1428 lines
61 KiB
Plaintext
1428 lines
61 KiB
Plaintext
DNS Operations WG
|
||
Internet-Draft J. Jeong (ed.)
|
||
ETRI/University of Minnesota
|
||
|
||
Expires: August 2005 19 February 2005
|
||
|
||
|
||
IPv6 Host Configuration of DNS Server Information Approaches
|
||
draft-ietf-dnsop-ipv6-dns-configuration-05.txt
|
||
|
||
|
||
Status of this Memo
|
||
|
||
This document is an Internet-Draft and is subject to all provisions
|
||
of section 3 of RFC 3667. By submitting this Internet-Draft, each
|
||
author represents that any applicable patent or other IPR claims of
|
||
which he or she is aware have been or will be disclosed, and any of
|
||
which he or she become aware will be disclosed, in accordance with
|
||
RFC 3668.
|
||
|
||
Internet-Drafts are working documents of the Internet Engineering
|
||
Task Force (IETF), its areas, and its working groups. Note that
|
||
other groups may also distribute working documents as
|
||
Internet-Drafts.
|
||
|
||
Internet-Drafts are draft documents valid for a maximum of six
|
||
months and may be updated, replaced, or obsoleted by other
|
||
documents at any time. It is inappropriate to use Internet-Drafts
|
||
as reference material or to cite them other than as "work in
|
||
progress."
|
||
|
||
The list of current Internet-Drafts can be accessed at
|
||
http://www.ietf.org/1id-abstracts.html
|
||
|
||
The list of Internet-Draft Shadow Directories can be accessed at
|
||
http://www.ietf.org/shadow.html"
|
||
|
||
This Internet-Draft will expire on August 19, 2005.
|
||
|
||
Copyright Notice
|
||
|
||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||
|
||
Abstract
|
||
|
||
This document describes three approaches for IPv6 recursive DNS
|
||
server address configuration. It details the operational
|
||
attributes of three solutions: RA option, DHCPv6 option, and
|
||
Well-known anycast addresses for recursive DNS servers.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 1]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
Additionally, it suggests four deployment scenarios considering
|
||
multi-solution resolution. Therefore, this document will give the
|
||
audience a guideline for IPv6 DNS configuration to select the
|
||
approaches suitable for their host DNS configuration.
|
||
|
||
Table of Contents
|
||
|
||
1. Introduction...................................................3
|
||
2. Terminology....................................................3
|
||
3. IPv6 DNS Configuration Approaches..............................3
|
||
3.1. RA Option..................................................3
|
||
3.1.1. Advantages...........................................4
|
||
3.1.2. Disadvantages........................................5
|
||
3.1.3. Observations.........................................6
|
||
3.2. DHCPv6 Option..............................................6
|
||
3.2.1. Advantages...........................................8
|
||
3.2.2. Disadvantages........................................8
|
||
3.2.3. Observations.........................................9
|
||
3.3. Well-known Anycast Addresses...............................9
|
||
3.3.1. Advantages..........................................10
|
||
3.3.2. Disadvantages.......................................10
|
||
3.3.3. Observations........................................11
|
||
4. Interworking among IPv6 DNS Configuration Approaches..........11
|
||
5. Deployment Scenarios..........................................12
|
||
5.1. ISP Network...............................................13
|
||
5.1.1. RA Option Approach..................................13
|
||
5.1.2. DHCPv6 Option Approach..............................13
|
||
5.1.3. Well-known Addresses Approach.......................14
|
||
5.2. Enterprise Network........................................14
|
||
5.3. 3GPP Network..............................................15
|
||
5.3.1. Currently Available Mechanisms and Recommendations..15
|
||
5.3.2. RA Extension........................................16
|
||
5.3.3. Stateless DHCPv6....................................17
|
||
5.3.4. Well-known Addresses................................18
|
||
5.3.5. Recommendations.....................................18
|
||
5.4. Unmanaged Network.........................................18
|
||
5.4.1. Case A: Gateway does not provide IPv6 at all........18
|
||
5.4.2. Case B: A dual-stack gateway connected to a dual-stack
|
||
ISP.................................................19
|
||
5.4.3. Case C: A dual-stack gateway connected to an IPv4-only
|
||
ISP.................................................19
|
||
5.4.4. Case D: A gateway connected to an IPv6-only ISP.....19
|
||
6. Security Considerations.......................................19
|
||
7. Acknowledgements..............................................20
|
||
8. Normative References..........................................20
|
||
9. Informative References........................................21
|
||
10. Appendix A - Link-layer Multicast Acknowledgements with RA
|
||
Option.......................................................23
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 2]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
11. Authors' Addresses...........................................23
|
||
12. Intellectual Property Statement..............................25
|
||
13. Full Copyright Statement.....................................25
|
||
Acknowledgement..................................................26
|
||
|
||
1. Introduction
|
||
|
||
Neighbor Discovery (ND) for IP Version 6 and IPv6 Stateless Address
|
||
Autoconfiguration provide the ways to configure either fixed or
|
||
mobile nodes with one or more IPv6 addresses, default routes and
|
||
some other parameters [3][4]. To support the access to additional
|
||
services in the Internet that are identified by a DNS name, such as
|
||
a web server, the configuration of at least one recursive DNS
|
||
server is also needed for DNS name resolution.
|
||
|
||
This document describes three approaches of recursive DNS server
|
||
address configuration for IPv6 host: (a) RA option [8], (b) DHCPv6
|
||
option [5]-[7], and (c) Well-known anycast addresses for recursive
|
||
DNS servers [9]. Also, it suggests the applicable scenarios for
|
||
four kinds of networks: (a) ISP network, (b) Enterprise network,
|
||
(c) 3GPP network, and (d) Unmanaged network.
|
||
|
||
This document is just an analysis of each possible approach, and
|
||
does not make any recommendation on particular one or on a
|
||
combination of particular ones. Some approaches may even not be
|
||
adopted at all as a result of further discussion.
|
||
|
||
Therefore, the objective of this document is to help the audience
|
||
select the approaches suitable for IPv6 host configuration of
|
||
recursive DNS server.
|
||
|
||
2. Terminology
|
||
|
||
This document uses the terminology described in [3]-[9]. In
|
||
addition, a new term is defined below:
|
||
|
||
Recursive DNS Server (RDNSS) A Recursive DNS Server is a name
|
||
server that offers the recursive
|
||
service of DNS name resolution.
|
||
|
||
3. IPv6 DNS Configuration Approaches
|
||
|
||
In this section, the operational attributes of three solutions are
|
||
described in detail.
|
||
|
||
3.1. RA Option
|
||
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 3]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
RA approach is to define a new ND option called RDNSS option that
|
||
contains a recursive DNS server address. Existing ND transport
|
||
mechanisms (i.e., advertisements and solicitations) are used. This
|
||
works in the same way that nodes learn about routers and prefixes.
|
||
An IPv6 host can configure the IPv6 addresses of one or more
|
||
RDNSSes via RA message periodically sent by router or solicited by
|
||
a Router Solicitation (RS) [8].
|
||
|
||
This approach needs RDNSS information to be configured in the
|
||
routers doing the advertisements. The configuration of RDNSS
|
||
address can be performed manually by operator or other ways, such
|
||
as automatic configuration through DHCPv6 client running on the
|
||
router. When advertising more than one RDNSS option, an RA message
|
||
includes as many RDNSS options as RDNSSes.
