<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.6) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-ipv4-reverse-in-v6-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="public-names">Simple Provisioning of Reverse IPv4 Names</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-ipv4-reverse-in-v6-01"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <postal>
          <street>470 Dawson Avenue</street>
          <city>Ottawa, ON</city>
          <code>K1Z 5V7</code>
          <country>Canada</country>
        </postal>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2022" month="December" day="08"/>
    <area>Internet</area>
    <workgroup>Homenet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Merges IPv4 reverse names into IPv6 reverse maps, particularly for IPv6 delegations that are managed automatically.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-richardson-ipv4-reverse-in-v6/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        homenet Working Group mailing list (<eref target="mailto:homenet@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/homenet/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/homenet/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/ipv4-reverse-dns.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Many small offices get customized service from boutique ISPs.
This has historically included delegation of one or a small number (8 to 16) of statically assigned IPv4 addresses.</t>
      <t>Populating the reverse zone for such small delegations has often meant using <xref target="RFC2317"/> style delegation.</t>
      <t><xref target="RFC2317"/> delegation still requires that the ISP delegate the zone to the customer, collect NS and DS records, and in most cases, that the ISP arranges to become a secondary for the zone.</t>
      <t>Experience by early adopters was that not every stub resolver would do a second query when a CNAME record was found in the reverse zone rather than a PTR, but if the PTR was returned as additional information in the same query, that it would in fact work.
(Later specifications make stub resolvers ignore this additional information.
Resolvers that paid attention to that update, also likely would follow the CNAME in the reverse.)</t>
      <t>This custom configuration required to do <xref target="RFC2317"/> delegation often has been a drag for many operators, and in some cases has resulted in delays to making IPv6 available to this smaller offices. The rationale is that IPv6 operations can only be scaled well when completely automated, and the custom configurations for the IPv4 delegation gets in the way of such things.</t>
      <t>This document proposes to leverage the work of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> and <xref target="I-D.ietf-homenet-naming-architecture-dhc-options"/> to automate the delegation of <xref target="RFC2317"/> reverse zones for IPv4 delegations.</t>
    </section>
    <section anchor="protocol-proposal">
      <name>Protocol Proposal</name>
      <t><xref target="RFC2317"/> initially proposes to make the delegated zone a subzone of the IPv4 reverse, such as having '128/26.2.0.192.in-addr.arpa' be the delegation from '2.0.192.in-addr.arpa'</t>
      <t>(The use of '/' as the separator has become a problem for many operators due the way that zone names are translated to file names, and has often been replaced with another character like '-')</t>
      <t>In <xref section="5.2" sectionFormat="comma" target="RFC2317"/> suggests putting the reverse names into the forward zone.
This document proposes to put the IPv4 reverse names into the IPv6 reverse zone, which can be automatically delegated to the Home Naming Architecture described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>
      <t>All of this can be done today through bilateral convention: as long as the HNA and the ISP's IPv4 Address Management system agree to use the same names in the CNAMEs, everything works.
This document proposes a universal mechanism to enable interoperation without bilateral agreement.</t>
      <t>IPv4 reverse names are done by octet in decimal, while IPv6 is done by hexadecimal digit by nibble.
In order to allow for the maximum interoperation for cases where multiple IPv4 addresses are delegated, but not from the same prefix, all IPv4 octets should be included in the mapped address.</t>
      <t>It is therefore proposed that the reverse name for an address 192.0.2.234, where the customer has the IPv6 prefix 2001:db8:cake::/64 delegated, be mapped as follows:</t>
      <artwork><![CDATA[
234.2.0.192.in-addr.arpa IN CNAME 234.2.0.192.0.0.0.0.e.k.a.c.8.d.b.0.1.0.0.2.ip6.arpa.
]]></artwork>
      <t>Note that the resulting name in the IP6 space will always be shorter than any IPv6 name, so even if a number like 8.8.8.8 were mapped (which could very well be read as an IPv6 nibble grouping), there should never be a conflict.</t>
      <section anchor="operator-changes">
        <name>Operator changes</name>
        <t>The only thing that the operator has to do differently is to insert the right CNAMEs into its reverse IPv4 DNS.
These can be generated by a custom script for their IP Address Manager which will know what IPv6 delegations have been made, and which IPv4 static delegations are involved.</t>
        <t>All of the DNS operational activities like DNSSEC, NS records, and the like would now be handled by the mechanisms of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> and <xref target="I-D.ietf-homenet-naming-architecture-dhc-options"/>.</t>
      </section>
      <section anchor="home-naming-architecture-hna-changes">
        <name>Home Naming Architecture (HNA) changes</name>
        <t>The HNA mechanism responsible for creating the reverse map needs to take into account any static IPv4 addresses that are delegated to it.
