Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Sometimes I have doubts.

Sometimes I have doubts.

Scheduled Pinned Locked Moved Uncategorized
21 Posts 5 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • kasperd@westergaard.socialK kasperd@westergaard.social

    Yeah, ipv4only.arpa exists on authoritative DNS servers and is served essentially like a name would have been served from any other TLD. As far as I recall there is an RFC recommending that DNS recursors hard-code that particular name in order to not need depend on authoritative DNS for that name. But last I checked BIND 9 would query authoritative servers for the name.

    DNS64 can work just fine without special casing ipv4only.arpa. It can just translate it like any other IPv4-only domain name, and clients can use that for discovery.

    I can definitely confirm that Android supports ipv4only.arpa for NAT64 discovery by default. It might support other methods as well, and I haven't verified which order it will try the methods on a network that supports different methods. None of the NAT64 deployments I have personally encountered used the well-known prefix. So I think falling back to the well-known prefix isn't a great option.

    As an operator of public NAT64 gateways I will say that using ipv4only.arpa for NAT64 discovery is not perfect, but all the alternatives I have seen are worse. An inherent drawback of ipv4only.arpa is that it cannot handle scenarios where different NAT64 prefixes are being used depending on IPv4 range. That part is supported when DNS64 is being used.

    Another drawback is more of an implementation shortcoming. 464-xlat implementations usually don't support use of multiple NAT64 prefixes for redundancy and will rather just pick one and stick with it. And it's not guaranteed that a client will pick up changes of prefix in a timely fashion.

    So if a NAT64 gateway goes down for maintenance it may be necessary for 464-xlat users to disconnect and reconnect in order to switch to a different prefix. Use of PREF64 is worse for that use case. Users actually have to change their router configuration in order to apply the changes. There appears to exist no standardized mechanism for a public NAT64 service to communicate prefix changes to routers of users.

    In theory a router could make use of ipv4only.arpa to do NAT64 prefix discovery and communicate this downstream using PREF64. But I haven't heard of any implementation doing this, and I don't see any advantage of this over the client doing discovery directly using ipv4only.arpa.

    goetz@chaos.socialG This user is from outside of this forum
    goetz@chaos.socialG This user is from outside of this forum
    goetz@chaos.social
    wrote last edited by
    #5

    @kasperd @tschaefer @camille

    Could you please send this observation to the mailinglist?

    kasperd@westergaard.socialK 1 Reply Last reply
    0
    • kasperd@westergaard.socialK kasperd@westergaard.social

      Yeah, ipv4only.arpa exists on authoritative DNS servers and is served essentially like a name would have been served from any other TLD. As far as I recall there is an RFC recommending that DNS recursors hard-code that particular name in order to not need depend on authoritative DNS for that name. But last I checked BIND 9 would query authoritative servers for the name.

      DNS64 can work just fine without special casing ipv4only.arpa. It can just translate it like any other IPv4-only domain name, and clients can use that for discovery.

      I can definitely confirm that Android supports ipv4only.arpa for NAT64 discovery by default. It might support other methods as well, and I haven't verified which order it will try the methods on a network that supports different methods. None of the NAT64 deployments I have personally encountered used the well-known prefix. So I think falling back to the well-known prefix isn't a great option.

      As an operator of public NAT64 gateways I will say that using ipv4only.arpa for NAT64 discovery is not perfect, but all the alternatives I have seen are worse. An inherent drawback of ipv4only.arpa is that it cannot handle scenarios where different NAT64 prefixes are being used depending on IPv4 range. That part is supported when DNS64 is being used.

      Another drawback is more of an implementation shortcoming. 464-xlat implementations usually don't support use of multiple NAT64 prefixes for redundancy and will rather just pick one and stick with it. And it's not guaranteed that a client will pick up changes of prefix in a timely fashion.

      So if a NAT64 gateway goes down for maintenance it may be necessary for 464-xlat users to disconnect and reconnect in order to switch to a different prefix. Use of PREF64 is worse for that use case. Users actually have to change their router configuration in order to apply the changes. There appears to exist no standardized mechanism for a public NAT64 service to communicate prefix changes to routers of users.