|
||
|
||
Through ND protocol and RDNSS option along with prefix information
|
||
option, an IPv6 host can perform its network configuration of its
|
||
IPv6 address and RDNSS simultaneously [3][4]. The RA option for
|
||
RDNSS can be used on any network that supports the use of ND.
|
||
|
||
However, it is worth noting that some link layers (e.g., WLAN) need
|
||
to acknowledge multicast packets, which may increase the amount of
|
||
link-layer traffic [25]-[28]. This is discussed in Appendix A.
|
||
|
||
The RA approach is useful in some mobile environments where the
|
||
addresses of the RDNSSes are changing because the RA option
|
||
includes a lifetime field that allows client to use RDNSSes nearer
|
||
to the client. This can be configured to a value that will require
|
||
the client to time out the entry and switch over to another RDNSS
|
||
address [8]. However, from the viewpoint of implementation, the
|
||
lifetime would seem to make matters a bit more complex. Instead of
|
||
just writing DNS configuration file, such as resolv.conf for the
|
||
list of RDNSS addresses, we have to have a daemon around (or a
|
||
program that is called at the defined intervals) that keeps
|
||
monitoring the lifetime of RDNSSes all the time.
|
||
|
||
The preference value of RDNSS, included in RDNSS option, allows
|
||
IPv6 hosts to select primary RDNSS among several RDNSSes; this can
|
||
be used for load balancing of RDNSSes [8].
|
||
|
||
3.1.1. Advantages
|
||
|
||
The RA option for RDNSS has a number of advantages. These include:
|
||
|
||
1) The RA option is an extension of existing ND/Autoconfig
|
||
mechanisms [3][4], and does not require a change in the base ND
|
||
protocol.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 4]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
2) This approach, like ND, works well on a variety of link types
|
||
including point-to-point links, point-to-multipoint, and
|
||
multi-point (i.e., Ethernet LANs), etc. RFC2461 [3] states,
|
||
however, that there may be some link types on which ND is not
|
||
possible; on such links, some other mechanisms will be needed for
|
||
DNS configuration.
|
||
|
||
3) All of the information a host needs to run the basic Internet
|
||
applications such as the email, web, ftp, etc., can be obtained
|
||
with the addition of this option to ND and address autoconfiguration
|
||
The use of a single mechanism is more reliable and easier to provide
|
||
than when the RDNSS information is learned via another protocol
|
||
mechanism. Debugging problems when multiple protocol mechanisms are
|
||
being used is harder and much more complex.
|
||
|
||
4) This mechanism works over a broad range of scenarios and
|
||
leverages IPv6 ND. This works well on links that support broadcast
|
||
reliably (e.g., Ethernet LANs) but not necessarily on other links
|
||
(e.g., Wireless LANs): Refer to Appendix A. Also, this works well
|
||
on links that are high performance (e.g., Ethernet LANs) and low
|
||
performance (e.g., Cellular networks). In the latter case,
|
||
combining the RDNSS information with the other information in the
|
||
RA, the host can learn all of the information needed to use most
|
||
Internet applications, such as the web in a single packet. This
|
||
not only saves bandwidth where this is an issue, but also minimizes
|
||
the delay needed to learn the RDNSS information.
|
||
|
||
5) The RA approach could be used as a model for other similar types
|
||
of configuration information. New RA options for other server
|
||
addresses, such as NTP server address, that are common to all
|
||
clients on a subnet would be easy to define.
|
||
|
||
3.1.2. Disadvantages
|
||
|
||
1) ND is mostly implemented in the kernel part of operating system.
|
||
Therefore, if ND supports the configuration of some additional
|
||
services, such as DNS servers, ND should be extended in the kernel
|
||
part, and complemented by a user-land process. DHCPv6, however,
|
||
has more flexibility for the extension of service discovery because
|
||
it is an application layer protocol.
|
||
|
||
2) The current ND framework should be modified due to the
|
||
synchronization between another ND cache for RDNSSes in the kernel
|
||
space and the DNS configuration file in the user space. Because it
|
||
is unacceptable to write and rewrite the DNS configuration file
|
||
(e.g., resolv.conf) from the kernel, another approach is needed.
|
||
One simple approach to solve this is to have a daemon listening to
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 5]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
what the kernel conveys, and to have the daemon do these steps, but
|
||
such a daemon is not needed with the current ND framework.
|
||
|
||
3) It is necessary to configure RDNSS addresses at least at one
|
||
router on every link where this information needs to be configured
|
||
by RA option.
|
||
|
||
3.1.3. Observations
|
||
|
||
The proposed RDNSS RA option along with the IPv6 ND and
|
||
Autoconfiguration allows a host to obtain all of the information it
|
||
needs to access the basic Internet services like the web, email,
|
||
ftp, etc. This is preferable in the environments where hosts use
|
||
RAs to autoconfigure their addresses and all the hosts on the
|
||
subnet share the same router and server addresses. If the
|
||
configuration information can be obtained from a single mechanism,
|
||
it is preferable because it does not add additional delay, and it
|
||
uses a minimum of bandwidth. The environments like this include
|
||
the homes, public cellular networks, and enterprise environments
|
||
where no per host configuration is needed, but exclude public WLAN
|
||
hot spots.
|
||
|
||
DHCPv6 is preferable where it is being used for address
|
||
configuration and if there is a need for host specific
|
||
configuration [5]-[7]. The environments like this are most likely
|
||
the enterprise environments where the local administration chooses
|
||
to have per host configuration control.
|
||
|
||
Note: the observation section is based on what the proponents of
|
||
each approach think makes a good overall solution.
|
||
|
||
3.2. DHCPv6 Option
|
||
|
||
DHCPv6 [5] includes the "DNS Recursive Name Server" option, through
|
||
which a host can obtain a list of IP addresses of recursive DNS
|
||
servers [7]. The DNS Recursive Name Server option carries a list
|
||
of IPv6 addresses of RDNSSes to which the host may send DNS queries.
|
||
The DNS servers are listed in the order of preference for use by
|
||
the DNS resolver on the host.
|
||
|
||
The DNS Recursive Name Server option can be carried in any DHCPv6
|
||
Reply message, in response to either a Request or an Information
|
||
request message. Thus, the DNS Recursive Name Server option can be
|
||
used either when DHCPv6 is used for address assignment, or when
|
||
DHCPv6 is used only for other configuration information as
|
||
stateless DHCPv6 [6].
|
||
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 6]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
Stateless DHCPv6 can be deployed either using DHCPv6 servers
|
||
running on general-purpose computers, or on router hardware.
|
||
Several router vendors currently implement stateless DHCPv6 servers.
|
||
Deploying stateless DHCPv6 in routers has the advantage that no
|
||
special hardware is required, and should work well for networks
|
||
where DHCPv6 is needed for very straightforward configuration of
|
||
network devices.
|
||
|
||
However, routers can also act as DHCPv6 relay agents. In this case,
|
||
the DHCPv6 server need not be on the router - it can be on a
|
||
general purpose computer. This has the potential to give the
|
||
operator of the DHCPv6 server more flexibility in how the DHCPv6
|
||
server responds to individual clients - clients can easily be given
|
||
different configuration information based on their identity, or for
|
||
any other reason. Nothing precludes adding this flexibility to a
|
||
router, but generally in current practice, DHCP servers running on
|
||
general-purpose hosts tend to have more configuration options than
|
||
those that are embedded in routers.
