Internet Engineering Task Force                         S. Tsuchiya, Ed.
Internet-Draft                                             Cisco Systems
Intended status: Informational                                 S. Ohkubo
Expires: May 5, 2013                                     Sakura Internet
                                                             Y. Kawakami
                                                  INTERNET MULTIFEED CO.
                                                                Nov 2012


                    Stateless IPv4 over IPv6 report
                     draft-janog-softwire-report-01

Abstract

   Stateless IPv4 over IPv6 tunnel such as MAP(Mapping of Address and
   Port) designs to support IPv4 over IPv6 island and resolve IPv4
   shortage problem by Address and Port Mapping technique.

   This document describes supported vendor's implementation, ipv4
   functionality over IPv6 and interoperability report.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on May 5, 2013.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect



Tsuchiya, et al.           Expires May 5, 2013                  [Page 1]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Implementation Report  . . . . . . . . . . . . . . . . . . . .  4
     2.1.  Participant List . . . . . . . . . . . . . . . . . . . . .  4
       2.1.1.  MAP-E Border Relay (BR)  . . . . . . . . . . . . . . .  4
       2.1.2.  MAP-E Customer Edge (CE) . . . . . . . . . . . . . . .  5
     2.2.  Security mechanism . . . . . . . . . . . . . . . . . . . .  5
       2.2.1.  Question . . . . . . . . . . . . . . . . . . . . . . .  5
       2.2.2.  Typical implementation . . . . . . . . . . . . . . . .  5
     2.3.  Provisioning method  . . . . . . . . . . . . . . . . . . .  6
     2.4.  Reachability to BR address . . . . . . . . . . . . . . . .  6
   3.  Test Parameter . . . . . . . . . . . . . . . . . . . . . . . .  6
   4.  IPv4 functionality over IPv6 . . . . . . . . . . . . . . . . .  7
     4.1.  T-1:ICMP . . . . . . . . . . . . . . . . . . . . . . . . .  7
     4.2.  T-2:IPSec VPN  . . . . . . . . . . . . . . . . . . . . . .  9
     4.3.  T-3:SSL VPN  . . . . . . . . . . . . . . . . . . . . . . .  9
     4.4.  T-4:FTP  . . . . . . . . . . . . . . . . . . . . . . . . .  9
     4.5.  T-5:PPTP . . . . . . . . . . . . . . . . . . . . . . . . .  9
     4.6.  T-6:L2TP . . . . . . . . . . . . . . . . . . . . . . . . .  9
     4.7.  T-7:Instant Messaging and VoIP . . . . . . . . . . . . . . 10
       4.7.1.  Facebook on the web (http) . . . . . . . . . . . . . . 10
       4.7.2.  Facebook via a client (xmpp) . . . . . . . . . . . . . 10
       4.7.3.  Jabber.org chat service (xmpp) . . . . . . . . . . . . 10
       4.7.4.  Gmail chat on the web (http) . . . . . . . . . . . . . 10
       4.7.5.  Gmail chat via a client (xmpp) . . . . . . . . . . . . 10
       4.7.6.  Google Talk client . . . . . . . . . . . . . . . . . . 10
       4.7.7.  AIM (AOL)  . . . . . . . . . . . . . . . . . . . . . . 10
       4.7.8.  ICQ (AOL)  . . . . . . . . . . . . . . . . . . . . . . 10
       4.7.9.  Skype  . . . . . . . . . . . . . . . . . . . . . . . . 10
       4.7.10. MSN  . . . . . . . . . . . . . . . . . . . . . . . . . 10
       4.7.11. Webex  . . . . . . . . . . . . . . . . . . . . . . . . 11
       4.7.12. Sametime . . . . . . . . . . . . . . . . . . . . . . . 11
       4.7.13. facetime . . . . . . . . . . . . . . . . . . . . . . . 11
     4.8.  T-8:NAT verification tool  . . . . . . . . . . . . . . . . 11
       4.8.1.  T-8-1:RFC4787  . . . . . . . . . . . . . . . . . . . . 11
       4.8.2.  T-8-2:NAT-Analyzer . . . . . . . . . . . . . . . . . . 11
     4.9.  Result summary . . . . . . . . . . . . . . . . . . . . . . 11
   5.  BR redundancy  . . . . . . . . . . . . . . . . . . . . . . . . 12
   6.  Interoperability . . . . . . . . . . . . . . . . . . . . . . . 12
   7.  Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 13
   8.  Contributor  . . . . . . . . . . . . . . . . . . . . . . . . . 13



