Skip to main content

IP/ICMP Translation Algorithm
RFC 6145

Revision differences

Document history

Date Rev. By Action
2020-01-21
23 (System) Received changes through RFC Editor sync (added Verified Errata tag)
2015-10-14
23 (System) Notify list changed from behave-chairs@ietf.org, draft-ietf-behave-v6v4-xlate@ietf.org to (None)
2012-08-22
23 (System) post-migration administrative database adjustment to the No Objection position for Stewart Bryant
2012-08-22
23 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2012-08-22
23 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2011-04-28
23 Cindy Morgan State changed to RFC Published from RFC Ed Queue.
2011-04-27
23 (System) RFC published
2010-10-13
23 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2010-10-12
23 (System) IANA Action state changed to No IC from In Progress
2010-10-12
23 (System) IANA Action state changed to In Progress
2010-10-12
23 Cindy Morgan IESG state changed to Approved-announcement sent
2010-10-12
23 Cindy Morgan IESG has approved the document
2010-10-12
23 Cindy Morgan Closed "Approve" ballot
2010-10-12
23 David Harrington State changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed by David Harrington
2010-09-30
23 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2010-09-30
23 David Harrington State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation::AD Followup by David Harrington
2010-09-18
23 (System) New version available: draft-ietf-behave-v6v4-xlate-23.txt
2010-09-18
23 David Harrington -23- changes RFC2119 keywords; get WG review
2010-09-14
23 David Harrington
Magnus Westerlund has raised a concern.
I have asked the document shepherd to prepare a response to Magnus's concerns, outlining the discussions about zero checksums …
Magnus Westerlund has raised a concern.
I have asked the document shepherd to prepare a response to Magnus's concerns, outlining the discussions about zero checksums that have already taken place.

From Magnus:
"I have taken a look at the new text. I am quite concerned about one thing.

Section 4.5:


  3.  Forwarding the packet without a UDP checksum.

      A stateless translator can translate fragmented UDP IPv4 packet
      under this condition.

Unless we modify RFC 2460 (see 6man debate about v6 and zero checksum) we can't allow this option to be used in the direction v4-v6. And it shouldn't occur in the other direction for the same reason that it is an illegal packet.

Thus I think this 3rd option shouldn't be included at this stage as it will create illegal packets.

For the same reason that it violates RFC 2460 I think also the section
5.5 change is inappropriate:

  For UDP, if an IPv6 UDP packet arrives with a 0 checksum, a UDP
  checksum SHOULD NOT be generated for that IPv4 packet.  Otherwise,
  the translator SHOULD recalculate and update the transport-layer
  checksum.  The translator MAY have a configuration option permitting
  it to zero the UDP checksum in some or all traffic.


I have not looked at any discussion leading up to this changes."
2010-08-24
23 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss by Alexey Melnikov
2010-08-24
23 Alexey Melnikov [Ballot discuss]
2010-08-23
23 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2010-08-23
23 Stewart Bryant [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss by Stewart Bryant
2010-08-22
22 (System) New version available: draft-ietf-behave-v6v4-xlate-22.txt
2010-08-17
23 Alexey Melnikov [Ballot comment]
2010-08-17
23 Alexey Melnikov
[Ballot discuss]
[Updated]

Modulo the issues listed below I have No Objections to the publication of this document:

As per ID nits , section 1 …
[Ballot discuss]
[Updated]

Modulo the issues listed below I have No Objections to the publication of this document:

As per ID nits , section 1 D, any -bis document that obsoletes another document needs to list changes since the previous version. (No need to list every comma, just major changes).
2010-08-17
21 (System) New version available: draft-ietf-behave-v6v4-xlate-21.txt
2010-08-13
23 (System) Removed from agenda for telechat - 2010-08-12
2010-08-12
23 Cindy Morgan State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan
2010-08-12
23 Jari Arkko
[Ballot discuss]
This document is in very good shape (as is the entire document set
on NAT64) and should move forward. However, before recommending that …
[Ballot discuss]
This document is in very good shape (as is the entire document set
on NAT64) and should move forward. However, before recommending that
this particular document gets final approval, I would like to discuss
on issue. The document explains:

