<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jens-7050-secure-channel-00" category="std" consensus="true" submissionType="IETF" updates="7050" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="7050-secure-channel">Redefining Secure Channel for ipv4only.arpa IPv6 Prefix Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-jens-7050-secure-channel-00"/>
    <author fullname="Tommy Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="26"/>
    <keyword>secure channel</keyword>
    <keyword>encrypted DNS</keyword>
    <keyword>DNR</keyword>
    <keyword>ipv4only.arpa</keyword>
    <abstract>
      <?line 27?>

<t>This document updates <xref target="RFC7050"/> to redefine the term "secure channel" and 
modify requirements for nodes and DNS64 servers to use more recent developments
in DNS security.</t>
    </abstract>
  </front>
  <middle>
    <?line 34?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC7050"/> defines a mechanism for discovery of the current network's IPv6
address synthesis prefix that uses a DNS query for the ipv4only.arpa SUDN.
It further provides normative requirements for nodes to use a "secure channel"
when issuing this query in <xref section="3.1" sectionFormat="of" target="RFC7050"/>. "Secure channel" was
defined as:</t>
      <t>"a communication channel a node has between itself and
   a DNS64 server protecting DNS protocol-related messages from
   interception and tampering.  The channel can be, for example, an
   IPsec-based virtual private network (VPN) tunnel or a link layer
   utilizing data encryption technologies."</t>
      <t>Since <xref target="RFC7050"/> was standardized, there have been a number of developments
in secure DNS channels, including DoT <xref target="RFC7858"/>, DoH <xref target="RFC8484"/>, DoQ
<xref target="RFC9250"/>, and DNR <xref target="RFC9463"/>. These are more appropriate ways to provide a
secure channel that a node can use to gain trust in the ipv4only.arpa query being
answered by the network's designated DNS64 <xref target="RFC6147"/> server. This document 
updates <xref target="RFC7050"/> to redefine "secure channel" and specify requirements for networks
and client nodes to determine whether the channel between the DNS64 server and the 
client node can be considered secure for trusting the discovered IPv6
translation prefix.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Name-Validating Encrypted DNS Protocols:
   Any standardized encrypted DNS protocol that allows a DNS client to use a
   DNS server's claimed hostname assignment to securely verify that
   the server is designated for use with the specified encryption protocol.
   Examples as of the time of this writing include DoT
   <xref target="RFC7858"/>, DoH <xref target="RFC8484"/>, and DoQ <xref target="RFC9250"/>, which all use TLS,
   either directly, indirectly through HTTPS, or through QUIC's use of the TLS
   handshake as described in <xref target="RFC9001"/>.</t>
    </section>
    <section anchor="explanation-of-changes">
      <name>Explanation of changes</name>
      <section anchor="redefining-secure-channel">
        <name>Redefining secure channel</name>
        <t>The previous definition of "secure channel" was not uniformly supported
by vendors. In comparison, DNS servers at the time of this writing are widely
adopting support for Name-Validating Encrypted DNS Protocols, as are OS vendors
who act as the validating nodes. This means there is no need to provide
additional encryption at the link layer to provide validation of the DNS64
resolver or protection of the DNS traffic, which only places extra burdens on
network operators and client nodes alike. Using link-layer protection instead
of Name-Validating Encrypted DNS Protocols also deprives the DNS client of the
assurance that the server that it is communicating with has a valid claim to the
server hostname that is specified by system administrators in the client's
encrypted DNS configuration.</t>
      </section>
      <section anchor="deprecating-use-of-dnssec-for-dns64-server-validation">
        <name>Deprecating use of DNSSEC for DNS64 server validation</name>
        <t>The original text in RFC7050 defined a DNSSEC-based mechanism for validating the
DNS64 resolver with necessary complication to determine the name needed for