Tsuchiya, et al.           Expires May 5, 2013                  [Page 2]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   9.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 13
   10. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 14
   11. Security Considerations  . . . . . . . . . . . . . . . . . . . 14
   12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     12.1. Normative References . . . . . . . . . . . . . . . . . . . 14
     12.2. Informative References . . . . . . . . . . . . . . . . . . 15
   Appendix A.  Additional Stuff  . . . . . . . . . . . . . . . . . . 16
     A.1.  test network toplogy and parameters  . . . . . . . . . . . 17
     A.2.  Configuration  . . . . . . . . . . . . . . . . . . . . . . 17
       A.2.1.  IP Infusion NetBSD 4.0.1:BR  . . . . . . . . . . . . . 17
       A.2.2.  IP Infusion Linux 2.6.18:BR  . . . . . . . . . . . . . 18
       A.2.3.  Furukawa Network Solution Corp.:BR . . . . . . . . . . 18
       A.2.4.  Vyatta ASAMAP:BR . . . . . . . . . . . . . . . . . . . 18
       A.2.5.  Internet Initiative Japan Inc. SEIL:BR . . . . . . . . 19
       A.2.6.  Cisco IOS-XR:BR  . . . . . . . . . . . . . . . . . . . 19
       A.2.7.  IP Infusion NetBSD 4.0.1:CE  . . . . . . . . . . . . . 19
       A.2.8.  IP Infusion Linux 2.6.18:CE  . . . . . . . . . . . . . 20
       A.2.9.  Furukawa Network Solution Corp.:CE . . . . . . . . . . 20
       A.2.10. Vyatta ASAMAP:CE . . . . . . . . . . . . . . . . . . . 21
       A.2.11. Internet Initiative Japan Inc. SEIL:CE . . . . . . . . 21
       A.2.12. Yamaha :CE . . . . . . . . . . . . . . . . . . . . . . 21
       A.2.13. CERNET OpenWRT :CE . . . . . . . . . . . . . . . . . . 21
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 22




























Tsuchiya, et al.           Expires May 5, 2013                  [Page 3]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


1.  Introduction

   Stateless IPv4 over IPv6 tunnel such as MAP(Mapping of Address and
   Port) designs to support IPv4 over IPv6 island and resolve IPv4
   shortage problem by Address and Port Mapping technique.

   JApan Network Operators Group [JANOG] made a Working Group to
   evaluate this feature.

   7 vendors and 9 implementations attended to the interop events which
   hold at Nagaoka city of Niigata, Japan.

   This document describes MAP-E [I-D.ietf-softwire-map] supported
   vendor's implementation, ipv4 functionality over IPv6 and
   interoperability report.


2.  Implementation Report

   MAP-E [I-D.ietf-softwire-map] is already supported by a lot of
   vendors.  The total number was 7 vendors and 9 implementations at
   this point.

   In this section, describes about interop event participant list,
   security mechanism and provisioning method and reachability to BR
   address.

2.1.  Participant List

2.1.1.  MAP-E Border Relay (BR)

   +---------------------------------+----------------+
   | Vendor                          | OS/Equipment   |
   +---------------------------------+----------------+
   | IP Infusion                     | Linux 2.6.18   |
   | IP Infusion                     | NetBSD 4.0.1   |
   | Furukawa Network Solution Corp. | FX5000         |
   | ASAMAP                          | Vyatta         |
   | Internet Initiative Japan Inc.  | SEIL/X1        |
   | Cisco Systems                   | IOS-XR/ASR9000 |
   +---------------------------------+----------------+










Tsuchiya, et al.           Expires May 5, 2013                  [Page 4]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


2.1.2.  MAP-E Customer Edge (CE)

   +---------------------------------+--------------+
   | Vendor                          | OS/Equipment |
   +---------------------------------+--------------+
   | IP Infusion                     | Linux 2.6.18 |
   | IP Infusion                     | NetBSD 4.0.1 |
   | Furukawa Network Solution Corp. | F60W         |
   | ASAMAP                          | Vyatta       |
   | CERNET                          | OpenWRT      |
   | Internet Initiative Japan Inc.  | SEIL/X1      |
   | Yamaha Corporation              | RTX1200      |
   +---------------------------------+--------------+

2.2.  Security mechanism

   We took a survey to participant about security considerations which
   is described on Section 13 of [I-D.ietf-softwire-map].

2.2.1.  Question

   Q1.  How to behave when CE/BR receives IPv4 packets which does not
   match MAP cpe domain?

   Q2.  How to behave when CE/BR receives IPv6 packets which has
   inconsistency between IPv6 src address and IPv4 src address?

   Q3.  How to behave when CE/BR receives IPv6 packets which has
   inconsistency between IPv6 dst address and IPv4 dst address?

   Q4.  How to behave when CE receives IPv6 packets which is not from BR
   address?

2.2.2.  Typical implementation

   A1.  Most of vendor look up IP routing table, then routing to next
   hop or drops.  But some vendors check routing table at first, then
   check consistency between the Rule IPv4 prefix and IPv4 destination
   packets.  As the result, routing to next hop or drops.

