Internet Engineering Task Force (IETF)                      D. Wing, Ed.
Request for Comments: 6887                                         Cisco
Category: Standards Track                                    S. Cheshire
ISSN: 2070-1721                                                    Apple
                                                           M. Boucadair
                                                         France Telecom
                                                               R. Penno
                                                                  Cisco
                                                             P. Selkirk
                                                                    ISC
                                                             April 2013


                     Port Control Protocol (PCP)

Abstract

  The Port Control Protocol allows an IPv6 or IPv4 host to control how
  incoming IPv6 or IPv4 packets are translated and forwarded by a
  Network Address Translator (NAT) or simple firewall, and also allows
  a host to optimize its outgoing NAT keepalive messages.

Status of This Memo

  This is an Internet Standards Track document.

  This document is a product of the Internet Engineering Task Force
  (IETF).  It represents the consensus of the IETF community.  It has
  received public review and has been approved for publication by the
  Internet Engineering Steering Group (IESG).  Further information on
  Internet Standards is available in Section 2 of RFC 5741.

  Information about the current status of this document, any errata,
  and how to provide feedback on it may be obtained at
  http://www.rfc-editor.org/info/rfc6887.

Copyright Notice

  Copyright (c) 2013 IETF Trust and the persons identified as the
  document authors.  All rights reserved.

  This document is subject to BCP 78 and the IETF Trust's Legal
  Provisions Relating to IETF Documents
  (http://trustee.ietf.org/license-info) in effect on the date of
  publication of this document.  Please review these documents
  carefully, as they describe your rights and restrictions with respect
  to this document.  Code Components extracted from this document must
  include Simplified BSD License text as described in Section 4.e of



Wing, et al.                 Standards Track                    [Page 1]

RFC 6887               Port Control Protocol (PCP)            April 2013


  the Trust Legal Provisions and are provided without warranty as
  described in the Simplified BSD License.

Table of Contents

  1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
  2.  Scope  . . . . . . . . . . . . . . . . . . . . . . . . . . . .  5
    2.1.  Deployment Scenarios . . . . . . . . . . . . . . . . . . .  5
    2.2.  Supported Protocols  . . . . . . . . . . . . . . . . . . .  5
    2.3.  Single-Homed Customer Premises Network . . . . . . . . . .  5
  3.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  6
  4.  Relationship between PCP Server and Its PCP-Controlled
      Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
  5.  Note on Fixed-Size Addresses . . . . . . . . . . . . . . . . . 10
  6.  Protocol Design Note . . . . . . . . . . . . . . . . . . . . . 11
  7.  Common Request and Response Header Format  . . . . . . . . . . 13
    7.1.  Request Header . . . . . . . . . . . . . . . . . . . . . . 14
    7.2.  Response Header  . . . . . . . . . . . . . . . . . . . . . 15
    7.3.  Options  . . . . . . . . . . . . . . . . . . . . . . . . . 16
    7.4.  Result Codes . . . . . . . . . . . . . . . . . . . . . . . 19
  8.  General PCP Operation  . . . . . . . . . . . . . . . . . . . . 20
    8.1.  General PCP Client: Generating a Request . . . . . . . . . 21
      8.1.1.  PCP Client Retransmission  . . . . . . . . . . . . . . 22
    8.2.  General PCP Server: Processing a Request . . . . . . . . . 24
    8.3.  General PCP Client: Processing a Response  . . . . . . . . 25
    8.4.  Multi-Interface Issues . . . . . . . . . . . . . . . . . . 27
    8.5.  Epoch  . . . . . . . . . . . . . . . . . . . . . . . . . . 27
  9.  Version Negotiation  . . . . . . . . . . . . . . . . . . . . . 29
  10. Introduction to MAP and PEER Opcodes . . . . . . . . . . . . . 30
    10.1. For Operating a Server . . . . . . . . . . . . . . . . . . 33
    10.2. For Operating a Symmetric Client/Server  . . . . . . . . . 35
    10.3. For Reducing NAT or Firewall Keepalive Messages  . . . . . 37
    10.4. For Restoring Lost Implicit TCP Dynamic Mapping State  . . 38
  11. MAP Opcode . . . . . . . . . . . . . . . . . . . . . . . . . . 39
    11.1. MAP Operation Packet Formats . . . . . . . . . . . . . . . 40
    11.2. Generating a MAP Request . . . . . . . . . . . . . . . . . 43
      11.2.1. Renewing a Mapping . . . . . . . . . . . . . . . . . . 44
    11.3. Processing a MAP Request . . . . . . . . . . . . . . . . . 44
    11.4. Processing a MAP Response  . . . . . . . . . . . . . . . . 48
    11.5. Address Change Events  . . . . . . . . . . . . . . . . . . 49
    11.6. Learning the External IP Address Alone . . . . . . . . . . 50
  12. PEER Opcode  . . . . . . . . . . . . . . . . . . . . . . . . . 50
    12.1. PEER Operation Packet Formats  . . . . . . . . . . . . . . 51
    12.2. Generating a PEER Request  . . . . . . . . . . . . . . . . 54
    12.3. Processing a PEER Request  . . . . . . . . . . . . . . . . 55
    12.4. Processing a PEER Response . . . . . . . . . . . . . . . . 56





Wing, et al.                 Standards Track                    [Page 2]

RFC 6887               Port Control Protocol (PCP)            April 2013


  13. Options for MAP and PEER Opcodes . . . . . . . . . . . . . . . 57
    13.1. THIRD_PARTY Option for MAP and PEER Opcodes  . . . . . . . 57
    13.2. PREFER_FAILURE Option for MAP Opcode . . . . . . . . . . . 59
    13.3. FILTER Option for MAP Opcode . . . . . . . . . . . . . . . 61
  14. Rapid Recovery . . . . . . . . . . . . . . . . . . . . . . . . 63
    14.1. ANNOUNCE Opcode  . . . . . . . . . . . . . . . . . . . . . 64
      14.1.1. ANNOUNCE Operation . . . . . . . . . . . . . . . . . . 65
      14.1.2. Generating and Processing a Solicited ANNOUNCE
              Message  . . . . . . . . . . . . . . . . . . . . . . . 65
      14.1.3. Generating and Processing an Unsolicited ANNOUNCE
              Message  . . . . . . . . . . . . . . . . . . . . . . . 66
    14.2. PCP Mapping Update . . . . . . . . . . . . . . . . . . . . 67
  15. Mapping Lifetime and Deletion  . . . . . . . . . . . . . . . . 69
    15.1. Lifetime Processing for the MAP Opcode . . . . . . . . . . 71
  16. Implementation Considerations  . . . . . . . . . . . . . . . . 72
    16.1. Implementing MAP with EDM Port-Mapping NAT . . . . . . . . 72
    16.2. Lifetime of Explicit and Implicit Dynamic Mappings . . . . 72
    16.3. PCP Failure Recovery . . . . . . . . . . . . . . . . . . . 72
      16.3.1. Recreating Mappings  . . . . . . . . . . . . . . . . . 73
      16.3.2. Maintaining Mappings . . . . . . . . . . . . . . . . . 73
      16.3.3. SCTP . . . . . . . . . . . . . . . . . . . . . . . . . 74
    16.4. Source Address Replicated in PCP Header  . . . . . . . . . 75
    16.5. State Diagram  . . . . . . . . . . . . . . . . . . . . . . 76
  17. Deployment Considerations  . . . . . . . . . . . . . . . . . . 77
    17.1. Ingress Filtering  . . . . . . . . . . . . . . . . . . . . 77
    17.2. Mapping Quota  . . . . . . . . . . . . . . . . . . . . . . 77
  18. Security Considerations  . . . . . . . . . . . . . . . . . . . 78
    18.1. Simple Threat Model  . . . . . . . . . . . . . . . . . . . 78
      18.1.1. Attacks Considered . . . . . . . . . . . . . . . . . . 79
      18.1.2. Deployment Examples Supporting the Simple Threat
              Model  . . . . . . . . . . . . . . . . . . . . . . . . 79
    18.2. Advanced Threat Model  . . . . . . . . . . . . . . . . . . 80
    18.3. Residual Threats . . . . . . . . . . . . . . . . . . . . . 80
      18.3.1. Denial of Service  . . . . . . . . . . . . . . . . . . 80
      18.3.2. Ingress Filtering  . . . . . . . . . . . . . . . . . . 81
      18.3.3. Mapping Theft  . . . . . . . . . . . . . . . . . . . . 81
      18.3.4. Attacks against Server Discovery . . . . . . . . . . . 81
  19. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 82
    19.1. Port Number  . . . . . . . . . . . . . . . . . . . . . . . 82
    19.2. Opcodes  . . . . . . . . . . . . . . . . . . . . . . . . . 82
    19.3. Result Codes . . . . . . . . . . . . . . . . . . . . . . . 82
    19.4. Options  . . . . . . . . . . . . . . . . . . . . . . . . . 82
  20. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 83
  21. References . . . . . . . . . . . . . . . . . . . . . . . . . . 84
    21.1. Normative References . . . . . . . . . . . . . . . . . . . 84
    21.2. Informative References . . . . . . . . . . . . . . . . . . 84
  Appendix A. NAT-PMP Transition . . . . . . . . . . . . . . . . . . 87




Wing, et al.                 Standards Track                    [Page 3]

RFC 6887               Port Control Protocol (PCP)            April 2013


1.  Introduction

  The Port Control Protocol (PCP) provides a mechanism to control how
  incoming packets are forwarded by upstream devices such as Network
  Address Translator IPv6/IPv4 (NAT64), Network Address Translator
  IPv4/IPv4 (NAT44), and IPv6 and IPv4 firewall devices, and a
  mechanism to reduce application keepalive traffic.  PCP is designed
  to be implemented in the context of Carrier-Grade NATs (CGNs) and
  small NATs (e.g., residential NATs), as well as with dual-stack and
  IPv6-only Customer Premises Equipment (CPE) routers, and all of the
  currently known transition scenarios towards IPv6-only CPE routers.
  PCP allows hosts to operate servers for a long time (e.g., a network-
  attached home security camera) or a short time (e.g., while playing a
  game or on a phone call) when behind a NAT device, including when
  behind a CGN operated by their Internet service provider or an IPv6
  firewall integrated in their CPE router.

