<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-v6ops-prefer8781-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="Prefer RFC8781">Prefer use of RFC8781 for Discovery of IPv6 Prefix Used for IPv6 Address Synthesis</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-v6ops-prefer8781-01"/>
    <author fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author fullname="Tommy Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jen Linkova">
      <organization>Google</organization>
      <address>
        <email>furry13@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="25"/>
    <area>ops</area>
    <workgroup>v6ops</workgroup>
    <keyword>IPv6</keyword>
    <keyword>DNS64</keyword>
    <keyword>PREF64</keyword>
    <keyword>NAT64</keyword>
    <keyword>CLAT</keyword>
    <abstract>
      <?line 59?>

<t>On networks providing IPv4-IPv6 translation (NAT64, RFC7915), hosts and other endpoints might need to know the IPv6 prefix used for translation (the NAT64 prefix).
While RFC7050 defined a DNS64-based prefix discovery mechanism, more robust methods have since emerged.
This document provides updated guidelines for NAT64 prefix discovery, deprecating the RFC7050 approach in favor of modern alternatives (e.g., RFC8781) except where those are unavailable.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/buraglio/draft-nbtjjl-v6ops-prefer8781"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-v6ops-prefer8781/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        v6ops Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/wg/v6ops/about/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/buraglio/draft-nbtjjl-dnsop-prefer8781"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>NAT64 devices translating between IPv4 and IPv6 packet headers (<xref target="RFC7915"/>) employ a NAT64 prefix to map IPv4 addresses into the IPv6 address space, and vice versa.
When a network provides NAT64 services, it is advantageous for hosts and endpoints to acquire the network's NAT64 prefix (PREF64).
Discovering the PREF64 enables endpoints to:</t>
      <ul spacing="normal">
        <li>
          <t>implement the customer-side translator (CLAT) functions of the 464XLAT architecture <xref target="RFC6877"/>;</t>
        </li>
        <li>
          <t>translate the IPv4 literal to an IPv6 literals (Section 7.1 of [RFC8305]);</t>
        </li>
        <li>
          <t>perform local DNS64 (<xref target="RFC6147"/>) functions.</t>
        </li>
      </ul>
      <t>Dynamic PREF64 discovery is often essential, particularly for unmanaged or mobile endpoints, where static configuration is impractical.
While <xref target="RFC7050"/> introduced the first DNS64-based mechanism for PREF64 discovery, subsequent methods have been developed to address its limitations.</t>
      <t>For instance, <xref target="RFC8781"/> defines a Neighbor Discovery (<xref target="RFC4861"/>) option for Router Advertisements (RAs) to convey PREF64 information to hosts.
This approach offers several advantages (Section 3 of <xref target="RFC8781"/>), including fate sharing  with other host network configuration parameterss.</t>
      <t>Due to fundamental shortcomings of the <xref target="RFC7050"/> mechanism (<xref target="issues"/>), <xref target="RFC8781"/> is the preferred solution for new deployments.
Implementations should strive for consistent PREF64 acquisition methods.
The DNS64-based mechanism of <xref target="RFC7050"/> should be employed only when RA-based PREF64 delivery is unavailable, or as a fallback for legacy systems incapable of processing the PREF64 RA option.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>CLAT: A customer-side translator (XLAT) that complies with <xref target="RFC6145"/>.</t>
      <t>DNS64: a mechanism for synthesizing AAAA records from A records, defined in <xref target="RFC6147"/>.</t>
      <t>NAT64: a mechanism for translating IPv6 packets to IPv4 packets and vice versa.  The translation is done by translating the packet headers according to the IP/ICMP Translation Algorithm defined in <xref target="RFC7915"/>. NAT64 translators can operate in stateless or stateful mode (<xref target="RFC6144"/>).</t>
      <t>PREF64 (or NAT64 prefix): An IPv6 prefix used for IPv6 address synthesis and for network addresses and protocols translation from IPv6 clients to IPv4 servers, <xref target="RFC6146"/>.</t>
      <t>Router Advertisement (RA): A packet used by Neighbor Discovery <xref target="RFC4861"/> and SLAAC to advertise the presence of the routers, together with other IPv6 configuration information.</t>
      <t>SLAAC:  StateLess Address AutoConfiguration, <xref target="RFC4862"/></t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="issues">
      <name>Existing issues with RFC 7050</name>
      <t>DNS-based method of discovering the NAT64 prefix introduces some challenges, which make this approach less preferable than most recently developed alternatives (such as PREF64 RA option, <xref target="RFC8781"/>).
