<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-6man-ra-pref64-09" indexInclude="true" ipr="trust200902" number="8781" prepTime="2020-04-24T11:24:58" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="4" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-6man-ra-pref64-09" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8781" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title>Discovering PREF64 in Router Advertisements</title>
    <seriesInfo name="RFC" value="8781" stream="IETF"/>
    <author fullname="Lorenzo Colitti" initials="L." surname="Colitti">
      <organization showOnFrontPage="true">Google</organization>
      <address>
        <postal>
          <street>Shibuya 3-21-3</street>
          <city>Shibuya</city>
          <region>Tokyo</region>
          <code>150-0002</code>
          <country>Japan</country>
        </postal>
        <phone/>
        <email>lorenzo@google.com</email>
      </address>
    </author>
    <author fullname="Jen Linkova" initials="J." surname="Linkova">
      <organization showOnFrontPage="true">Google</organization>
      <address>
        <postal>
          <street>1 Darling Island Rd</street>
          <city>Pyrmont</city>
          <region>NSW</region>
          <code>2009</code>
          <country>Australia</country>
        </postal>
        <phone/>
        <email>furry@google.com</email>
      </address>
    </author>
    <date month="04" year="2020"/>
    <area>Internet</area>
    <workgroup>IPv6 Maintenance</workgroup>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">This document specifies a Neighbor Discovery option to be used in
      Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol
      Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8781" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-use-cases-for-communicating">Use Cases for Communicating the NAT64 Prefix to Hosts</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-why-include-the-nat64-prefi">Why Include the NAT64 Prefix in Router Advertisements?</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-option-format">Option Format</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-scaled-lifetime-processing">Scaled Lifetime Processing</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-usage-guidelines">Usage Guidelines</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-handling-multiple-nat64-pre">Handling Multiple NAT64 Prefixes</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-pref64-consistency">PREF64 Consistency</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">NAT64 <xref target="RFC6146" format="default" sectionFormat="of" derivedContent="RFC6146"/> with DNS Extensions
      for Network Address Translation from IPv6 clients to IPv4 servers (DNS64) <xref target="RFC6147" format="default" sectionFormat="of" derivedContent="RFC6147"/> is a widely deployed mechanism to
      provide IPv4 access on IPv6-only networks. In various scenarios, the
      host must be aware of the NAT64 prefix in use by the network. This
      document specifies a Neighbor Discovery <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> option to be used in Router Advertisements
      (RAs) to
      communicate NAT64 prefixes to hosts.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t pn="section-1.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.2">
        <name slugifiedName="name-terminology">Terminology</name>
        <dl newline="false" spacing="normal" pn="section-1.2-1">
          <dt pn="section-1.2-1.1">PREF64 (or NAT64 prefix):</dt>
          <dd pn="section-1.2-1.2">An IPv6 prefix used for IPv6 address
	  synthesis <xref target="RFC6146" format="default" sectionFormat="of" derivedContent="RFC6146"/>;
        </dd>
          <dt pn="section-1.2-1.3">NAT64:</dt>
          <dd pn="section-1.2-1.4">Network Address and Protocol Translation from IPv6 clients to
	  IPv4 servers <xref target="RFC6146" format="default" sectionFormat="of" derivedContent="RFC6146"/>;
        </dd>
          <dt pn="section-1.2-1.5">Router Advertisement (RA):</dt>
          <dd pn="section-1.2-1.6">A message used by IPv6 routers to
	  advertise their presence together
	  with various link and Internet parameters <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/>;
        </dd>
        </dl>
        <t pn="section-1.2-2">
	  DNS64: a mechanism for synthesizing AAAA records from A records