  PCP allows applications to create mappings from an external IP
  address, protocol, and port to an internal IP address, protocol, and
  port.  These mappings are required for successful inbound
  communications destined to machines located behind a NAT or a
  firewall.

  After creating a mapping for incoming connections, it is necessary to
  inform remote computers about the IP address, protocol, and port for
  the incoming connection.  This is usually done in an application-
  specific manner.  For example, a computer game might use a rendezvous
  server specific to that game (or specific to that game developer), a
  SIP phone would use a SIP proxy, and a client using DNS-Based Service
  Discovery [RFC6763] would use DNS Update [RFC2136] [RFC3007].  PCP
  does not provide this rendezvous function.  The rendezvous function
  may support IPv4, IPv6, or both.  Depending on that support and the
  application's support of IPv4 or IPv6, the PCP client may need an
  IPv4 mapping, an IPv6 mapping, or both.

  Many NAT-friendly applications send frequent application-level
  messages to ensure that their session will not be timed out by a NAT.
  These are commonly called "NAT keepalive" messages, even though they
  are not sent to the NAT itself (rather, they are sent 'through' the
  NAT).  These applications can reduce the frequency of such NAT
  keepalive messages by using PCP to learn (and influence) the NAT
  mapping lifetime.  This helps reduce bandwidth on the subscriber's
  access network, traffic to the server, and battery consumption on
  mobile devices.

  Many NATs and firewalls include Application Layer Gateways (ALGs) to
  create mappings for applications that establish additional streams or
  accept incoming connections.  ALGs incorporated into NATs may also



Wing, et al.                 Standards Track                    [Page 4]

RFC 6887               Port Control Protocol (PCP)            April 2013


  modify the application payload.  Industry experience has shown that
  these ALGs are detrimental to protocol evolution.  PCP allows an
  application to create its own mappings in NATs and firewalls,
  reducing the incentive to deploy ALGs in NATs and firewalls.

2.  Scope

2.1.  Deployment Scenarios

  PCP can be used in various deployment scenarios, including:

  o  Basic NAT [RFC3022]

  o  Network Address and Port Translation [RFC3022], such as commonly
     deployed in residential NAT devices

  o  Carrier-Grade NAT [RFC6888]

  o  Dual-Stack Lite (DS-Lite) [RFC6333]

  o  NAT that is Layer-2 Aware [L2NAT]

  o  Dual-Stack Extra Lite [RFC6619]

  o  NAT64, both Stateless [RFC6145] and Stateful [RFC6146]

  o  IPv4 and IPv6 simple firewall control [RFC6092]

  o  IPv6-to-IPv6 Network Prefix Translation (NPTv6) [RFC6296]

2.2.  Supported Protocols

  The PCP Opcodes defined in this document are designed to support
  transport-layer protocols that use a 16-bit port number (e.g., TCP,
  UDP, Stream Control Transmission Protocol (SCTP) [RFC4960], and
  Datagram Congestion Control Protocol (DCCP) [RFC4340]).  Protocols
  that do not use a port number (e.g., Resource Reservation Protocol
  (RSVP), IP Encapsulating Security Payload (ESP) [RFC4303], ICMP, and
  ICMPv6) are supported for IPv4 firewall, IPv6 firewall, and NPTv6
  functions, but are out of scope for any NAT functions.

2.3.  Single-Homed Customer Premises Network

  PCP assumes a single-homed IP address model.  That is, for a given IP
  address of a host, only one default route exists to reach other hosts
  on the Internet from that source IP address.  This is important
  because after a PCP mapping is created and an inbound packet (e.g.,
  TCP SYN) is rewritten and delivered to a host, the outbound response



Wing, et al.                 Standards Track                    [Page 5]

RFC 6887               Port Control Protocol (PCP)            April 2013


  (e.g., TCP SYNACK) has to go through the same (reverse) path so it
  passes through the same NAT to have the necessary inverse rewrite
  performed.  This restriction exists because otherwise there would
  need to be a PCP-enabled NAT for every egress (because the host could
  not reliably determine which egress path packets would take), and the
  client would need to be able to reliably make the same internal/
  external mapping in every NAT gateway, which in general is not
  possible (because the other NATs might already have the necessary
  external port mapped to another host).

3.  Terminology

  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
  "OPTIONAL" in this document are to be interpreted as described in
  "Key words for use in RFCs to Indicate Requirement Levels" [RFC2119].

  Internal Host:
     A host served by a NAT gateway, or protected by a firewall.  This
     is the host that will receive incoming traffic resulting from a
     PCP mapping request, or the host that initiated an implicit
     dynamic outbound mapping (e.g., by sending a TCP SYN) across a
     firewall or a NAT.

  Remote Peer Host:
     A host with which an internal host is communicating.  This can
     include another internal host (or even the same internal host); if
     a NAT is involved, the NAT would need to hairpin the traffic
     [RFC4787].

  Internal Address:
     The address of an internal host served by a NAT gateway or
     protected by a firewall.

  External Address:
     The address of an internal host as seen by other remote peers on
     the Internet with which the internal host is communicating, after
     translation by any NAT gateways on the path.  An external address
     is generally a public routable (i.e., non-private) address.  In
     the case of an internal host protected by a pure firewall, with no
     address translation on the path, its external address is the same
     as its internal address.

  Endpoint-Dependent Mapping (EDM):  A term applied to NAT operation
     where an implicit mapping created by outgoing traffic (e.g., TCP
     SYN) from a single internal address, protocol, and port to
     different remote peers and ports may be assigned different
     external ports, and a subsequent PCP mapping request for that



Wing, et al.                 Standards Track                    [Page 6]

RFC 6887               Port Control Protocol (PCP)            April 2013


     internal address, protocol, and port may be assigned yet another
     different external port.  This term encompasses both Address-
     Dependent Mapping and Address and Port-Dependent Mapping
     [RFC4787].

  Endpoint-Independent Mapping (EIM):  A term applied to NAT operation
     where all mappings from a single internal address, protocol, and
     port to different remote peers and ports are all assigned the same
     external address and port.

  Remote Peer Address:
     The address of a remote peer, as seen by the internal host.  A
     remote address is generally a publicly routable address.  In the
     case of a remote peer that is itself served by a NAT gateway, the
     remote address may in fact be the remote peer's external address,
     but since this remote translation is generally invisible to
     software running on the internal host, the distinction can safely
     be ignored for the purposes of this document.

  Third Party:
     In the common case, an internal host manages its own mappings
     using PCP requests, and the internal address of those mappings is
     the same as the source IP address of the PCP request packet.

     In the case where one device is managing mappings on behalf of
     some other device that does not implement PCP, the presence of the
     THIRD_PARTY option in the MAP request signifies that the specified
     address, rather than the source IP address of the PCP request
     packet, should be used as the internal address for the mapping.

  Mapping, Port Mapping, Port Forwarding:
     A NAT mapping creates a relationship between an internal IP
     address, protocol, and port, and an external IP address, protocol,
     and port.  More specifically, it creates a translation rule where
     packets destined *to* the external IP address, protocol, and port
     have their destination address and port translated to the internal
     address and port, and conversely, packets *from* the internal IP
     address, protocol, and port have their source address and port
     translated to the external address and port.  In the case of a
     pure firewall, the "mapping" is the identity function, translating
     an internal IP address, protocol, and port number to the same
     external IP address, protocol, and port number.  Firewall
     filtering, applied in addition to that identity mapping function,
     is separate from the mapping itself.







Wing, et al.                 Standards Track                    [Page 7]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Mapping Types:
     There are three dimensions to classifying mapping types: how they
     are created (implicitly/explicitly), their primary purpose
     (outbound/inbound), and how they are deleted (dynamic/static).
     Implicit mappings are created as a side effect of some other
     operation; explicit mappings are created by a mechanism explicitly
     dealing with mappings.  Outbound mappings exist primarily to
     facilitate outbound communication; inbound mappings exist
     primarily to facilitate inbound communication.  Dynamic mappings
     are deleted when their lifetime expires, or through other protocol
     action; static mappings are permanent until the user chooses to
     delete them.

     *  Implicit dynamic mappings are created implicitly as a side
        effect of traffic such as an outgoing TCP SYN or outgoing UDP
        packet.  Such packets were not originally designed explicitly
        for creating NAT (or firewall) state, but they can have that
        effect when they pass through a NAT (or firewall) device.
        Implicit dynamic mappings usually have a finite lifetime,
        though this lifetime is generally not known to the client using
        them.

     *  Explicit dynamic mappings are created as a result of explicit
        PCP MAP and PEER requests.  Like a DHCP address lease, explicit
        dynamic mappings have a finite lifetime, and this lifetime is
        communicated to the client.  As with a DHCP address lease, if
        the client wants a mapping to persist the client must prove
        that it is still present by periodically renewing the mapping
        to prevent it from expiring.  If a PCP client goes away, then
        any mappings it created will be automatically cleaned up when
        they expire.

     *  Explicit static mappings are created by manual configuration
        (e.g., via command-line interface or other user interface) and
        persist until the user changes that manual configuration.