This section outlines the key issues, associated with <xref target="RFC7050"/>.</t>
      <section anchor="dependency-on-network-provided-recursive-resolvers">
        <name>Dependency on Network-Provided Recursive Resolvers</name>
        <t>Fundamentally, the presence of the NAT64 and the exact value of the prefix used for the translation are network-specific attributes.
Therefore, <xref target="RFC7050"/> requires the device to use the DNS64 resolvers provided by the network.
If the device or an application is configured to use other recursive resolvers or runs a local recursive resolver, the corresponding name resolution APIs and libraries are required to recognize 'ipv4only.arpa.' as a special name and give it special treatment.
This issue and remediation approach are discussed in <xref target="RFC8880"/>.
However, it has been observed that very few <xref target="RFC7050"/> implementations support <xref target="RFC8880"/> requirements for special treatment of 'ipv4only.arpa.'.
As a result, configuring such systems and applications to use resolvers other than the one provided by the network breaks the PREF64 discovery, leading to degraded user experience.</t>
        <t>VPN clients often override the host's DNS configuration, for example, by configuring enterprise DNS servers as the host's recursive resolvers and forcing all name resolution through the VPN.
These enterprise DNS servers typically lack DNS64 functionality and therefore cannot provide information about the PREF64 used within the local network.
Consequently, this prevents the host from discovering the necessary PREF64, negatively impacting its connectivity on IPv6-only networks</t>
      </section>
      <section anchor="network-stack-initialization-delay">
        <name>Network Stack Initialization Delay</name>
        <t>When using SLAAC, an IPv6 host typically requires a single RA to acquire its network configuration.
For IPv6-only hosts, timely PREF64 discovery is critical, particularly for those performing local DNS64 or NAT64 functions, such as CLAT.
Until the PREF64 is obtained, the host's IPv4-only applications and communication to IPv4-only destinations are impaired.
The mechanism defined in <xref target="RFC7050"/> does not bundle PREF64 information with other network configuration parameters.</t>
      </section>
      <section anchor="latency-in-updates-propagation">
        <name>Latency in Updates Propagation</name>
        <t>Section 3 of <xref target="RFC7050"/> requires that the node <bcp14>SHALL</bcp14> cache the replies received during the PREF64 discovery and <bcp14>SHOULD</bcp14> repeat the discovery process ten seconds before the TTL of the Well-Known Name's synthetic AAAA resource record expires.
As a result, once the PREF64 is discovered, it will be used until the TTL expired, or until the node disconnects from the network.
There is no mechanism for an operator to force the PREF64 rediscovery on the node without disconnecting the node from the network.
If the operator needs to change the PREF64 value used in the network, they need to proactively reduce the TTL value returned by the DNS64 server.
This method has two significant drawbacks:</t>
        <ul spacing="normal">
          <li>
            <t>Many networks utilize external DNS64 servers and therefore have no control over the TTL value.</t>
          </li>
          <li>
            <t>The PREF64 changes need to be planned and executed at least TTL seconds in advance. If the operator needs to notify nodes that a particular prefix must not be used (e.g. during a network outage or if the nodes learnt a rogue PREF64 as a result of an attack), it might not be possible without interrupting the network connectivity for the affected nodes.</t>
          </li>
        </ul>
      </section>
      <section anchor="multihoming-implications">
        <name>Multihoming Implications</name>
        <t>According to Section 3 of <xref target="RFC7050"/>, a node <bcp14>MUST</bcp14> examine all received AAAA resource records to discover one or more PREF64s and <bcp14>MUST</bcp14> utilize all learned prefixes.
However, this approach presents challenges in some multihomed topologies where different DNS64 servers belonging to different ISPs might return different PREF64s.
In such cases, it is crucial that traffic destined for synthesized addresses is routed to the correct NAT64 device and the source address selected for those flows belongs to the prefix from that ISP's address space.