|
||
|
||
DHCPv6 currently provides a mechanism for reconfiguring DHCPv6
|
||
clients that use stateful configuration assignment. To do this,
|
||
the DHCPv6 server sends a Reconfigure message to the client. The
|
||
client validates the Reconfigure message, and then contacts the
|
||
DHCPv6 server to obtain updated configuration information. Using
|
||
this mechanism, it is currently possible to propagate new
|
||
configuration information to DHCPv6 clients as this information
|
||
changes.
|
||
|
||
The DHC Working Group is currently studying an additional mechanism
|
||
through which configuration information, including the list of
|
||
RDNSSes, can be updated. The lifetime option for DHCPv6 [10]
|
||
assigns a lifetime to configuration information obtained through
|
||
DHCPv6. At the expiration of the lifetime, the host contacts the
|
||
DHCPv6 server to obtain updated configuration information,
|
||
including the list of RDNSSes. This lifetime gives the network
|
||
administrator another mechanism to configure hosts with new RDNSSes
|
||
by controlling the time at which the host refreshes the list.
|
||
|
||
The DHC Working Group has also discussed the possibility of
|
||
defining an extension to DHCPv6 that would allow the use of
|
||
multicast to provide configuration information to multiple hosts
|
||
with a single DHCPv6 message. Because of the lack of deployment
|
||
experience, the WG has deferred consideration of multicast DHCPv6
|
||
configuration at this time. Experience with DHCPv4 has not
|
||
identified a requirement for multicast message delivery, even in
|
||
large service provider networks with tens of thousands of hosts
|
||
that may initiate a DHCPv4 message exchange simultaneously.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 7]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
3.2.1. Advantages
|
||
|
||
The DHCPv6 option for RDNSS has a number of advantages. These
|
||
include:
|
||
|
||
1) DHCPv6 currently provides a general mechanism for conveying
|
||
network configuration information to clients. So configuring
|
||
DHCPv6 servers allows the network administrator to configure
|
||
RDNSSes along with the addresses of other network services, as well
|
||
as location-specific information like time zones.
|
||
|
||
2) As a consequence, when the network administrator goes to
|
||
configure DHCPv6, all the configuration information can be managed
|
||
through a single service, typically with a single user interface
|
||
and a single configuration database.
|
||
|
||
3) DHCPv6 allows for the configuration of a host with information
|
||
specific to that host, so that hosts on the same link can be
|
||
configured with different RDNSSes as well as other configuration
|
||
information. This capability is important in some network
|
||
deployments such as service provider networks or WiFi hot spots.
|
||
|
||
4) A mechanism exists for extending DHCPv6 to support the
|
||
transmission of additional configuration that has not yet been
|
||
anticipated.
|
||
|
||
5) Hosts that require other configuration information such as the
|
||
addresses of SIP servers and NTP servers are likely to need DHCPv6
|
||
for other configuration information.
|
||
|
||
6) The specification for configuration of RDNSSes through DHCPv6 is
|
||
available as an RFC. No new protocol extensions such as new
|
||
options are necessary.
|
||
|
||
7) Interoperability among independent implementations has been
|
||
demonstrated.
|
||
|
||
3.2.2. Disadvantages
|
||
|
||
The DHCPv6 option for RDNSS has a few disadvantages. These
|
||
include:
|
||
|
||
1) Update currently requires message from server (however, see
|
||
[10]).
|
||
|
||
2) Because DNS information is not contained in RA message, the host
|
||
must receive two messages from the router, and must transmit at
|
||
least one message to the router. On networks where bandwidth is at
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 8]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
a premium, this is a disadvantage, although on most networks it is
|
||
not a practical concern.
|
||
|
||
3) Increased latency for initial configuration - in addition to
|
||
waiting for an RA message, the client must now exchange packets
|
||
with a DHCPv6 server; even if it is locally installed on a router,
|
||
this will slightly extend the time required to configure the client.
|
||
For clients that are moving rapidly from one network to another,
|
||
this will be a disadvantage.
|
||
|
||
3.2.3. Observations
|
||
|
||
In the general case, on general-purpose networks, stateless DHCPv6
|
||
provides significant advantages and no significant disadvantages.
|
||
Even in the case where bandwidth is at a premium and low latency is
|
||
desired, if hosts require other configuration information in
|
||
addition to a list of RDNSSes or if hosts must be configured
|
||
selectively, those hosts will use DHCPv6 and the use of the DHCPv6
|
||
DNS recursive name server option will be advantageous.
|
||
|
||
However, we are aware of some applications where it would be
|
||
preferable to put the RDNSS information into an RA packet; for
|
||
example, on a cell phone network, where bandwidth is at a premium
|
||
and extremely low latency is desired. The final DNS configuration
|
||
draft should be written so as to allow these special applications
|
||
to be handled using DNS information in the RA packet.
|
||
|
||
3.3. Well-known Anycast Addresses
|
||
|
||
Anycast uses the same routing system as unicast [11]. However,
|
||
administrative entities are local ones. The local entities may
|
||
accept unicast routes (including default routes) to anycast servers
|
||
from adjacent entities. The administrative entities should not
|
||
advertise their peers routes to their internal anycast servers, if
|
||
they want to prohibit external access from some peers to the
|
||
servers. If some advertisement is inevitable (such as the case
|
||
with default routes), the packets to the servers should be blocked
|
||
at the boundary of the entities. Thus, for this anycast, not only
|
||
unicast routing but also unicast ND protocols can be used as is.
|
||
|
||
First of all, the well-known anycast addresses approach is much
|
||
different from that discussed at IPv6 Working Group in the past [9].
|
||
It should be noted that "anycast" in this memo is simpler than that
|
||
of RFC1546 [11] and RFC3513 [12] where it is assumed to be
|
||
prohibited to have multiple servers on a single link sharing an
|
||
anycast address. That is, on a link, anycast address is assumed to
|
||
be unique. DNS clients today already have redundancy by having
|
||
multiple well-known anycast addresses configured as RDNSS addresses.
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 9]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
There is no point in having multiple RDNSSes sharing an anycast
|
||
address on a single link.
|
||
|
||
The approach with well-known anycast addresses is to set multiple
|
||
well-known anycast addresses in clients' resolver configuration
|
||
files from the beginning, say, as factory default. Thus, there is
|
||
no transport mechanism and no packet format [9].
|
||
|
||
An anycast address is an address shared by multiple servers (in
|
||
this case, the servers are RDNSSes). Request from a client to the
|
||
anycast address is routed to a server selected by the routing
|
||
system. However, it is a bad idea to mandate "site" boundary on
|
||
anycast addresses, because most users just do not have their own
|
||
servers and want to access their ISPs' across their site boundaries.
|
||
Larger sites may also depend on their ISPs or may have their own
|
||
RDNSSes within "site" boundaries.
|
||
|
||
3.3.1. Advantages
|
||
|
||
The basic advantage of the well-known addresses approach is that it
|
||
uses no transport mechanism. Thus,
|
||
|
||
1) There is no delay to get the response and no further delay by
|
||
packet losses.
|
||
|
||
2) The approach can be combined with any other configuration
|
||
mechanisms, such as RA-based approach and DHCP based approach, as
|
||
well as factory default configuration.
|
||
|
||
3) The approach works over any environment where DNS works.
|
||
|
||
Another advantage is that the approach needs to configure DNS
|
||
servers as a router, but nothing else. Considering that DNS
|
||
servers do need configuration, the amount of overall configuration
|
||
effort is proportional to the number of the DNS servers and scales
|
||
linearly. It should be noted that, in the simplest case where a
|
||
subscriber to an ISP does not have any DNS server, the subscriber
|
||
naturally accesses DNS servers of the ISP even though the
|
||
subscriber and the ISP do nothing and there is no protocol to
|
||
exchange DNS server information between the subscriber and the ISP.
|
||
|
||
3.3.2. Disadvantages
|
||
|
||
Well-known anycast addresses approach requires that DNS servers (or
|
||
routers near it as a proxy) act as routers to advertise their
|
||
anycast addresses to the routing system, which requires some
|
||
configuration (see the last paragraph of the previous section on
|
||
the scalability of the effort).