     Both implicit and explicit dynamic mappings are dynamic in the
     sense that they are created on demand, as requested (implicitly or
     explicitly) by the internal host, and have a lifetime.  After the
     lifetime, the mapping is deleted unless the lifetime is extended
     by action by the internal host (e.g., sending more traffic or
     sending another PCP request).

     Static mappings are, by their nature, always explicit.  Static
     mappings differ from explicit dynamic mappings in that their
     lifetime is effectively infinite (they exist until manually
     removed), but otherwise they behave exactly the same as explicit
     MAP mappings.



Wing, et al.                 Standards Track                    [Page 8]

RFC 6887               Port Control Protocol (PCP)            April 2013


     While all mappings are, by necessity, bidirectional (most Internet
     communication requires information to flow in both directions for
     successful operation), when talking about mappings, it can be
     helpful to identify them loosely according to their 'primary'
     purpose.

     *  Outbound mappings exist primarily to enable outbound
        communication.  For example, when a host calls connect() to
        make an outbound connection, a NAT gateway will create an
        implicit dynamic outbound mapping to facilitate that outbound
        communication.

     *  Inbound mappings exist primarily to enable listening servers to
        receive inbound connections.  Generally, when a client calls
        listen() to listen for inbound connections, a NAT gateway will
        not implicitly create any mapping to facilitate that inbound
        communication.  A PCP MAP request can be used explicitly to
        create a dynamic inbound mapping to enable the desired inbound
        communication.

     Explicit static (manual) mappings and explicit dynamic (MAP)
     mappings both allow internal hosts to receive inbound traffic that
     is not in direct response to any immediately preceding outbound
     communication (i.e., to allow internal hosts to operate a "server"
     that is accessible to other hosts on the Internet).

  PCP Client:
     A PCP software instance responsible for issuing PCP requests to a
     PCP server.  Several independent PCP clients can exist on the same
     host.  Several PCP clients can be located in the same local
     network.  A PCP client can issue PCP requests on behalf of a
     third-party device for which it is authorized to do so.  An
     interworking function from Universal Plug and Play Internet
     Gateway Device (UPnP IGDv1 [IGDv1]) to PCP is another example of a
     PCP client.  A PCP server in a NAT gateway that is itself a client
     of another NAT gateway (nested NAT) may itself act as a PCP client
     to the upstream NAT.

  PCP-Controlled Device:
     A NAT or firewall that controls or rewrites packet flows between
     internal hosts and remote peer hosts.  PCP manages the mappings on
     this device.

  PCP Server:
     A PCP software instance that resides on the PCP-Controlled Device
     that receives PCP requests from the PCP client and creates
     appropriate state in response to that request.




Wing, et al.                 Standards Track                    [Page 9]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Subscriber:
     The unit of billing for a commercial ISP.  A subscriber may have a
     single IP address from the commercial ISP (which can be shared
     among multiple hosts using a NAT gateway, thereby making them
     appear to be a single host to the ISP) or may have multiple IP
     addresses provided by the commercial ISP.  In either case, the IP
     address or addresses provided by the ISP may themselves be further
     translated by a Carrier-Grade NAT (CGN) operated by the ISP.

4.  Relationship between PCP Server and Its PCP-Controlled Device

  The PCP server receives and responds to PCP requests.  The PCP server
  functionality is typically a capability of a NAT or firewall device,
  as shown in Figure 1.  It is also possible for the PCP functionality
  to be provided by some other device, which communicates with the
  actual NAT(s) or firewall(s) via some other proprietary mechanism, as
  long as from the PCP client's perspective such split operation is
  indistinguishable from the integrated case.

                                 +-----------------+
        +------------+           | NAT or firewall |
        | PCP client |-<network>-+      with       +---<Internet>
        +------------+           |    PCP server   |
                                 +-----------------+

                  Figure 1: PCP-Enabled NAT or Firewall

  A NAT or firewall device, between the PCP client and the Internet,
  might implement simple or advanced firewall functionality.  This may
  be a side effect of the technology implemented by the device (e.g., a
  network address and port translator, by virtue of its port rewriting,
  normally requires connections to be initiated from an inside host
  towards the Internet), or this might be an explicit firewall policy
  to deny unsolicited traffic from the Internet.  Some firewall devices
  deny certain unsolicited traffic from the Internet (e.g., TCP, UDP to
  most ports) but allow certain other unsolicited traffic from the
  Internet (e.g., UDP port 500 and IP ESP) [RFC6092].  Such default
  filtering (or lack thereof) is out of scope of PCP itself.  If a
  client device wants to receive traffic and supports PCP, and does not
  possess prior knowledge of such default filtering policy, it SHOULD
  use PCP to request the necessary mappings to receive the desired
  traffic.

5.  Note on Fixed-Size Addresses

  For simplicity in building and parsing request and response packets,
  PCP always uses fixed-size 128-bit IP address fields for both IPv6
  addresses and IPv4 addresses.



Wing, et al.                 Standards Track                   [Page 10]

RFC 6887               Port Control Protocol (PCP)            April 2013


  When the address field holds an IPv6 address, the fixed-size 128-bit
  IP address field holds the IPv6 address stored as is.

  When the address field holds an IPv4 address, an IPv4-mapped IPv6
  address [RFC4291] is used (::ffff:0:0/96).  This has the first 80
  bits set to zero and the next 16 set to one, while its last 32 bits
  are filled with the IPv4 address.  This is unambiguously
  distinguishable from a native IPv6 address, because an IPv4-mapped
  IPv6 address [RFC4291] would not be valid for a mapping.

  When checking for an IPv4-mapped IPv6 address, all of the first 96
  bits MUST be checked for the pattern -- it is not sufficient to check
  for ones in bits 81-96.

  The all-zeros IPv6 address MUST be expressed by filling the
  fixed-size 128-bit IP address field with all zeros (::).

  The all-zeros IPv4 address MUST be expressed by 80 bits of zeros,
  16 bits of ones, and 32 bits of zeros (::ffff:0:0).

6.  Protocol Design Note

  PCP can be viewed as a request/response protocol, much like many
  other UDP-based request/response protocols, and can be implemented
  perfectly well as such.  It can also be viewed as what might be
  called a hint/notification protocol, and this observation can help
  simplify implementations.

  Rather than viewing the message streams between PCP client and PCP
  server as following a strict request/response pattern, where every
  response is associated with exactly one request, the message flows
  can be viewed as two somewhat independent streams carrying
  information in opposite directions:

  o  A stream of hints flowing from PCP client to PCP server, where the
     client indicates to the server what it would like the state of its
     mappings to be, and

  o  A stream of notifications flowing from PCP server to PCP client,
     where the server informs the clients what the state of its
     mappings actually is.

  To an extent, some of this approach is required anyway in a UDP-based
  request/response protocol, since UDP packets can be lost, duplicated,
  or reordered.






Wing, et al.                 Standards Track                   [Page 11]

RFC 6887               Port Control Protocol (PCP)            April 2013


  In this view of the protocol, the client transmits hints to the
  server at various intervals signaling its desires, and the server
  transmits notifications to the client signaling the actual state of
  its mappings.  These two message flows are loosely correlated in that
  a client request (hint) usually elicits a server response
  (notification), but only loosely, in that a client request may result
  in no server response (in the case of packet loss), and a server
  response may be generated gratuitously without an immediately
  preceding client request (in the case where server configuration
  change, e.g., change of external IP address on a NAT gateway, results
  in a change of mapping state).

  The exact times that client requests are sent are influenced by a
  client timing state machine taking into account whether (i) the
  client has not yet received a response from the server for a prior
  request (retransmission), or (ii) the client has previously received
  a response from the server saying how long the indicated mapping
  would remain active (renewal).  This design philosophy is the reason
  why PCP's retransmissions and renewals are exactly the same packet on
  the wire.  Typically, retransmissions are sent with exponentially
  increasing intervals as the client waits for the server to respond,
  whereas renewals are sent with exponentially decreasing intervals as
  the expiry time approaches, but, from the server's point of view,
  both packets are identical, and both signal the client's desire that
  the stated mapping exist or continue to exist.

  A PCP server usually sends responses as a direct result of client
  requests, but not always.  For example, if a server is too overloaded
  to respond, it is allowed to silently ignore a request message and
  let the client retransmit.  Also, if external factors cause a NAT
  gateway or firewall's configuration to change, then the PCP server
  can send unsolicited responses to clients informing them of the new
  state of their mappings.  Such reconfigurations are expected to be
  rare, because of the disruption they can cause to clients, but should
  they happen, PCP provides a way for servers to communicate the new
  state to clients promptly, without having to wait for the next
  periodic renewal request.

  This design goal helps explain why PCP request and response messages
  have no transaction ID, because such a transaction ID is unnecessary,
  and would unnecessarily limit the protocol and unnecessarily
  complicate implementations.  A PCP server response (i.e.,
  notification) is self-describing and complete.  It communicates the
  internal and external addresses, protocol, and ports for a mapping,
  and its remaining lifetime.  If the client does in fact currently
  want such a mapping to exist, then it can identify the mapping in
  question from the internal address, protocol, and port, and update
  its state to reflect the current external address and port, and



Wing, et al.                 Standards Track                   [Page 12]

RFC 6887               Port Control Protocol (PCP)            April 2013


  remaining lifetime.  If a client does not currently want such a
  mapping to exist, then it can safely ignore the message.  No client
  action is required for unexpected mapping notifications.  In today's
  world, a NAT gateway can have a static mapping, and the client device
  has no explicit knowledge of this, and no way to change the fact.
  Also, in today's world, a client device can be connected directly to
  the public Internet, with a globally routable IP address, and, in
  this case, it effectively has "mappings" for all of its listening
  ports.  Such a device has to be responsible for its own security and
  cannot rely on assuming that some other network device will be
  blocking all incoming packets.

