<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-v6ops-prefer8781-06" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="Prefer RFC8781">Recommendations for Discovering IPv6 Prefix Used for IPv6 Address Synthesis</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-v6ops-prefer8781-06"/>
    <author fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author fullname="Tommy Jensen">
      <organization/>
      <address>
        <email>tojens.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jen Linkova">
      <organization>Google</organization>
      <address>
        <email>furry13@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="23"/>
    <area>ops</area>
    <workgroup>v6ops</workgroup>
    <keyword>IPv6</keyword>
    <keyword>DNS64</keyword>
    <keyword>PREF64</keyword>
    <keyword>NAT64</keyword>
    <keyword>CLAT</keyword>
    <abstract>
      <?line 61?>

<t>On networks providing IPv4-IPv6 translation (RFC7915), hosts and other endpoints need to know the IPv6 prefix(es) used for translation (the NAT64 prefix). This document provides guidelines for NAT64 prefix discovery, specifically recommending obtaining the NAT64 prefix from Router Advertisement option (RFC8781) when available.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/buraglio/draft-nbtjjl-v6ops-prefer8781"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-v6ops-prefer8781/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        v6ops Working Group mailing list (<eref target="mailto:v6ops@ietf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/wg/v6ops/about/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/v6ops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/buraglio/draft-nbtjjl-v6ops-prefer8781"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Devices translating between IPv4 and IPv6 packet headers <xref target="RFC7915"/> use a NAT64 prefix to map IPv4 addresses into the IPv6 address space, and vice versa.
When a network provides NAT64, it is advantageous for endpoints to acquire the network's NAT64 prefixes (PREF64).
Discovering the PREF64 enables endpoints to:</t>
      <ul spacing="normal">
        <li>
          <t>Implement the customer-side translator (CLAT) function of the 464XLAT architecture <xref target="RFC6877"/>.</t>
        </li>
        <li>
          <t>Translate IPv4 literals to IPv6 literals (Section 7.1 of <xref target="RFC8305"/>).</t>
        </li>
        <li>
          <t>Perform local DNS64 <xref target="RFC6147"/> functions.</t>
        </li>
        <li>
          <t>Support applications relying on IPv4 address referral (Section 3.2.2 of <xref target="RFC7225"/>).</t>
        </li>
      </ul>
      <t>Dynamic PREF64 discovery is useful to keep the NAT64 prefix configuration up-to-date, particularly for unmanaged endpoints or endpoints which move between networks.
<xref target="RFC7050"/> introduces the first DNS64-based mechanism for PREF64 discovery based on <xref target="RFC7051"/> analysis.
However, subsequent methods have been developed to address <xref target="RFC7050"/> limitations.</t>
      <t>For instance, <xref target="RFC8781"/> defines a Neighbor Discovery <xref target="RFC4861"/> option for Router Advertisements (RAs) to convey PREF64 information to hosts.
This approach offers several advantages (Section 3 of <xref target="RFC8781"/>), including fate sharing with other host network configuration parameters.</t>
      <t>Due to fundamental shortcomings of the <xref target="RFC7050"/> mechanism (<xref target="issues"/>), <xref target="RFC8781"/> is the preferred solution for new deployments.
Implementations should strive for consistent PREF64 acquisition methods.
The DNS64-based mechanism of <xref target="RFC7050"/> should be employed only when RA-based PREF64 delivery is unavailable, or as a fallback for legacy systems incapable of processing the PREF64 RA Option.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>DNS64: a mechanism for synthesizing AAAA records from A records, defined in <xref target="RFC6147"/>.</t>
      <t>NAT64: a mechanism for translating IPv6 packets to IPv4 packets and vice versa.  The translation is done by translating the packet headers according to the IP/ICMP Translation Algorithm defined in <xref target="RFC7915"/>. NAT64 translators can operate in stateful (<xref target="RFC6144"/>) or stateless mode (e.g. customer-side translator, CLAT, <xref target="RFC6877"/>).