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 10]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
|
||
3.3.3. Observations
|
||
|
||
If other approaches are used in addition, the well-known anycast
|
||
addresses should also be set in RA or DHCP configuration files to
|
||
reduce the configuration effort of users.
|
||
|
||
The redundancy by multiple RDNSSes is better provided by multiple
|
||
servers having different anycast addresses than multiple servers
|
||
sharing the same anycast address because the former approach allows
|
||
stale servers to still generate routes to their anycast addresses.
|
||
Thus, in a routing domain (or domains sharing DNS servers), there
|
||
will be only one server having an anycast address unless the domain
|
||
is so large that load distribution is necessary.
|
||
|
||
Small ISPs will operate one RDNSS at each anycast address which is
|
||
shared by all the subscribers. Large ISPs may operate multiple
|
||
RDNSSes at each anycast address to distribute and reduce load,
|
||
where boundary between RDNSSes may be fixed (redundancy is still
|
||
provided by multiple addresses) or change dynamically. DNS packets
|
||
with the well-known anycast addresses are not expected (though not
|
||
prohibited) to cross ISP boundaries, as ISPs are expected to be
|
||
able to take care of themselves.
|
||
|
||
Because "anycast" in this memo is simpler than that of RFC1546 [11]
|
||
and RFC3513 [12] where it is assumed to be administratively
|
||
prohibited to have multiple servers on a single link sharing an
|
||
anycast address, anycast in this memo should be implemented as
|
||
UNICAST of RFC2461 [3] and RFC3513 [12]. As a result, ND-related
|
||
instability disappears. Thus, anycast in well-known anycast
|
||
addresses approach can and should use the anycast address as a
|
||
source unicast (according to RFC3513 [12]) address of packets of
|
||
UDP and TCP responses. With TCP, if route flips and packets to an
|
||
anycast address are routed to a new server, it is expected that the
|
||
flip is detected by ICMP or sequence number inconsistency and the
|
||
TCP connection is reset and retried.
|
||
|
||
4. Interworking among IPv6 DNS Configuration Approaches
|
||
|
||
Three approaches can work together for IPv6 host configuration of
|
||
RDNSS. This section shows a consideration on how these approaches
|
||
can interwork each other.
|
||
|
||
For ordering between RA and DHCP approaches, O (Other stateful
|
||
configuration) flag in RA message can be used [8]. If no RDNSS
|
||
option is included, an IPv6 host may perform DNS configuration
|
||
through DHCPv6 [5]-[7] regardless of whether the O flag is set or
|
||
not.
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 11]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
|
||
The well-known anycast addresses approach fully interworks with the
|
||
other approaches. That is, the other approaches can remove the
|
||
configuration effort on servers by using the well-known addresses
|
||
as the default configuration. Moreover, the clients preconfigured
|
||
with the well-known anycast addresses can be further configured to
|
||
use other approaches to override the well-known addresses, if the
|
||
configuration information from other approaches are available.
|
||
That is, all the clients should have the well-known anycast
|
||
addresses preconfigured, in the case where there are no other
|
||
mechanisms available. In order to fly anycast approach with the
|
||
other solutions, there are three options as follows:
|
||
|
||
1) The first option is that well-known addresses are used as last
|
||
resort, when an IPv6 host can not get RDNSS information through RA
|
||
and DHCP. The well-known anycast addresses have to be preconfigured
|
||
in IPv6 hosts' resolver configuration files.
|
||
|
||
2) The second is that an IPv6 host can configure well-known
|
||
addresses as the most preferable in its configuration file even
|
||
though either RA option or DHCP option is available.
|
||
|
||
3) The last is that the well-known anycast addresses can be set in
|
||
RA or DHCP configuration to reduce configuration effort of users.
|
||
According to either RA or DHCP mechanism, the well-known addresses
|
||
can be obtained by IPv6 host. Because this approach is the most
|
||
convenient for users, the last option is recommended.
|
||
|
||
Note: this section does not necessarily mean this document suggests
|
||
adopting all these three approaches and making them interwork in
|
||
the way described here. In fact, some approaches may even not be
|
||
adopted at all as a result of further discussion.
|
||
|
||
5. Deployment Scenarios
|
||
|
||
Regarding the DNS configuration on the IPv6 host, several
|
||
mechanisms are being considered at the DNSOP Working Group such as
|
||
RA option, DHCPv6 option and well-known preconfigured anycast
|
||
addresses as of today, and this document is a final result from the
|
||
long thread. In this section, we suggest four applicable scenarios
|
||
of three approaches for IPv6 DNS configuration.
|
||
|
||
Note: in the applicable scenarios, authors do not implicitly push
|
||
any specific approaches into the restricted environments. No
|
||
enforcement is in each scenario and all mentioned scenarios are
|
||
probable. The main objective of this work is to provide a useful
|
||
guideline for IPv6 DNS configuration.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 12]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
5.1. ISP Network
|
||
|
||
A characteristic of ISP network is that multiple Customer Premises
|
||
Equipment (CPE) devices are connected to IPv6 PE (Provider Edge)
|
||
routers and each PE connects multiple CPE devices to the backbone
|
||
network infrastructure [13]. The CPEs may be hosts or routers.
|
||
|
||
In the case where the CPE is a router, there is a customer network
|
||
that is connected to the ISP backbone through the CPE. Typically,
|
||
each customer network gets a different IPv6 prefix from an IPv6 PE
|
||
router, but the same RDNSS configuration will be distributed.
|
||
|
||
This section discusses how the different approaches to distributing
|
||
DNS information are compared in an ISP network.
|
||
|
||
5.1.1. RA Option Approach
|
||
|
||
When the CPE is a host, the RA option for RDNSS can be used to
|
||
allow the CPE to get RDNSS information as well as /64 prefix
|
||
information for stateless address autoconfiguration at the same
|
||
time when the host is attached to a new subnet [8]. Because an
|
||
IPv6 host must receive at least one RA message for stateless
|
||
address autoconfiguration and router configuration, the host could
|
||
receive RDNSS configuration information in that RA without the
|
||
overhead of an additional message exchange.
|
||
|
||
When the CPE is a router, the CPE may accept the RDNSS information
|
||
from the RA on the interface connected to the ISP, and copy that
|
||
information into the RAs advertised in the customer network.
|
||
|
||
This approach is more valuable in the mobile host scenario, in
|
||
which the host must receive at least an RA message for detecting a
|
||
new network, than in other scenarios generally although
|
||
administrator should configure RDNSS information on the routers.
|
||
Secure ND [14] can provide extended security when using RA message.