7.  Common Request and Response Header Format

  All PCP messages are sent over UDP, with a maximum UDP payload length
  of 1100 octets.  The PCP messages contain a request or response
  header containing an Opcode, any relevant Opcode-specific
  information, and zero or more options.  All numeric quantities larger
  than a single octet (e.g., result codes, lifetimes, Epoch times,
  etc.) are represented in conventional IETF network order, i.e., most
  significant octet first.  Non-numeric quantities are represented as
  is on all platforms, with no byte swapping (e.g., IP addresses and
  ports are placed in PCP messages using the same representation as
  when placed in IP or TCP headers).

  The packet layout for the common header, and operation of the PCP
  client and PCP server, are described in the following sections.  The
  information in this section applies to all Opcodes.  Behavior of the
  Opcodes defined in this document is described in Sections 10, 11, and
  12.





















Wing, et al.                 Standards Track                   [Page 13]

RFC 6887               Port Control Protocol (PCP)            April 2013


7.1.  Request Header

  All requests have the following format:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |  Version = 2  |R|   Opcode    |         Reserved              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                 Requested Lifetime (32 bits)                  |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            PCP Client's IP Address (128 bits)                 |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    :                                                               :
    :             (optional) Opcode-specific information            :
    :                                                               :
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    :                                                               :
    :             (optional) PCP Options                            :
    :                                                               :
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                 Figure 2: Common Request Packet Format

  These fields are described below:

  Version:  This document specifies protocol version 2.  PCP clients
     and servers compliant with this document use the value 2.  This
     field is used for version negotiation as described in Section 9.

  R: Indicates Request (0) or Response (1).

  Opcode:  A 7-bit value specifying the operation to be performed.  MAP
     and PEER Opcodes are defined in Sections 11 and 12.

  Reserved:  16 reserved bits.  MUST be zero on transmission and MUST
     be ignored on reception.

  Requested Lifetime:  An unsigned 32-bit integer, in seconds, ranging
     from 0 to 2^32-1 seconds.  This is used by the MAP and PEER
     Opcodes defined in this document for their requested lifetime.







Wing, et al.                 Standards Track                   [Page 14]

RFC 6887               Port Control Protocol (PCP)            April 2013


  PCP Client's IP Address:  The source IPv4 or IPv6 address in the IP
     header used by the PCP client when sending this PCP request.  An
     IPv4 address is represented using an IPv4-mapped IPv6 address.
     The PCP Client IP Address in the PCP message header is used to
     detect an unexpected NAT on the path between the PCP client and
     the PCP-controlled NAT or firewall device.  See Section 8.1.

  Opcode-specific information:  Payload data for this Opcode.  The
     length of this data is determined by the Opcode definition.

  PCP Options:  Zero, one, or more options that are legal for both a
     PCP request and for this Opcode.  See Section 7.3.

7.2.  Response Header

  All responses have the following format:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |  Version = 2  |R|   Opcode    |   Reserved    |  Result Code  |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                      Lifetime (32 bits)                       |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                     Epoch Time (32 bits)                      |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                      Reserved (96 bits)                       |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    :                                                               :
    :             (optional) Opcode-specific response data          :
    :                                                               :
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    :             (optional) Options                                :
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                 Figure 3: Common Response Packet Format

  These fields are described below:

  Version:  Responses from servers compliant with this specification
     MUST use version 2.  This is set by the server.

  R: Indicates Request (0) or Response (1).  All Responses MUST use 1.
     This is set by the server.





Wing, et al.                 Standards Track                   [Page 15]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Opcode:  The 7-bit Opcode value.  The server copies this value from
     the request.

  Reserved:  8 reserved bits, MUST be sent as 0, MUST be ignored when
     received.  This is set by the server.

  Result Code:  The result code for this response.  See Section 7.4 for
     values.  This is set by the server.

  Lifetime:  An unsigned 32-bit integer, in seconds, ranging from 0 to
     2^32-1 seconds.  On an error response, this indicates how long
     clients should assume they'll get the same error response from
     that PCP server if they repeat the same request.  On a success
     response for the PCP Opcodes that create a mapping (MAP and PEER),
     the Lifetime field indicates the lifetime for this mapping.  This
     is set by the server.

  Epoch Time:  The server's Epoch Time value.  See Section 8.5 for
     discussion.  This value is set by the server, in both success and
     error responses.

  Reserved:  96 reserved bits.  For requests that were successfully
     parsed, this MUST be sent as 0, MUST be ignored when received.
     This is set by the server.  For requests that were not
     successfully parsed, the server copies the last 96 bits of the PCP
     Client's IP Address field from the request message into this
     corresponding 96-bit field of the response.

  Opcode-specific information:  Payload data for this Opcode.  The
     length of this data is determined by the Opcode definition.

  PCP Options:  Zero, one, or more options that are legal for both a
     PCP response and for this Opcode.  See Section 7.3.

7.3.  Options

  A PCP Opcode can be extended with one or more options.  Options can
  be used in requests and responses.  The design decisions in this
  specification about whether to include a given piece of information
  in the base Opcode format or in an option were an engineering trade-
  off between packet size and code complexity.  For information that is
  usually (or always) required, placing it in the fixed Opcode data
  results in simpler code to generate and parse the packet, because the
  information is a fixed location in the Opcode data, but wastes space
  in the packet in the event that field is all zeros because the
  information is not needed or not relevant.  For information that is
  required less often, placing it in an option results in slightly more
  complicated code to generate and parse packets containing that



Wing, et al.                 Standards Track                   [Page 16]

RFC 6887               Port Control Protocol (PCP)            April 2013


  option, but saves space in the packet when that information is not
  needed.  Placing information in an option also means that an
  implementation that never uses that information doesn't even need to
  implement code to generate and parse it.  For example, a client that
  never requests mappings on behalf of some other device doesn't need
  to implement code to generate the THIRD_PARTY option, and a PCP
  server that doesn't implement the necessary security measures to
  create third-party mappings safely doesn't need to implement code to
  parse the THIRD_PARTY option.

  Options use the following Type-Length-Value format:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |  Option Code  |  Reserved     |       Option Length           |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    :                       (optional) Data                         :
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                        Figure 4: Options Header

  The description of the fields is as follows:

  Option Code:  8 bits.  Its most significant bit indicates if this
     option is mandatory (0) or optional (1) to process.

  Reserved:  8 bits.  MUST be set to 0 on transmission and MUST be
     ignored on reception.

  Option Length:  16 bits.  Indicates the length of the enclosed data,
     in octets.  Options with length of 0 are allowed.  Options that
     are not a multiple of 4 octets long are followed by one, two, or
     three 0 octets to pad their effective length in the packet to be a
     multiple of 4 octets.  The Option Length reflects the semantic
     length of the option, not including any padding octets.

  Data:  Option data.

  If several options are included in a PCP request, they MAY be encoded
  in any order by the PCP client, but MUST be processed by the PCP
  server in the order in which they appear.  It is the responsibility
  of the PCP client to ensure that the server has sufficient room to
  reply without exceeding the 1100-octet size limit; if its reply would
  exceed that size, the server generates an error.






Wing, et al.                 Standards Track                   [Page 17]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If, while processing a PCP request, including its options, an error
  is encountered that causes a PCP error response to be generated, the
  PCP request MUST cause no state change in the PCP server or the
  PCP-controlled device (i.e., it rolls back any tentative changes it
  might have made while processing the request).  Such an error
  response MUST consist of a complete copy of the request packet with
  the error code and other appropriate fields set in the header.

  An option MAY appear more than once in a request or in a response, if
  permitted by the definition of the option.  If the option's
  definition allows the option to appear only once but it appears more
  than once in a request, and the option is understood by the PCP
  server, the PCP server MUST respond with the MALFORMED_OPTION result
  code.  If the PCP server encounters an invalid option (e.g., PCP
  option length is longer than the UDP packet length), the error
  MALFORMED_OPTION SHOULD be returned (rather than MALFORMED_REQUEST),
  as that helps the client better understand how the packet was
  malformed.  If a PCP response would have exceeded the maximum PCP
  message size, the PCP server SHOULD respond with MALFORMED_REQUEST.

  If the overall option structure of a request cannot successfully be
  parsed (e.g., a nonsensical option length), the PCP server MUST
  generate an error response with code MALFORMED_OPTION.

  If the overall option structure of a request is valid, then how each
  individual option is handled is determined by the most significant
  bit in the option code.  If the most significant bit is set, handling
  this option is optional, and a PCP server MAY process or ignore this
  option, entirely at its discretion.  If the most significant bit is
  clear, handling this option is mandatory, and a PCP server MUST
  return the error MALFORMED_OPTION if the option contents are
  malformed, or UNSUPP_OPTION if the option is unrecognized,
  unimplemented, or disabled, or if the client is not authorized to use
  the option.  In error responses, all options are returned.  In
  success responses, all processed options are included and unprocessed
  options are not included.

  Because the PCP client cannot reject a response containing an Option,
  PCP clients MUST ignore Options that they do not understand that
  appear in responses, including Options in the mandatory-to-process
  range.  Naturally, if a client explicitly requests an Option where
  correct execution of that Option requires processing the Option data
  in the response, that client SHOULD implement code to do that.








Wing, et al.                 Standards Track                   [Page 18]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Different options are valid for different Opcodes.  For example:

  o  The THIRD_PARTY option is valid for both MAP and PEER Opcodes.

  o  The FILTER option is valid only for the MAP Opcode (for the PEER
     Opcode it would have no meaning).

  o  The PREFER_FAILURE option is valid only for the MAP Opcode (for
     the PEER Opcode, similar semantics are automatically implied).