  Also, when the IPv4 sender does not set the DF bit
  the translator MUST always include an IPv6 fragment header to
  indicate that the sender allows fragmentation.
  ...
  In addition, the rules in section 3.1 use
  the presence of an IPv6 fragment header to indicate that the sender
  might not be using path MTU discovery (i.e., the packet should not
  have the DF flag set should it later be translated back to IPv4).
  ....
  If the DF bit is set and the packet is not a fragment (i.e., the MF
  flag is not set and the Fragment Offset is equal to zero) then the
  translator SHOULD NOT add a Fragment header to the resulting packet.
  ...
  If there is a need to add a Fragment header (the DF bit is not set or
  the packet is a fragment) the header fields are set as above with the
  following exceptions:

In other words, DF=0 implies a fragment header in IPv6. This has been
shown to cause operational difficulties in practice, as even traffic
that in no way needed fragmentation will have a fragmentation header,
which may result in difficulties due to limited firewall fragmentation
support in IPv6, and so on.

Perhaps the spec is right in recommending this, but I would like to
understand exactly why it says what it says, and what the downside
of a more relaxed recommendation might be. (FWIW, I'm sending this
message behind a NAT64 device that uses a relaxed recommendation.)
2010-08-12
23 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2010-08-11
23 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre
2010-08-11
23 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2010-08-11
23 Sean Turner [Ballot comment]
I support Tim's DISCUSS position.
2010-08-11
23 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner
2010-08-11
23 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2010-08-11
23 Stewart Bryant
[Ballot discuss]
When a translator receives an unfragmented UDP IPv4 packet and the
checksum field is zero, the translator SHOULD compute the missing UDP
checksum …
[Ballot discuss]
When a translator receives an unfragmented UDP IPv4 packet and the
checksum field is zero, the translator SHOULD compute the missing UDP
checksum as part of translating the packet. 

There needs to be text explaining how the translator know whether or not to add the missing checksum. I understand that this is now a more complex decision than it used to be as a result of proposals to relax the requirement to include a UDP checksum for IPv6 depending on the application requirement.

My reading of this specification is that in the reverse direction (IPv6 to IPv4), when a non checksum neutral address is used a check sum will be added to the UDP header carried by the IPv4 packet, and yet I see no discussion of whether this can be turned off, or of the implications for the IPv4 host (which conceivably may not be able to operate with UDP checksum)
2010-08-11
23 Stewart Bryant [Ballot Position Update] New position, Discuss, has been recorded by Stewart Bryant
2010-08-11
23 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2010-08-11
23 Tim Polk
[Ballot discuss]
Tero Kvinen's security directorate review indicated that the security considerations are incomplete with respect to the impact of IPsec's AH and ESP on …
[Ballot discuss]
Tero Kvinen's security directorate review indicated that the security considerations are incomplete with respect to the impact of IPsec's AH and ESP on translation.  I have not seen a response to this message (and there have been no
updates to the document), and personally believe these issues should be addressed.  That is, I consider these issues
blocking.  Please work with Tero to scrub the text!

The full message is available at:
                  http://www.ietf.org/mail-archive/web/secdir/current/msg01762.html
2010-08-11
23 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-08-09
23 Alexey Melnikov
[Ballot comment]
3.  Translating from IPv4 to IPv6

  Path MTU discovery is mandatory in IPv6 but it is optional in IPv4.
  IPv6 routers …
[Ballot comment]
3.  Translating from IPv4 to IPv6

  Path MTU discovery is mandatory in IPv6 but it is optional in IPv4.
  IPv6 routers never fragment a packet - only the sender can do
  fragmentation.

