, similar to on any of its interfaces, e.g.:

>    -  if the tunnel is towards the Internet, check that the site's
>        IPv6 prefixes are not used as the source addresses, or
>
>    -  if the tunnel is towards an edge network, check that the source
>        address belongs to that edge network.

Is this an implementation requirement or a deployment/configuration
recommendation? If the former, than 2119 language should be used, and the doc
needs to explain how the router understand if the tunnel is "towards the
Internet" or "towards an edge network". If the latter, the doc should say
something like "the node should be configured to perform..."

> 3.7.  Link-Local Addresses
...
>    The interface identifier [RFC3513] for such an interface may be based
>    on the 32-bit IPv4 address of an underlying interface, or formed
>    using some other means, as long as it's unique from the other tunnel
>    endpoint with a reasonably high probability.

This doesn't work with multiple tunnels using the same IPv4 interface,
and this, I think, will be the common case.

> 3.8.  Neighbor Discovery over Tunnels
...
>    Not using a link layer address options is consistent with how
>    Deighbor Discovery is used on other point-to-point links.

"Deighbor" -> "Neighbor"

Section 5:

>    Additionally, an implementation must treat interfaces to different
>    links as separate

I'm not sure I understand this part. Is it trying to say that different
tunnels should be considered different p2p interfaces rather than a single
p2mp one?

> e.g. to ensure that Neighbor Discovery packets
>    arriving on one link does not effect other links.  This is especially
>    important for tunnel links.
2004-05-13
07 Alex Zinin [Ballot Position Update] New position, Discuss, has been recorded for Alex Zinin by Alex Zinin
2004-05-12
07 Jon Peterson [Ballot Position Update] Position for Jon Peterson has been changed to No Objection from Undefined by Jon Peterson
2004-05-12
07 Jon Peterson
[Ballot comment]
Given that this document addresses two mechanisms, dual-stacks and tunneling, I'm kind of surprised that the Security Considerations seems to talk exclusively about …
[Ballot comment]
Given that this document addresses two mechanisms, dual-stacks and tunneling, I'm kind of surprised that the Security Considerations seems to talk exclusively about tunneling. Are there no security considerations in the use of a dual-stack host? Especially given the fact that some applications on a given host may be configured to use only one stack or another, as Section 2 suggests? I can imagine a number of cases in which different protocols may be used in concert by a host (say, SIP and RTP), where conceivably different protocols employing different stacks could be used by the same application. Surely there's some security implications of that.
2004-05-12
07 Jon Peterson [Ballot Position Update] New position, Undefined, has been recorded for Jon Peterson by Jon Peterson
2004-05-11
07 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Undefined by Ted Hardie
2004-05-11
07 Ted Hardie
[Ballot comment]
Since mrw is already holding a discuss on 2.2, I've listed this is a comment,
but it might be worth the authors' considering …
[Ballot comment]
Since mrw is already holding a discuss on 2.2, I've listed this is a comment,
but it might be worth the authors' considering when they look at her discuss.

I'm concerned both about this text:

  However, when a query locates an AAAA
  record holding an IPv6 address, and an A record holding an IPv4
  address, the resolver library MAY filter or order the results
  returned to the application in order to influence the version of IP
  packets used to communicate with that node.

and the general approach of describing the filtering mechanism
available to the resolver as if it were the primary way of
preferring AAAA to A or vice versa.  The most obvious way
to prefer one address family over the other is to query for
one RR in preference to the other.  You may still get other
data back, of course, but this gives control earlier than
filtering post-facto, and it deserves a mention here. 

To take a random example, if I dig for the AAAA
record associated with ns-ext.isc.org, I get the A record in
the additional section; that might be filtered, but the preference
is already established.  The case they seem to be focused
on is the one like that in which a dig for the ns records for isc.org
returns both A and AAAA records associated with hosts
like ns-ext.isc.org.  That's fine, and it should be included,
but as part of the larger context.  I suspect they simply thought
the choice of RR was too obvious to list, but I'm guessing it
is not for the intended audience of this document.
2004-05-11
07 Ted Hardie [Ballot Position Update] New position, Undefined, has been recorded for Ted Hardie by Ted Hardie
2004-05-11
07 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley by Russ Housley
2004-05-11
07 Steven Bellovin
[Ballot discuss]
Please explain how the GSTM helps here.  Most tunnel links are more than one hop.

Section 5: it's *not* that hard to learn …
[Ballot discuss]
Please explain how the GSTM helps here.  Most tunnel links are more than one hop.

Section 5: it's *not* that hard to learn the source address of a tunnel endpoint.