	  <xref target="RFC6147" format="default" sectionFormat="of" derivedContent="RFC6147"/>;
        </t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-use-cases-for-communicating">Use Cases for Communicating the NAT64 Prefix to Hosts</name>
      <t pn="section-2-1">
		On networks employing NAT64, it is useful for hosts to know the NAT64 prefix for several reasons, including the following:
      </t>
      <ul spacing="normal" bare="false" empty="false" pn="section-2-2">
        <li pn="section-2-2.1">
          <t pn="section-2-2.1.1">Enabling DNS64 functions on end hosts. In particular:
          </t>
          <ul spacing="normal" bare="false" empty="false" pn="section-2-2.1.2">
            <li pn="section-2-2.1.2.1">Local DNSSEC validation (DNS64 in stub-resolver mode). As
	    discussed in <xref target="RFC6147" sectionFormat="comma" section="2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6147#section-2" derivedContent="RFC6147"/>,
	    the stub resolver in the host "will try to obtain (real)
	    AAAA RRs,
	    and in case they are not available, the DNS64 function will
	    synthesize AAAA RRs for internal usage." Therefore, to perform the
	    DNS64 function, the stub resolver needs to know the NAT64
	    prefix. This is required in order to use DNSSEC on a NAT64
	    network.</li>
            <li pn="section-2-2.1.2.2">Trusted DNS server. AAAA synthesis is required for the host to
	    be able to use a DNS server not provided by the network (e.g., a
	    DNS-over-TLS <xref target="RFC7858" format="default" sectionFormat="of" derivedContent="RFC7858"/> or
	    DNS-over-HTTPS <xref target="RFC8484" format="default" sectionFormat="of" derivedContent="RFC8484"/> server
	    with which the host has an existing trust relationship).</li>
            <li pn="section-2-2.1.2.3">Networks with no DNS64 server. Hosts that support AAAA
	    synthesis and are aware of the NAT64 prefix in use do not need the
	    network to perform the DNS64 function at all.</li>
          </ul>
        </li>
        <li pn="section-2-2.2">
          <t pn="section-2-2.2.1"> Enabling NAT64 address-translation functions on end hosts. For example:
          </t>
          <ul spacing="normal" bare="false" empty="false" pn="section-2-2.2.2">
            <li pn="section-2-2.2.2.1">IPv4 address literals on an IPv6-only host. As described in
	    <xref target="RFC8305" sectionFormat="comma" section="7.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8305#section-7.1" derivedContent="RFC8305"/>, IPv6-only
	    hosts connecting to IPv4 address literals can translate the IPv4
	    literal to an IPv6 literal.</li>
            <li pn="section-2-2.2.2.2">464XLAT <xref target="RFC6877" format="default" sectionFormat="of" derivedContent="RFC6877"/>. 464XLAT
	    requires the host be aware of the NAT64 prefix.</li>
          </ul>
        </li>
      </ul>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-why-include-the-nat64-prefi">Why Include the NAT64 Prefix in Router Advertisements?</name>
      <dl newline="false" spacing="normal" pn="section-3-1">
        <dt pn="section-3-1.1">Fate sharing:</dt>
        <dd pn="section-3-1.2">NAT64 requires routing to be configured. IPv6 routing
      configuration requires receiving an IPv6 RA <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/>. Therefore, using RAs to provide hosts with the NAT64 prefix ensures that NAT64
      reachability information shares the fate of the rest of the network
      configuration on the host.</dd>
        <dt pn="section-3-1.3">Atomic configuration:</dt>
        <dd pn="section-3-1.4">Including the NAT64 prefix in the RA minimizes the number of packets required to configure a
      host. Only one packet (an RA) is required to complete
      the network configuration. This speeds up the process of connecting to a
      network that supports NAT64/DNS64. It also simplifies host implementation by
      removing the possibility that the host can have an incomplete
      Layer 3
      configuration (e.g., IPv6 addresses and prefixes, but no NAT64
      prefix).</dd>
        <dt pn="section-3-1.5">Updatability:</dt>
        <dd pn="section-3-1.6">It is possible to change the NAT64 prefix at any time,
      because when it changes, it is possible to notify hosts by sending a new
      RA.</dd>
        <dt pn="section-3-1.7">Deployability:</dt>
        <dd pn="section-3-1.8">All IPv6 hosts and networks are required to support