[...]

  However, when the IPv4 sender does not set the Don't Fragment (DF)
  bit, the translator MUST ensure that the packet does not exceed the
  path MTU on the IPv6 side.  This is done by fragmenting the IPv4
  packet so that it fits in 1280-byte IPv6 packets, since that is the
  minimum IPv6 MTU.  Also, when the IPv4 sender does not set the DF bit
  the translator MUST always include an IPv6 fragment header to
  indicate that the sender allows fragmentation.

Are these 2 paragraphs in conflict?
2010-08-09
23 Alexey Melnikov
[Ballot discuss]
[Updated]

Modulo the issues listed below I have No Objections to the publication of this document:

As per ID nits , section 1 …
[Ballot discuss]
[Updated]

Modulo the issues listed below I have No Objections to the publication of this document:

As per ID nits , section 1 D, any -bis document that obsoletes another document needs to list changes since the previous version. (No need to list every comma, just major changes).

ID-nits tool report for this document:

Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

[...]

  ** Obsolete normative reference: RFC 1883 (Obsoleted by RFC 2460)

Is use of RFC 1883 intentional?

[...]

  -- Obsolete informational reference (is this intentional?): RFC 2766
    (Obsoleted by RFC 4966)

What is the relationship between this document and RFC 4966?
2010-08-09
23 Alexey Melnikov
[Ballot discuss]
I haven't reviewed the document yet, but after a quick scan of the document I don't see a section list changes since RFC …
[Ballot discuss]
I haven't reviewed the document yet, but after a quick scan of the document I don't see a section list changes since RFC 2765.
2010-08-09
23 Alexey Melnikov [Ballot Position Update] New position, Discuss, has been recorded by Alexey Melnikov
2010-08-04
23 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-07-16
23 David Harrington [Ballot Position Update] New position, Yes, has been recorded for David Harrington
2010-07-16
23 David Harrington Ballot has been issued by David Harrington
2010-07-16
23 David Harrington Created "Approve" ballot
2010-07-08
23 David Harrington Placed on agenda for telechat - 2010-08-12 by David Harrington
2010-07-08
23 David Harrington State Changes to IESG Evaluation from Waiting for AD Go-Ahead by David Harrington
2010-06-15
23 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2010-06-11
23 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Tero Kivinen.
2010-06-09
23 Amanda Baber As described in the IANA Considerations section, we understand this
document to have NO IANA Actions.
2010-06-09
23 Amanda Baber IANA comments:

As described in the IANA Considerations section, we understand this
document to have NO IANA Actions.
2010-06-03
23 Samuel Weiler Request for Last Call review by SECDIR is assigned to Tero Kivinen
2010-06-03
23 Samuel Weiler Request for Last Call review by SECDIR is assigned to Tero Kivinen
2010-06-01
23 Amy Vezza Last call sent
2010-06-01
23 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2010-06-01
23 David Harrington Last Call was requested by David Harrington
2010-06-01
23 David Harrington State Changes to Last Call Requested from AD Evaluation::AD Followup by David Harrington
2010-06-01
23 (System) Ballot writeup text was added
2010-06-01
23 (System) Last call text was added
2010-06-01
23 (System) Ballot approval text was added
2010-05-18
20 (System) New version available: draft-ietf-behave-v6v4-xlate-20.txt
2010-04-17
19 (System) New version available: draft-ietf-behave-v6v4-xlate-19.txt
2010-04-10
18 (System) New version available: draft-ietf-behave-v6v4-xlate-18.txt
2010-04-07
17 (System) New version available: draft-ietf-behave-v6v4-xlate-17.txt
2010-04-02
16 (System) New version available: draft-ietf-behave-v6v4-xlate-16.txt
2010-03-31
23 David Harrington [Note]: 'Dave Thaler (dthaler@microsoft.com) is the document shepherd.' added by David Harrington
2010-03-31
23 David Harrington Responsible AD has been changed to David Harrington from Magnus Westerlund
2010-03-30
15 (System) New version available: draft-ietf-behave-v6v4-xlate-15.txt
2010-03-30
14 (System) New version available: draft-ietf-behave-v6v4-xlate-14.txt
2010-03-30
13 (System) New version available: draft-ietf-behave-v6v4-xlate-13.txt
2010-03-22
23 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-03-22
12 (System) New version available: draft-ietf-behave-v6v4-xlate-12.txt
2010-03-20
23 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Magnus Westerlund
2010-03-18
23 Magnus Westerlund State Changes to AD Evaluation from Publication Requested by Magnus Westerlund
2010-03-18
23 Magnus Westerlund [Note]: 'Dave Thaler (dthaler@microsoft.com) is the document shepherd.' added by Magnus Westerlund
2010-03-17
23 Cindy Morgan
(1.a) Who is the Document Shepherd for this document?