   A2.  All of BRs checks inconsistency between IPv6 src address and
   IPv4 src address.  Most of CE checks inconsistency between IPv6 src
   address and IPv4 src address.  If IPv6 src address is included in the
   Rule IPv6 prefix then validates IPv4 src address.  If the src address
   is BR address, then it does not validate.

   A3.  Most of BR only checks whether the IPv6 dst address is BR
   address.  Most of CE validates inconsistency between IPv6 dst address



Tsuchiya, et al.           Expires May 5, 2013                  [Page 5]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   and IPv4 dst address before NAT process.

   A4.  Depends on configuration.  If CE is configured as "Hub and Spoke
   mode" or permit only from BR address, then the packets will be
   dropped.  If CE is configured as "Mesh mode" or no filter, then
   packets will transit.

2.3.  Provisioning method

   Section 7 of [I-D.ietf-softwire-map] describes configuration of
   MAP-E.  All of CE and BR who attended the event are supported manual
   configuration only at this time.

   Most of vendors directly configures "Length of EA bits", but some
   vendors configures "sharing ratio" and "contiguous-ports", "length of
   EA bits" would be calculated as the result.

   The former configuration type would be useful for operation and
   trouble shooting, because "rule in the packets" is visible on
   configurations.

   On the other hand, latter type configuration would be easy to
   understand design such as how many user will be shared one address.

2.4.  Reachability to BR address

   3 BR implementations are required to configure BR address as
   interface address.

   The rest of 2 BR implementations must not configure BR address as
   interface address.

   The former implementation, can confirm reachability of BR address
   from IPv6 network.  But latter implementation, can not confirm
   reachability to BR address but of course can confirm reachability to
   BR themselves.


3.  Test Parameter

   MAP-E Parameter










Tsuchiya, et al.           Expires May 5, 2013                  [Page 6]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   +----------------------+-------------------------------------------+
   | Parameter            | Value                                     |
   +----------------------+-------------------------------------------+
   | Rule IPv6 prefix     | 2403:9200::/32                            |
   | Rule IPv4 prefix     | 203.86.225.0/28                           |
   | End-user IPv6 prefix | 2403:9200:fff1::/48 - 2403:9200:fff7::/48 |
   | EA bits              | 16bit(48-32)                              |
   | Port-Set ID          | 12bit                                     |
   | PSID offset          | 4                                         |
   | BR IPv6 address      | 2403:9200:fff0:0::2                       |
   | Topology             | Mesh                                      |
   +----------------------+-------------------------------------------+

   Each of MAP-E has only 15 TCP/UDP ports,1 IP address is shared by
   4096 users.

   MAP Simulation Tool shows this rule. [1]

   MTU Parameter

   +-----------+----------+---------------+--------------------+
   | Parameter | IPv6 MTU | TCP MSS clamp | Tunnel IF IPv4 MTU |
   +-----------+----------+---------------+--------------------+
   | Value     | 1500byte | Enable        | 1460byte           |
   +-----------+----------+---------------+--------------------+


4.  IPv4 functionality over IPv6

   MAP-E [I-D.ietf-softwire-map] uses A+P technologies with NAT44.
   Basic NAT requirement is defined as [RFC4787], [RFC5508] and
   [RFC5382].  But there is difference of implementation among vendors.
   ALG support also depends on vendors implementations.

4.1.  T-1:ICMP

   Section 9 of [I-D.ietf-softwire-map] describes about ICMP handling in
   MAP domain.

   T-1-1: echo request/echo reply

   Confirmed from MAP-E CE network to global internet.

   Echo request (ICMP type 8 code 0) has identifier, so MAP-E CE has to
   rewrite this field from ports-set value.  Echo reply(ICMP type 0 code
   0) has same identifier as echo request.  MAP-BR must handle from this
   identifier field.




Tsuchiya, et al.           Expires May 5, 2013                  [Page 7]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   Therefore the test could confirm capability of ICMP both CE and BR.

   All of CE and BR are supported this feature.

   T-1-2: Host Unreachable

   Confirmed from MAP-E CE network to global internet.

   Layer3 switch reply "Host unreachable" (ICMP type 3 code 1) message,
   the message does not has identifier field.  So MAP-BR has to inspect
   ICMP payload.

   The test could confirm capability to handling for null identifier
   ICMP of MAP-BR.

   3 BR already supported this feature.2 BR does not support this
   feature at this time.

   T-1-3: TTL equals 0 during transit

   Confirmed traceroute from MAP-E CE network to global internet.

   Layer3 switch reply "TTL equals 0 during transit" (ICMP type 11 code
   0) message, the message does not has identifier field.  So MAP-BR has
   to inspect ICMP payload.

   The test could confirm capability to handling for null identifier
   ICMP of MAP-BR.