|
||
|
||
5.1.2. DHCPv6 Option Approach
|
||
|
||
DHCPv6 can be used for RDNSS configuration through the use of the
|
||
DNS option, and can provide other configuration information in the
|
||
same message with RDNSS configuration [5]-[7]. DHCPv6 DNS option
|
||
is already in place for DHCPv6 as RFC 3646 [7] and DHCPv6-lite
|
||
or stateless DHCP [6] is nowhere as complex as a full DHCPv6
|
||
implementation. DHCP is a client-server model protocol, so ISP can
|
||
handle user identification on its network intentionally, and also
|
||
authenticated DHCP [15] can be used for secure message exchange.
|
||
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 13]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
The expected model for deployment of IPv6 service by ISPs is to
|
||
assign a prefix to each customer, which will be used by the
|
||
customer gateway to assign a /64 prefix to each network in the
|
||
customer's network. Prefix delegation with DHCP (DHCPv6 PD) has
|
||
already been adopted by ISPs for automating the assignment of the
|
||
customer prefix to the customer gateway [17]. DNS configuration
|
||
can be carried in the same DHCPv6 message exchange used for DHCPv6
|
||
to efficiently provide that information, along with any other
|
||
configuration information needed by the customer gateway or
|
||
customer network. This service model can be useful to Home or SOHO
|
||
subscribers. The Home or SOHO gateway, which is a customer gateway
|
||
for ISP, can then pass that RDNSS configuration information to the
|
||
hosts in the customer network through DHCP.
|
||
|
||
5.1.3. Well-known Addresses Approach
|
||
|
||
Well-known anycast addresses approach is also a feasible and simple
|
||
mechanism for ISP [9]. The use of well-known anycast addresses
|
||
avoids some of the security risks in rogue messages sent through an
|
||
external protocol like RA or DHCPv6. The configuration of hosts
|
||
for the use of well-known anycast addresses requires no protocol or
|
||
manual configuration, but the configuration of routing for the
|
||
anycast addresses requires intervention on the part of the network
|
||
administrator. Also, the number of special addresses would be
|
||
equal to the number of RDNSSes that could be made available to
|
||
subscribers.
|
||
|
||
5.2. Enterprise Network
|
||
|
||
Enterprise network is defined as a network that has multiple
|
||
internal links, one or more router connections, to one or more
|
||
Providers and is actively managed by a network operations entity
|
||
[16]. An enterprise network can get network prefixes from ISP by
|
||
either manual configuration or prefix delegation [17]. In most
|
||
cases, because an enterprise network manages its own DNS domains,
|
||
it operates its own DNS servers for the domains. These DNS servers
|
||
within enterprise network process recursive DNS name resolution
|
||
requests from IPv6 hosts as RDNSSes. The RDNSS configuration in
|
||
the enterprise network can be performed like in Section 4, in which
|
||
three approaches can be used together as follows:
|
||
|
||
1) IPv6 host can decide which approach is or may be used in its
|
||
subnet with O flag in RA message [8]. As the first option in
|
||
Section 4, well-known anycast addresses can be used as a last
|
||
resort when RDNSS information can not be obtained through either RA
|
||
option or DHCP option. This case needs IPv6 hosts to preconfigure
|
||
the well-known anycast addresses in their DNS configuration files.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 14]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
2) When the enterprise prefers well-known anycast approach to the
|
||
others, IPv6 hosts should preconfigure the well-known anycast
|
||
addresses like in the first option.
|
||
|
||
3) The last option, a more convenient and transparent way, does not
|
||
need IPv6 hosts to preconfigure the well-known anycast addresses
|
||
because the addresses are delivered to IPv6 hosts through either RA
|
||
option or DHCPv6 option as if they were unicast addresses. This
|
||
way is most recommended for the sake of user's convenience.
|
||
|
||
5.3. 3GPP Network
|
||
|
||
IPv6 DNS configuration is a missing part of IPv6 autoconfiguration
|
||
and an important part of the basic IPv6 functionality in the 3GPP
|
||
User Equipment (UE). Higher level description of the 3GPP
|
||
architecture can be found in [18], and transition to IPv6 in 3GPP
|
||
networks is analyzed in [19] and [20].
|
||
|
||
In 3GPP architecture, there is a dedicated link between the UE and
|
||
the GGSN called the Packet Data Protocol (PDP) Context. This link
|
||
is created through the PDP Context activation procedure [21].
|
||
There is a separate PDP context type for IPv4 and IPv6 traffic. If
|
||
a 3GPP UE user is communicating using IPv6 (having an active IPv6
|
||
PDP context), it can not be assumed that (s)he has simultaneously
|
||
active IPv4 PDP context, and DNS queries could be done using IPv4.
|
||
A 3GPP UE can thus be an IPv6 node, and it needs to somehow
|
||
discover the address of the RDNSS. Before IP-based services (e.g.,
|
||
web browsing or e-mail) can be used, the IPv6 (and IPv4) RDNSS
|
||
addresses need to be discovered in the 3GPP UE.
|
||
|
||
Section 5.3.1 briefly summarizes currently available mechanisms in
|
||
3GPP networks and recommendations. 5.3.2 analyzes the Router
|
||
Advertisement based solution, 5.3.3 analyzes the Stateless DHCPv6
|
||
mechanism, and 5.3.4 analyzes the Well-known addresses approach.
|
||
Section 5.3.5 finally summarizes the recommendations.
|
||
|
||
5.3.1. Currently Available Mechanisms and Recommendations
|
||
|
||
3GPP has defined a mechanism, in which RDNSS addresses can be
|
||
received in the PDP context activation (a control plane mechanism).
|
||
That is called the Protocol Configuration Options Information
|
||
Element (PCO-IE) mechanism [22]. The RDNSS addresses can also be
|
||
received over the air (using text messages), or typed in manually
|
||
in the UE. Note that the two last mechanisms are not very well
|
||
scalable. The UE user most probably does not want to type IPv6
|
||
RDNSS addresses manually in his/her UE. The use of well-known
|
||
addresses is briefly discussed in section 5.3.4.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 15]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
It is seen that the mechanisms above most probably are not
|
||
sufficient for the 3GPP environment. IPv6 is intended to operate
|
||
in a zero-configuration manner, no matter what the underlying
|
||
network infrastructure is. Typically, the RDNSS address is needed
|
||
to make an IPv6 node operational - and the DNS configuration should
|
||
be as simple as the address autoconfiguration mechanism. It must
|
||
also be noted that there will be additional IP interfaces in some
|
||
near future 3GPP UEs, e.g., WLAN, and 3GPP-specific DNS
|
||
configuration mechanisms (such as PCO-IE [22]) do not work for
|
||
those IP interfaces. In other words, a good IPv6 DNS configuration
|
||
mechanism should also work in a multi-access network environment.
|
||
|
||
From 3GPP point of view, the best IPv6 DNS configuration solution
|
||
is feasible for a very large number of IPv6-capable UEs (can be
|
||
even hundreds of millions in one operator's network), is automatic
|
||
and thus requires no user action. It is suggested to standardize a
|
||
lightweight, stateless mechanism that works in all network
|
||
environments. The solution could then be used for 3GPP, 3GPP2,
|
||
WLAN and other access network technologies. A light, stateless
|
||
IPv6 DNS configuration mechanism is thus not only needed in 3GPP
|
||
networks, but also 3GPP networks and UEs would certainly benefit
|
||
from the new mechanism.