draft-ietf-behave-v6v4-xlate-11
Dave Thaler, dthaler@microsoft.com

Has the
Document Shepherd personally reviewed this version of the
document and, …
(1.a) Who is the Document Shepherd for this document?

draft-ietf-behave-v6v4-xlate-11
Dave Thaler, dthaler@microsoft.com

Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he or she believe this
version is ready for forwarding to the IESG for publication?

Yes.

(1.b) Has the document had adequate review both from key WG members
and from key non-WG members? Does the Document Shepherd have
any concerns about the depth or breadth of the reviews that
have been performed?

This document has received significant WG review.
No concerns.

(1.c) Does the Document Shepherd have concerns that the document
needs more review from a particular or broader perspective,
e.g., security, operational complexity, someone familiar with
AAA, internationalization or XML?

No concerns.

(1.d) Does the Document Shepherd have any specific concerns or
issues with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he
or she is uncomfortable with certain parts of the document, or
has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated
that it still wishes to advance the document, detail those
concerns here.

No concerns.

Has an IPR disclosure related to this document
been filed? If so, please include a reference to the
disclosure and summarize the WG discussion and conclusion on
this issue.

None.

(1.e) How solid is the WG consensus behind this document?

Solid.

Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

The WG has a good understanding of, and agreement with, this document.

(1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in
separate email messages to the Responsible Area Director. (It
should be in a separate email because this questionnaire is
entered into the ID Tracker.)

No such threats or appeals.

(1.g) Has the Document Shepherd personally verified that the
document satisfies all ID nits? (See
http://www.ietf.org/ID-Checklist.html and
and http://tools.ietf.org/tools/idnits/).

Yes.

Boilerplate checks are
not enough; this check needs to be thorough. Has the document
met all formal review criteria it needs to, such as the MIB
Doctor, media type and URI type reviews?

The document does not specify a MIB, media type, or URI, and thus
does not need to meet those review criteria.

If the document
does not already indicate its intended status at the top of
the first page, please indicate the intended status here.

Intended Status: Standards Track

(1.h) Has the document split its references into normative and
informative?

Yes

Are there normative references to documents that
are not ready for advancement or are otherwise in an unclear
state? If such normative references exist, what is the
strategy for their completion? Are there normative references
that are downward references, as described in [RFC3967]? If
so, list these downward references to support the Area
Director in the Last Call procedure for them [RFC3967].

All normative references are to RFCs, either standards track or BCP.

The document shepherd observed that idnits complains about the license:

== You're using the IETF Trust Provisions' Section 6.b License Notice from 12
Sep 2009 rather than the newer Notice from 28 Dec 2009. (See
http://trustee.ietf.org/license-info/)

however, the authors are using xml2rfc which does not support this
new license text.

(1.i) Has the Document Shepherd verified that the document IANA
consideration section exists and is consistent with the body
of the document?

