<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.33 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4193 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4193.xml">
<!ENTITY RFC7078 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7078.xml">
<!ENTITY RFC7526 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7526.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC6724 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6724.xml">
<!ENTITY RFC1918 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1918.xml">
<!ENTITY RFC3484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3484.xml">
<!ENTITY RFC5220 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5220.xml">
]>


<rfc ipr="trust200902" docName="draft-ietf-6man-rfc6724-update-00" category="std" consensus="true" submissionType="IETF" updates="6724">
  <front>
    <title abbrev="Prefer ULAs over IPv4 addresses">Preference for IPv6 ULAs over IPv4 addresses in RFC6724</title>

    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Chown" fullname="Tim Chown">
      <organization>Jisc</organization>
      <address>
        <email>Tim.Chown@jisc.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Duncan" fullname="Jeremy Duncan">
      <organization>Tachyon Dynamics</organization>
      <address>
        <email>jduncan@tachyondynamics.com</email>
      </address>
    </author>

    <date year="2023" month="October" day="09"/>

    <area>Int</area>
    <workgroup>6MAN</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 45?>

<t>This document updates RFC 6724 based on operational experience gained since its publication over ten years ago. In particular it updates the precedence of Unique Local Addresses (ULAs) in the default address selection policy table, which as originally defined by RFC 6724 has lower precedence than legacy IPv4 addressing. The update places both IPv6 Global Unicast Addresses (GUAs) and ULAs ahead of all IPv4 addresses on the policy table to better suit operational deployment and management of ULAs in production. In updating the RFC 6724 default policy table, this document also demotes the preference for 6to4 addresses. These changes to default behavior improve supportability of common use cases such as, but not limited to, automatic / unmanaged scenarios. It is recognized that some less common deployment scenarios may require explicit configuration or custom changes to achieve desired operational parameters.</t>



    </abstract>



  </front>

  <middle>


<?line 49?>

<section anchor="introduction"><name>Introduction</name>

<t>When <xref target="RFC6724"/> was published in 2012 it was expected that the default policy table may need to be updated from operational experience; section 2.1 says "It is important that implementations provide a way to change the default policies as more experience is gained" and points to the examples in Section 10, including Section 10.6 which considers a ULA example.</t>

<t>This document is written on the basis of such operational experience, in particular for scenarios where ULAs are used within a site.</t>

<t>The current default policy table in RFC 6724 leads to preference for IPv6 GUAs over IPv4 globals, which is widely considered to be preferential behavior to support greater use of IPv6 in dual-stack environments, and to allow sites to phase out IPv4 as its use becomes ever lower.</t>

<t>However, the default policy table also puts IPv6 ULAs below all IPv4 addresses, including <xref target="RFC1918"/> addresses. For many site operators this behavior will be counter-intuitive, and may create difficulties with respect to planning, operational, and security implications for environments where ULA addressing is used in certain IPv4/IPv6 dual-stack network scenarios. The expected prioritization of IPv6 traffic over IPv4 by default, as happens with IPv6 GUA addressing, will not happen for ULAs.</t>

<t>An IPv6 deployment, whether enterprise, residential or other, may use combinations of IPv6 GUAs, IPv6 ULAs, IPv4 globals, IPv4 RFC 1918 addressing, and may or may not use some form of NAT.</t>

<t>This document makes no comment or recommendation on how ULAs are used, or on the use of NAT in an IPv6 network. As the default policy table stands, operationally where GUAs and ULAs are used alongside RFC 1918 addressing, an IPv6 GUA would be selected to reach an IPv6 GUA destination.  However where there are only ULAs and RFC1918 addressing in use, RFC 1918 addresses will be preferred.</t>

<t>This document updates the default policy table to elevate the preference for ULAs such that ULAs will be preferred over all IPv4 addresses, providing more consistent and less confusing behavior for operators.</t>

<t>This change aims to improve the default handling of address selection for common cases, and unmanaged / automatic scenarios rather than those where DHCPv6 is deployed. Sites using DHCPv6 for host configuration management can make use of implementations of <xref target="RFC7078"/> to apply changes to the RFC 6724 policy table.</t>

<t>The changes should also assist operators in phasing out IPv4 from dual-stack environments, since IPv6 GUAs and ULAs will be preferred over any IPv4 addresses.  This is an extremely important enabler towards IPv6-only networking.</t>

<t>The changes are discussed in more detail in the following sections, with a further section providing a summary of the proposed updates.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="unintended-operational-issues-regarding-ipv6-preference-and-ulas"><name>Unintended Operational Issues Regarding IPv6 Preference and ULAs</name>