7.4.  Result Codes

  The following result codes may be returned as a result of any Opcode
  received by the PCP server.  The only success result code is 0; other
  values indicate an error.  If a PCP server encounters multiple errors
  during processing of a request, it SHOULD use the most specific error
  message.  Each error code below is classified as either a 'long
  lifetime' error or a 'short lifetime' error, which provides guidance
  to PCP server developers for the value of the Lifetime field for
  these errors.  It is RECOMMENDED that short lifetime errors use a
  30-second lifetime and long lifetime errors use a 30-minute lifetime.

  0  SUCCESS: Success.

  1  UNSUPP_VERSION: The version number at the start of the PCP Request
     header is not recognized by this PCP server.  This is a long
     lifetime error.  This document describes PCP version 2.

  2  NOT_AUTHORIZED: The requested operation is disabled for this PCP
     client, or the PCP client requested an operation that cannot be
     fulfilled by the PCP server's security policy.  This is a long
     lifetime error.

  3  MALFORMED_REQUEST: The request could not be successfully parsed.
     This is a long lifetime error.

  4  UNSUPP_OPCODE: Unsupported Opcode.  This is a long lifetime error.

  5  UNSUPP_OPTION: Unsupported option.  This error only occurs if the
     option is in the mandatory-to-process range.  This is a long
     lifetime error.

  6  MALFORMED_OPTION: Malformed option (e.g., appears too many times,
     invalid length).  This is a long lifetime error.

  7  NETWORK_FAILURE: The PCP server or the device it controls is
     experiencing a network failure of some sort (e.g., has not yet
     obtained an external IP address).  This is a short lifetime error.



Wing, et al.                 Standards Track                   [Page 19]

RFC 6887               Port Control Protocol (PCP)            April 2013


  8  NO_RESOURCES: Request is well-formed and valid, but the server has
     insufficient resources to complete the requested operation at this
     time.  For example, the NAT device cannot create more mappings at
     this time, is short of CPU cycles or memory, or is unable to
     handle the request due to some other temporary condition.  The
     same request may succeed in the future.  This is a system-wide
     error, different from USER_EX_QUOTA.  This can be used as a catch-
     all error, should no other error message be suitable.  This is a
     short lifetime error.

  9  UNSUPP_PROTOCOL: Unsupported transport protocol, e.g., SCTP in a
     NAT that handles only UDP and TCP.  This is a long lifetime error.

  10 USER_EX_QUOTA: This attempt to create a new mapping would exceed
     this subscriber's port quota.  This is a short lifetime error.

  11 CANNOT_PROVIDE_EXTERNAL: The suggested external port and/or
     external address cannot be provided.  This error MUST only be
     returned for:
     *  MAP requests that included the PREFER_FAILURE option
        (normal MAP requests will return an available external port)
     *  MAP requests for the SCTP protocol (PREFER_FAILURE is implied)
     *  PEER requests

     See Section 13.2 for details of the PREFER_FAILURE Option.  The
     error lifetime depends on the reason for the failure.

  12 ADDRESS_MISMATCH: The source IP address of the request packet does
     not match the contents of the PCP Client's IP Address field, due
     to an unexpected NAT on the path between the PCP client and the
     PCP-controlled NAT or firewall.  This is a long lifetime error.

  13 EXCESSIVE_REMOTE_PEERS: The PCP server was not able to create the
     filters in this request.  This result code MUST only be returned
     if the MAP request contained the FILTER option.  See Section 13.3
     for details of the FILTER Option.  This is a long lifetime error.

8.  General PCP Operation

  PCP messages MUST be sent over UDP [RFC0768].  Every PCP request
  generates at least one response, so PCP does not need to run over a
  reliable transport protocol.

  When receiving multiple identical requests, the PCP server will
  generally generate identical responses -- barring cases where the PCP
  server's state changes between those requests due to other activity.
  As an example of how such a state change could happen, a request
  could be received while the PCP-controlled device has no mappings



Wing, et al.                 Standards Track                   [Page 20]

RFC 6887               Port Control Protocol (PCP)            April 2013


  available, and the PCP server will generate an error response.  If
  mappings become available and then another copy of that same request
  arrives (perhaps duplicated in transit in the network), the PCP
  server will allocate a mapping and generate a non-error response.  A
  PCP client MUST handle such updated responses for any request it
  sends, most notably to support rapid recovery (Section 14).  Also see
  the Protocol Design Note (Section 6).

8.1.  General PCP Client: Generating a Request

  This section details operation specific to a PCP client, for any
  Opcode.  Procedures specific to the MAP Opcode are described in
  Section 11, and procedures specific to the PEER Opcode are described
  in Section 12.

  Prior to sending its first PCP message, the PCP client determines
  which server to use.  The PCP client performs the following steps to
  determine its PCP server:

  1.  if a PCP server is configured (e.g., in a configuration file or
      via DHCP), that single configuration source is used as the list
      of PCP server(s), else

  2.  the default router list (for IPv4 and IPv6) is used as the list
      of PCP server(s).  Thus, if a PCP client has both an IPv4 and
      IPv6 address, it will have an IPv4 PCP server (its IPv4 default
      router) for its IPv4 mappings, and an IPv6 PCP server (its IPv6
      default router) for its IPv6 mappings.

  For the purposes of this document, only a single PCP server address
  is supported.  Should future specifications define configuration
  methods that provide a longer list of PCP server addresses, those
  specifications will define how clients select one or more addresses
  from that list.

  With that PCP server address, the PCP client formulates its PCP
  request.  The PCP request contains a PCP common header, PCP Opcode
  and payload, and (possibly) options.  As with all UDP client software
  on any operating system, when several independent PCP clients exist
  on the same host, each uses a distinct source port number to
  disambiguate their requests and replies.  The PCP client's source
  port SHOULD be randomly generated [RFC6056].

  The PCP client MUST include the source IP address of the PCP message
  in the PCP request.  This is typically its own IP address; see
  Section 16.4 for how this can be coded.  This is used to detect an
  unexpected NAT on the path between the PCP client and the
  PCP-controlled NAT or firewall device, to avoid wasting resources on



Wing, et al.                 Standards Track                   [Page 21]

RFC 6887               Port Control Protocol (PCP)            April 2013


  the PCP-controlled NAT creating pointless non-functional mappings.
  When such an intervening non-PCP-aware inner NAT is detected,
  mappings must first be created by some other means in the inner NAT,
  before mappings can be usefully created in the outer PCP-controlled
  NAT.  Having created mappings in the inner NAT by some other means,
  the PCP client should then use the inner NAT's external address as
  the client IP address, to signal to the outer PCP-controlled NAT that
  the client is aware of the inner NAT, and has taken steps to create
  mappings in it by some other means, so that mappings created in the
  outer NAT will not be a pointless waste of resources.

8.1.1.  PCP Client Retransmission

  PCP clients are responsible for reliable delivery of PCP request
  messages.  If a PCP client fails to receive an expected response from
  a server, the client must retransmit its message.  The
  retransmissions MUST use the same Mapping Nonce value (see Sections
  11.1 and 12.1).  The client begins the message exchange by
  transmitting a message to the server.  The message exchange continues
  for as long as the client wishes to maintain the mapping, and
  terminates when the PCP client is no longer interested in the PCP
  transaction (e.g., the application that requested the mapping is no
  longer interested in the mapping) or (optionally) when the message
  exchange is considered to have failed according to the retransmission
  mechanism described below.

  The client retransmission behavior is controlled and described by the
  following variables:

    RT:   Retransmission timeout, calculated as described below

   IRT:   Initial retransmission time, SHOULD be 3 seconds

   MRC:   Maximum retransmission count, SHOULD be 0 (0 indicates no
          maximum)

   MRT:   Maximum retransmission time, SHOULD be 1024 seconds

   MRD:   Maximum retransmission duration, SHOULD be 0 (0 indicates no
          maximum)

  RAND:   Randomization factor, calculated as described below

  With each message transmission or retransmission, the client sets RT
  according to the rules given below.  If RT expires before a response
  is received, the client retransmits the request and computes a new
  RT.




Wing, et al.                 Standards Track                   [Page 22]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Each of the computations of a new RT include a new randomization
  factor (RAND), which is a random number chosen with a uniform
  distribution between -0.1 and +0.1.  The randomization factor is
  included to minimize synchronization of messages transmitted by PCP
  clients.  The algorithm for choosing a random number does not need to
  be cryptographically sound.  The algorithm SHOULD produce a different
  sequence of random numbers from each invocation of the PCP client.

  The RT value is initialized based on IRT:

     RT = (1 + RAND) * IRT

  RT for each subsequent message transmission is based on the previous
  value of RT, subject to the upper bound on the value of RT specified
  by MRT.  If MRT has a value of 0, there is no upper limit on the
  value of RT, and MRT is treated as "infinity".  The new value of RT
  is calculated as shown below, where RTprev is the current value of
  RT:

     RT = (1 + RAND) * MIN (2 * RTprev, MRT)

  MRC specifies an upper bound on the number of times a client may
  retransmit a message.  Unless MRC is zero, the message exchange fails
  once the client has transmitted the message MRC times.

  MRD specifies an upper bound on the length of time a client may
  retransmit a message.  Unless MRD is zero, the message exchange fails
  once MRD seconds have elapsed since the client first transmitted the
  message.

  If both MRC and MRD are non-zero, the message exchange fails whenever
  either of the conditions specified in the previous two paragraphs are
  met.  If both MRC and MRD are zero, the client continues to transmit
  the message until it receives a response or the client no longer
  wants a mapping.

  Once a PCP client has successfully received a response from a PCP
  server on that interface, it resets RT to a value randomly selected
  in the range 1/2 to 5/8 of the mapping lifetime, as described in
  Section 11.2.1, "Renewing a Mapping", and sends subsequent PCP
  requests for that mapping to that same server.