      In theory a router could make use of ipv4only.arpa to do NAT64 prefix discovery and communicate this downstream using PREF64. But I haven't heard of any implementation doing this, and I don't see any advantage of this over the client doing discovery directly using ipv4only.arpa.

      tschaefer@ipv6.socialT This user is from outside of this forum
      tschaefer@ipv6.socialT This user is from outside of this forum
      tschaefer@ipv6.social
      wrote last edited by
      #6

      @kasperd @camille

      Thanks.
      But about the maintenance/disruption of NAT64 GW service: I would expect a rerouting or useful failover on the network/server side, never a change of the prefix! It would need to be changed by DNS64 too.

      tschaefer@ipv6.socialT kasperd@westergaard.socialK 2 Replies Last reply
      0
      • tschaefer@ipv6.socialT tschaefer@ipv6.social

        @kasperd @camille

        Thanks.
        But about the maintenance/disruption of NAT64 GW service: I would expect a rerouting or useful failover on the network/server side, never a change of the prefix! It would need to be changed by DNS64 too.

        tschaefer@ipv6.socialT This user is from outside of this forum
        tschaefer@ipv6.socialT This user is from outside of this forum
        tschaefer@ipv6.social
        wrote last edited by
        #7

        @kasperd @camille

        The other problem of using more than one clat interface is a rare edge case in my opinion.
        Even my smartphone switches well from IPv6 only mobile network to IPv6 only WiFi and vice versa.
        Only the windows preview doesn't refresh CLAT when changing from one IPv6 only network to another.
        But the windows preview isn't suitable for everyday use anyway yet.

        1 Reply Last reply
        0
        • tschaefer@ipv6.socialT tschaefer@ipv6.social

          @kasperd @camille

          Thanks.
          But about the maintenance/disruption of NAT64 GW service: I would expect a rerouting or useful failover on the network/server side, never a change of the prefix! It would need to be changed by DNS64 too.

          kasperd@westergaard.socialK This user is from outside of this forum
          kasperd@westergaard.socialK This user is from outside of this forum
          kasperd@westergaard.social
          wrote last edited by
          #8

          I assume you never operated a public NAT64 service. There are networks between the NAT64 gateway and the client which are completely outside of my control. But I can achieve high availability by running multiple NAT64 gateways in independent locations.

          I have health checks of the gateways which automatically updates DNS64 accordingly. And I give clients addresses using multiple prefixes to allow for client-side failover. Client-side failover is crucial as sometimes individual clients are unable to reach specific gateways for reasons that are on networks that I don't use myself and thus outside the visibility of my health checks.

          A client with a good implementation of fallback between AAAA records works great in this scenario. 464-xlat doesn't handle this as well.

          tschaefer@ipv6.socialT 1 Reply Last reply
          0
          • goetz@chaos.socialG goetz@chaos.social

            @kasperd @tschaefer @camille

            Could you please send this observation to the mailinglist?

            kasperd@westergaard.socialK This user is from outside of this forum
            kasperd@westergaard.socialK This user is from outside of this forum
            kasperd@westergaard.social
            wrote last edited by
            #9

            I have done so in the past, but their mailing list software is not letting my mails through.

            goetz@chaos.socialG 1 Reply Last reply
            0
            • kasperd@westergaard.socialK kasperd@westergaard.social

              I assume you never operated a public NAT64 service. There are networks between the NAT64 gateway and the client which are completely outside of my control. But I can achieve high availability by running multiple NAT64 gateways in independent locations.

              I have health checks of the gateways which automatically updates DNS64 accordingly. And I give clients addresses using multiple prefixes to allow for client-side failover. Client-side failover is crucial as sometimes individual clients are unable to reach specific gateways for reasons that are on networks that I don't use myself and thus outside the visibility of my health checks.

              A client with a good implementation of fallback between AAAA records works great in this scenario. 464-xlat doesn't handle this as well.

              tschaefer@ipv6.socialT This user is from outside of this forum
              tschaefer@ipv6.socialT This user is from outside of this forum
              tschaefer@ipv6.social
              wrote last edited by
              #10

              @kasperd

              You are right. I never operated public NAT64 services. (and I don't use yours, because they weren't not reliable for me in the past - sorry to say that).

              But beside the fact of your engagement - from the Telekom (the gateway I use all the time, not public) I don't expect changing prefixes, I expect more or less good monitored reliability.

              tschaefer@ipv6.socialT 1 Reply Last reply
              0
              • tschaefer@ipv6.socialT tschaefer@ipv6.social

                @kasperd

                You are right. I never operated public NAT64 services. (and I don't use yours, because they weren't not reliable for me in the past - sorry to say that).