<t>The preference for use of IPv6 addressing over IPv4 addressing in <xref target="RFC6724"/> is inconsistent. As written, RFC 6724 section 10.3 states:</t>

<figure><artwork><![CDATA[
"The default policy table gives IPv6 addresses higher precedence than
IPv4 addresses.  This means that applications will use IPv6 in
preference to IPv4 when the two are equally suitable.  An
administrator can change the policy table to prefer IPv4 addresses by
giving the ::ffff:0.0.0.0/96 prefix a higher precedence".
]]></artwork></figure>

<t>The expected behavior would be that ULA address space would be preferred over legacy IPv4, however this is not the case. This presents an issue with any environment that will use ULA addressing alongside legacy IPv4, whether global or RFC 1918. This is counter to the standard expectations for legacy IPv4 / IPv6 dual-stack behavior in preferring IPv6, which is the case for GUA addressing.</t>

<section anchor="operational-implications"><name>Operational Implications</name>

<t>There are demonstrated and easily repeatable operational examples of the impact of the current RFC 6724 behaviour, i.e., ULAs not being preferred in OS and network equipment over legacy IPv4 addresses. These reinforce the need to update RFC 6724 to both better reflect the original intent of the RFC and to facilitate the depreciation and eventual removal of IPv4 in network environments.</t>

<t>Below is an example of a gai.conf file from a modern Linux installation as of 25 May 2023:</t>

<figure><artwork><![CDATA[
# Configuration for getaddrinfo(3).
#
# So far only configuration for the destination address sorting is needed.
# RFC 3484 governs the sorting.  But the RFC also says that system
# administrators should be able to overwrite the defaults.  This can be
# achieved here.
#
# All lines have an initial identifier specifying the option followed by
# up to two values.  Information specified in this file replaces the
# default information.  Complete absence of data of one kind causes the
# appropriate default information to be used.  The supported commands include:
#
# reload  <yes|no>
#    If set to yes, each getaddrinfo(3) call will check whether this file
#    changed and if necessary reload.  This option should not really be
#    used.  There are possible runtime problems.  The default is no.
#
# label   <mask>   <value>
#    Add another rule to the RFC 3484 label table.  See section 2.1 in
#    RFC 3484.  The default is:
#
#label ::1/128       0
#label ::/0          1
#label 2002::/16     2
#label ::/96         3
#label ::ffff:0:0/96 4
#label fec0::/10     5
#label fc00::/7      6
#label 2001:0::/32   7
#
#    This default differs from the tables given in RFC 3484 by handling
#    (now obsolete) site-local IPv6 addresses and Unique Local Addresses.
#    The reason for this difference is that these addresses are never
#    NATed while IPv4 site-local addresses most probably are.  Given
#    the precedence of IPv6 over IPv4 (see below) on machines having only
#    site-local IPv4 and IPv6 addresses a lookup for a global address would
#    see the IPv6 be preferred.  The result is a long delay because the
#    site-local IPv6 addresses cannot be used while the IPv4 address is
#    (at least for the foreseeable future) NATed.  We also treat Teredo
#    tunnels special.
#
# precedence  <mask>   <value>
#    Add another rule to the RFC 3484 precedence table.  See section 2.1
#    and 10.3 in RFC 3484.  The default is:
#
#precedence  ::1/128       50
#precedence  ::/0          40
#precedence  2002::/16     30
#precedence ::/96          20
#precedence ::ffff:0:0/96  10
#
#    For sites which prefer IPv4 connections change the last line to
#
#precedence ::ffff:0:0/96  100

#
# scopev4  <mask>  <value>
#    Add another rule to the RFC 6724 scope table for IPv4 addresses.
#    By default the scope IDs described in section 3.2 in RFC 6724 are
#    used.  Changing these defaults should hardly ever be necessary.
#    The defaults are equivalent to:
#
#scopev4 ::ffff:169.254.0.0/112  2
#scopev4 ::ffff:127.0.0.0/104    2
#scopev4 ::ffff:0.0.0.0/96       14
]]></artwork></figure>

<t>The legacy IPv4 address range in the gai.conf file is "scopev4" and the prefix ::ffff:0.0.0.0/96 which has a higher precedence (35) in RFC 6724 than the ULA prefix of fc00::/7 (3). This results in legacy IPv4 being preferred over IPv6 ULA. The result is that the operational outcome when utilizing dual-stack with ULA is inconsistent and imparts unnecessary difficulty for both troubleshooting and creating the requisite baseline of the expected behavior, which are both requirements for supportable production deployments. Depending on the host implementation, security baseline expectations can be inconsistent at best and haphazard at worst.</t>