      Neighbor Discovery <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> so just a
      minor extension to the existing implementation is required. Other
      options, such as <xref target="RFC7225" format="default" sectionFormat="of" derivedContent="RFC7225"/>, require
      implementing other protocols (e.g., Port Control Protocol (PCP) <xref target="RFC7225" format="default" sectionFormat="of" derivedContent="RFC7225"/>), which could be considered an obstacle for
      deployment.</dd>
      </dl>
    </section>
    <section anchor="Format" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-option-format">Option Format</name>
      <figure anchor="fig_Option" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-nat64-prefix-option-format">NAT64 Prefix Option Format</name>
        <artwork align="center" name="" type="" alt="" pn="section-4-1.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |    Length     |     Scaled Lifetime     | PLC |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|              Highest 96 bits of the Prefix                    |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
      </figure>
      <t pn="section-4-2">Fields:</t>
      <dl newline="false" spacing="normal" pn="section-4-3">
        <dt pn="section-4-3.1">Type:</dt>
        <dd pn="section-4-3.2">8-bit identifier of the PREF64 option
	    type (38)</dd>
        <dt pn="section-4-3.3">Length:</dt>
        <dd pn="section-4-3.4">8-bit unsigned integer.  The length of the
	    option (including the Type and Length fields) is in units of 8
	    octets. The sender <bcp14>MUST</bcp14> set the length to 2.  The
	    receiver <bcp14>MUST</bcp14> ignore the PREF64 option if the
	    Length field value is not 2.</dd>
        <dt pn="section-4-3.5">Scaled Lifetime:</dt>
        <dd pn="section-4-3.6">13-bit unsigned integer. The maximum time in
	    units of 8 seconds over which this NAT64 prefix <bcp14>MAY</bcp14>
	    be used. See <xref target="lifetime" format="default" sectionFormat="of" derivedContent="Section 4.1"/> for the
	    Scaled Lifetime field processing rules.</dd>
        <dt pn="section-4-3.7">PLC (Prefix Length Code):</dt>
        <dd pn="section-4-3.8">3-bit unsigned integer. This field encodes the
	    NAT64 Prefix Length defined in <xref target="RFC6052" format="default" sectionFormat="of" derivedContent="RFC6052"/>. The PLC field values 0, 1, 2, 3, 4, and 5
	    indicate the NAT64 prefix length of 96, 64, 56, 48, 40, and 32 bits,
	    respectively. The receiver <bcp14>MUST</bcp14> ignore the PREF64
	    option if the Prefix Length Code field is not set to one of those
	    values.</dd>
        <dt pn="section-4-3.9">Highest 96 bits of the Prefix:</dt>
        <dd pn="section-4-3.10">96-bit unsigned integer. Contains bits 0 - 95 of the NAT64 prefix.</dd>
      </dl>
      <section anchor="lifetime" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-scaled-lifetime-processing">Scaled Lifetime Processing</name>
        <t pn="section-4.1-1">
	  It would be highly undesirable for the NAT64 prefix to
	  have a lifetime shorter than the Router Lifetime, which
	  is defined in <xref target="RFC4861" sectionFormat="of" section="4.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4861#section-4.2" derivedContent="RFC4861"/> as a 16-bit unsigned integer.
	  If the NAT64 prefix lifetime is not at least equal to
	  the default Router Lifetime, it might lead to scenarios
	  in which the NAT64 prefix lifetime expires before the
	  arrival of the next unsolicited RA. Therefore, the
	  Scaled Lifetime encodes the NAT64 prefix lifetime in
	  units of 8 seconds. The receiver <bcp14>MUST</bcp14>
	  multiply the Scaled Lifetime value by 8 (for example,
	  by a logical left shift) to calculate the maximum time in
	  seconds the prefix <bcp14>MAY</bcp14> be used.
	  The maximum lifetime of the NAT64 prefix is thus 65528
	  seconds.

	  
	  To ensure that the NAT64 prefix does not expire before the default
	  router, it is <bcp14>NOT RECOMMENDED</bcp14>
	  to configure default Router Lifetimes greater than 65528
	  seconds when using this option.
	  A lifetime of 0 indicates that the prefix <bcp14>SHOULD NOT</bcp14> be used anymore.
        </t>
        <t pn="section-4.1-2">
	  By default, the value of the Scaled Lifetime field <bcp14>SHOULD</bcp14> be set
	  to the lesser of 3 x MaxRtrAdvInterval <xref target="RFC4861" format="default" sectionFormat="of" derivedContent="RFC4861"/> divided by 8, or 8191.