   3 BR already supported this feature.2 BR does not support this
   feature at this time.

   T-1-4: Fragmentation needed but no frag. bit set

   Confirmed Echo with DF-bit from MAP-E CE network to global internet.

   Layer3 switch reply "Fragmentation needed but no frag. bit set" (ICMP
   type 3 code 4) message, the message does not has identifier field.
   So MAP-BR has to inspect ICMP payload.

   The test could confirm capability to handling for null identifier
   ICMP of MAP-BR.

   3 BR already supported this feature.2 BR does not support this
   feature at this time.






Tsuchiya, et al.           Expires May 5, 2013                  [Page 8]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


4.2.  T-2:IPSec VPN

   IPSec VPN [RFC2401] uses ESP packets, therefore MAP-E CE should
   support NAT traversal [RFC3948].

   T-2-1:IPSec

   All of CE failed.This result is expected behavior.

   T-2-2:IPSec VPN(UDP:NAT Traversal)

   All of CE succeeded.

4.3.  T-3:SSL VPN

   It should be no problem, because SSL VPN[RFC4347] uses TCP sockets.

   All of CE succeeded.

4.4.  T-4:FTP

   FTP[RFC0959] PORT(Active) and PASV(Passive) mode had sometimes
   problem in NAT44.  [RFC2428] is enhancement FTP for IPv6/NAT.  MAP-E
   devices may need support FTP ALG if the customer required FTP Active
   mode.

   T-4-1:Passive(PASV) mode

   All of CE succeeded.

   T-4-2:Active(PORT) mode

   Only 2 vendor's CE succeeded.

4.5.  T-5:PPTP

   PPTP[RFC2637] uses GRE and TCP port 1723.  Unless configuring to pass
   GRE and TCP port 1723, can not use PPTP on MAP-E .NOTE:Microsoft is
   warning use of PPTP due to security reason. [2743314]

   All of CE failed.This result is expected behavior.

4.6.  T-6:L2TP

   L2TP/IPsec[RFC3193] should support on MAP-E using with NAT
   Traversal[RFC3948].

   All of CE succeeded.



Tsuchiya, et al.           Expires May 5, 2013                  [Page 9]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


4.7.  T-7:Instant Messaging and VoIP

   Verified functionality of Instant Messaging and VoIP tool that
   described on section 5.3 of [RFC6586] and facetime within same MAP-E
   CE, different MAP-E CEs and between MAP-E BR and CE.

4.7.1.  Facebook on the web (http)

   All of combination basically succeeded.  Tested both chat and video.

4.7.2.  Facebook via a client (xmpp)

   All of combination succeeded.

4.7.3.  Jabber.org chat service (xmpp)

   Not tested

4.7.4.  Gmail chat on the web (http)

   All of combination basically succeeded.  Tested chat,voice and video.

4.7.5.  Gmail chat via a client (xmpp)

   All of combination basically succeeded.  Tested chat,voice and video.

4.7.6.  Google Talk client

   All of combination basically succeeded.  Tested chat,voice and video.

4.7.7.  AIM (AOL)

   All of combination basically succeeded.  Tested chat,voice and video.

4.7.8.  ICQ (AOL)

   All of combination basically succeeded.  Tested chat,voice and video.

4.7.9.  Skype

   All of combination basically succeeded.  Tested chat,voice and video.

4.7.10.  MSN

   All of combination basically succeeded.  Tested chat,voice and video.






Tsuchiya, et al.           Expires May 5, 2013                 [Page 10]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


4.7.11.  Webex

   All of combination succeeded.  Tested chat,voice and video in the
   meeting.

4.7.12.  Sametime

   Not tested

4.7.13.  facetime

   All of combination succeeded.

4.8.  T-8:NAT verification tool

   Acording to Section-11 of [I-D.ietf-softwire-map], MAP CE should
   support [RFC4787], [RFC5508] and [RFC5382] .  This section describes
   the result of MAP CEs which were verified by test tool.

4.8.1.  T-8-1:RFC4787

   STUN [RFC5389], NAT Behavior Discovery [RFC5780] and UDP hole
   punching are used for online game.  [RFC4787] is Best Current
   Practise of NAT behavior requirement for UDP.  Konami Digital
   Entertainment Co., Ltd. provided [RFC4787] verification tool.

   The test result will be update.

   REQ-1: Endpoint-Independent Mapping

   REQ-8: Filtering Behavior

   REQ-9: Hairpinning

   REQ-3: Port overloading

4.8.2.  T-8-2:NAT-Analyzer

   [NAT-Analyzer] is JAVA applet in the browser to verify NAT
   functionality.

   The test result will be update.

4.9.  Result summary

   Even DNS queries could occupy to MAP-E CE NAT table in this port
   restricted (only 15 ports) environments.




