<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chroboczek-int-v4-via-v6-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="v4-via-v6">IPv4 routes with an IPv6 next hop</title>
    <seriesInfo name="Internet-Draft" value="draft-chroboczek-int-v4-via-v6-02"/>
    <author fullname="Juliusz Chroboczek">
      <organization>IRIF, University of Paris</organization>
      <address>
        <postal>
          <street>Case 7014</street>
          <street>75205 Paris Cedex 13</street>
          <street>France</street>
        </postal>
        <email>jch@irif.fr</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="T." surname="Høiland-Jørgensen" fullname="Toke Høiland-Jørgensen">
      <organization>Red Hat</organization>
      <address>
        <email>toke@toke.dk</email>
      </address>
    </author>
    <date year="2023" month="December" day="12"/>
    <area>Internet Engineering Steering Group</area>
    <workgroup>Internet Area</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 61?>

<t>We propose "v4-via-v6" routing, a technique that uses IPv6 next-hop
addresses for routing IPv4 packets, thus making it possible to route IPv4
packets across a network where routers have not been assigned IPv4
addresses.  We describe the technique, and discuss its operational
implications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://wkumari.github.io/draft-chroboczek-int-v4-via-v6/draft-chroboczek-int-v4-via-v6.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-chroboczek-int-v4-via-v6/"/>.
      </t>
      <t>
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/wkumari/draft-chroboczek-int-v4-via-v6"/>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The dominant form of routing in the Internet is next-hop routing, where
a routing protocol constructs a routing table which is used by
a forwarding process to forward packets.  The routing table is a data
structure that maps network prefixes in a given family (IPv4 or IPv6) to
next hops, pairs of an outgoing interface and a neighbor's network
address, for example:</t>
      <artwork><![CDATA[
    destination                      next hop
  2001:db8:0:1::/64               eth0, fe80::1234:5678
  203.0.113.0/24                  eth0, 192.0.2.1
]]></artwork>
      <t>When a packet is routed according to a given routing table entry, the
forwarding plane uses a neighbor discovery protocol (the Neighbor
Discovery protocol (ND) <xref target="RFC4861"/> in the case of IPv6, the Address
Resolution Protocol (ARP) <xref target="RFC0826"/> in the case of IPv4) to map the
next-hop address to a link-layer address (a "MAC address"), which is then
used to construct the link-layer frames that encapsulate forwarded
packets.</t>
      <t>It is apparent from the description above that there is no fundamental
reason why the destination prefix and the next-hop address should be in
the same address family: there is nothing preventing an IPv6 packet from
being routed through a next hop with an IPv4 address (in which case the
next hop's MAC address will be obtained using ARP), or, conversely, an
IPv4 packet from being routed through a next hop with an IPv6 address.
(In fact, it is even possible to store link-layer addresses directly in
the next-hop entry of the routing table, thus avoiding the use of an
address resolution protocol altogether, which is commonly done in networks
using the OSI protocol suite).</t>
      <t>The case of routing IPv4 packets through an IPv6 next hop is
particularly interesting, since it makes it possible to build
networks that have no IPv4 addresses except at the edges and still
provide IPv4 connectivity to edge hosts.  In addition, since an IPv6
next hop can use a link-local address that is autonomously
configured, the use of such routes enables a mode of operation where
the network core has no statically assigned IP addresses of either
family, which significantly reduces the amount of manual
configuration required.  (See also <xref target="RFC7404"/> for a discussion of the
issues involved with such an approach.)</t>
      <t>We call a route towards an IPv4 prefix that uses an IPv6 next hop a
"v4-via-v6" route.</t>
      <t>This document discusses the protocol design and operations implications
of such routes and is designed to be used as a reference for future
documents.</t>
      <t>{ Editor note, to be removed before publication. This document is heavily based
on draft-ietf-babel-v4viav6. When draft-ietf-babel-v4viav6 was
going through IESG eval, Warren raised concerns that something this
fundamental deserved to be documented in a separate, standalone document, so
that it can be more fully discussed, and, more importantly, referenced
cleanly in the future. }</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="operation">
      <name>Operation</name>
      <t>Next-hop routing is implemented by two separate components, the routing
protocol and the forwarding plane, that communicate through a shared
data structure, the routing table.</t>
      <section anchor="structure-of-the-routing-table">
        <name>Structure of the routing table</name>
        <t>The routing table is a data structure that maps address prefixes to
next-hops, pairs of the form (interface, address).  In traditional
next-hop routing, the routing table maps IPv4 prefixes to IPv4 next hops,