        </t>
        <t pn="section-4.1-3">
	  Router vendors <bcp14>SHOULD</bcp14> allow administrators to specify
	  nonzero lifetime values that are not divisible by 8. 
	  In such cases, the router <bcp14>SHOULD</bcp14> round the provided
	  value up to the nearest integer that is divisible by 8 and smaller
	  than 65536, then divide the result by 8 (or perform a logical
	  right shift by 3) and set the Scaled Lifetime field to the
	  resulting value. 
	  If a nonzero lifetime value that is to be divided by 8 (or
	  subjected to a logical right shift by 3) is less than 8, then the
	  Scaled Lifetime field <bcp14>SHOULD</bcp14> be set to 1.
	  This last step ensures that lifetimes under 8 seconds are encoded as
	  a nonzero Scaled Lifetime.
        </t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-usage-guidelines">Usage Guidelines</name>
      <t pn="section-5-1">This option specifies exactly one NAT64 prefix for all IPv4
      destinations. If the network operator wants to route different parts
      of the IPv4 address space to different NAT64 devices, this can be
      accomplished by routing more specific subprefixes of the NAT64 prefix
      to those devices.
      For example, suppose an operator is using the <xref target="RFC1918" format="default" sectionFormat="of" derivedContent="RFC1918"/> address space 10.0.0.0/8 internally.
      That operator might want to route 10.0.0.0/8 through NAT64 device A, and
      the rest of the IPv4 space through NAT64 device B.
      If the operator's NAT64 prefix is 2001:db8:a:b::/96, then the operator
      can route 2001:db8:a:b::a00:0/104 to NAT64 A and 2001:db8:a:b::/96 to
      NAT64 B.
      </t>
      <t pn="section-5-2">This option may appear more than once in an RA
      (e.g., when gracefully renumbering the network from one NAT64 prefix
      to another). Host behavior with regard to synthesizing IPv6 addresses
      from IPv4 addresses <bcp14>SHOULD</bcp14> follow the recommendations
      given in <xref target="RFC7050" sectionFormat="of" section="3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7050#section-3" derivedContent="RFC7050"/>, limited
      to the NAT64 prefixes that have a nonzero lifetime.</t>
      <t pn="section-5-3">In a network (or a provisioning domain) that provides both IPv4 and
      NAT64, it may be desirable for certain IPv4 addresses not to be
      translated. An example might be private address ranges that are local to
      the network/provisioning domain and that should not be reached through the
      NAT64. This type of configuration cannot be conveyed to hosts using this
      option, or through other NAT64 prefix provisioning mechanisms such as
      <xref target="RFC7050" format="default" sectionFormat="of" derivedContent="RFC7050"/> or <xref target="RFC7225" format="default" sectionFormat="of" derivedContent="RFC7225"/>. This problem does not apply in IPv6-only
      networks: the host in an IPv6-only network does not have an IPv4 address and
      cannot reach any IPv4 destinations without the NAT64.
      

</t>
      <section anchor="mult_src" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-handling-multiple-nat64-pre">Handling Multiple NAT64 Prefixes</name>
        <t pn="section-5.1-1">
	  In some cases, a host may receive multiple NAT64 prefixes from
	  different sources. Possible scenarios include (but are not limited
	  to):
        </t>
        <ul spacing="normal" bare="false" empty="false" pn="section-5.1-2">
          <li pn="section-5.1-2.1"> the host is using multiple mechanisms to discover PREF64
	  prefixes (e.g., by using PCP <xref target="RFC7225" format="default" sectionFormat="of" derivedContent="RFC7225"/>) and/or resolving an IPv4-only fully qualified
	  domain name <xref target="RFC7050" format="default" sectionFormat="of" derivedContent="RFC7050"/> in addition to
	  receiving the PREF64 RA option);</li>
          <li pn="section-5.1-2.2"> the PREF64 option presents in a single RA more than once;</li>
          <li pn="section-5.1-2.3"> the host receives multiple RAs with different PREF64 prefixes
	  on a given interface.</li>
        </ul>
        <t pn="section-5.1-3">When multiple PREF64s are discovered via the RA PREF64 Option (either the
	Option presents more than once in a single RA or multiple RAs are
	received), host behavior with regard to synthesizing IPv6 addresses
	from IPv4 addresses <bcp14>SHOULD</bcp14> follow the recommendations
	given in <xref target="RFC7050" section="3" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7050#section-3" derivedContent="RFC7050"/>,