In other words, the node needs to associate the discovered PREF64 with upstream information, including the IPv6 prefix and default gateway.
Currently, there is no reliable way for a node to map a DNS64 response (and the prefix learned from it) to a specific upstream in a multihoming scenario.
Consequently, the node might inadvertently select an incorrect source address for a given PREF64 and/or send traffic to the incorrect uplink.</t>
      </section>
      <section anchor="security-implications">
        <name>Security Implications</name>
        <t>As discussed in Section 7 of <xref target="RFC7050"/>, the DNS-based PREF64 discovery is prone to DNS spoofing attacks.
In addition to creating a wider attack surface for IPv6 deployments, <xref target="RFC7050"/> has other security challenges worth noting to justify declaring it legacy.</t>
        <section anchor="secure-channel-def">
          <name>Definition of secure channel</name>
          <t><xref target="RFC7050"/> requires a node's communication channel with a DNS64 server to be a "secure channel" which it defines to mean "a communication channel a node has between itself and a DNS64 server protecting DNS protocol-related messages from interception and tampering." This need is redundant when another communication mechanism of IPv6-related configuration, specifically Router Advertisements, can already be defended against tampering by RA Guard <xref target="RFC6105"/>. Requiring nodes to implement two defense mechanisms when only one is necessary when <xref target="RFC8781"/> is used in place of <xref target="RFC7050"/> creates unnecessary risk.</t>
        </section>
        <section anchor="secure-channel-example-of-ipsec">
          <name>Secure channel example of IPsec</name>
          <t>One of the two examples <xref target="RFC7050"/> defines to qualify a communication channel with a DNS64 server is the use of an "IPsec-based virtual private network (VPN) tunnel". As of the time of this writing, this is not supported as a practice by any common operating system DNS client. While they could, there have also since been multiple mechanisms defined for performing DNS-specific encryption such as those defined in <xref target="RFC9499"/> that would be more appropriately scoped to the applicable DNS traffic. These are also compatible with encrypted DNS advertisement by the network using Discovery of Network-designated Resolvers <xref target="RFC9463"/> that would ensure the clients know in advance that the DNS64 server supported the encryption mechanism.</t>
        </section>
        <section anchor="secure-channel-example-of-link-layer-encryption">
          <name>Secure channel example of link layer encryption</name>
          <t>The other example given by <xref target="RFC7050"/> that would allow a communication channel with a DNS64 server to qualify as a "secure channel" is the use of a "link layer utilizing data encryption technologies". As of the time of this writing, most common link layer implementations use data encryption already with no extra effort needed on the part of network nodes. While this appears to be a trivial way to satisfy this requirement, it also renders the requirement meaningless since any node along the path can still read the higher-layer DNS traffic containing the translation prefix. This seems to be at odds with the definition of "secure channel" as explained in <xref section="2.2" sectionFormat="of" target="RFC7050"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="recommendations-for-pref64-discovery">
      <name>Recommendations for PREF64 Discovery</name>
      <section anchor="deployment-recommendations">
        <name>Deployment Recommendations</name>
        <t>Operators deploying NAT64 networks <bcp14>SHOULD</bcp14> provide PREF64 information in Router Advertisements as per <xref target="RFC8781"/>.</t>
        <section anchor="mobile-network-considerations">
          <name>Mobile network considerations</name>
          <t>Use of <xref target="RFC8781"/> may not be currently practical for networks that have more complex network control signaling or rely on slower network component upgrade cycles, such as mobile networks. These environments are encouraged to incorporate <xref target="RFC8781"/> when made practical by infrastructure upgrades or software stack feature additions.</t>
        </section>
      </section>
      <section anchor="clients-implementation-recommendations">
        <name>Clients Implementation Recommendations</name>
        <t>Clients <bcp14>SHOULD</bcp14> obtain PREF64 information from Router Advertisements as per <xref target="RFC8781"/> instead of using <xref target="RFC7050"/> method.
In the absence of the PREF64 information in RAs, a client <bcp14>MAY</bcp14> choose to fall back to RFC7050.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Obtaining PREF64 information from Router Advertisements improves the overall security of an IPv6-only client as it mitigates all attack vectors related to spoofed or rogue DNS response, as discussed in Section 7 of <xref target="RFC7050"/>.