|
||
|
||
5.3.2. RA Extension
|
||
|
||
Router Advertisement extension [8] is a lightweight IPv6 DNS
|
||
configuration mechanism that requires minor changes in 3GPP UE IPv6
|
||
stack and Gateway GPRS Support Node (GGSN, the default router in
|
||
the 3GPP architecture) IPv6 stack. This solution can be specified
|
||
in the IETF (no action needed in the 3GPP) and taken in use in 3GPP
|
||
UEs and GGSNs.
|
||
|
||
In this solution, an IPv6-capable UE configures DNS information
|
||
via RA message sent by its default router (GGSN), i.e., RDNSS
|
||
option for recursive DNS server is included in the RA message.
|
||
This solution is easily scalable for a very large number of UEs.
|
||
The operator can configure the RDNSS addresses in the GGSN as a
|
||
part of normal GGSN configuration. The IPv6 RDNSS address is
|
||
received in the Router Advertisement, and an extra Round Trip Time
|
||
(RTT) for asking RDNSS addresses can be avoided.
|
||
|
||
If thinking about cons, this mechanism still requires
|
||
standardization effort in the IETF, and the end nodes and routers
|
||
need to support this mechanism. The equipment software update
|
||
should, however, be pretty straightforward, and new IPv6 equipment
|
||
could support RA extension already from the beginning.
|
||
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 16]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
5.3.3. Stateless DHCPv6
|
||
|
||
DHCPv6-based solution needs the implementation of Stateless DHCP
|
||
[6] and DHCPv6 DNS options [7] in the UE, and a DHCPv6 server in
|
||
the operator's network. A possible configuration is such that the
|
||
GGSN works as a DHCP relay.
|
||
|
||
Pros for Stateless DHCPv6-based solution are
|
||
|
||
1) Stateless DHCPv6 is a standardized mechanism.
|
||
|
||
2) DHCPv6 can be used for receiving other configuration information
|
||
than RDNSS addresses, e.g., SIP server addresses.
|
||
|
||
3) DHCPv6 works in different network environments.
|
||
|
||
4) When DHCPv6 service is deployed through a single, centralized
|
||
server, the RDNSS configuration information can be updated by the
|
||
network administrator at a single source.
|
||
|
||
Some issues with DHCPv6 in 3GPP networks are listed below:
|
||
|
||
1) DHCPv6 requires an additional server in the network unless the
|
||
(Stateless) DHCPv6 functionality is integrated into an existing
|
||
router already, and it is one box more to be maintained.
|
||
|
||
2) DHCPv6 is not necessarily needed for 3GPP UE IPv6 addressing
|
||
(3GPP Stateless Address Autoconfiguration is typically used), and
|
||
not automatically implemented in 3GPP IPv6 UEs.
|
||
|
||
3) Scalability and reliability of DHCPv6 in very large 3GPP
|
||
networks (with tens or hundreds of millions of UEs) may be an issue,
|
||
at least the redundancy needs to be taken care of. However, if the
|
||
DHCPv6 service is integrated into the network elements, such as
|
||
router operating system, scalability and reliability is comparable
|
||
with other DNS configuration approaches.
|
||
|
||
4) It is sub-optimal to utilize the radio resources in 3GPP
|
||
networks for DHCPv6 messages if there is a simpler alternative
|
||
available.
|
||
|
||
a) Use of Stateless DHCPv6 adds one round trip delay to the case
|
||
in which the UE can start transmitting data right after the
|
||
Router Advertisement.
|
||
|
||
5) If the DNS information (suddenly) changes, Stateless DHCPv6 can
|
||
not automatically update the UE, see [23].
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 17]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
5.3.4. Well-known Addresses
|
||
|
||
Using well-known addresses is also a feasible and a light mechanism
|
||
for 3GPP UEs. Those well-known addresses can be preconfigured in
|
||
the UE software and the operator makes the corresponding
|
||
configuration on the network side. So this is a very easy
|
||
mechanism for the UE, but requires some configuration work in the
|
||
network. When using well-known addresses, UE forwards queries to
|
||
any of the preconfigured addresses. In the current proposal [9],
|
||
IPv6 anycast addresses are suggested.
|
||
|
||
Note: IPv6 DNS configuration proposal based on the use of
|
||
well-known site-local addresses developed at the IPv6 Working Group
|
||
was seen as a feasible mechanism for 3GPP UEs, but opposition by
|
||
some people in the IETF and finally deprecating IPv6 site-local
|
||
addresses made it impossible to standardize it. Note that this
|
||
mechanism is implemented in some existing operating systems today
|
||
(also in some 3GPP UEs) as a last resort of IPv6 DNS configuration.
|
||
|
||
5.3.5. Recommendations
|
||
|
||
It is suggested that a lightweight, stateless DNS configuration
|
||
mechanism is specified as soon as possible. From 3GPP UE's and
|
||
networks' point of view, Router Advertisement based mechanism looks
|
||
most promising. The sooner a light, stateless mechanism is
|
||
specified, the sooner we can get rid of using well-known site-local
|
||
addresses for IPv6 DNS configuration.
|
||
|
||
5.4. Unmanaged Network
|
||
|
||
There are 4 deployment scenarios of interest in unmanaged networks
|
||
[24]:
|
||
|
||
1) A gateway which does not provide IPv6 at all;
|
||
|
||
2) A dual-stack gateway connected to a dual-stack ISP;
|
||
|
||
3) A dual-stack gateway connected to an IPv4-only ISP; and
|
||
|
||
4) A gateway connected to an IPv6-only ISP.
|
||
|
||
5.4.1. Case A: Gateway does not provide IPv6 at all
|
||
|
||
In this case, the gateway does not provide IPv6; the ISP may or may
|
||
not provide IPv6. Automatic or Configured tunnels are the
|
||
recommended transition mechanisms for this scenario.
|
||
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 18]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
The case where dual-stack hosts behind an NAT, that need access to
|
||
an IPv6 RDNSS, can not be entirely ruled out. The DNS
|
||
configuration mechanism has to work over the tunnel, and the
|
||
underlying tunneling mechanism could be implementing NAT traversal.
|
||
The tunnel server assumes the role of a relay (both for DHCP and
|
||
Well-known anycast addresses approaches).
|
||
|
||
RA-based mechanism is relatively straightforward in its operation,
|
||
assuming the tunnel server is also the IPv6 router emitting RAs.
|
||
Well-known anycast addresses approach seems also simple in
|
||
operation across the tunnel, but the deployment model using
|
||
Well-known anycast addresses in a tunneled environment is unclear or
|
||
not well understood.
|
||
|
||
5.4.2. Case B: A dual-stack gateway connected to a dual-stack ISP
|
||
|
||
This is similar to a typical IPv4 home user scenario, where DNS
|
||
configuration parameters are obtained using DHCP. Except that
|
||
Stateless DHCPv6 is used, as opposed to the IPv4 scenario where the
|
||
DHCP server is stateful (maintains the state for clients).
|
||
|
||
5.4.3. Case C: A dual-stack gateway connected to an IPv4-only ISP
|
||
|
||
This is similar to Case B. If a gateway provides IPv6 connectivity
|
||
by managing tunnels, then it is also supposed to provide access to
|
||
an RDNSS. Like this, the tunnel for IPv6 connectivity originates
|
||
from the dual-stack gateway instead of the host.