                But beside the fact of your engagement - from the Telekom (the gateway I use all the time, not public) I don't expect changing prefixes, I expect more or less good monitored reliability.

                tschaefer@ipv6.socialT This user is from outside of this forum
                tschaefer@ipv6.socialT This user is from outside of this forum
                tschaefer@ipv6.social
                wrote last edited by
                #11

                @kasperd

                My employers network has also only one gateway as far as i know. (of course he maintains it, but probably the interrupts are so short, nobody notices it)

                tschaefer@ipv6.socialT 1 Reply Last reply
                0
                • tschaefer@ipv6.socialT tschaefer@ipv6.social

                  @kasperd

                  My employers network has also only one gateway as far as i know. (of course he maintains it, but probably the interrupts are so short, nobody notices it)

                  tschaefer@ipv6.socialT This user is from outside of this forum
                  tschaefer@ipv6.socialT This user is from outside of this forum
                  tschaefer@ipv6.social
                  wrote last edited by
                  #12

                  @kasperd

                  To introduce more complexity at client side is not the right way, I think.

                  Anyway, It is a transition technology - not planned to stay for ever.

                  kasperd@westergaard.socialK 1 Reply Last reply
                  0
                  • tschaefer@ipv6.socialT tschaefer@ipv6.social

                    @kasperd

                    To introduce more complexity at client side is not the right way, I think.

                    Anyway, It is a transition technology - not planned to stay for ever.

                    kasperd@westergaard.socialK This user is from outside of this forum
                    kasperd@westergaard.socialK This user is from outside of this forum
                    kasperd@westergaard.social
                    wrote last edited by
                    #13

                    Client side failover is a necessity if you want reliability. Even when IPv4 is long gone, I predict the failover code is here to stay. The failover code may even get a little bit more sophisticated.

                    If we want to minimize client side complexity during the transition, then DNS64 is the way to go. Dual-stack and 464xlat both add complexity on the client side, which you can avoid when using DNS64.

                    I agree transition technologies should not stay forever. Had people been upgrading in due time, we would never have needed DNS64 and NAT64 in the first place.

                    tschaefer@ipv6.socialT 1 Reply Last reply
                    0
                    • kasperd@westergaard.socialK kasperd@westergaard.social

                      Client side failover is a necessity if you want reliability. Even when IPv4 is long gone, I predict the failover code is here to stay. The failover code may even get a little bit more sophisticated.

                      If we want to minimize client side complexity during the transition, then DNS64 is the way to go. Dual-stack and 464xlat both add complexity on the client side, which you can avoid when using DNS64.

                      I agree transition technologies should not stay forever. Had people been upgrading in due time, we would never have needed DNS64 and NAT64 in the first place.

                      tschaefer@ipv6.socialT This user is from outside of this forum
                      tschaefer@ipv6.socialT This user is from outside of this forum
                      tschaefer@ipv6.social
                      wrote last edited by
                      #14

                      @kasperd

                      But at your DNS64 servers it is unnecessarily complex. They provide three different NAT64 prefixes.
                      No CLAT implementation can switch between three instances simultaneously. Android's CLAT is quite mature.
                      Client failover isn't there - for 12 years.

                      tschaefer@ipv6.socialT 1 Reply Last reply
                      0
                      • tschaefer@ipv6.socialT tschaefer@ipv6.social

                        @kasperd

                        But at your DNS64 servers it is unnecessarily complex. They provide three different NAT64 prefixes.
                        No CLAT implementation can switch between three instances simultaneously. Android's CLAT is quite mature.
                        Client failover isn't there - for 12 years.

                        tschaefer@ipv6.socialT This user is from outside of this forum
                        tschaefer@ipv6.socialT This user is from outside of this forum
                        tschaefer@ipv6.social
                        wrote last edited by
                        #15

                        @kasperd

                        The NAT64 GW has to be good. Just a similar example:
                        cgn - it has also no second chance at the client. It works or it doesn't work.

                        kasperd@westergaard.socialK 1 Reply Last reply
                        0
                        • tschaefer@ipv6.socialT tschaefer@ipv6.social

                          @kasperd

                          The NAT64 GW has to be good. Just a similar example:
                          cgn - it has also no second chance at the client. It works or it doesn't work.

                          kasperd@westergaard.socialK This user is from outside of this forum
                          kasperd@westergaard.socialK This user is from outside of this forum
                          kasperd@westergaard.social
                          wrote last edited by
                          #16

                          That just supports the point I am making. Use of DNS64+NAT64 can achieve some benefits that are hard to achieve with 464-XLAT and close to impossible with an IPv4-only CGN.