and IPv6 addresses to IPv6 next hops.  With v4-via-v6 routing, the routing
table is extended so that an IPv4 prefix may map to either an IPv4 or an
IPv6 next hop.</t>
      </section>
      <section anchor="operation-of-the-forwarding-plane">
        <name>Operation of the forwarding plane</name>
        <t>The forwarding plane is the part of the routing implementation that is
executed for every forwarded packet.  As a packet arrives, the forwarding
plane consults the routing table, selects a single route matching the
packet, determines the next-hop address, and forwards the packet to the
next-hop address.</t>
        <t>With v4-via-v6 routing, the address family of the next-hop address is no
longer determined by the address family of the prefix: since the routing
table may map an IPv4 prefix to either an IPv4 or an IPv6 next-hop, the
forwarding plane must be able to determine, on a per-packet basis, whether
the next-hop address is an IPv4 or an IPv6 address, and to use that
information in order to choose the right address resolution protocol to
use (ARP for IP4, ND for IPv6).</t>
      </section>
      <section anchor="operation-of-routing-protocols">
        <name>Operation of routing protocols</name>
        <t>The routing protocol is the part of the routing implementation that is
executed asynchronously from the forwarding plane, and whose role is to
build the routing table.  Since v4-via-v6 routing is a generalisation of
traditional next-hop routing, v4-via-v6 can interoperate with existing
routing protocols: a traditional routing protocol produces a traditional
next-hop routing table, which can be used by an implementation supporting
v4-via-v6 routing.</t>
        <t>However, in order to use the additional flexibility provided by v4-via-v6
routing, routing protocols will need to be extended with the ability to
populate the routing table with v4-via-v6 routes when an IPv4 address is
not available or when the available IPv4 addresses are not suitable for
use as a next-hop (e.g., not stable enough).</t>
        <section anchor="distance-vector-routing-protocols">
          <name>Distance-vector routing protocols</name>
        </section>
        <section anchor="link-state-routing-protocols">
          <name>Link-state routing protocols</name>
        </section>
      </section>
    </section>
    <section anchor="icmp-considerations">
      <name>ICMP Considerations</name>
      <t>The Internet Control Message Protocol (ICMPv4, or simply ICMP)
<xref target="RFC0792"/> is a protocol related to IPv4 that is primarily used to
carry diagnostic and debugging information.  ICMPv4 packets may be
originated by end hosts (e.g., the "destination unreachable, port
unreachable" ICMPv4 packet), but they may also be originated by
intermediate routers (e.g., most other kinds of "destination
unreachable" packets).</t>
      <t>Some protocols deployed in the Internet rely on ICMPv4 packets sent
by intermediate routers.  Most notably, path MTU Discovery (PMTUd)
<xref target="RFC1191"/> is an algorithm executed by end hosts to discover the
maximum packet size that a route is able to carry.  While there exist
variants of PMTUd that are purely end-to-end <xref target="RFC4821"/>, the variant
most commonly deployed in the Internet has a hard dependency on
ICMPv4 packets originated by intermediate routers: if intermediate
routers are unable to send ICMPv4 packets, PMTUd may lead to
persistent black-holing of IPv4 traffic.</t>
      <t>Due to this kind of dependency, every router that is able to
forward IPv4 traffic <bcp14>SHOULD</bcp14> be able originate ICMPv4 traffic.  Since
the extension described in this document enables routers to forward
IPv4 traffic received over an interface that has not been assigned an
IPv4 address, a router implementing this extension <bcp14>MUST</bcp14> be able to
originate ICMPv4 packets even when the outgoing interface has not
been assigned an IPv4 address.</t>
      <t>In such a situation, if the router has an interface that has been
assigned an IPv4 address (other than the loopback address), or if an
IPv4 address has been assigned to the router itself (to the "loopback
interface"), then that IPv4 address may be used as the source of
originated ICMPv4 packets.  If no IPv4 address is available, the
router could use the experimental mechanism described in Requirement
R-22 of Section 4.8 <xref target="RFC7600"/>, which consists of using the dummy
address 192.0.0.8 as the source address of originated ICMPv4 packets.
Note however that using the same address on multiple routers may
hamper debugging and fault isolation, e.g., when using the
"traceroute" utility.</t>
      <t>{Editor note: It would be surprising to many operators to see something like:</t>
      <artwork><![CDATA[
> $ traceroute -n 8.8.8.8
traceroute to 8.8.8.8 (8.8.8.8), 64 hops max, 52 byte packets
 1  192.168.0.1  1.894 ms  1.953 ms  1.463 ms
 2  192.0.0.8  9.012 ms  8.852 ms  12.211 ms
 3  192.0.0.8  8.445 ms  9.426 ms  9.781 ms
 4  192.0.0.8  9.984 ms  10.282 ms  10.763 ms
 5  192.0.0.8  13.994 ms  13.031 ms  12.948 ms
 6  192.0.0.8  27.502 ms  26.895 ms
 7  8.8.8.8  26.509 ms
]]></artwork>
      <t>Is this a problem though? If this becomes common practice, will operators
just come to understand that the repeated 192.0.0.8 is not actually a looping
packet, but rather that the packet is (probably!) making forward progress?