validation. When Name-Validating Encrypted DNS Protocols are used, there is a
pre-defined name for the desired resolver, which removes this complication.</t>
        <t>This name <bcp14>SHOULD</bcp14> be dynamically discovered from the network which advertises the
DNS64 server by using DNR <xref target="RFC9463"/> so that no preconfiguration of nodes is
required to do proper server authentication of the DNS64 resolver. DNS
nodes <bcp14>SHOULD</bcp14> support DNR <xref target="RFC9463"/> to facilitate this discovery.</t>
        <t>As of this writing, there is wide support for Name-Validating Encrypted DNS
Protocols, whereas there is little support for DNSSEC validation by DNS clients,
which typically leave this responsibility to the recursive resolver.</t>
      </section>
      <section anchor="relationship-to-rfc8880">
        <name>Relationship to RFC8880</name>
        <t><xref target="RFC8880"/> updates <xref target="RFC7050"/> to specify that the ipv4only.arpa zone <bcp14>MUST</bcp14>
be an insecure delegation. This document deprecates use of DNSSEC for validating
the resolver providing the prefix. This document and <xref target="RFC8880"/> are therefore
complimentary, not in conflict, despite the apparent overlap due to both
revising the use of DNSSEC by <xref target="RFC7050"/>.</t>
      </section>
    </section>
    <section anchor="text-changes-to-rfc7050">
      <name>Text changes to RFC7050</name>
      <section anchor="redefining-secure-channel-term">
        <name>Redefining Secure Channel term</name>
        <t>This document makes the following changes to <xref section="2.2" sectionFormat="of" target="RFC7050"/>:</t>
        <t>OLD TEXT:</t>
        <t>===</t>
        <t>Secure Channel: a communication channel a node has between itself and
   a DNS64 server protecting DNS protocol-related messages from
   interception and tampering.  The channel can be, for example, an
   IPsec-based virtual private network (VPN) tunnel or a link layer
   utilizing data encryption technologies.</t>
        <t>===</t>
        <t>NEW TEXT:</t>
        <t>===</t>
        <t>Name-Validating Encrypted DNS Protocols: Any standardized encrypted DNS protocol that allows a DNS client to use a
   DNS server's claimed hostname assignment to securely verify that
   the server is designated for use with the specified encryption protocol.
   Examples as of the time of this writing include DoT
   <xref target="RFC7858"/>, DoH <xref target="RFC8484"/>, and DoQ <xref target="RFC9250"/>, which all use TLS,
   either directly, indirectly through HTTPS, or through QUIC's use of the TLS
   handshake as described in <xref target="RFC9001"/>.</t>
        <t>Secure Channel: A communication channel that a node has between itself and
   a DNS64 server that protects DNS protocol-related messages from
   interception and tampering. The channel uses a Name-Validating Encrypted DNS
   Protocol that is validated against a domain name associated with the configuration
   of the DNS64 resolver. The information that the client requires for DNS64-resolver
   server authentication may either be pre-configured or discovered using a mechanism 
   such as DNR <xref target="RFC9463"/>.</t>
        <t>===</t>
      </section>
      <section anchor="deprecating-use-of-dnssec-for-prefix-discovery-validation">
        <name>Deprecating use of DNSSEC for prefix discovery validation</name>
        <section anchor="redefining-validation-requirement">
          <name>Redefining validation requirement</name>
          <t>This document makes the following changes to <xref section="3.1" sectionFormat="of" target="RFC7050"/>:</t>
          <t>OLD TEXT:</t>
          <t>===</t>
          <t>To mitigate against attacks, the node <bcp14>SHOULD</bcp14> communicate with a
   trusted DNS64 server over a secure channel or use DNSSEC.  NAT64
   operators <bcp14>SHOULD</bcp14> provide facilities for validating discovery of
   Pref64::/n via a secure channel and/or DNSSEC protection.</t>
          <t>It is important to understand that DNSSEC only validates that the
   discovered Pref64::/n is the one that belongs to a domain used by
   NAT64 FQDN.  Importantly, the DNSSEC validation does not tell if the
   node is at the network where the Pref64::/n is intended to be used.