This document uses "NAT64" as a generalized term for a translator which uses the stateless IP/ICMP translation algorithm defined in <xref target="RFC7915"/> and operates within a framework for IPv4/IPv6 translation described in <xref target="RFC6144"/>.</t>
      <t>PREF64 (or Pref64::/n, or NAT64 prefix): An IPv6 prefix used for IPv6 address synthesis and for network addresses and protocols translation from IPv6 clients to IPv4 servers using the algorithm defined in <xref target="RFC6052"/>.</t>
      <t>Router Advertisement (RA): A packet used by Neighbor Discovery <xref target="RFC4861"/> and SLAAC to advertise the presence of the routers, together with other IPv6 configuration information.</t>
      <t>SLAAC:  StateLess Address AutoConfiguration, <xref target="RFC4862"/></t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="recommendations-for-pref64-discovery">
      <name>Recommendations for PREF64 Discovery</name>
      <section anchor="deployment-recommendations-for-endpoints">
        <name>Deployment Recommendations for Endpoints</name>
        <t>Endpoints <bcp14>SHOULD</bcp14> attempt to obtain PREF64 information from RAs per <xref target="RFC8781"/> instead of using <xref target="RFC7050"/> method.
In the absence of the PREF64 information in RAs, an endpoint <bcp14>MAY</bcp14> choose to fall back to the mechanism defined in RFC7050.
This recommendation to prefer the <xref target="RFC8781"/> mechanism over one defined in <xref target="RFC7050"/> is consistent with Section 5.1 of <xref target="RFC8781"/>.</t>
      </section>
      <section anchor="deployment-recommendations-for-operators">
        <name>Deployment Recommendations for Operators</name>
        <t>Operators deploying NAT64 <bcp14>SHOULD</bcp14> provide PREF64 information in Router Advertisements per <xref target="RFC8781"/>.</t>
        <section anchor="mobile-network-considerations">
          <name>Mobile Network Considerations</name>
          <t>While <xref target="RFC8781"/> support is widely integrated into modern operating systems on mobile endpoints, equipment deployed in mobile network environments often lacks abilities to include the PREF64 Option into RAs.
Therefore, the immediate deployment and enablement of PREF64 by mobile operators may not currently be feasible and the recommendations outlined in this document are not presently applicable to mobile network operators.
These environments are encouraged to incorporate <xref target="RFC8781"/> when made practical by infrastructure upgrades or software stack feature additions.</t>
        </section>
        <section anchor="migration-considerations">
          <name>Migration Considerations</name>
          <t>Transitioning from the <xref target="RFC7050"/> heuristic to using the <xref target="RFC8781"/> approach might require a period where both mechanisms coexist.
The duration of such period and feasibility of discontinuing DNS64 support, relying solely on RA-based PREF64 signaling in a given network depends on the endpoint footprint, particularly the presence and number of endpoints running outdated operating systems, which do not support <xref target="RFC8781"/>.</t>
          <t>Migrating away from DNS64-based discovery also reduces dependency on DNS64 in general, thereby eliminating DNSSEC and DNS64 incompatibility concerns (Section 6.2 of <xref target="RFC6147"/>).</t>
        </section>
      </section>
    </section>
    <section anchor="issues">
      <name>Existing Issues with RFC7050</name>
      <t>DNS-based method of discovering the NAT64 prefix introduces some challenges, which make this approach less preferable than latest developed alternatives (such as PREF64 RA Option, <xref target="RFC8781"/>).
This section outlines the key issues, associated with <xref target="RFC7050"/>, with a focus on those not discussed in <xref target="RFC7050"/> or in the analysis of solutions for hosts to discover NAT64 prefix (<xref target="RFC7051"/>).</t>
      <section anchor="dependency-on-network-provided-recursive-resolvers">
        <name>Dependency on Network-Provided Recursive Resolvers</name>
        <t>Fundamentally, the presence of the NAT64 and the exact value of the prefix used for the translation are network-specific attributes.
Therefore, <xref target="RFC7050"/> requires the endpoint discovering the prefix to use the DNS64 resolvers provided by the network.
If the device or an application is configured to use other recursive resolvers or runs a local recursive resolver, the corresponding name resolution APIs and libraries are required to recognize 'ipv4only.arpa.' as a special name and give it special treatment.
This issue and remediation approach are discussed in <xref target="RFC8880"/>.
However, it has been observed that very few <xref target="RFC7050"/> implementations support <xref target="RFC8880"/> requirements for special treatment of 'ipv4only.arpa.'.
As a result, configuring such systems and applications to use resolvers other than the one provided by the network breaks the PREF64 discovery, leading to degraded user experience.</t>
        <t>VPN applications may override the endpoint's DNS configuration, for example, by configuring enterprise DNS servers as the node's recursive resolvers and forcing all name resolution through the VPN.