	limited to the NAT64 prefixes that have a nonzero lifetime.</t>
        <t pn="section-5.1-4">
	  When different PREF64s are discovered using multiple mechanisms,
	  hosts <bcp14>SHOULD</bcp14> select one source of information
	  only. The <bcp14>RECOMMENDED</bcp14> order is:
        </t>
        <ul spacing="normal" bare="false" empty="false" pn="section-5.1-5">
          <li pn="section-5.1-5.1">PCP-discovered prefixes <xref target="RFC7225" format="default" sectionFormat="of" derivedContent="RFC7225"/>, if supported;</li>
          <li pn="section-5.1-5.2">PREF64s discovered via the RA Option;</li>
          <li pn="section-5.1-5.3">PREF64s resolving an  IPv4-only fully qualified domain name <xref target="RFC7050" format="default" sectionFormat="of" derivedContent="RFC7050"/> </li>
        </ul>
        <t pn="section-5.1-6">Note: If the network provides PREF64s via both this RA Option
	and <xref target="RFC7225" format="default" sectionFormat="of" derivedContent="RFC7225"/>, hosts that receive the
	PREF64 via the RA Option may choose to use it immediately (before waiting
	for the PCP to complete); therefore, some traffic may not reflect any
	more detailed configuration provided by the PCP.</t>
        <t pn="section-5.1-7">
	    The host <bcp14>SHOULD</bcp14> treat the PREF64 as being specific
	    to the network interface it was received on. Hosts that are aware
	    of Provisioning Domain (PvD, <xref target="RFC7556" format="default" sectionFormat="of" derivedContent="RFC7556"/>)
	    <bcp14>MUST</bcp14> treat the PREF64 as being scoped to the
	    implicit or explicit PvD.
        </t>
      </section>
      <section anchor="cons" numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-pref64-consistency">PREF64 Consistency</name>
        <t pn="section-5.2-1">
	    <xref target="RFC4861" sectionFormat="of" section="6.2.7" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4861#section-6.2.7" derivedContent="RFC4861"/>
	    recommends that routers inspect RAs sent by other routers to
	    ensure that all routers onlink advertise consistent
	    information. Routers <bcp14>SHOULD</bcp14> inspect valid PREF64
	    options received on a given link and verify the
	    consistency. Detected inconsistencies indicate that one or more
	    routers might be misconfigured. Routers <bcp14>SHOULD</bcp14> log
	    such cases to system or network management. Routers
	    <bcp14>SHOULD</bcp14> check and compare the following information:
        </t>
        <ul spacing="normal" bare="false" empty="false" pn="section-5.2-2">
          <li pn="section-5.2-2.1">set of PREF64s with a nonzero lifetime;</li>
          <li pn="section-5.2-2.2">set of PREF64s with a zero lifetime.</li>
        </ul>
        <t pn="section-5.2-3">
Routers that are aware of PvD (<xref target="RFC7556" format="default" sectionFormat="of" derivedContent="RFC7556"/>) <bcp14>MUST</bcp14> only compare information scoped to the
same
implicit or explicit PvD.
</t>
      </section>
    </section>
    <section anchor="IANA-con" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t pn="section-6-1">IANA has assigned a new IPv6 Neighbor Discovery Option
      type for the PREF64 option defined in this document in the
      "IPv6 Neighbor Discovery Option Formats" registry <xref target="IANA" format="default" sectionFormat="of" derivedContent="IANA"/>.</t>
      <table anchor="option_table" align="center" pn="table-1">
        <name slugifiedName="name-new-iana-registry-assignmen">New IANA Registry Assignment</name>
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Description</th>
            <th align="left" colspan="1" rowspan="1">Type</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">PREF64 option</td>
            <td align="left" colspan="1" rowspan="1">38</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-7-1">Because RAs are required in all IPv6 configuration
      scenarios, on IPv6-only networks, RAs must already be
      secured -- e.g., by deploying an RA-Guard <xref target="RFC6105" format="default" sectionFormat="of" derivedContent="RFC6105"/>. Providing all configuration in RAs
      reduces the attack surface to be targeted by malicious attackers trying to
      provide hosts with invalid configuration, as compared to distributing the
      configuration through multiple different mechanisms that need to be
      secured independently.</t>
      <t pn="section-7-2">
If a host is provided with an incorrect NAT64 prefix, the IPv6-only host might
not be able to communicate with IPv4-only destinations.