Tsuchiya, et al.           Expires May 5, 2013                 [Page 11]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   There is two solution; one is specific short timer for DNS or UDP.
   Another is configured DNS transport proxy on MAP-E CE.

   As section-3 of [I-D.draft-dec-stateless-4v6] describes, MAP-E CE
   expected to act as a DNS resolver proxy, using native DNS over IPv6
   to the SP network.

   IPv6 MTU expected as 1500byte, but some vendors had the implicit
   limitation which does not configured over 1280byte.  It could not see
   a lot of site if the vendor which had limitation works as BR.  Also
   there was complex issue even if the vendor works as CE.

   As section 10.1 of [I-D.ietf-softwire-map], IPv6 MTU in the MAP
   domain should configured well managed value.

   Most of modern applications and VPN protocols could use in multi
   vendor MAP-E[I-D.ietf-softwire-map].

   But there is the difference of test result of [RFC4787] and FTP
   Active mode.  It's depends on vendor's NAT implementation.


5.  BR redundancy

   As MAP-E is stateless,so specific technic is not required for
   redundancy.

   Tested BR redundancy between 2 BRs by routing convergence.  Skype
   session had been kept and could communicate after route
   convergence(about 2 sec).


6.  Interoperability

   MAP-E stateless technology that means does not need maintenance of
   state machine.  So there are no problem of interoperability.

   But there was one issue about "ipv6 interface identifier" from
   misunderstanding of section-6 of [I-D.ietf-softwire-map].

   If it could add example to explain format in this section, then it
   would be more understandable.

   The issue is already fixed.







Tsuchiya, et al.           Expires May 5, 2013                 [Page 12]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


7.  Conclusion

   A lot of vendors already implemented MAP-E.

   There is no critical issue about interoperability between different
   vendor's CE and CE, CE and BR, BR and BR.

   Most of issue were already discussed on IETF.

   MAP-E [I-D.ietf-softwire-map] is mature.


8.  Contributor

   Test netork Contributors

   Chisato Kashiwagi Chisato.Kashiwagi@ipinfusion.com
   Shuuichi Saito shuu@fnsc.co.jp
   Takuya Iimura tiimura@cisco.com
   Tomoki Murai murai@fnsc.co.jp
   Tomoyuki Sahara  tsahara@iij.ad.jp
   Ryo Sato sr.10005@konami.com
   Motohiko Sato sm.64846@konami.com
   Congxiao Bao  congxiao@cernet.edu.cn
   Guoliang Han  bupthgl@gmail.com
   Kohei Ono Kohei.Ono@ipinfusion.com
   Naohide Kamitani kamitani@fnsc.co.jp
   Masakazu Asama m-asama@ginzado.ne.jp
   Kazuhiko Satoyoshi satoyoshi@soundnet.yamaha.co.jp
   Takehiro Sukizaki  sukizaki@soundnet.yamaha.co.jp
   Tetsuya Innami tinnami@cisco.com
   Satoshi Kubota sa-kubota@jpne.co.jp
   Yuji Yamazaki yuji.yamazaki@g.softbank.co.jp
   Satoru Matsushima satoru.matsushima@gmail.com
   Kaoru Oka kaoru.oka@g.softbank.co.jp
   Miki Takata miki@baking.jp
   Takayuki Osabe osabet@nscs.jp
   Satoshi Ebe satoshie@nscs.jp
   Yasuyuki Kaneko yasuyuki.kaneko@global-netcore.jp
   Maoke Chen fibrib@gmail.com


9.  Acknowledgements

   The author would like to thanks NS Comuputer Service, ENOG and JANOG
   committee.  The authors would like to thank you Satoru Matsushima,
   Seiichi Kawamura for their thorough review and comments.




Tsuchiya, et al.           Expires May 5, 2013                 [Page 13]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


10.  IANA Considerations

   This document has no actions for IANA.


11.  Security Considerations

   There is no additional security requirement.


12.  References

12.1.  Normative References

   [I-D.dec-stateless-4v6]
              Dec, W., "Stateless 4via6 Address Sharing",
              draft-dec-stateless-4v6-00 (work in progress), March 2011.

   [I-D.ietf-softwire-map]
              Troan, O., Dec, W., Li, X., Bao, C., Zhai, Y., Matsushima,
              S., and T. Murakami, "Mapping of Address and Port (MAP)",
              draft-ietf-softwire-map-00 (work in progress), June 2012.

   [I-D.murakami-softwire-4rd]
              Murakami, T. and O. Troan, "IPv4 Residual Deployment on
              IPv6 infrastructure - protocol specification",
              draft-murakami-softwire-4rd-00 (work in progress),
              July 2011.

   [RFC0959]  Postel, J. and J. Reynolds, "File Transfer Protocol",
              STD 9, RFC 959, October 1985.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2401]  Kent, S. and R. Atkinson, "Security Architecture for the
              Internet Protocol", RFC 2401, November 1998.