     Note: If the server's state changes between retransmissions and
     the server's response is delayed or lost, the state in the PCP
     client and server may not be synchronized.  This is not unique to
     PCP, but also occurs with other network protocols (e.g., TCP).  In
     the unlikely event that such de-synchronization occurs, PCP heals
     itself after lifetime seconds.



Wing, et al.                 Standards Track                   [Page 23]

RFC 6887               Port Control Protocol (PCP)            April 2013


8.2.  General PCP Server: Processing a Request

  This section details operation specific to a PCP server.  Processing
  SHOULD be performed in the order of the following paragraphs.

  A PCP server MUST only accept normal (non-THIRD_PARTY) PCP requests
  from a client on the same interface from which it would normally
  receive packets from that client, and it MUST silently ignore PCP
  requests arriving on any other interface.  For example, a residential
  NAT gateway accepts PCP requests only when they arrive on its (LAN)
  interface connecting to the internal network, and silently ignores
  any PCP requests arriving on its external (WAN) interface.  A PCP
  server that supports THIRD_PARTY requests MAY be configured to accept
  THIRD_PARTY requests on other configured interfaces (see Section 13.1
  for details on the THIRD_PARTY Option).

  Upon receiving a request, the PCP server parses and validates it.  A
  valid request contains a valid PCP common header, one valid PCP
  Opcode, and zero or more options (which the server might or might not
  comprehend).  If an error is encountered during processing, the
  server generates an error response that is sent back to the PCP
  client.  Processing of an Opcode and its options is specific to each
  Opcode.

  Error responses have the same packet layout as success responses,
  with certain fields from the request copied into the response, and
  other fields assigned by the PCP server set as indicated in Figure 3.

  Copying request fields into the response is important because this is
  what enables a client to identify to which request a given response
  pertains.  For Opcodes that are understood by the PCP server, it
  follows the requirements of that Opcode to copy the appropriate
  fields.  For Opcodes that are not understood by the PCP server, it
  simply generates the UNSUPP_OPCODE response and copies fields from
  the PCP header and copies the rest of the PCP payload as is (without
  attempting to interpret it).

  All responses (both error and success) contain the same Opcode as the
  request, but with the "R" bit set.

  Any error response has a non-zero result code, and is created by:

  o  Copying the entire UDP payload, or 1100 octets, whichever is less,
     and zero-padding the response to a multiple of 4 octets if
     necessary
  o  Setting the R bit
  o  Setting the result code
  o  Setting the Lifetime, Epoch Time, and Reserved fields



Wing, et al.                 Standards Track                   [Page 24]

RFC 6887               Port Control Protocol (PCP)            April 2013


  o  Updating other fields in the response, as indicated by 'set by the
     server' in the PCP response field description

  A success response has a zero result code, and is created by:

  o  Copying the first 4 octets of request packet header
  o  Setting the R bit
  o  Setting the result code to zero
  o  Setting the Lifetime, Epoch Time, and Reserved fields
  o  Possibly setting Opcode-specific response data if appropriate
  o  Adding any processed options to the response message

  If the received PCP request message is less than 2 octets long, it is
  silently dropped.

  If the R bit is set, the message is silently dropped.

  If the first octet (version) is a version that is not supported, a
  response is generated with the UNSUPP_VERSION result code, and the
  Version Negotiation steps detailed in Section 9 are followed.

  Otherwise, if the version is supported but the received message is
  shorter than 24 octets, the message is silently dropped.

  If the server is overloaded by requests (from a particular client or
  from all clients), it MAY simply silently discard requests, as the
  requests will be retried by PCP clients, or it MAY generate the
  NO_RESOURCES error response.

  If the length of the message exceeds 1100 octets, is not a multiple
  of 4 octets, or is too short for the Opcode in question, it is
  invalid and a MALFORMED_REQUEST response is generated, and the
  response message is truncated to 1100 octets.

  The PCP server compares the source IP address (from the received IP
  header) with the field PCP Client IP Address.  If they do not match,
  the error ADDRESS_MISMATCH MUST be returned.  This is done to detect
  and prevent accidental use of PCP where a non-PCP-aware NAT exists
  between the PCP client and PCP server.  If the PCP client wants such
  a mapping, it needs to ensure that the PCP field matches its apparent
  IP address from the perspective of the PCP server.

8.3.  General PCP Client: Processing a Response

  The PCP client receives the response and verifies that the source IP
  address and port belong to the PCP server of a previously sent PCP
  request.  If not, the response is silently dropped.




Wing, et al.                 Standards Track                   [Page 25]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If the received PCP response message is less than 4 octets long, it
  is silently dropped.

  If the R bit is clear, the message is silently dropped.

  If the error code is UNSUPP_VERSION, Version Negotiation processing
  continues as described in Section 9.

  Responses shorter than 24 octets, longer than 1100 octets, or not a
  multiple of 4 octets are invalid and ignored.

  The PCP client then validates that the Opcode matches a previous PCP
  request.  If the response does not match a previous PCP request, the
  response is ignored.  The response is further matched by comparing
  fields in the response Opcode-specific data to fields in the request
  Opcode-specific data, as described by the processing for that Opcode.
  If that fails, the response is ignored.

  After these matches are successful, the PCP client checks the Epoch
  Time field (see Section 8.5) to determine if it needs to restore its
  state to the PCP server.  A PCP client SHOULD be prepared to receive
  multiple responses from the PCP server at any time after a single
  request is sent.  This allows the PCP server to inform the client of
  mapping changes such as an update or deletion.  For example, a PCP
  server might send a SUCCESS response and, after a configuration
  change on the PCP server, later send a NOT_AUTHORIZED response.  A
  PCP client MUST be prepared to receive responses for requests it
  never sent (which could have been sent by a previous PCP instance on
  this same host, or by a previous host that used the same client IP
  address, or by a malicious attacker) by simply ignoring those
  unexpected messages.

  If the error ADDRESS_MISMATCH is received, it indicates the presence
  of a NAT between the PCP client and PCP server.  Procedures to
  resolve this problem are beyond the scope of this document.

  For both success and error responses, a Lifetime value is returned.
  The lifetime indicates how long this response should be considered
  valid by the client (i.e for success results, how long the mapping
  will last, and for failure results how long the same failure
  condition should be expected to persist).  The PCP client SHOULD
  impose an upper limit on this returned value (to protect against
  absurdly large values, e.g., 5 years), detailed in Section 15,
  "Mapping Lifetime and Deletion".

  If the result code is 0 (SUCCESS), the request succeeded.





Wing, et al.                 Standards Track                   [Page 26]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If the result code is not 0, the request failed, and the PCP client
  SHOULD NOT resend the same request for the indicated lifetime of the
  error (as limited by the sanity checking detailed in Section 15).

  If the PCP client has discovered a new PCP server (e.g., connected to
  a new network), the PCP client MAY immediately begin communicating
  with this PCP server, without regard to hold times from communicating
  with a previous PCP server.

8.4.  Multi-Interface Issues

  Hosts that desire a PCP mapping might be multi-interfaced (i.e., own
  several logical/physical interfaces).  Indeed, a host can be
  configured with several IPv4 addresses (e.g., WiFi and Ethernet) or
  dual-stacked.  These IP addresses may have distinct reachability
  scopes (e.g., if IPv6, they might have global reachability scope as
  is the case for a Global Unicast Address (GUA) [RFC3587] or limited
  scope as is the case for a Unique Local Address (ULA) [RFC4193]).

  IPv6 addresses with global reachability (e.g., GUAs) SHOULD be used
  as the source address when generating a PCP request.  IPv6 addresses
  without global reachability (e.g., ULAs) SHOULD NOT be used as the
  source interface when generating a PCP request.  If IPv6 privacy
  addresses [RFC4941] are used for PCP mappings, a new PCP request will
  need to be issued whenever the IPv6 privacy address is changed.  This
  PCP request SHOULD be sent from the IPv6 privacy address itself.  It
  is RECOMMENDED that the client delete its mappings to the previous
  privacy address after it no longer needs those old mappings.

  Due to the ubiquity of IPv4 NAT, IPv4 addresses with limited scope
  (e.g., private addresses [RFC1918]) MAY be used as the source
  interface when generating a PCP request.

8.5.  Epoch

  Every PCP response sent by the PCP server includes an Epoch Time
  field.  This time field increments by one every second.  Anomalies in
  the received Epoch Time value provide a hint to PCP clients that a
  PCP server state loss may have occurred.  Clients respond to such
  state loss hints by promptly renewing their mappings, so as to
  quickly restore any lost state at the PCP server.

  If the PCP server resets or loses the state of its explicit dynamic
  mappings (that is, those mappings created by PCP requests), due to
  reboot, power failure, or any other reason, it MUST reset its Epoch
  time to its initial starting value (usually zero) to provide this
  hint to PCP clients.  After resetting its Epoch time, the PCP server
  resumes incrementing the Epoch Time value by one every second.



Wing, et al.                 Standards Track                   [Page 27]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Similarly, if the external IP address(es) of the NAT (controlled by
  the PCP server) changes, the Epoch time MUST be reset.  A PCP server
  MAY maintain one Epoch Time value for all PCP clients or MAY maintain
  distinct Epoch Time values (per PCP client, per interface, or based
  on other criteria); this choice is implementation-dependent.