Connectivity to destinations reachable over IPv6 would not be impacted just by
providing a host with an incorrect prefix; however, if attackers are capable
of sending rogue RAs, they can perform denial-of-service or man-in-the-middle
attacks, as described in <xref target="RFC6104" format="default" sectionFormat="of" derivedContent="RFC6104"/>.
      </t>
      <t pn="section-7-3">The security measures that must already be in place to ensure that
      RAs are only received from legitimate sources
      eliminate the problem of NAT64 prefix validation described in <xref target="RFC7050" sectionFormat="of" section="3.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7050#section-3.1" derivedContent="RFC7050"/>.</t>
    </section>
  </middle>
  <back>
    <references pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="IANA" target="https://www.iana.org/assignments/icmpv6-parameters" quoteTitle="true" derivedAnchor="IANA">
          <front>
            <title>Internet Control Message Protocol version 6 (ICMPv6) Parameters</title>
            <author>
              <organization showOnFrontPage="true">IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4861" target="https://www.rfc-editor.org/info/rfc4861" quoteTitle="true" derivedAnchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Simpson" fullname="W. Simpson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Soliman" fullname="H. Soliman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="September"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6.  IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC6052" target="https://www.rfc-editor.org/info/rfc6052" quoteTitle="true" derivedAnchor="RFC6052">
          <front>
            <title>IPv6 Addressing of IPv4/IPv6 Translators</title>
            <author initials="C." surname="Bao" fullname="C. Bao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Huitema" fullname="C. Huitema">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="X." surname="Li" fullname="X. Li">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="October"/>
            <abstract>
              <t>This document discusses the algorithmic translation of an IPv6 address to a corresponding IPv4 address, and vice versa, using only statically configured information.  It defines a well-known prefix for use in algorithmic translations, while allowing organizations to also use network-specific prefixes when appropriate.  Algorithmic translation is used in IPv4/IPv6 translators, as well as other types of proxies and gateways (e.g., for DNS) used in IPv4/IPv6 scenarios. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6052"/>
          <seriesInfo name="DOI" value="10.17487/RFC6052"/>
        </reference>
        <reference anchor="RFC7050" target="https://www.rfc-editor.org/info/rfc7050" quoteTitle="true" derivedAnchor="RFC7050">
          <front>
            <title>Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis</title>
            <author initials="T." surname="Savolainen" fullname="T. Savolainen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Korhonen" fullname="J. Korhonen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Wing" fullname="D. Wing">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="November"/>
            <abstract>
              <t>This document describes a method for detecting the presence of DNS64 and for learning the IPv6 prefix used for protocol translation on an access network.  The method depends on the existence of a well-known IPv4-only fully qualified domain name "ipv4only.arpa.".  The information learned enables nodes to perform local IPv6 address synthesis and to potentially avoid NAT64 on dual-stack and multi-interface deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7050"/>
          <seriesInfo name="DOI" value="10.17487/RFC7050"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC1918" target="https://www.rfc-editor.org/info/rfc1918" quoteTitle="true" derivedAnchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author initials="Y." surname="Rekhter" fullname="Y. Rekhter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Moskowitz" fullname="B. Moskowitz">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Karrenberg" fullname="D. Karrenberg">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G. J." surname="de Groot" fullname="G. J. de Groot">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Lear" fullname="E. Lear">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1996" month="February"/>
            <abstract>
              <t>This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC6104" target="https://www.rfc-editor.org/info/rfc6104" quoteTitle="true" derivedAnchor="RFC6104">
          <front>
            <title>Rogue IPv6 Router Advertisement Problem Statement</title>
            <author initials="T." surname="Chown" fullname="T. Chown">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Venaas" fullname="S. Venaas">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="February"/>
            <abstract>