   [RFC2637]  Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little,
              W., and G. Zorn, "Point-to-Point Tunneling Protocol",
              RFC 2637, July 1999.

   [RFC3193]  Patel, B., Aboba, B., Dixon, W., Zorn, G., and S. Booth,
              "Securing L2TP using IPsec", RFC 3193, November 2001.

   [RFC3948]  Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M.
              Stenberg, "UDP Encapsulation of IPsec ESP Packets",
              RFC 3948, January 2005.



Tsuchiya, et al.           Expires May 5, 2013                 [Page 14]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   [RFC4347]  Rescorla, E. and N. Modadugu, "Datagram Transport Layer
              Security", RFC 4347, April 2006.

   [RFC4787]  Audet, F. and C. Jennings, "Network Address Translation
              (NAT) Behavioral Requirements for Unicast UDP", BCP 127,
              RFC 4787, January 2007.

   [RFC5508]  Srisuresh, P., Ford, B., Sivakumar, S., and S. Guha, "NAT
              Behavioral Requirements for ICMP", BCP 148, RFC 5508,
              April 2009.

   [RFC5780]  MacDonald, D. and B. Lowekamp, "NAT Behavior Discovery
              Using Session Traversal Utilities for NAT (STUN)",
              RFC 5780, May 2010.

   [RFC6586]  Arkko, J. and A. Keranen, "Experiences from an IPv6-Only
              Network", RFC 6586, April 2012.

12.2.  Informative References

   [2743314]  ""Microsoft Security Advisory (2743314) Unencapsulated MS-
              CHAP v2 Authentication Could Allow Information Disclosure
              "", <http://technet.microsoft.com/en-us/security/advisory/
              2743314>.

   [ENOG]     ""Echigo Network Operators' Group"", <http://enog.jp/>.

   [I-D.ietf-softwire-stateless-4v6-motivation]
              Boucadair, M., Matsushima, S., Lee, Y., Bonness, O.,
              Borges, I., and G. Chen, "Motivations for Stateless IPv4
              over IPv6 Migration Solutions",
              draft-ietf-softwire-stateless-4v6-motivation-00 (work in
              progress), September 2011.

   [JANOG]    ""JApan Network Operators Group"",
              <http://www.janog.gr.jp/en>.

   [NAT-Analyzer]
              ""Network Measurement Activites at TUM"",
              <http://nattest.net.in.tum.de/>.

   [RFC3849]  Huston, G., Lord, A., and P. Smith, "IPv6 Address Prefix
              Reserved for Documentation", RFC 3849, July 2004.

   [RFC4443]  Conta, A., Deering, S., and M. Gupta, "Internet Control
              Message Protocol (ICMPv6) for the Internet Protocol
              Version 6 (IPv6) Specification", RFC 4443, March 2006.




Tsuchiya, et al.           Expires May 5, 2013                 [Page 15]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   [RFC5387]  Touch, J., Black, D., and Y. Wang, "Problem and
              Applicability Statement for Better-Than-Nothing Security
              (BTNS)", RFC 5387, November 2008.

   [RFC5569]  Despres, R., "IPv6 Rapid Deployment on IPv4
              Infrastructures (6rd)", RFC 5569, January 2010.

   [RFC5737]  Arkko, J., Cotton, M., and L. Vegoda, "IPv4 Address Blocks
              Reserved for Documentation", RFC 5737, January 2010.

   [RFC5952]  Kawamura, S. and M. Kawashima, "A Recommendation for IPv6
              Address Text Representation", RFC 5952, August 2010.

   [RFC6052]  Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X.
              Li, "IPv6 Addressing of IPv4/IPv6 Translators", RFC 6052,
              October 2010.

   [RFC6104]  Chown, T. and S. Venaas, "Rogue IPv6 Router Advertisement
              Problem Statement", RFC 6104, February 2011.

   [RFC6145]  Li, X., Bao, C., and F. Baker, "IP/ICMP Translation
              Algorithm", RFC 6145, April 2011.

   [RFC6346]  Bush, R., "The Address plus Port (A+P) Approach to the
              IPv4 Address Shortage", RFC 6346, August 2011.

