TOC 
Behavior Engineering for HindranceR. Denis-Courmont
Avoidance (if taken)VideoLAN project
Internet-DraftNovember 12, 2007
Intended status: Standards Track 
Expires: May 15, 2008 


Network Address Translation (NAT) Behavioral Requirements for DCCP
draft-denis-behave-nat-dccp-00.txt

Status of This Memo

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on May 15, 2008.

Abstract

This document would define a set of requirements for NATs that handle DCCP.



Table of Contents

1.  Introduction
2.  Definitions
3.  Applicability
4.  Requirements for NATs
5.  Tunnelling
6.  DCCP simultaneous open
7.  Security Considerations
8.  IANA Considerations
9.  Acknowledgments
10.  References
    10.1.  Normative References
    10.2.  Informative References




 TOC 

1.  Introduction

For historical reasons, NAT devices are not typically capable of handling datagrams and flows for application using the Datagram Congestion Control Protocol (DCCP)[RFC4340] (Kohler, E., Handley, M., and S. Floyd, “Datagram Congestion Control Protocol (DCCP),” March 2006.).

This draft discusses the technical issues involved, and proposes different potential solutions. It is however expected that not all of them (if any) will be carried on.



 TOC 

2.  Definitions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).



 TOC 

3.  Applicability

This document applies to NAT devices that want to handle DCCP datagrams. It is not the intent of this document to deprecate the overwhelming majority of deployed NAT devices. These NATs are simply not expected to handle DCCP, so this memo is not applicable to them.

TBD: This draft does not currently specify any clear requirement anyway.



 TOC 

4.  Requirements for NATs

The first approach to using DCCP through NAT devices involves changing the NAT devices to handle DCCP explicitly. Processing of DCCP packets by a NAT device would then be very similar to processing of TCP packets, as already specified in [I‑D.ietf‑behave‑tcp] (Guha, S., “NAT Behavioral Requirements for TCP,” April 2007.).

In addition to the usual changes to the IP header, NAT devices would need to mangle:

Because changing the the source or destination IP address of a DCCP packet will normally invalidate the DCCP checksum, it is not possible to use DCCP through a NAT without dedicated support. Some NAT devices are known to provide a "generic" transport protocol support, whereby only the IP header is mangled. That scheme will not work with DCCP at all.

TBD: write down actual mapping and timing requirements, etc. See behave-nat-tcp as a start.



 TOC 

5.  Tunnelling

Tunnelling is another approach: DCCP datagram would be encapsulated into an additionnal UDP transport header. This relies on the fact that many NATs are capable of handling UDP datagrams. This solution has tha major advantage of not needing any changes to the existing deployed NAT devices.

Issues with this solution include:

Various actual tunnelling solutions are already defined, such as ESP-in-UDP[RFC3948] (Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M. Stenberg, “UDP Encapsulation of IPsec ESP Packets,” January 2005.) (especially with the NULL cipher suite) or Teredo[RFC4380] (Huitema, C., “Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs),” February 2006.).



 TOC 

6.  DCCP simultaneous open

When both parties to an intended DCCP session are located behind either a NAT device or a stateful firewall, neither can act as the paassive endpoint in the connection establishment.

Unfortunately, at the time of writing, the DCCP connection state machine does not allow both peers to behave as active endpoint, as is the case in TCP simultaneous open. It is expected that this issue will be tackled in the DCCP working group shortly (TODO: reference relevant I-D).



 TOC 

7.  Security Considerations

TBD.



 TOC 

8.  IANA Considerations

This document raises no IANA considerations.



 TOC 

9.  Acknowledgments

The authors would like to thank ... for their comments on this document.



 TOC 

10.  References



 TOC 

10.1. Normative References

[RFC2119] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML).
[RFC4340] Kohler, E., Handley, M., and S. Floyd, “Datagram Congestion Control Protocol (DCCP),” RFC 4340, March 2006 (TXT).


 TOC 

10.2. Informative References

[I-D.ietf-behave-tcp] Guha, S., “NAT Behavioral Requirements for TCP,” draft-ietf-behave-tcp-07 (work in progress), April 2007 (TXT).
[RFC3948] Huttunen, A., Swander, B., Volpe, V., DiBurro, L., and M. Stenberg, “UDP Encapsulation of IPsec ESP Packets,” RFC 3948, January 2005 (TXT).
[RFC4380] Huitema, C., “Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs),” RFC 4380, February 2006 (TXT).


 TOC 

Author's Address

  Rémi Denis-Courmont
  VideoLAN project
EMail:  rem@videolan.org
URI:  http://www.videolan.org/


 TOC 

Full Copyright Statement

Intellectual Property