These enterprise DNS servers typically lack DNS64 functionality and therefore cannot provide information about the PREF64 used within the local network.
Consequently, this prevents the endpoint from discovering the necessary PREF64, negatively impacting its connectivity on IPv6-only networks.</t>
        <t>If both the network-provided DNS64 and the endpoint's resolver happen to utilize the Well-Known Prefix (64:ff9b::/96, <xref target="RFC6052"/>), the endpoint would end up using a PREF64 that's valid for the current network.
However, if the endpoint changes its network attachment, it can't detect if the new network lacks NAT64 entirely or uses a network-specific NAT64 prefix (NSP, <xref target="RFC6144"/>).</t>
      </section>
      <section anchor="network-stack-initialization-delay">
        <name>Network Stack Initialization Delay</name>
        <t>When using SLAAC, an IPv6 host typically requires a single RA to acquire its network configuration.
For IPv6-only endpoints, timely PREF64 discovery is critical, particularly for those performing local DNS64 or NAT64 functions, such as CLAT (<xref target="RFC6877"/>).
Until a PREF64 is obtained, the endpoint's IPv4-only applications and communication to IPv4-only destinations are impaired.
The mechanism defined in <xref target="RFC7050"/> does not bundle PREF64 information with other network configuration parameters.</t>
      </section>
      <section anchor="latency-in-updates-propagation">
        <name>Latency in Updates Propagation</name>
        <t>Section 3 of <xref target="RFC7050"/> states: "The node <bcp14>SHALL</bcp14> cache the replies it receives during the Pref64::/n discovery procedure, and it <bcp14>SHOULD</bcp14> repeat the discovery process ten seconds before the TTL of the Well-Known Name's synthetic AAAA resource record expires."
As a result, once a PREF64 is discovered, it will be used until the TTL expired, or until the node disconnects from the network.
There is no mechanism for an operator to force the PREF64 rediscovery on the node without disconnecting the node from the network.
If the operator needs to change the PREF64 value used in the network, they need to proactively reduce the TTL value returned by the DNS64 server.
This method has two significant drawbacks:</t>
        <ul spacing="normal">
          <li>
            <t>Many networks utilize external DNS64 servers and therefore have no control over the TTL value, if the PREF64 needs to be changed or withdrawn.</t>
          </li>
          <li>
            <t>The PREF64 changes need to be planned and executed at least TTL seconds in advance. If the operator needs to notify nodes that a particular prefix must not be used (e.g. during a network outage or if the nodes learnt a rogue PREF64 as a result of an attack), it might not be possible without interrupting the network connectivity for the affected nodes.</t>
          </li>
        </ul>
      </section>
      <section anchor="multihoming-implications">
        <name>Multihoming Implications</name>
        <t>Section 3 of <xref target="RFC7050"/> requires a node to examine all received AAAA resource records to discover one or more PREF64s and to utilize all learned prefixes.
However, this approach presents challenges in some multihomed topologies where different DNS64 servers belonging to different ISPs might return different PREF64s.
In such cases, it is crucial that traffic destined for synthesized addresses is sent to the correct NAT64 and the source address selected for those flows belongs to the prefix from that ISP's address space.
In other words, the node needs to associate each discovered PREF64 with upstream information, including the IPv6 prefix and default gateway.
Currently, there is no reliable way for a node to map a DNS64 response (and the prefix learned from it) to a specific upstream in a multihoming scenario.
Consequently, the node might inadvertently select an incorrect source address for a given PREF64 and/or send traffic to the incorrect uplink.</t>
      </section>
      <section anchor="security-implications">
        <name>Security Implications</name>
        <t>As discussed in Section 7 of <xref target="RFC7050"/>, the DNS-based PREF64 discovery is prone to DNS spoofing attacks.
In addition to creating a wider attack surface for IPv6 deployments, <xref target="RFC7050"/> has other security challenges worth noting to justify declaring it legacy.</t>
        <section anchor="secure-channel-def">
          <name>Definition of Secure Channel</name>
          <t><xref target="RFC7050"/> requires a node's communication channel with a DNS64 server to be a "secure channel" which it defines to mean "a communication channel a node has between itself and a DNS64 server protecting DNS protocol-related messages from interception and tampering."