              <t>When deploying IPv6, whether IPv6-only or dual-stack, routers are configured to send IPv6 Router Advertisements (RAs) to convey information to nodes that enable them to autoconfigure on the network.  This information includes the implied default router address taken from the observed source address of the RA message, as well as on-link prefix information.  However, unintended misconfigurations by users or administrators, or possibly malicious attacks on the network, may lead to bogus RAs being present, which in turn can cause operational problems for hosts on the network.  In this document, we summarise the scenarios in which rogue RAs may be observed and present a list of possible solutions to the problem.  We focus on the unintended causes of rogue RAs in the text.  The goal of this text is to be Informational, and as such to present a framework around which solutions can be proposed and discussed.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6104"/>
          <seriesInfo name="DOI" value="10.17487/RFC6104"/>
        </reference>
        <reference anchor="RFC6105" target="https://www.rfc-editor.org/info/rfc6105" quoteTitle="true" derivedAnchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author initials="E." surname="Levy-Abegnoli" fullname="E. Levy-Abegnoli">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Van de Velde" fullname="G. Van de Velde">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Popoviciu" fullname="C. Popoviciu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Mohacsi" fullname="J. Mohacsi">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="February"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks.  The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy.  This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC6146" target="https://www.rfc-editor.org/info/rfc6146" quoteTitle="true" derivedAnchor="RFC6146">
          <front>
            <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Matthews" fullname="P. Matthews">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="van Beijnum" fullname="I. van Beijnum">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="April"/>
          </front>
          <seriesInfo name="RFC" value="6146"/>
          <seriesInfo name="DOI" value="10.17487/RFC6146"/>
        </reference>
        <reference anchor="RFC6147" target="https://www.rfc-editor.org/info/rfc6147" quoteTitle="true" derivedAnchor="RFC6147">
          <front>
            <title>DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers</title>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Sullivan" fullname="A. Sullivan">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Matthews" fullname="P. Matthews">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="van Beijnum" fullname="I. van Beijnum">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="April"/>
            <abstract>
              <t>DNS64 is a mechanism for synthesizing AAAA records from A records. DNS64 is used with an IPv6/IPv4 translator to enable client-server communication between an IPv6-only client and an IPv4-only server, without requiring any changes to either the IPv6 or the IPv4 node, for the class of applications that work through NATs.  This document specifies DNS64, and provides suggestions on how it should be deployed in conjunction with IPv6/IPv4 translators.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6147"/>
          <seriesInfo name="DOI" value="10.17487/RFC6147"/>
        </reference>
        <reference anchor="RFC6877" target="https://www.rfc-editor.org/info/rfc6877" quoteTitle="true" derivedAnchor="RFC6877">
          <front>
            <title>464XLAT: Combination of Stateful and Stateless Translation</title>
            <author initials="M." surname="Mawatari" fullname="M. Mawatari">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Kawashima" fullname="M. Kawashima">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Byrne" fullname="C. Byrne">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="April"/>
            <abstract>
              <t>This document describes an architecture (464XLAT) for providing limited IPv4 connectivity across an IPv6-only network by combining existing and well-known stateful protocol translation (as described in RFC 6146) in the core and stateless protocol translation (as described in RFC 6145) at the edge. 464XLAT is a simple and scalable technique to quickly deploy limited IPv4 access service to IPv6-only edge networks without encapsulation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6877"/>
          <seriesInfo name="DOI" value="10.17487/RFC6877"/>
        </reference>
        <reference anchor="RFC7225" target="https://www.rfc-editor.org/info/rfc7225" quoteTitle="true" derivedAnchor="RFC7225">
          <front>
            <title>Discovering NAT64 IPv6 Prefixes Using the Port Control Protocol (PCP)</title>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="May"/>
            <abstract>
              <t>This document defines a new Port Control Protocol (PCP) option to learn the IPv6 prefix(es) used by a PCP-controlled NAT64 device to build IPv4-converted IPv6 addresses.  This option is needed for successful communications when IPv4 addresses are used in referrals.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7225"/>
          <seriesInfo name="DOI" value="10.17487/RFC7225"/>
        </reference>
        <reference anchor="RFC7556" target="https://www.rfc-editor.org/info/rfc7556" quoteTitle="true" derivedAnchor="RFC7556">