<t>As the gai.conf file, or an equivalent within a given operating system, is referenced it dictates the
behavior of the getaddrinfo() or analogous process. More specifically, where getaddrinfo() or a comparable API is used, the sorting behavior should take into account both
the source address of the requesting host as well as the destination addresses returned and sort according to both source and destination addresses, i.e, when a ULA address is
returned, the source address selection should return and use a ULA address if available. Similarly, if a GUA address is returned the source address selection should return a GUA source address if available.</t>

<t>However, there are clearly evidenced example of three failure scenarios:</t>

<t><list style="numbers">
  <t>ULA per RFC 6724 is less preferred (the precedence value is lower) than all legacy IPv4 (represented by ::ffff:0:0/96 in the aforementioned table).</t>
  <t>Because of the lower precedence value of fc00::/7, if a host has legacy IPv4 enabled, it will use legacy IPv4 before using ULA.</t>
  <t>A dual-stacked client will source the traffic from the legacy IPv4 address, meaning it will require a corresponding legacy IPv4 destination address.</t>
</list></t>

<t>For scenario number 3, when a host resolves through DNS a destination with A and AAAA DNS records, the host will choose the A record to get an legacy IPv4 address for the destination, meaning ULA IPv6 is rendered unused.</t>

<t>As a result, the use of ULAs is not a viable option for dual-stack networking transition planning, large scale network modeling, network lab environments or other modes of large scale networking that run both IPv4 and IPv6 concurrently with the expectation that IPv6 will be preferred by default.</t>

</section>
</section>
<section anchor="preference-of-6to4-addresses"><name>Preference of 6to4 addresses</name>

<t>The anycast prefix for 6to4 relays was deprecated by <xref target="RFC7526"/> in 2015, and since that time the use of 6to4 addressing has further declined to the point where it is generally not seen and can be considered to all intents and purposes deprecated in use.</t>

<t>This document therefore demotes the precedence of the 6to4 prefix in the policy table to the same minimum preference as carried by the deprecated site local and 6bone address prefixes.</t>

</section>
<section anchor="adjustments-to-rfc-6724"><name>Adjustments to RFC 6724</name>

<t>Rule 2.1 of RFC 6724 states:</t>

<figure><artwork><![CDATA[
If an implementation is not configurable or has not been configured,
   then it SHOULD operate according to the algorithms specified here in
   conjunction with the following default policy table:


      Prefix        Precedence Label
      ::1/128               50     0
      ::/0                  40     1
      ::ffff:0:0/96         35     4
      2002::/16             30     2
      2001::/32              5     5
      fc00::/7               3    13
      ::/96                  1     3
      fec0::/10              1    11
      3ffe::/16              1    12
]]></artwork></figure>

<t>This document updates RFC 6724 section 2.1 to the following:</t>

<figure><artwork><![CDATA[
If an implementation is not configurable or has not been configured,
   then it SHOULD operate according to the algorithms specified here in
   conjunction with the following default policy table:


      Prefix        Precedence Label
      ::1/128               50     0
      ::/0                  40     1
      fc00::/7              30    13
      ::ffff:0:0/96         20     4
      2001::/32              5     5
      2002::/16              5     2
      ::/96                  1     3
      fec0::/10              1    11
      3ffe::/16              1    12
]]></artwork></figure>

<t>This preference table update moves 2002::/16 to de-preference its status in line with RFC 7526 and changes the default address selection to move fc00::/7 above legacy IPv4, with ::ffff:0:0/96 now set to precedence 20.</t>

</section>
<section anchor="the-practicalities-of-implementing-address-selection-support"><name>The practicalities of implementing address selection support</name>

<t>As with most adjustments to standards, and using RFC 6724 itself as a measuring stick, the updates defined in this document will likely take between 8-20 years to become common enough for consistent behavior within most operating systems. At the time of writing, it has been over 10 years since RFC 6724 has been published but we continue to see existing commercial and open source operating systems exhibiting <xref target="RFC3484"/> behavior.</t>