  Whenever a client receives a PCP response, the client validates the
  received Epoch Time value according to the procedure below, using
  integer arithmetic:

  o  If this is the first PCP response the client has received from
     this PCP server, the Epoch Time value is treated as necessarily
     valid, otherwise

     *  If the current PCP server Epoch time (curr_server_time) is less
        than the previously received PCP server Epoch time
        (prev_server_time) by more than one second, then the client
        treats the Epoch time as obviously invalid (time should not go
        backwards).  The server Epoch time apparently going backwards
        by *up to* one second is not deemed invalid, so that minor
        packet reordering on the path from PCP server to PCP client
        does not trigger a cascade of unnecessary mapping renewals.  If
        the server Epoch time passes this check, then further
        validation checks are performed:

        +  The client computes the difference between its
           current local time (curr_client_time) and the
           time the previous PCP response was received from this PCP
           server (prev_client_time):
           client_delta = curr_client_time - prev_client_time;

        +  The client computes the difference between the
           current PCP server Epoch time (curr_server_time) and the
           previously received Epoch time (prev_server_time):
           server_delta = curr_server_time - prev_server_time;

        +  If client_delta+2 < server_delta - server_delta/16
           or server_delta+2 < client_delta - client_delta/16,
           then the client treats the Epoch Time value as invalid,
           else the client treats the Epoch Time value as valid.

  o  The client records the current time values for use in its next
     comparison:
     prev_client_time = curr_client_time
     prev_server_time = curr_server_time






Wing, et al.                 Standards Track                   [Page 28]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If the PCP client determined that the Epoch Time value it received
  was invalid, then it concludes that the PCP server may have lost
  state, and promptly renews all its active port mapping leases
  following the mapping recreation procedure described in
  Section 16.3.1.

  Notes:

  o  The client clock MUST never go backwards.  If curr_client_time is
     found to be less than prev_client_time, then this is a client bug,
     and how the client deals with this client bug is implementation
     specific.

  o  The calculations above are constructed to allow client_delta and
     server_delta to be computed as unsigned integer values.

  o  The "+2" in the calculations above is to accommodate quantization
     errors in client and server clocks (up to one-second quantization
     error each in server and client time intervals).

  o  The "/16" in the calculations above is to accommodate inaccurate
     clocks in low-cost devices.  This allows for a total discrepancy
     of up to 1/16 (6.25%) to be considered benign; e.g., if one clock
     were to run too fast by 3% while the other clock ran too slow by
     3%, then the client would not consider this difference to be
     anomalous or indicative of a restart having occurred.  This
     tolerance is strict enough to be effective at detecting reboots,
     while not being so strict as to generate false alarms.

9.  Version Negotiation

  A PCP client sends its requests using PCP version number 2.  Should
  later updates to this document specify different message formats with
  a version number greater than 2, it is expected that PCP servers will
  still support version 2 in addition to the newer version(s).
  However, in the event that a server returns a response with result
  code UNSUPP_VERSION, the client MAY log an error message to inform
  the user that it is too old to work with this server.

  Should later updates to this document specify different message
  formats with a version number greater than 2, and backwards
  compatibility be desired, this first octet can be used for forward
  and backward compatibility.








Wing, et al.                 Standards Track                   [Page 29]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If future PCP versions greater than 2 are specified, version
  negotiation proceeds as follows:

  1.  The client sends its first request using the highest
      (i.e., presumably 'best') version number it supports.

  2.  If the server supports that version, it responds normally.

  3.  If the server does not support that version, it replies giving a
      result containing the result code UNSUPP_VERSION, and the closest
      version number it does support (if the server supports a range of
      versions higher than the client's requested version, the server
      returns the lowest of that supported range; if the server
      supports a range of versions lower than the client's requested
      version, the server returns the highest of that supported range).

  4.  If the client receives an UNSUPP_VERSION result containing a
      version it does support, it records this fact and proceeds to use
      this message version for subsequent communication with this PCP
      server (until a possible future UNSUPP_VERSION response if the
      server is later updated, at which point the version negotiation
      process repeats).  If the version number in the UNSUPP_VERSION
      response is zero then that means this is a NAT-PMP server
      [RFC6886], and a client MAY choose to communicate with it using
      the older NAT-PMP protocol, as described in Appendix A.

  5.  If the client receives an UNSUPP_VERSION result containing a
      version it does not support, then the client SHOULD try the next-
      lower version supported by the client.  The attempt to use the
      next-lower version repeats until the client has tried version 2.
      If using version 2 fails, the client MAY log an error message to
      inform the user that it is too old to work with this server, and
      the client SHOULD set a timer to retry its request in 30 minutes
      or the returned Lifetime value, whichever is smaller.  By
      automatically retrying in 30 minutes, the protocol accommodates
      an upgrade of the PCP server.

10.  Introduction to MAP and PEER Opcodes

  There are four uses for the MAP and PEER Opcodes defined in this
  document:

  o  a host operating a server and wanting an incoming connection
     (Section 10.1);

  o  a host operating a client and server on the same port
     (Section 10.2);




Wing, et al.                 Standards Track                   [Page 30]

RFC 6887               Port Control Protocol (PCP)            April 2013


  o  a host operating a client and wanting to optimize the application
     keepalive traffic (Section 10.3); and

  o  a host operating a client and wanting to restore lost state in its
     NAT (Section 10.4).

  These are discussed in the following sections, and a (non-normative)
  state diagram is provided in Section 16.5.

  When operating a server (see Sections 10.1 and 10.2), the PCP client
  knows if it wants an IPv4 listener, IPv6 listener, or both on the
  Internet.  The PCP client also knows if it has an IPv4 address or
  IPv6 address configured on one of its interfaces.  It takes the union
  of this knowledge to decide to which of its PCP servers to send the
  request (e.g., an IPv4 address or an IPv6 address), and whether to
  send one or two MAP requests for each of its interfaces (e.g., if the
  PCP client has only an IPv4 address but wants both IPv6 and IPv4
  listeners, it sends a MAP request containing the all-zeros IPv6
  address in the Suggested External Address field, and sends a second
  MAP request containing the all-zeros IPv4 address in the Suggested
  External Address field).  If the PCP client has both an IPv4 and IPv6
  address, and only wants an IPv4 listener, it sends one MAP request
  from its IPv4 address (if the PCP server supports NAT44 or IPv4
  firewall) or one MAP request from its IPv6 address (if the PCP server
  supports NAT64).  The PCP client can simply request the desired
  mapping to determine if the PCP server supports the desired mapping.
  Applications that embed IP addresses in payloads (e.g., FTP, SIP)
  will find it beneficial to avoid address family translation, if
  possible.

  The MAP and PEER requests include a Suggested External IP Address
  field.  Some PCP-controlled devices, especially CGN but also multi-
  homed NPTv6 networks, have a pool of public-facing IP addresses.  PCP
  allows the client to indicate if it wants a mapping assigned on a
  specific address of that pool or any address of that pool.  Some
  applications will break if mappings are created on different IP
  addresses (e.g., active mode FTP), so applications should carefully
  consider the implications of using this capability.  Static mappings
  for that internal address (e.g., those created by a command-line
  interface on the PCP server or PCP-controlled device) may exist to a
  certain external address, and if the suggested external IP address is
  the IPv4 or IPv6 all-zeros address, PCP SHOULD assign its mappings to
  the same external address, as this can also help applications using a
  mix of both static mappings and PCP-created mappings.  If, on the
  other hand, the suggested external IP address contains a non-zero IP
  address the PCP server SHOULD create a mapping to that external
  address, even if there are other mappings from that same internal
  address to a different external address.  Once an internal address



Wing, et al.                 Standards Track                   [Page 31]

RFC 6887               Port Control Protocol (PCP)            April 2013


  has no implicit dynamic mappings and no explicit dynamic mappings in
  the PCP-controlled device, a subsequent implicit or explicit mapping
  for that internal address MAY be assigned to a different External
  address.  Generally, this reassignment would occur when a CGN device
  is load balancing newly seen internal addresses to its public pool of
  external addresses.

  The following table summarizes how various common PCP deployments use
  IPv6 and IPv4 addresses.

  The 'internal' address is implicitly the same as the source IP
  address of the PCP request, except when the THIRD_PARTY option is
  used.

  The 'external' address is the Suggested External Address field of the
  MAP or PEER request, and its address family is usually the same as
  the 'internal' address family, except when technologies like NAT64
  are used.

  The 'remote peer' address is the remote peer IP address of the PEER
  request or the FILTER option of the MAP request, and is always the
  same address family as the 'internal' address, even when NAT64 is
  used.  In NAT64, the IPv6 PCP client is not necessarily aware of the
  NAT64 or aware of the actual IPv4 address of the remote peer, so it
  expresses the IPv6 address from its perspective, as shown in Figure
  5.

                internal  external  PCP remote peer  actual remote peer
                --------  -------   ---------------  ------------------
  IPv4 firewall   IPv4      IPv4         IPv4              IPv4
  IPv6 firewall   IPv6      IPv6         IPv6              IPv6
          NAT44   IPv4      IPv4         IPv4              IPv4
          NAT46   IPv4      IPv6         IPv4              IPv6
          NAT64   IPv6      IPv4         IPv6              IPv4
          NPTv6   IPv6      IPv6         IPv6              IPv6

              Figure 5: Address Families with MAP and PEER

  Note that the internal address and the remote peer address are always
  the same address family, and the external address and the actual
  remote peer address are always the same address family.










Wing, et al.                 Standards Track                   [Page 32]

RFC 6887               Port Control Protocol (PCP)            April 2013


10.1.  For Operating a Server

  A host operating a server (e.g., a web server) listens for traffic on
  a port, but the server never initiates traffic from that port.  For
  this to work across a NAT or a firewall, the host needs to (a) create
  a mapping from a public IP address, protocol, and port to itself
  using the MAP Opcode, as described in Section 11; (b) publish that
  public IP address, protocol, and port via some sort of rendezvous
  server (e.g., DNS, a SIP message, or a proprietary protocol); and
  (c) ensure that any other non-PCP-speaking packet filtering
  middleboxes on the path (e.g., host-based firewall, network-based
  firewall, or other NATs) will also allow the incoming traffic.
  Publishing the public IP address and port is out of scope of this
  specification.  To accomplish (a), the host follows the procedures
  described in this section.