This need is redundant when another communication mechanism of IPv6-related configuration, specifically RAs, can already be defended against tampering, for example by enabling RA-Guard <xref target="RFC6105"/>.
Requiring nodes to implement two defense mechanisms when only one is necessary when <xref target="RFC8781"/> is used in place of <xref target="RFC7050"/> creates unnecessary risk.</t>
        </section>
        <section anchor="secure-channel-example-of-ipsec">
          <name>Secure Channel Example of IPsec</name>
          <t>One of the two examples that <xref target="RFC7050"/> defines to qualify a communication channel with a DNS64 server is the use of an "IPsec-based virtual private network (VPN) tunnel". As of the time of this writing, this is not supported as a practice by any common operating system DNS client. While they could, there have also since been multiple mechanisms defined for performing DNS-specific encryption such as those defined in <xref target="RFC9499"/> that would be more appropriately scoped to the applicable DNS traffic. These are also compatible with encrypted DNS advertisement by the network using Discovery of Network-designated Resolvers <xref target="RFC9463"/> that would ensure the clients know in advance that the DNS64 server supported the encryption mechanism.</t>
        </section>
        <section anchor="secure-channel-example-of-link-layer-encryption">
          <name>Secure Channel Example of Link Layer Encryption</name>
          <t>The other example given by <xref target="RFC7050"/> that would allow a communication channel with a DNS64 server to qualify as a "secure channel" is the use of a "link layer utilizing data encryption technologies". As of the time of this writing, most common link layer implementations use data encryption already with no extra effort needed on the part of network nodes. While this appears to be a trivial way to satisfy this requirement, it also renders the requirement meaningless since any node along the path can still read the higher-layer DNS traffic containing the translation prefix. This seems to be at odds with the definition of "secure channel" as explained in <xref section="2.2" sectionFormat="of" target="RFC7050"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Obtaining PREF64 information using RAs improves the overall security of an IPv6-only endpoint as it mitigates all attack vectors related to spoofed or rogue DNS response, as discussed in Section 7 of <xref target="RFC7050"/>.
Security considerations related to obtaining PREF64 information from RAs are discussed in Section 7 of <xref target="RFC8781"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not introduce any IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC4862">
          <front>
            <title>IPv6 Stateless Address Autoconfiguration</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="T. Jinmei" initials="T." surname="Jinmei"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6. The autoconfiguration process includes generating a link-local address, generating global addresses via stateless address autoconfiguration, and the Duplicate Address Detection procedure to verify the uniqueness of the addresses on a link. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4862"/>
          <seriesInfo name="DOI" value="10.17487/RFC4862"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC6052">
          <front>
            <title>IPv6 Addressing of IPv4/IPv6 Translators</title>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document discusses the algorithmic translation of an IPv6 address to a corresponding IPv4 address, and vice versa, using only statically configured information. It defines a well-known prefix for use in algorithmic translations, while allowing organizations to also use network-specific prefixes when appropriate. Algorithmic translation is used in IPv4/IPv6 translators, as well as other types of proxies and gateways (e.g., for DNS) used in IPv4/IPv6 scenarios. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6052"/>
          <seriesInfo name="DOI" value="10.17487/RFC6052"/>
        </reference>
        <reference anchor="RFC6144">
          <front>
            <title>Framework for IPv4/IPv6 Translation</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="K. Yin" initials="K." surname="Yin"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This note describes a framework for IPv4/IPv6 translation. This is in the context of replacing Network Address Translation - Protocol Translation (NAT-PT), which was deprecated by RFC 4966, and to enable networks to have IPv4 and IPv6 coexist in a somewhat rational manner while transitioning to an IPv6 network. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6144"/>
          <seriesInfo name="DOI" value="10.17487/RFC6144"/>
        </reference>
        <reference anchor="RFC6146">
          <front>
            <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document describes stateful NAT64 translation, which allows IPv6-only clients to contact IPv4 servers using unicast UDP, TCP, or ICMP. One or more public IPv4 addresses assigned to a NAT64 translator are shared among several IPv6-only clients. When stateful NAT64 is used in conjunction with DNS64, no changes are usually required in the IPv6 client or the IPv4 server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6146"/>
          <seriesInfo name="DOI" value="10.17487/RFC6146"/>
        </reference>
        <reference anchor="RFC7225">
          <front>