|
||
|
||
5.4.4. Case D: A gateway connected to an IPv6-only ISP
|
||
|
||
This is similar to Case B.
|
||
|
||
6. Security Considerations
|
||
|
||
As security requirements depend solely on applications and are
|
||
different application by application, there can be no generic
|
||
requirement defined at higher IP or lower application layer of DNS.
|
||
|
||
However, it should be noted that cryptographic security requires
|
||
configured secret information that full autoconfiguration and
|
||
cryptographic security are mutually exclusive. People insisting on
|
||
secure full autoconfiguration will get false security, false
|
||
autoconfiguration or both.
|
||
|
||
In some deployment scenarios [19], where cryptographic security is
|
||
required for applications, the secret information for the
|
||
cryptographic security is preconfigured through which application
|
||
specific configuration data, including those for DNS, can be
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 19]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
securely configured. It should be noted that if applications
|
||
requiring cryptographic security depend on DNS, the applications
|
||
also require cryptographic security to DNS. Therefore, the full
|
||
autoconfiguration of DNS is not acceptable.
|
||
|
||
However, with full autoconfiguration, weaker but still reasonable
|
||
security is being widely accepted and will continue to be
|
||
acceptable. That is, with full autoconfiguration, which means
|
||
there is no cryptographic security for the autoconfiguration, it is
|
||
already assumed that the local environment is secure enough that
|
||
the information from the local autoconfiguration server has
|
||
acceptable security even without cryptographic security. Thus, the
|
||
communication between the local DNS client and local DNS server has
|
||
the acceptable security.
|
||
|
||
In autoconfiguring recursive servers, DNSSEC may be overkill,
|
||
because DNSSEC [29] needs the configuration and reconfiguration of
|
||
clients at root key roll-over [30][31]. Even if additional keys
|
||
for secure key roll-over are added at the initial configuration,
|
||
they are as vulnerable as the original keys to some forms of
|
||
attacks, such as social hacking. Another problem of using DNSSEC
|
||
and autoconfiguration together is that DNSSEC requires secure time,
|
||
which means secure communication with autoconfigured time servers,
|
||
which requires configured secret information. Therefore, in order
|
||
that the autoconfiguration may be secure, it requires configured
|
||
secret information.
|
||
|
||
If DNSSEC [29] is used and the signatures are verified on the
|
||
client host, the misconfiguration of a DNS server may be simply
|
||
denial of service. Also, if local routing environment is not
|
||
reliable, clients may be directed to a false resolver with the same
|
||
IP address as the true one.
|
||
|
||
For security considerations of each approach, refer to the
|
||
corresponding drafts [5]-[9].
|
||
|
||
7. Acknowledgements
|
||
|
||
This draft has greatly benefited from inputs by David Meyer, Rob
|
||
Austein, Tatuya Jinmei, Pekka Savola, Tim Chown, Luc Beloeil,
|
||
Christian Huitema, Thomas Narten, Pascal Thubert, and Greg Daley.
|
||
The authors appreciate their contributions.
|
||
|
||
8. Normative References
|
||
|
||
[1] S. Bradner, "Intellectual Property Rights in IETF Technology",
|
||
RFC 3668, February 2004.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 20]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
[2] S. Bradner, "IETF Rights in Contributions", RFC 3667, February
|
||
2004.
|
||
|
||
[3] T. Narten, E. Nordmark and W. Simpson, "Neighbor Discovery for
|
||
IP Version 6 (IPv6)", RFC 2461, December 1998.
|
||
|
||
[4] S. Thomson and T. Narten, "IPv6 Stateless Address
|
||
Autoconfiguration", RFC 2462, December 1998.
|
||
|
||
[5] R. Droms et al., "Dynamic Host Configuration Protocol for IPv6
|
||
(DHCPv6)", RFC 3315, July 2003.
|
||
|
||
[6] R. Droms, "Stateless Dynamic Host Configuration Protocol
|
||
(DHCP) Service for IPv6", RFC 3736, April 2004.
|
||
|
||
[7] R. Droms et al., "DNS Configuration options for Dynamic Host
|
||
Configuration Protocol for IPv6 (DHCPv6)", RFC 3646, December
|
||
2003.
|
||
|
||
9. Informative References
|
||
|
||
[8] J. Jeong, S. Park, L. Beloeil and S. Madanapalli, "IPv6 DNS
|
||
Discovery based on Router Advertisement",
|
||
draft-jeong-dnsop-ipv6-dns-discovery-04.txt, February 2005,
|
||
Work in Progress.
|
||
|
||
[9] M. Ohta, "Preconfigured DNS Server Addresses",
|
||
draft-ohta-preconfigured-dns-01.txt, February 2004, Work in
|
||
Progress.
|
||
|
||
[10] S. Venaas, T. Chown and B. Volz, "Information Refresh Time
|
||
Option for DHCPv6", draft-ietf-dhc-lifetime-03.txt, January
|
||
2005, Work in Progress.
|
||
|
||
[11] C. Partridge, T. Mendez and W. Milliken, "Host Anycasting
|
||
Service", RFC 1546, November 1993.
|
||
|
||
[12] R. Hinden and S. Deering, "Internet Protocol Version 6 (IPv6)
|
||
Addressing Architecture", RFC 3513, April 2003.
|
||
|
||
[13] M. Lind et al., "Scenarios and Analysis for Introduction IPv6
|
||
into ISP Networks",
|
||
draft-ietf-v6ops-isp-scenarios-analysis-03.txt, June 2004,
|
||
Work in Progress.
|
||
|
||
[14] J. Arkko et al., "SEcure Neighbor Discovery (SEND)",
|
||
draft-ietf-send-ndopt-06.txt, July 2004, Work in Progress.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 21]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
[15] R. Droms and W. Arbaugh, "Authentication for DHCP Messages",
|
||
RFC 3118, June 2001.
|
||
|
||
[16] J. Bound et al., "IPv6 Enterprise Network Scenarios",
|
||
draft-ietf-v6ops-ent-scenarios-05.txt, July 2004, Work in
|
||
Progress.
|
||
|
||
[17] O. Troan and R. Droms, "IPv6 Prefix Options for Dynamic Host
|
||
Configuration Protocol (DHCP) version 6", RFC 3633, December
|
||
2003.
|
||
|
||
[18] M. Wasserman, Ed., "Recommendations for IPv6 in 3GPP
|
||
Standards", RFC 3314, September 2002.
|
||
|
||
[19] J. Soininen, Ed., "Transition Scenarios for 3GPP Networks",
|
||
RFC 3574, August 2003.
|
||
|
||
[20] J. Wiljakka, Ed., "Analysis on IPv6 Transition in 3GPP
|
||
Networks", draft-ietf-v6ops-3gpp-analysis-11.txt, October 2004,
|
||
Work in Progress.
|
||
|
||
[21] 3GPP TS 23.060 V5.4.0, "General Packet Radio Service (GPRS);
|
||
Service description; Stage 2 (Release 5)", December 2002.
|
||
|
||
[22] 3GPP TS 24.008 V5.8.0, "Mobile radio interface Layer 3
|
||
specification; Core network protocols; Stage 3 (Release 5)",
|
||
June 2003.
|
||
|
||
[23] T. Chown, S. Venaas and A. Vijayabhaskar, "Renumbering
|
||
Requirements for Stateless DHCPv6",
|
||
draft-ietf-dhc-stateless-dhcpv6-renumbering-02.txt, October
|
||
2004, Work in Progress.
|
||
|
||
[24] C. Huitema et al., "Unmanaged Networks IPv6 Transition
|
||
Scenarios", RFC 3750, April 2004.
|
||
|
||
[25] ANSI/IEEE Std 802.11, "Part 11: Wireless LAN Medium Access
|
||
Control (MAC) and Physical Layer (PHY) Specifications", March
|
||
1999.
|
||
|
||
[26] IEEE Std 802.11a, "Part 11: Wireless LAN Medium Access Control
|
||
(MAC) and Physical Layer (PHY) specifications: High-speed
|
||
Physical Layer in the 5 GHZ Band", September 1999.
|
||
|
||
[27] IEEE Std 802.11b, "Part 11: Wireless LAN Medium Access Control
|
||
(MAC) and Physical Layer (PHY) specifications: Higher-Speed
|
||
Physical Layer Extension in the 2.4 GHz Band", September 1999.