   Furthermore, DNSSEC validation cannot be utilized in the case of a
   WKP.</t>
          <t>===</t>
          <t>NEW TEXT:</t>
          <t>===</t>
          <t>To mitigate against attacks, the node <bcp14>SHOULD</bcp14> communicate with a
   trusted DNS64 server over a secure channel. NAT64 operators <bcp14>SHOULD</bcp14> provide
   facilities for validating discovery of Pref64::/n via a secure channel,
   including support for one or more Name-Validating Encrypted DNS Protocols and
   the use of DNR <xref target="RFC9463"/> to advertise the configuration that nodes need in
   order to connect to, and perform server authentication for, the DNS64 resolver.</t>
          <t>The node <bcp14>MUST</bcp14> use the name-validating functionality of its chosen Name-Validating
   Encrypted DNS Protocol and abort any connections to DNS64 resolvers that
   cannot pass this name validation. For example, clients using encrypted DNS protocols
   that use the TLS handshake will need to verify that the domain name of the DNS64
   server is present in the server's certificate and that the certificate is
   signed by a trust anchor that the node trusts.</t>
          <t>===</t>
        </section>
        <section anchor="for-the-network">
          <name>For the network</name>
          <t>This document makes the following changes to <xref section="3.1.1" sectionFormat="of" target="RFC7050"/>:</t>
          <t>OLD TEXT:</t>
          <t>===</t>
          <t>If the operator has chosen to support nodes performing validation of
   discovered Pref64::/n with DNSSEC, the operator of the NAT64 device
   <bcp14>MUST</bcp14> perform the following configurations.</t>
          <ol spacing="normal" type="1"><li>
              <t>Have one or more fully qualified domain names for the NAT64
translator entities (later referred to as NAT64 FQDN).  In the
case of more than one Pref64::/n being used in a network, e.g.,
for load-balancing purposes, it is for network administrators to
decide whether a single NAT64's fully qualified domain name maps
to more than one Pref64::/n, or whether there will be a dedicated
NAT64 FQDN per Pref64::/n.</t>
            </li>
            <li>
              <t>Each NAT64 FQDN <bcp14>MUST</bcp14> have one or more DNS AAAA resource records
containing Pref64::WKA (Pref64::/n combined with WKA).</t>
            </li>
            <li>
              <t>Each Pref64::WKA <bcp14>MUST</bcp14> have a PTR resource record that points to
the corresponding NAT64 FQDN.</t>
            </li>
            <li>
              <t>Sign the NAT64 FQDNs' AAAA and A resource records with DNSSEC.</t>
            </li>
          </ol>
          <t>===</t>
          <t>NEW TEXT:</t>
          <t>===</t>
          <t>The original version of RFC7050 defined a mechanism for securing the channel
   between a node and a DNS64 resolver by using DNSSEC. This is a complicated
   procedure that is discouraged in favor of the use of Name-Validating
   Encrypted DNS Protocols. Networks <bcp14>SHOULD</bcp14> plan to migrate nodes relying on this
   mechanism to using Name-Validating Encrypted DNS Protocols instead.</t>
          <t>===</t>
        </section>
        <section anchor="for-the-node">
          <name>For the node</name>
          <t>This document makes the following changes to <xref section="3.1.2" sectionFormat="of" target="RFC7050"/>:</t>
          <t>OLD TEXT:</t>
          <t>===</t>
          <t>A node <bcp14>SHOULD</bcp14> prefer a secure channel to talk to a DNS64 server
   whenever possible.  In addition, a node that implements a DNSSEC
   validating resolver <bcp14>MAY</bcp14> use the following procedure to validate
   discovery of the Pref64::/n.</t>
          <ol spacing="normal" type="1"><li>
              <t>Heuristically find Pref64::/n candidates by making a AAAA
resource record query for "ipv4only.arpa." by following the
procedure in Section 3.  This will result in IPv6 addresses
consisting of Pref64::/n combined with WKA, i.e., Pref64::WKA.