            <title>Discovering NAT64 IPv6 Prefixes Using the Port Control Protocol (PCP)</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines a new Port Control Protocol (PCP) option to learn the IPv6 prefix(es) used by a PCP-controlled NAT64 device to build IPv4-converted IPv6 addresses. This option is needed for successful communications when IPv4 addresses are used in referrals.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7225"/>
          <seriesInfo name="DOI" value="10.17487/RFC7225"/>
        </reference>
        <reference anchor="RFC7915">
          <front>
            <title>IP/ICMP Translation Algorithm</title>
            <author fullname="C. Bao" initials="C." surname="Bao"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="T. Anderson" initials="T." surname="Anderson"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 6145.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7915"/>
          <seriesInfo name="DOI" value="10.17487/RFC7915"/>
        </reference>
        <reference anchor="RFC6147">
          <front>
            <title>DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs. This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6147"/>
          <seriesInfo name="DOI" value="10.17487/RFC6147"/>
        </reference>
        <reference anchor="RFC6877">
          <front>
            <title>464XLAT: Combination of Stateful and Stateless Translation</title>
            <author fullname="M. Mawatari" initials="M." surname="Mawatari"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <author fullname="C. Byrne" initials="C." surname="Byrne"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This document describes an architecture (464XLAT) for providing limited IPv4 connectivity across an IPv6-only network by combining existing and well-known stateful protocol translation (as described in RFC 6146) in the core and stateless protocol translation (as described in RFC 6145) at the edge. 464XLAT is a simple and scalable technique to quickly deploy limited IPv4 access service to IPv6-only edge networks without encapsulation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6877"/>
          <seriesInfo name="DOI" value="10.17487/RFC6877"/>
        </reference>
        <reference anchor="RFC7051">
          <front>
            <title>Analysis of Solution Proposals for Hosts to Learn NAT64 Prefix</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="T. Savolainen" initials="T." role="editor" surname="Savolainen"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>Hosts and applications may benefit from learning if an IPv6 address is synthesized and if NAT64 and DNS64 are present in a network. This document analyzes all proposed solutions (known at the time of writing) for communicating whether the synthesis is taking place, what address format was used, and what IPv6 prefix was used by the NAT64 and DNS64. These solutions enable both NAT64 avoidance and local IPv6 address synthesis. The document concludes by recommending the standardization of the approach based on heuristic discovery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7051"/>
          <seriesInfo name="DOI" value="10.17487/RFC7051"/>
        </reference>
        <reference anchor="RFC8880">
          <front>
            <title>Special Use Domain Name 'ipv4only.arpa'</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>NAT64 (Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers) allows client devices using IPv6 to communicate with servers that have only IPv4 connectivity.</t>
              <t>The specification for how a client discovers its local network's NAT64 prefix (RFC 7050) defines the special name 'ipv4only.arpa' for this purpose. However, in its Domain Name Reservation Considerations section (Section 8.1), that specification (RFC 7050) indicates that the name actually has no particularly special properties that would require special handling.</t>
              <t>Consequently, despite the well-articulated special purpose of the name, 'ipv4only.arpa' was not recorded in the Special-Use Domain Names registry as a name with special properties.</t>
              <t>This document updates RFC 7050. It describes the special treatment required and formally declares the special properties of the name. It also adds similar declarations for the corresponding reverse mapping names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8880"/>
          <seriesInfo name="DOI" value="10.17487/RFC8880"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="RFC8305">
          <front>
            <title>Happy Eyeballs Version 2: Better Connectivity Using Concurrency</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>Many communication protocols operating over the modern Internet use hostnames. These often resolve to multiple IP addresses, each of which may have different performance and connectivity characteristics. Since specific addresses or address families (IPv4 or IPv6) may be blocked, broken, or sub-optimal on a network, clients that attempt multiple connections in parallel have a chance of establishing a connection more quickly. This document specifies requirements for algorithms that reduce this user-visible delay and provides an example algorithm, referred to as "Happy Eyeballs". This document obsoletes the original algorithm description in RFC 6555.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8305"/>
          <seriesInfo name="DOI" value="10.17487/RFC8305"/>
        </reference>
      </references>
    </references>
    <?line 223?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following people for their valuable contributions: Mohamed Boucadair, Lorenzo Colitti, Tom Costello, Charles Eckel, Nick Heatley, Gabor Lencse, Ted Lemon, Peter Schmitt, Chongfeng Xie.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