This may be via PPP IPCP, or DHCPv4 for the first address, and by some IPv4 as a service to get additional addresses.
It is probably that the addresses will have to be statically configured for some time.
(Note that the services described by <xref target="RFC9313"/> are all mechanisms to share an IPv4 among many subscribers, not delegate a single IPv4 address)</t>
        <t>For an address like 192.0.2.234, with a reverse name of "webserver.example", then it must create a  new PTR record like:</t>
        <artwork><![CDATA[
234.2.0.192.0.0.0.0.e.k.a.c.8.d.b.0.1.0.0.2.ip6.arpa IN PTR webserver.example.
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The presence of the additional PTR records may be easily enumerated due to the much smaller IPv4 space.
That will reveal which names are active in IPv4 space for the enterprise using this technique.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2317">
          <front>
            <title>Classless IN-ADDR.ARPA delegation</title>
            <author fullname="H. Eidnes" initials="H." surname="Eidnes">
              <organization/>
            </author>
            <author fullname="G. de Groot" initials="G." surname="de Groot">
              <organization/>
            </author>
            <author fullname="P. Vixie" initials="P." surname="Vixie">
              <organization/>
            </author>
            <date month="March" year="1998"/>
            <abstract>
              <t>This document describes a way to do IN-ADDR.ARPA delegation on non-octet boundaries for address spaces covering fewer than 256 addresses.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="20"/>
          <seriesInfo name="RFC" value="2317"/>
          <seriesInfo name="DOI" value="10.17487/RFC2317"/>
        </reference>
        <reference anchor="I-D.ietf-homenet-front-end-naming-delegation">
          <front>
            <title>Simple Provisioning of Public Names for Residential Networks</title>
            <author fullname="Daniel Migault" initials="D." surname="Migault">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Nominum</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ray Hunter" initials="R." surname="Hunter">
              <organization>Globis Consulting BV</organization>
            </author>
            <date day="5" month="December" year="2022"/>
            <abstract>
              <t>   Home network owners may have devices or services hosted on this home
   network that they wish to access from the Internet (i.e., from a
   network outside of the home network).  Home networks are increasingly
   numbered using IPv6 addresses, which makes this access much simpler.
   To enable this access, the names and IP addresses of these devices
   and services needs to be made available in the public DNS.

   The names and IP address of the home network are present in the
   Public Homenet Zone by the Homenet Naming Authority (HNA), which in
   turn instructs an outsourced infrastructure to publish the zone on
   the behalf of the home owner.  This document describes how an this
   Home Naming Authority instructs the outsourced infrastructure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-homenet-front-end-naming-delegation-24"/>
        </reference>
        <reference anchor="I-D.ietf-homenet-naming-architecture-dhc-options">
          <front>
            <title>DHCPv6 Options for Home Network Naming Authority</title>
            <author fullname="Daniel Migault" initials="D." surname="Migault">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Akamai</organization>
            </author>
            <author fullname="Tomek Mrugalski" initials="T." surname="Mrugalski">
              <organization>Internet Systems Consortium, Inc.</organization>
            </author>
            <date day="31" month="October" year="2022"/>
            <abstract>
              <t>   This document defines DHCPv6 options so a Homenet Naming Authority
   (HNA) can automatically proceed to the appropriate configuration and
   outsource the authoritative naming service for the home network.  In
   most cases, the outsourcing mechanism is transparent for the end
   user.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-homenet-naming-architecture-dhc-options-24"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9313">
          <front>
            <title>Pros and Cons of IPv6 Transition Technologies for IPv4-as-a-Service (IPv4aaS)</title>
            <author fullname="G. Lencse" initials="G." surname="Lencse">
              <organization/>
            </author>
            <author fullname="J. Palet Martinez" initials="J." surname="Palet Martinez">
              <organization/>
            </author>
            <author fullname="L. Howard" initials="L." surname="Howard">
              <organization/>
            </author>
            <author fullname="R. Patterson" initials="R." surname="Patterson">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <date month="October" year="2022"/>
            <abstract>
              <t>Several IPv6 transition technologies have been developed to provide customers with IPv4-as-a-Service (IPv4aaS) for ISPs with an IPv6-only access and/or core network. These technologies have their advantages and disadvantages. Depending on existing topology, skills, strategy, and other preferences, one of these technologies may be the most appropriate solution for a network operator.</t>
              <t>This document examines the five most prominent IPv4aaS technologies and considers a number of different aspects to provide network operators with an easy-to-use reference to assist in selecting the technology that best suits their needs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9313"/>
          <seriesInfo name="DOI" value="10.17487/RFC9313"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