For each Pref64::/n that the node wishes to validate, the node
performs the following steps.</t>
            </li>
            <li>
              <t>Send a DNS PTR resource record query for the IPv6 address of the
translator (for ".ip6.arpa." tree), using the Pref64::WKA learned
in step 1.  CNAME and DNAME results should be followed according
to the rules in RFC 1034 [RFC1034], RFC 1035 [RFC1035], and RFC
6672 [RFC6672].  The ultimate response will include one or more
NAT64 FQDNs.</t>
            </li>
            <li>
              <t>The node <bcp14>SHOULD</bcp14> compare the domains of learned NAT64 FQDNs to a
list of the node's trusted domains and choose a NAT64 FQDN that
matches.  The means for a node to learn the trusted domains is</t>
            </li>
          </ol>
          <t>Savolainen, et al.           Standards Track                    [Page 7]</t>
          <t>RFC 7050                  Pref64::/n Discovery             November 2013</t>
          <artwork><![CDATA[
   implementation specific.  If the node has no trust for the
   domain, the discovery procedure is not secure, and the remaining
   steps described below MUST NOT be performed.
]]></artwork>
          <ol spacing="normal" type="1"><li>
              <t>Send a DNS AAAA resource record query for the NAT64 FQDN.</t>
            </li>
            <li>
              <t>Verify the DNS AAAA resource record contains Pref64::WKA
addresses received at step 1.  It is possible that the NAT64 FQDN
has multiple AAAA records, in which case the node <bcp14>MUST</bcp14> check if
any of the addresses match the ones obtained in step 1.  The node
<bcp14>MUST</bcp14> ignore other responses and not use them for local IPv6
address synthesis.</t>
            </li>
            <li>
              <t>Perform DNSSEC validation of the DNS AAAA response.</t>
            </li>
          </ol>
          <t>After the node has successfully performed the above five steps, the
   node can consider Pref64::/n validated.</t>
          <t>===</t>
          <t>NEW TEXT:</t>
          <t>===</t>
          <t>The original version of RFC7050 defined a mechanism for securing the channel
   between a node and a DNS64 resolver by using DNSSEC. This is a complicated
   procedure that is discouraged in favor of the use of Name-Validating
   Encrypted DNS Protocols. Nodes <bcp14>SHOULD NOT</bcp14> add support for the DNSSEC-based mechanism and
   <bcp14>SHOULD</bcp14> plan to replace this functionality with validation using Name-Validating
   Encrypted DNS Protocols.</t>
          <t>===</t>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document modifies the mechanisms that nodes use to determine their connection
to the network's DNS64 resolver is secure. It shifts the verification from
IPsec to TLS or another mechanism that allows the client to verify the server's 
association with a domain name (via the use of Name-Validating Encrypted DNS
Protocols). This is expected to broaden the use of verification in the wild
given the greater likelihood, only increasing with time, that a DNS client will
implement support for a Name-Validating Encrypted DNS Protocol given this alternative
to the comparatively difficult task of implementing IPsec for its connection to
the DNS64 resolver.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network. The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.". The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6147">
          <front>
            <title>DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs. This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6147"/>
          <seriesInfo name="DOI" value="10.17487/RFC6147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC8880">
          <front>
            <title>Special Use Domain Name 'ipv4only.arpa'</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>NAT64 (Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers) allows client devices using IPv6 to communicate with servers that have only IPv4 connectivity.</t>
              <t>The specification for how a client discovers its local network's NAT64 prefix (RFC 7050) defines the special name 'ipv4only.arpa' for this purpose. However, in its Domain Name Reservation Considerations section (Section 8.1), that specification (RFC 7050) indicates that the name actually has no particularly special properties that would require special handling.</t>
              <t>Consequently, despite the well-articulated special purpose of the name, 'ipv4only.arpa' was not recorded in the Special-Use Domain Names registry as a name with special properties.</t>
              <t>This document updates RFC 7050. It describes the special treatment required and formally declares the special properties of the name. It also adds similar declarations for the corresponding reverse mapping names.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8880"/>
          <seriesInfo name="DOI" value="10.17487/RFC8880"/>
        </reference>
      </references>
    </references>
    <?line 350?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