Security considerations related to obtaining PREF64 information from RAs are discussed in Section 7 of <xref target="RFC8781"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>It is expected that there will be a long tail of both clients and networks still relying on <xref target="RFC7050"/> as a sole mechanism to discover PREF64 information.
Therefore IANA still need to maintain "ipv4only.arpa." as described in <xref target="RFC7050"/> and this document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4862">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC6144">
          <front>
            <title>Framework for IPv4/IPv6 Translation</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="K. Yin" initials="K." surname="Yin"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This note describes a framework for IPv4/IPv6 translation. This is in the context of replacing Network Address Translation - Protocol Translation (NAT-PT), which was deprecated by RFC 4966, and to enable networks to have IPv4 and IPv6 coexist in a somewhat rational manner while transitioning to an IPv6 network. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6144"/>
          <seriesInfo name="DOI" value="10.17487/RFC6144"/>
        </reference>
        <reference anchor="RFC6145">
          <front>
            <title>IP/ICMP Translation Algorithm</title>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 2765. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6145"/>
          <seriesInfo name="DOI" value="10.17487/RFC6145"/>
        </reference>
        <reference anchor="RFC6146">
          <front>
            <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document describes stateful NAT64 translation, which allows IPv6-only clients to contact IPv4 servers using unicast UDP, TCP, or ICMP. One or more public IPv4 addresses assigned to a NAT64 translator are shared among several IPv6-only clients. When stateful NAT64 is used in conjunction with DNS64, no changes are usually required in the IPv6 client or the IPv4 server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6146"/>
          <seriesInfo name="DOI" value="10.17487/RFC6146"/>
        </reference>
        <reference anchor="RFC7915">
          <front>
            <title>IP/ICMP Translation Algorithm</title>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="T. Anderson" initials="T." surname="Anderson"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 6145.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7915"/>
          <seriesInfo name="DOI" value="10.17487/RFC7915"/>
        </reference>
        <reference anchor="RFC6147">
          <front>
            <title>DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs. This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6147"/>
          <seriesInfo name="DOI" value="10.17487/RFC6147"/>
        </reference>
        <reference anchor="RFC6877">
          <front>
            <title>464XLAT: Combination of Stateful and Stateless Translation</title>
            <author fullname="M. Mawatari" initials="M." surname="Mawatari"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <author fullname="C. Byrne" initials="C." surname="Byrne"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This document describes an architecture (464XLAT) for providing limited IPv4 connectivity across an IPv6-only network by combining existing and well-known stateful protocol translation (as described in RFC 6146) in the core and stateless protocol translation (as described in RFC 6145) at the edge. 464XLAT is a simple and scalable technique to quickly deploy limited IPv4 access service to IPv6-only edge networks without encapsulation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6877"/>
          <seriesInfo name="DOI" value="10.17487/RFC6877"/>
        </reference>
        <reference anchor="RFC8880">
          <front>
            <title>Special Use Domain Name 'ipv4only.arpa'</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>NAT64 (Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers) allows client devices using IPv6 to communicate with servers that have only IPv4 connectivity.</t>
              <t>The specification for how a client discovers its local network's NAT64 prefix (RFC 7050) defines the special name 'ipv4only.arpa' for this purpose. However, in its Domain Name Reservation Considerations section (Section 8.1), that specification (RFC 7050) indicates that the name actually has no particularly special properties that would require special handling.</t>
              <t>Consequently, despite the well-articulated special purpose of the name, 'ipv4only.arpa' was not recorded in the Special-Use Domain Names registry as a name with special properties.</t>
              <t>This document updates RFC 7050. It describes the special treatment required and formally declares the special properties of the name. It also adds similar declarations for the corresponding reverse mapping names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8880"/>
          <seriesInfo name="DOI" value="10.17487/RFC8880"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
      </references>
    </references>
    <?line 210?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to than the following people for their valuable contributions: Lorenzo Colitti, Tom Costello, Charles Eckel, Nick Heatley, Gabor Lencse and Peter Schmitt.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