          <front>
            <title>Multiple Provisioning Domain Architecture</title>
            <author initials="D." surname="Anipko" fullname="D. Anipko" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="June"/>
            <abstract>
              <t>This document is a product of the work of the Multiple Interfaces Architecture Design team.  It outlines a solution framework for some of the issues experienced by nodes that can be attached to multiple networks simultaneously.  The framework defines the concept of a Provisioning Domain (PvD), which is a consistent set of network configuration information.  PvD-aware nodes learn PvD-specific information from the networks they are attached to and/or other sources.  PvDs are used to enable separation and configuration consistency in the presence of multiple concurrent connections.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7556"/>
          <seriesInfo name="DOI" value="10.17487/RFC7556"/>
        </reference>
        <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858" quoteTitle="true" derivedAnchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author initials="Z." surname="Hu" fullname="Z. Hu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Zhu" fullname="L. Zhu">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Heidemann" fullname="J. Heidemann">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Mankin" fullname="A. Mankin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Wessels" fullname="D. Wessels">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="May"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8305" target="https://www.rfc-editor.org/info/rfc8305" quoteTitle="true" derivedAnchor="RFC8305">
          <front>
            <title>Happy Eyeballs Version 2: Better Connectivity Using Concurrency</title>
            <author initials="D." surname="Schinazi" fullname="D. Schinazi">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Pauly" fullname="T. Pauly">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="December"/>
            <abstract>
              <t>Many communication protocols operating over the modern Internet use hostnames.  These often resolve to multiple IP addresses, each of which may have different performance and connectivity characteristics.  Since specific addresses or address families (IPv4 or IPv6) may be blocked, broken, or sub-optimal on a network, clients that attempt multiple connections in parallel have a chance of establishing a connection more quickly.  This document specifies requirements for algorithms that reduce this user-visible delay and provides an example algorithm, referred to as "Happy Eyeballs".  This document obsoletes the original algorithm description in RFC 6555.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8305"/>
          <seriesInfo name="DOI" value="10.17487/RFC8305"/>
        </reference>
        <reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484" quoteTitle="true" derivedAnchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="McManus" fullname="P. McManus">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="October"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
      </references>
    </references>
    <section anchor="Acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t pn="section-appendix.a-1">
	Thanks to the following people (in alphabetical order) for their review and feedback:
	<contact fullname="Mikael Abrahamsson"/>, <contact fullname="Mark Andrews"/>, <contact fullname="Brian E Carpenter"/>, <contact fullname="David Farmer"/>,
	<contact fullname="Nick Heatley"/>, <contact fullname="Robert Hinden"/>, <contact fullname="Martin Hunek"/>, <contact fullname="Tatuya Jinmei"/>, <contact fullname="Benjamin  Kaduk"/>, <contact fullname="Erik Kline"/>, <contact fullname="Suresh Krishnan"/>, <contact fullname="Warren Kumari"/>, <contact fullname="David Lamparter"/>,
	<contact fullname="Barry Leiba"/>, <contact fullname="Jordi Palet Martinez"/>, <contact fullname="Tommy Pauly"/>, <contact fullname="Alexandre Petrescu"/>,
	<contact fullname="Michael Richardson"/>, <contact fullname="David Schinazi"/>, <contact fullname="Ole Troan"/>, <contact fullname="Eric Vynke"/>, <contact fullname="Bernie  Volz"/>.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Lorenzo Colitti" initials="L." surname="Colitti">
        <organization showOnFrontPage="true">Google</organization>
        <address>
          <postal>
            <street>Shibuya 3-21-3</street>
            <city>Shibuya</city>
            <region>Tokyo</region>
            <code>150-0002</code>
            <country>Japan</country>
          </postal>
          <phone/>
          <email>lorenzo@google.com</email>
        </address>
      </author>
      <author fullname="Jen Linkova" initials="J." surname="Linkova">
        <organization showOnFrontPage="true">Google</organization>
        <address>
          <postal>
            <street>1 Darling Island Rd</street>
            <city>Pyrmont</city>
            <region>NSW</region>
            <code>2009</code>
            <country>Australia</country>
          </postal>
          <phone/>
          <email>furry@google.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