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 22]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
[28] IEEE P802.11g/D8.2, "Part 11: Wireless LAN Medium Access
|
||
Control (MAC) and Physical Layer (PHY) specifications: Further
|
||
Higher Data Rate Extension in the 2.4 GHz Band", April 2003.
|
||
|
||
[29] D. Eastlake, "Domain Name System Security Extensions", RFC
|
||
2535, March 1999.
|
||
|
||
[30] O. Kolkman and R. Gieben, "DNSSEC Operational Practices",
|
||
draft-ietf-dnsop-dnssec-operational-practices-03.txt,
|
||
December 2004.
|
||
|
||
[31] G. Guette and O. Courtay, "Requirements for Automated Key
|
||
Rollover in DNSSEC",
|
||
draft-ietf-dnsop-key-rollover-requirements-02.txt, January
|
||
2005.
|
||
|
||
10. Appendix A - Link-layer Multicast Acknowledgements with RA Option
|
||
|
||
One benefit of RA option is to be able to multicast the
|
||
advertisements, reducing the need for duplicated unicast
|
||
communications.
|
||
|
||
However, some link-layers may not support this as well as others.
|
||
Consider, for example, WLAN networks where multicast is unreliable.
|
||
The unreliability problem is caused by lack of ACK for multicast,
|
||
especially on the path from the Access Point (AP) to the Station
|
||
(STA), which is specific to CSMA/CA of WLAN [25]-[28]. Namely,
|
||
multicast packet is unacknowledged on the path from the AP to the
|
||
STA, but acknowledged in the reverse direction from the STA to the
|
||
AP [25]. For example, when a router is placed at wired network
|
||
connected to an AP, a host may sometimes not receive RA message
|
||
advertised through the AP.
|
||
|
||
The fact that this problem has not been addressed in Neighbor
|
||
Discovery [3] indicates that the extra link-layer acknowledgements
|
||
have not been considered a serious problem till now.
|
||
|
||
A possible mitigation technique could be to map all-nodes link-local
|
||
multicast address to the link-layer broadcast address, and to rely
|
||
on the ND retransmissions for message delivery.
|
||
|
||
11. Authors' Addresses
|
||
|
||
Jaehoon Paul Jeong, Editor
|
||
ETRI/University of Minnesota at Twin Cities
|
||
117 Pleasant Street SE
|
||
Minneapolis, MN 55455
|
||
USA
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 23]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
|
||
Phone: +1 651 587 7774
|
||
EMail: jjeong@cs.umn.edu
|
||
|
||
Ralph Droms
|
||
Cisco Systems
|
||
1414 Massachusetts Ave.
|
||
Boxboro, MA 01719
|
||
USA
|
||
|
||
Phone: +1 978 936 1674
|
||
EMail: rdroms@cisco.com
|
||
|
||
Robert M. Hinden
|
||
Nokia
|
||
313 Fairchild Drive
|
||
Mountain View, CA 94043
|
||
USA
|
||
|
||
Phone: +1 650 625 2004
|
||
EMail: bob.hinden@nokia.com
|
||
|
||
Ted Lemon
|
||
Nominum, Inc.
|
||
950 Charter Street
|
||
Redwood City, CA 94043
|
||
USA
|
||
|
||
EMail: Ted.Lemon@nominum.com
|
||
|
||
Masataka Ohta
|
||
Graduate School of Information Science and Engineering
|
||
Tokyo Institute of Technology
|
||
2-12-1, O-okayama, Meguro-ku
|
||
Tokyo 152-8552
|
||
Japan
|
||
|
||
Phone: +81 3 5734 3299
|
||
Fax: +81 3 5734 3299
|
||
EMail: mohta@necom830.hpcl.titech.ac.jp
|
||
|
||
Soohong Daniel Park
|
||
Mobile Platform Laboratory, SAMSUNG Electronics
|
||
416, Maetan-3dong, Paldal-gu, Suwon
|
||
Gyeonggi-Do
|
||
Korea
|
||
|
||
Phone: +82 31 200 4508
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 24]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
EMail: soohong.park@samsung.com
|
||
|
||
Suresh Satapati
|
||
Cisco Systems, Inc.
|
||
San Jose, CA 95134
|
||
USA
|
||
|
||
EMail: satapati@cisco.com
|
||
|
||
Juha Wiljakka
|
||
Nokia
|
||
Visiokatu 3
|
||
FIN-33720 TAMPERE
|
||
Finland
|
||
|
||
Phone: +358 7180 48372
|
||
EMail: juha.wiljakka@nokia.com
|
||
|
||
12. Intellectual Property Statement
|
||
|
||
The IETF takes no position regarding the validity or scope of any
|
||
Intellectual Property Rights or other rights that might be claimed
|
||
to pertain to the implementation or use of the technology described
|
||
in this document or the extent to which any license under such
|
||
rights might or might not be available; nor does it represent that
|
||
it has made any independent effort to identify any such rights.
|
||
Information on the procedures with respect to rights in RFC
|
||
documents can be found in BCP 78 and BCP 79.
|
||
|
||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||
assurances of licenses to be made available, or the result of an
|
||
attempt made to obtain a general license or permission for the use
|
||
of such proprietary rights by implementers or users of this
|
||
specification can be obtained from the IETF on-line IPR repository
|
||
at http://www.ietf.org/ipr.
|
||
|
||
The IETF invites any interested party to bring to its attention any
|
||
copyrights, patents or patent applications, or other proprietary
|
||
rights that may cover technology that may be required to implement
|
||
this standard. Please address the information to the IETF at
|
||
ietf-ipr@ietf.org.
|
||
|
||
13. Full Copyright Statement
|
||
|
||
Copyright (C) The Internet Society (2005). This document is
|
||
subject to the rights, licenses and restrictions contained in BCP
|
||
78, and except as set forth therein, the authors retain all their
|
||
rights.
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 25]
|
||
|
||
Internet-Draft IPv6 Host Configuration of DNS Server February 2005
|
||
|
||
|
||
|
||
This document and the information contained herein are provided on
|
||
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
|
||
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND
|
||
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES,
|
||
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT
|
||
THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR
|
||
ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
|
||
PARTICULAR PURPOSE.
|
||
|
||
Acknowledgement
|
||
|
||
Funding for the RFC Editor function is currently provided by the
|
||
Internet Society.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Jeong, et al. Expires - August 2005 [Page 26]
|
||
|