<t>While it should be noted that RFC 6724 defines a solution to adjust the address preference selection table that is functional theoretically, operationally the solution is operating system dependent and cannot be signaled by any currently deployed network mechanism. While <xref target="RFC7078"/> defines such a DHCPv6 option, it is not by any means widely implemented. This lack of an intra-protocol or network-based ability to adjust address selection preference, along with the inability to adjust a notable number of operating systems either programmatically or manually renders operational scalability of such a mechanism challenging.</t>

<t>It is especially important to note this behavior in the long lifecycle equipment that exists in industrial control and operational technology environments due to their very long mean time to replacement/lifecycle.</t>

<t>In practice this means that network operators and those who design networks need to keep these considerations in mind.  Should the current ULA and IPv4 preference issue be of concern then 'workarounds' do exist. One is to use IPv6-only networking, i.e., not deploy dual-stack, and another is to only use GUA IPv6 addresses which are preferred by default over all IPv4 addresses.</t>

</section>
<section anchor="notable-changes-in-practice-today"><name>Notable changes in practice today</name>

<section anchor="relation-to-rfc5220"><name>Relation to <xref target="RFC5220"/></name>

<t>The concerns expressed in section 2.2.2 of <xref target="RFC5220"/> need to be considered. But with a separate label for ULA now present in the policy table, Rule 5 of Section 6 of RFC 6724 which states 
~~~~~
Rule 5: Prefer matching label.
   If Label(Source(DA)) = Label(DA) and Label(Source(DB)) &lt;&gt; Label(DB),
   then prefer DA.  Similarly, if Label(Source(DA)) &lt;&gt; Label(DA) and
   Label(Source(DB)) = Label(DB), then prefer DB.
~~~~~
means that the presence of the label and the rule defining the behavior based on said rule should prevent the situation described in that section from occurring.</t>

</section>
<section anchor="relation-to-happy-eyeballs"><name>Relation to Happy Eyeballs</name>

<t>In cases where a ULA Source Address is selected to communicate with a GUA destination, Happy Eyeballs version 1 or 2 would result in practice in IPv4 being used since the ULA source address will likely fail (due to egress filtering at the border, as discussed in the Security Considerations below). Corner cases may exist where the ULA address will not fail, however, in normal operation these cases are more likely misconfigurations than intentional.</t>

</section>
<section anchor="relation-to-rfc4193"><name>Relation to <xref target="RFC4193"/></name>

<t>If the operational guidelines in sections 4.1 and 4.3 of <xref target="RFC4193"/> are followed, a Destination Unreachable ICMPv6 Error should be received by the source device which should trigger Happy Eyeballs. If Happy Eyeballs is not implemented, the next option should follow the guidelines outlined in <xref target="RFC4193"/>.</t>

</section>
</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to acknowledge the valuable input and contributions of the 6man WG including Brian Carpenter, XiPeng Xiao, Eduard Vasilenko, David Farmer, Bob Hinden, Ed Horley, Tom Coffeen, Scott Hogg, Chris Cummings, Paul Wefel, and Dale Carder.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>There are no direct security considerations in this document.</t>

<t>The mixed preference for IPv6 over IPv4 from the default policy table in RFC 6724 represents a potential security issue, given an operator may expect ULAs to be used when in practice RFC 1918 addresses are used instead.</t>

<t>When using the updated ULA source address selection defined in this document, network operators <bcp14>MUST</bcp14> follow Section 4.3 of <xref target="RFC4193"/> for firewall/packet filtering as "routers be configured by default to keep any packets with Local
IPv6 addresses from leaking outside of the site and to keep any site prefixes from being advertised outside of their site." Following this security practice is critical when ULAs have more broad reachability.</t>

<t>Operators should be mindful of cases where one node is compliant with RFC 6724 as originally published and another node is compliant with the update presented in this document, as there may be inconsistent behaviour for communications initiated in each direction. Similarly, differences between current RFC 6724-compliant and RFC 3484-compliant nodes may also be observed. Ultimately all nodes should be made compliant to the updated specification described in this document.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None.</t>

</section>
<section anchor="appendix-a-changes-since-rfc6724"><name>Appendix A. Changes since RFC6724</name>

<t><list style="symbols">
  <t>Update to default preference table moving 6to4 address block 2002::/16 to de-preference status in line with <xref target="RFC7526"/></t>
  <t>Change the default address selection to move fc00::/7 to preference 30, above legacy IPv4,</t>
  <t>Change ::ffff:0:0/96 to preference 20.</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC2119;
&RFC4193;
&RFC7078;
&RFC7526;
&RFC8174;


    </references>

    <references title='Informative References'>

&RFC6724;
&RFC1918;
&RFC3484;
&RFC5220;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