URIs

   [1]  <http://6lab.cisco.com/map/
        MAP.php?W1siUnVsZSAwIiwiMjQwMzo5MjAwOjA6MC8zMiIsIjIwMy44Ni4yMjUu
        MC8yOCIsMTYsNCwxXV0=>


Appendix A.  Additional Stuff

















Tsuchiya, et al.           Expires May 5, 2013                 [Page 16]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


A.1.  test network toplogy and parameters


                                .--.
                              _(.   `)
                            _(  IPv4  `)_
                           (  Internet   `)
                          ( `  .        )  )
                           `--(_______)---'
                                  |
                            +----------+
                            | MAP-E BR |
                            +----------+      MAP-E BR IPv6 address
                                  |           2403:9200:fff0:0::2
                                .--.
                              _(.   `)
                            _(  IPv6  `)_
                           (  Backbone   `)    Rule IPv6 prefix:2403:9200::/32
                          ( `  .        )  )   Rule IPv4 prefix:203.86.225.0/28
                           `--(_______)---'    CE IPv6 prefix:
                                  |            2403:9200:fff1::/48 - 2403:9200:fff7::/48
                                  |            EA bits:16bit(48-32)
                                  |            Port-Set ID:12bit
                          +---------------+    PSID offset:4
                          |  IPv6 Switch  |    Tunnel Interface IPv4 MTU: 1460
                          +---------------+
                          |       |       |


                                 Figure 1

A.2.  Configuration

A.2.1.  IP Infusion NetBSD 4.0.1:BR

   ---- MAP tunnel I/F ----
   # cat /etc/ifconfig.map0
   up
   mtu 1460
   inet 10.99.99.1/24
   rule_ipv6_prefix 2403:9200::/32
   rule_ipv4_prefix 203.86.225.0/28
   rule_eabits_length 16
   psid_offset 4
   encap_src_check 0
   fmr 1





Tsuchiya, et al.           Expires May 5, 2013                 [Page 17]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


A.2.2.  IP Infusion Linux 2.6.18:BR

   ---- MAP tunnel I/F ----
   ip -6 tunnel change map1 rule_ipv6_prefix 2403:9200::/32
   ip -6 tunnel change map1 rule_ipv4_prefix 203.86.225.0/28
   ip -6 tunnel change map1 rule_eabits_length 16
   ip -6 tunnel change map1 psid_offset 4
   ip -6 tunnel change map1 fmr 1
   ip -6 tunnel change map1 map_autosetaddr 1
   ip -6 tunnel change map1 map_autosetgw 1
   ip -4 addr add 203.86.225.18/30 dev map1

A.2.3.  Furukawa Network Solution Corp.:BR

   !
   interface tunnel 1
    tunnel mode ipinip ipv4 ipv6-tunnel-profile 1
   exit
   !
   ipv4 ipv6-tunnel-profile 1
    profile-mode map-encap
    rule-ipv4-prefix 203.86.225.0/28
    rule-ipv6-prefix 2403:9200::/32
    user-len 16
    source-address 2403:9200:fff0::2
   exit


A.2.4.  Vyatta ASAMAP:BR

   interfaces {
        loopback lo {
        }
        map map0 {
            br-address 2403:9200:fff0::2/64
            default-forwarding-mode encapsulation
            default-forwarding-rule true
            role br
            rule 1 {
                ea-length 16
                ipv4-prefix 203.86.225.0/28
                ipv6-prefix 2403:9200::/32
            }
        }







Tsuchiya, et al.           Expires May 5, 2013                 [Page 18]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


A.2.5.  Internet Initiative Japan Inc. SEIL:BR

interface frd0 mtu 1460
frd mode br
frd br-address 2403:9200:fff0::2
frd rule add R0 external-ipv4-prefix 203.86.225.0/28 internal-ipv6-prefix 2403:9200::/32 index-length 16 psid-offset 4

A.2.6.  Cisco IOS-XR:BR

   !
   interface ServiceApp5
    ipv4 address 203.0.113.5 255.255.255.252
    load-interval 30
    service cgn JANOG service-type map-e
    logging events link-status
   !
   interface ServiceApp6
    ipv6 address 2001:db8:1:1::1/64
    load-interval 30
    service cgn JANOG service-type map-e
    logging events link-status
   !
   interface ServiceInfra1
    ipv4 address 203.0.113.1 255.255.255.252
    service-location 0/0/CPU0
   !
   service cgn JANOG
    service-location preferred-active 0/0/CPU0
    service-type map-e Softwire
     cpe-domain ipv4 prefix 203.86.225.0/28
     cpe-domain ipv6 prefix 2403:9200::/32
     sharing-ratio 12
     aftr-endpoint-address 2403:9200:fff0::2
     contiguous-ports 0
     address-family ipv4
      interface ServiceApp5
     !
     address-family ipv6
      interface ServiceApp6
     !
   end


A.2.7.  IP Infusion NetBSD 4.0.1:CE







Tsuchiya, et al.           Expires May 5, 2013                 [Page 19]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


   -- ifconfig.map0 -- actual MAP-E parameter
   up
   mtu 1460
   rule_ipv6_prefix 2403:9200::/32
   rule_ipv4_prefix 203.86.225.0/28
   lan_if_name any
   wan_if_name lo1
   map_autosetaddr 1
   map_autosetgw 1
   rule_eabits_length 16
   psid_offset 4
   map_border_router 2403:9200:fff0:0::2
   map_mss auto
   fmr 1