What if it goes:
<tt>192.168.0.1 -&gt; 192.0.0.8 -&gt; 10.10.10.10 -&gt; 192.0.0.8 -&gt; 172.16.14.2 -&gt; dest?</tt>
}</t>
      <t>{ Editor note / question:
192.0.0.8 is assigned in the <xref target="IANA-IPV4-REGISTRY"/> as the "IPv4 dummy address".
It may be used as a Source Address, and was requested in <xref target="RFC7600"/> to be used
as the IPv4 source address when synthesizing an ICMPv4 packet to mirror an
ICMPv6 error message.  This is all fine and good - but, 192.0.0.0/24 is
commonly considered a bogon or martian</t>
      <t>Example (from a Juniper router):</t>
      <artwork><![CDATA[
wkumari@rtr2.pao> show route martians

inet.0:
             0.0.0.0/0 exact -- allowed
             0.0.0.0/8 orlonger -- disallowed
             127.0.0.0/8 orlonger -- disallowed
             192.0.0.0/24 orlonger -- disallowed
             240.0.0.0/4 orlonger -- disallowed
             224.0.0.0/4 exact -- disallowed
             224.0.0.0/24 exact -- disallowed
]]></artwork>
      <t>This means that these packets are likely to be filtered in many places, and
so ICMP packets with this source address are likely to be dropped. Is this a
major issue? Would requesting another address be a better solution? Would it help? If it were to be allocated from some more global pool, it would still
likely require "magic" to allow it to pass BCP38 filters.
}</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The techniques described in this document make routing more flexible by
allowing IPv4 routes to propagate across a section of a network that has
only been assigned IPv6 addresses.  This additional flexibility might
invalidate otherwise reasonable assumptions made by network
administrators, which could potentially cause security issues.</t>
      <t>For example, if an island of IPv4-only hosts is separated from the IPv4
Internet by routers that have not been assigned IPv4 addresses, a network
administrator might reasonably assume that the IPv4-only hosts are
unreachable from the IPv4 Internet.  This assumption is broken if the
intermediary routers implement v4-via-v6 routing, which might make the
IPv4-only hosts reachable from the IPv4 Internet.  If this is not
desirable, then the network administrator must filter out the undesirable
traffic in the forwarding plane by implementing suitable packet filtering
rules.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7600">
          <front>
            <title>IPv4 Residual Deployment via IPv6 - A Stateless Solution (4rd)</title>
            <author fullname="R. Despres" initials="R." surname="Despres"/>
            <author fullname="S. Jiang" initials="S." role="editor" surname="Jiang"/>
            <author fullname="R. Penno" initials="R." surname="Penno"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="G. Chen" initials="G." surname="Chen"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This document specifies a stateless solution for service providers to progressively deploy IPv6-only network domains while still offering IPv4 service to customers. The solution's distinctive properties are that TCP/UDP IPv4 packets are valid TCP/UDP IPv6 packets during domain traversal and that IPv4 fragmentation rules are fully preserved end to end. Each customer can be assigned one public IPv4 address, several public IPv4 addresses, or a shared address with a restricted port set.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7600"/>
          <seriesInfo name="DOI" value="10.17487/RFC7600"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC0826">
          <front>
            <title>An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware</title>
            <author fullname="D. Plummer" initials="D." surname="Plummer"/>
            <date month="November" year="1982"/>
            <abstract>
              <t>The purpose of this RFC is to present a method of Converting Protocol Addresses (e.g., IP addresses) to Local Network Addresses (e.g., Ethernet addresses). This is an issue of general concern in the ARPA Internet Community at this time. The method proposed here is presented for your consideration and comment. This is not the specification of an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="37"/>
          <seriesInfo name="RFC" value="826"/>
          <seriesInfo name="DOI" value="10.17487/RFC0826"/>
        </reference>
        <reference anchor="RFC7404">
          <front>
            <title>Using Only Link-Local Addressing inside an IPv6 Network</title>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="E. Vyncke" initials="E." surname="Vyncke"/>
            <date month="November" year="2014"/>
            <abstract>
              <t>In an IPv6 network, it is possible to use only link-local addresses on infrastructure links between routers. This document discusses the advantages and disadvantages of this approach to facilitate the decision process for a given network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7404"/>
          <seriesInfo name="DOI" value="10.17487/RFC7404"/>
        </reference>
        <reference anchor="RFC0792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC1191">
          <front>
            <title>Path MTU discovery</title>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="November" year="1990"/>
            <abstract>
              <t>This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path. It specifies a small change to the way routers generate one type of ICMP message. For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1191"/>
          <seriesInfo name="DOI" value="10.17487/RFC1191"/>
        </reference>
        <reference anchor="RFC4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <date month="March" year="2007"/>
            <abstract>
              <t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="IANA-IPV4-REGISTRY">
          <front>
            <title>IANA IPv4 Address Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="https://www.iana.org/assignments/iana-ipv4-special-registry/"/>
        </reference>
      </references>
    </references>
    <?line 314?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