Yes

If the document specifies protocol
extensions, are reservations requested in appropriate IANA
registries? Are the IANA registries clearly identified? If
the document creates a new registry, does it define the
proposed initial contents of the registry and an allocation
procedure for future registrations? Does it suggest a
reasonable name for the new registry? See [RFC5226]. If the
document describes an Expert Review process has Shepherd
conferred with the Responsible Area Director so that the IESG
can appoint the needed Expert during the IESG Evaluation?

There are no registries.

(1.j) Has the Document Shepherd verified that sections of the
document that are written in a formal language, such as XML
code, BNF rules, MIB definitions, etc., validate correctly in
an automated checker?

The document contains no such formal language.

(1.k) The IESG approval announcement includes a Document
Announcement Write-Up. Please provide such a Document
Announcement Write-Up? Recent examples can be found in the
"Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary
Relevant content can frequently be found in the abstract
and/or introduction of the document. If not, this may be
an indication that there are deficiencies in the abstract
or introduction.

This document forms a replacement of the Stateless IP/ICMP
Translation Algorithm (SIIT) described in RFC 2765. The algorithm
translates between IPv4 and IPv6 packet headers (including ICMP
headers).

Working Group Summary
Was there anything in WG process that is worth noting? For
example, was there controversy about particular points or
were there decisions where the consensus was particularly
rough?

The primary issues raised dealt with fragment handling.
An investigation was done to determine how much of a problem not
getting ICMPv6 "packet too big" messages is on the public Internet,
and it was found to be a bigger problem than originally anticipated.
As such, this changed the WG opinion from rough consensus on
one approach to a strong consensus on a different appoach on
the final document.

Document Quality
Are there existing implementations of the protocol?

Yes,
http://www.ietf.org/mail-archive/web/behave/current/msg08102.html

Have a
significant number of vendors indicated their plan to
implement the specification?

Yes, several vendors are actively implementing the specification.

Are there any reviewers that
merit special mention as having done a thorough review,
e.g., one that resulted in important changes or a
conclusion that the document had no substantive issues?

They are listed in the document's acknowledgement section.

If
there was a MIB Doctor, Media Type or other expert review,
what was its course (briefly)? In the case of a Media Type
review, on what date was the request posted?

No such reviews were necessary.

Personnel
Who is the Document Shepherd for this document?

Dave Thaler, dthaler@microsoft.com

Who is the
Responsible Area Director?

Magnus Westerlund, magnus.westerlund@ericsson.com

If the document requires IANA
experts(s), insert 'The IANA Expert(s) for the registries
in this document are .'

The document doesn't require IANA experts.
2010-03-17
23 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2010-03-17
23 Cindy Morgan [Note]: 'Dave Thaler (dthaler@microsoft.com) is the document shepherd.' added by Cindy Morgan
2010-03-16
11 (System) New version available: draft-ietf-behave-v6v4-xlate-11.txt
2010-02-27
10 (System) New version available: draft-ietf-behave-v6v4-xlate-10.txt
2010-02-11
09 (System) New version available: draft-ietf-behave-v6v4-xlate-09.txt
2010-02-08
08 (System) New version available: draft-ietf-behave-v6v4-xlate-08.txt
2010-02-07
07 (System) New version available: draft-ietf-behave-v6v4-xlate-07.txt
2010-01-25
06 (System) New version available: draft-ietf-behave-v6v4-xlate-06.txt
2009-12-17
05 (System) New version available: draft-ietf-behave-v6v4-xlate-05.txt
2009-11-20
04 (System) New version available: draft-ietf-behave-v6v4-xlate-04.txt
2009-10-24
03 (System) New version available: draft-ietf-behave-v6v4-xlate-03.txt
2009-10-19
02 (System) New version available: draft-ietf-behave-v6v4-xlate-02.txt
2009-09-09
01 (System) New version available: draft-ietf-behave-v6v4-xlate-01.txt
2009-06-30
00 (System) New version available: draft-ietf-behave-v6v4-xlate-00.txt