A.2.8.  IP Infusion Linux 2.6.18:CE

   ---- MAP tunnel I/F ----

   ip -6 tunnel change map1 rule_ipv6_prefix 2403:9200::/32
   ip -6 tunnel change map1 rule_ipv4_prefix 203.86.225.0/28
   ip -6 tunnel change map1 rule_eabits_length 16
   ip -6 tunnel change map1 psid_offset 4
   ip -6 tunnel change map1 map_border_router 2403:9200:fff0:0::2
   ip -6 tunnel change map1 fmr 1
   ip -6 tunnel change map1 map_autosetaddr 1
   ip -6 tunnel change map1 map_autosetgw 1

A.2.9.  Furukawa Network Solution Corp.:CE

   ip nat ap_pool ADDR-POOL1
    ipv6-mape-profile 1
   exit
   ip ipv6-mape-profile 1
    user-len 16
    br-address 2403:9200:fff0:0::2
    rule-ipv6-prefix reference-interface loopback 1
    rule-ipv6-prefix-len 32
    rule-ipv4-prefix 203.86.225.0 255.255.255.240
   exit
   interface tunnel 1
    tunnel mode ipip ipv6-mape-profile 1
    tunnel source reference-interface ipv6 loopback 1
    ip mtu 1460
    ip nat inside source list 10 ap_pool ADDR-POOL1
   exit




Tsuchiya, et al.           Expires May 5, 2013                 [Page 20]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


A.2.10.  Vyatta ASAMAP:CE

    interfaces {
        map map0 {
            br-address 2403:9200:fff0::2/64
            default-forwarding-mode encapsulation
            default-forwarding-rule true
            role ce
            rule 1 {
                ea-length 16
                ipv4-prefix 203.86.225.0/28
                ipv6-prefix 2403:9200::/32
            }
            tunnel-source eth1
        }

A.2.11.  Internet Initiative Japan Inc. SEIL:CE

interface frd0 mtu 1460
interface frd0 tcp-mss 1420
nat napt add private 192.168.1.0-192.168.1.255 interface frd0
nat option port-assignment random
frd mode ce
frd ce-address 2403:9200:fff6:0:cb:56e1:f0f:f600
frd br-address 2403:9200:fff0::2
frd rule add R0 external-ipv4-prefix 203.86.225.0/28 internal-ipv6-prefix 2403:9200::/32 index-length 16 psid-offset 4

A.2.12.  Yamaha :CE

tunnel select 1
 tunnel encapsulation ipip
 tunnel endpoint address 2403:9200:fff7:0:cb:56e1:f0f:f700 2403:9200:fff0::2
 tunnel map-e 203.86.225.0/28 2403:9200::/32 16 4 ::2
 ip tunnel mtu 1460
 ip tunnel nat descriptor 1000
 tunnel enable 1
nat descriptor type 1000 masquerade
nat descriptor timer 1000 30
nat descriptor timer 1000 tcpfin 5
nat descriptor address outer 1000 map-e

A.2.13.  CERNET OpenWRT :CE









Tsuchiya, et al.           Expires May 5, 2013                 [Page 21]


Internet-Draft            IPv4 over IPv6 report                 Nov 2012


# configure eth1 -- IPv4 interface
ifconfig br-lan 192.168.1.1/24

./control start

#janog softwire interop event
utils/ivictl -r -d -P 2403:9200:fff0:0::2/128
utils/ivictr -r -p 203.86.225.0/28 -P 2403:9200::/32 -R 4096 - M 1 -f -E
utils/ivictr -s -i br-lan -I eth0.1 -H -N -a 192.168.1.0/24 -A 203.86.225.1/28 -P 2403:9200::/32 -R 4096 - M 1 -o 4 -f -c 1400 -E
service iptables stop
service ip6tables stop


Authors' Addresses

   Shishio Tsuchiya (editor)
   Cisco Systems
   Midtown Tower, 9-7-1,Akasaka
   Minato-Ku, Tokyo  107-6227
   Japan

   Phone: +81 3 6434 6543
   Email: shtsuchi@cisco.com


   Shuichi Ohkubo
   Sakura Internet
   33F Sumitomo fudosan Nishi shinjuku Bldg.,7-20-1 Nishi shinjuku
   Shinjuku-Ku, Tokyo  160-0023
   Japan

   Phone: +81 3 5332 7070
   Email: ohkubo@sakura.ad.jp


   Yuya Kawakami
   INTERNET MULTIFEED CO.
   OTEMACHI 1st.SQUARE EAST TOWER,3F 1-5-1,Otemachi,
   Chiyoda-ku, Tokyo  100-0004
   Japan

   Phone: +81 3 3282 1040
   Email: kawakami@mfeed.ad.jp








Tsuchiya, et al.           Expires May 5, 2013                 [Page 22]