The security section seems to say "just use IPsec".  That's not nearly enough detail on how to do it interoperably.
2004-05-11
07 Steven Bellovin [Ballot Position Update] New position, Discuss, has been recorded for Steve Bellovin by Steve Bellovin
2004-05-10
07 Margaret Cullen
[Ballot discuss]
Section 2.2 provides a considerable amount of information about how dual stack nodes will handle situations where both A and AAAA addresses are …
[Ballot discuss]
Section 2.2 provides a considerable amount of information about how dual stack nodes will handle situations where both A and AAAA addresses are returned by DNS.  This situation is well covered in RFC 3484, and I think it would be better to remove much of this section and simply refer to RFC 3484.

In particular, this section over-simplifies the filtering and ordering mechanisms that are needed to do proper address selection.

I also have two minor editorial comments:

  The most straightforward way for IPv6 nodes to remain compatible with
  IPv4-only nodes is by providing a complete IPv4 implementation.  IPv6
  nodes that provide a complete IPv4 and IPv6 implementations are

s/provide a complete/provide complete

  is no assumption that the DNS server know the IPv4/IPv6 capabilities
  of the requesting node.

s/DNS server know/DNS servers know (or DNS server knows)
2004-05-10
07 Margaret Cullen
[Ballot discuss]
Section 2.2 provides a considerable amount of information about how dual stack nodes will handle situations where both A and AAAA addresses are …
[Ballot discuss]
Section 2.2 provides a considerable amount of information about how dual stack nodes will handle situations where both A and AAAA addresses are returned by DNS.  This situation is well covered in RFC 3484, and I think it would be better to remove much of this section and simply refer to RFC 3484.

In particular, this section over-simplifies the filtering and ordering mechanisms that are needed to do proper address selection.

I also have two minor editorial comments:

  The most straightforward way for IPv6 nodes to remain compatible with
  IPv4-only nodes is by providing a complete IPv4 implementation.  IPv6
  nodes that provide a complete IPv4 and IPv6 implementations are

s/provide a complete/provide complete

  is no assumption that the DNS server know the IPv4/IPv6 capabilities
  of the requesting node.

s/DNS server know/DNS servers know (or DNS server knows)
2004-05-10
07 Margaret Cullen
[Ballot discuss]
2.  Dual IP Layer Operation


Section 2.2 provides a considerable amount of information about how dual stack nodes will handle situations where both …
[Ballot discuss]
2.  Dual IP Layer Operation


Section 2.2 provides a considerable amount of information about how dual stack nodes will handle situations where both A and AAAA addresses are returned by DNS.  This situation is well covered in RFC 3484, and I think it would be better to remove much of this section and simply refer to RFC 3484.

In particular, this section over-simplifies the filtering and ordering mechanisms that are needed to do proper address selection.

I also have two minor editorial comments:

  The most straightforward way for IPv6 nodes to remain compatible with
  IPv4-only nodes is by providing a complete IPv4 implementation.  IPv6
  nodes that provide a complete IPv4 and IPv6 implementations are

s/provide a complete/provide complete

  is no assumption that the DNS server know the IPv4/IPv6 capabilities
  of the requesting node.

s/DNS server know/DNS servers know (or DNS server knows)
2004-05-10
07 Margaret Cullen [Ballot Position Update] New position, Discuss, has been recorded for Margaret Wasserman by Margaret Wasserman
2004-05-01
07 Margaret Cullen [Note]: 'Participant in PROTO Team pilot:
Working Group Chair Followup of DISCUSS Comments
http://www.ietf.org/internet-drafts/draft-ietf-proto-wgchair-discuss-pilot-01.txt' added by Margaret Wasserman
2004-04-28
07 David Kessens Placed on agenda for telechat - 2004-05-13 by David Kessens
2004-04-28
07 David Kessens State Changes to IESG Evaluation from Waiting for AD Go-Ahead by David Kessens
2004-04-20
07 David Kessens [Ballot Position Update] New position, Yes, has been recorded for David Kessens
2004-04-20
07 David Kessens Ballot has been issued by David Kessens
2004-04-20
07 David Kessens Created "Approve" ballot
2004-04-08
07 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2004-03-25
07 Amy Vezza Last call sent
2004-03-25
07 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2004-03-24
07 David Kessens Last Call was requested by David Kessens
2004-03-24
07 David Kessens State Changes to Last Call Requested from Publication Requested by David Kessens
2004-03-24
07 (System) Ballot writeup text was added
2004-03-24
07 (System) Last call text was added
2004-03-24
07 (System) Ballot approval text was added
2004-03-16
07 Bert Wijnen Shepherding AD has been changed to David Kessens from Bert Wijnen
2004-02-10
07 Dinara Suleymanova Draft Added by Dinara Suleymanova
2004-02-02
02 (System) New version available: draft-ietf-v6ops-mech-v2-02.txt
2003-10-27
01 (System) New version available: draft-ietf-v6ops-mech-v2-01.txt
2003-02-26
00 (System) New version available: draft-ietf-v6ops-mech-v2-00.txt