                          The added complexity on the DNS64 servers is minor. And if that means end-users can have a simpler setup on their network, I think it's a good trade-off.

                          I have considered implementing a 464-XLAT that can utilize redundant NAT64 gateways. But so far I haven't had time for that.

                          goetz@ipv6.socialG 1 Reply Last reply
                          0
                          • kasperd@westergaard.socialK kasperd@westergaard.social

                            I have done so in the past, but their mailing list software is not letting my mails through.

                            goetz@chaos.socialG This user is from outside of this forum
                            goetz@chaos.socialG This user is from outside of this forum
                            goetz@chaos.social
                            wrote last edited by
                            #17

                            @kasperd @tschaefer @camille IETF ?

                            kasperd@westergaard.socialK 1 Reply Last reply
                            0
                            • goetz@chaos.socialG goetz@chaos.social

                              @kasperd @tschaefer @camille IETF ?

                              kasperd@westergaard.socialK This user is from outside of this forum
                              kasperd@westergaard.socialK This user is from outside of this forum
                              kasperd@westergaard.social
                              wrote last edited by
                              #18

                              Yes. I received an automated response stating:

                              Your mail to 'v6ops' with the subject
                              
                                  Re: [v6ops] I-D Action: draft-ietf-v6ops-ipv6-only-resolver-00.txt
                              
                              Is being held until the list moderator can review it for approval.
                              
                              1 Reply Last reply
                              0
                              • kasperd@westergaard.socialK kasperd@westergaard.social

                                That just supports the point I am making. Use of DNS64+NAT64 can achieve some benefits that are hard to achieve with 464-XLAT and close to impossible with an IPv4-only CGN.

                                The added complexity on the DNS64 servers is minor. And if that means end-users can have a simpler setup on their network, I think it's a good trade-off.

                                I have considered implementing a 464-XLAT that can utilize redundant NAT64 gateways. But so far I haven't had time for that.

                                goetz@ipv6.socialG This user is from outside of this forum
                                goetz@ipv6.socialG This user is from outside of this forum
                                goetz@ipv6.social
                                wrote last edited by
                                #19

                                @kasperd @tschaefer
                                Regarding Implementation of ipv4only.arpa on DNS64 resolvers.
                                From RFC 8880
                                "All DNS64 recursive resolvers MUST recognize 'ipv4only.arpa' (and all of its subdomains) as special, and they MUST NOT attempt to look up NS records for 'ipv4only.arpa' or otherwise query authoritative name servers in an attempt to resolve this name. Instead, DNS64 recursive resolvers MUST act as authoritative for this zone, by generating immediate responses for all

                                goetz@ipv6.socialG 1 Reply Last reply
                                0
                                • goetz@ipv6.socialG goetz@ipv6.social

                                  @kasperd @tschaefer
                                  Regarding Implementation of ipv4only.arpa on DNS64 resolvers.
                                  From RFC 8880
                                  "All DNS64 recursive resolvers MUST recognize 'ipv4only.arpa' (and all of its subdomains) as special, and they MUST NOT attempt to look up NS records for 'ipv4only.arpa' or otherwise query authoritative name servers in an attempt to resolve this name. Instead, DNS64 recursive resolvers MUST act as authoritative for this zone, by generating immediate responses for all

                                  goetz@ipv6.socialG This user is from outside of this forum
                                  goetz@ipv6.socialG This user is from outside of this forum
                                  goetz@ipv6.social
                                  wrote last edited by
                                  #20

                                  queries for 'ipv4only.arpa' (and any subdomain of 'ipv4only.arpa'),
                                  "
                                  @tschaefer @kasperd

                                  kasperd@westergaard.socialK 1 Reply Last reply
                                  0
                                  • goetz@ipv6.socialG goetz@ipv6.social

                                    queries for 'ipv4only.arpa' (and any subdomain of 'ipv4only.arpa'),
                                    "
                                    @tschaefer @kasperd

                                    kasperd@westergaard.socialK This user is from outside of this forum
                                    kasperd@westergaard.socialK This user is from outside of this forum
                                    kasperd@westergaard.social
                                    wrote last edited by
                                    #21

                                    I have seen some inconsistent behavior of BIND9 in that regard. However I am done filing bug reports about that software.

                                    1 Reply Last reply
                                    1
                                    0
                                    • R relay@relay.infosec.exchange shared this topic
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    • Login

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent
                                    • Tags
                                    • Popular
                                    • World
                                    • Users
                                    • Groups