  As normal, the application needs to begin listening on a port.  Then,
  the application constructs a PCP message with the MAP Opcode, with
  the external address set to the appropriate all-zeros address,
  depending on whether it wants a public IPv4 or IPv6 address.































Wing, et al.                 Standards Track                   [Page 33]

RFC 6887               Port Control Protocol (PCP)            April 2013


  The following pseudocode shows how PCP can be reliably used to
  operate a server:

   /* start listening on the local server port */
   int s = socket(...);
   bind(s, ...);
   listen(s, ...);

   getsockname(s, &internal_sockaddr, ...);
   bzero(&external_sockaddr, sizeof(external_sockaddr));

   while (1)
       {
       /* Note: The "time_to_send_pcp_request()" check below includes:
        * 1. Sending the first request
        * 2. Retransmitting requests due to packet loss
        * 3. Resending a request due to impending lease expiration
        * 4. Resending a request due to server state loss
        * The PCP packet sent is identical in all four cases; from
        * the PCP server's point of view they are the same operation.
        * The suggested external address and port may be updated
        * repeatedly during the lifetime of the mapping.
        * Other fields in the packet generally remain unchanged.
        */
       if (time_to_send_pcp_request())
           pcp_send_map_request(internal_sockaddr.sin_port,
               internal_sockaddr.sin_addr,
               &external_sockaddr, /* will be zero the first time */
               requested_lifetime, &assigned_lifetime);

       if (pcp_response_received())
           update_rendezvous_server("Client Ident", external_sockaddr);

       if (received_incoming_connection_or_packet())
           process_it(s);

       if (other_work_to_do())
           do_it();

       /* ... */

       block_until_we_need_to_do_something_else();
       }

         Figure 6: Pseudocode for Using PCP to Operate a Server






Wing, et al.                 Standards Track                   [Page 34]

RFC 6887               Port Control Protocol (PCP)            April 2013


10.2.  For Operating a Symmetric Client/Server

  A host operating a client and server on the same port (e.g.,
  Symmetric RTP [RFC4961] or SIP Symmetric Response Routing (rport)
  [RFC3581]) first establishes a local listener, (usually) sends the
  local and public IP addresses, protocol, and ports to a rendezvous
  service (which is out of scope of this document), and initiates an
  outbound connection from that same source address and same port.  To
  accomplish this, the application uses the procedure described in this
  section.

  An application that is using the same port for outgoing connections
  as well as incoming connections MUST first signal its operation of a
  server using the PCP MAP Opcode, as described in Section 11, and
  receive a positive PCP response before it sends any packets from that
  port.

     Discussion: In general, a PCP client doesn't know in advance if it
     is behind a NAT or firewall.  On detecting that the host has
     connected to a new network, the PCP client can attempt to request
     a mapping using PCP; if that succeeds, then the client knows it
     has successfully created a mapping.  If, after multiple retries,
     it has received no PCP response, then either the client is *not*
     behind a NAT or firewall and has unfettered connectivity or the
     client *is* behind a NAT or firewall that doesn't support PCP (and
     the client may still have working connectivity by virtue of static
     mappings previously created manually by the user).  Retransmitting
     PCP requests multiple times before giving up and assuming
     unfettered connectivity adds delay in that case.  Initiating
     outbound TCP connections immediately without waiting for PCP
     avoids this delay, and will work if the NAT has endpoint-
     independent mapping (EIM) behavior, but may fail if the NAT has
     endpoint-dependent mapping (EDM) behavior.  Waiting enough time to
     allow an explicit PCP MAP mapping to be created (if possible)
     first ensures that the same external port will then be used for
     all subsequent implicit dynamic mappings (e.g., TCP SYNs) sent
     from the specified internal address, protocol, and port.  PCP
     supports both EIM and EDM NATs, so clients need to assume they may
     be dealing with an EDM NAT.  In this case, the client will
     experience more reliable connectivity if it attempts explicit PCP
     MAP requests first, before initiating any outbound TCP connections
     from that internal address and port.  For further information on
     using PCP with EDM NATs, see Section 16.1.








Wing, et al.                 Standards Track                   [Page 35]

RFC 6887               Port Control Protocol (PCP)            April 2013


  The following pseudocode shows how PCP can be used to operate a
  symmetric client and server:

   /* start listening on the local server port */
   int s = socket(...);
   bind(s, ...);
   listen(s, ...);

   getsockname(s, &internal_sockaddr, ...);
   bzero(&external_sockaddr, sizeof(external_sockaddr));

   while (1)
       {
       /* Note: The "time_to_send_pcp_request()" check below includes:
        * 1. Sending the first request
        * 2. Retransmitting requests due to packet loss
        * 3. Resending a request due to impending lease expiration
        * 4. Resending a request due to server state loss
        */
       if (time_to_send_pcp_request())
           pcp_send_map_request(internal_sockaddr.sin_port,
               internal_sockaddr.sin_addr,
               &external_sockaddr, /* will be zero the first time */
               requested_lifetime, &assigned_lifetime);

       if (pcp_response_received())
           update_rendezvous_server("Client Ident", external_sockaddr);

       if (received_incoming_connection_or_packet())
           process_it(s);

       if (need_to_make_outgoing_connection())
           make_outgoing_connection(s, ...);

       if (data_to_send())
           send_it(s);

       if (other_work_to_do())
           do_it();

       /* ... */

       block_until_we_need_to_do_something_else();
       }

             Figure 7: Pseudocode for Using PCP to Operate a
                         Symmetric Client/Server




Wing, et al.                 Standards Track                   [Page 36]

RFC 6887               Port Control Protocol (PCP)            April 2013


10.3.  For Reducing NAT or Firewall Keepalive Messages

  A host operating a client (e.g., XMPP client, SIP client) sends from
  a port, and may receive responses, but never accepts incoming
  connections from other remote peers on this port.  It wants to ensure
  that the flow to its remote peer is not terminated (due to
  inactivity) by an on-path NAT or firewall.  To accomplish this, the
  application uses the procedure described in this section.

  Middleboxes, such as NATs or firewalls, generally need to see
  occasional traffic or they will terminate their session state,
  causing application failures.  To avoid this, many applications
  routinely generate keepalive traffic for the primary (or sole)
  purpose of maintaining state with such middleboxes.  Applications can
  reduce such application keepalive traffic by using PCP.

     Note: For reasons beyond NAT, an application may find it useful to
     perform application-level keepalives, such as to detect a broken
     path between the client and server, keep state alive on the remote
     peer, or detect a powered-down client.  These keepalives are not
     related to maintaining middlebox state, and PCP cannot do anything
     useful to reduce those keepalives.

  To use PCP for this function, the application first connects to its
  server, as normal.  Afterwards, it issues a PCP request with the PEER
  Opcode as described in Section 12 to learn and/or extend the lifetime
  of its mapping.
























Wing, et al.                 Standards Track                   [Page 37]

RFC 6887               Port Control Protocol (PCP)            April 2013


  The following pseudocode shows how PCP can be reliably used with a
  dynamic socket, for the purposes of reducing application keepalive
  messages:

   /* make outgoing connection to server */
   int s = socket(...);
   connect(s, &remote_peer, ...);

   getsockname(s, &internal_sockaddr, ...);
   bzero(&external_sockaddr, sizeof(external_sockaddr));

   while (1)
       {
       /* Note: The "time_to_send_pcp_request()" check below includes:
        * 1. Sending the first request
        * 2. Retransmitting requests due to packet loss
        * 3. Resending a request due to impending lease expiration
        * 4. Resending a request due to server state loss
        */
       if (time_to_send_pcp_request())
           pcp_send_peer_request(internal_sockaddr.sin_port,
               internal_sockaddr.sin_addr,
               &external_sockaddr, /* will be zero the first time */
               remote_peer, requested_lifetime, &assigned_lifetime);

       if (data_to_send())
           send_it(s);

       if (received_incoming_data())
           process_it(s);

       if (other_work_to_do())
           do_it();

       /* ... */

       block_until_we_need_to_do_something_else();
       }

          Figure 8: Pseudocode Using PCP with a Dynamic Socket

10.4.  For Restoring Lost Implicit TCP Dynamic Mapping State

  After a NAT loses state (e.g., because of a crash or power failure),
  it is useful for clients to re-establish TCP mappings on the NAT.
  This allows servers on the Internet to see traffic from the same IP
  address and port, so that sessions can be resumed exactly where they
  were left off.  This can be useful for long-lived connections



Wing, et al.                 Standards Track                   [Page 38]

RFC 6887               Port Control Protocol (PCP)            April 2013


  (e.g., instant messaging) or for connections transferring a lot of
  data (e.g., FTP).  This can be accomplished by first establishing a
  TCP connection normally and then sending a PEER request/response and
  remembering the external address and external port.  Later, when the
  NAT has lost state, the client can send a PEER request with the
  suggested external port and suggested external address remembered
  from the previous session, which will create a mapping in the NAT
  that functions exactly as an implicit dynamic mapping.  The client
  then resumes sending TCP data to the server.

     Note: This procedure works well for TCP, provided:

        (i) the NAT creates a new implicit dynamic outbound mapping
        only for outbound TCP segments with the SYN bit set (i.e., the
        newly booted NAT silently drops outbound data segments from the
        client when the NAT does not have an active mapping for those
        segments), and

        (ii) the newly booted NAT does not send a TCP RST in response
        to receiving unexpected inbound TCP segments.

     This procedure works less well for UDP, because as soon as
     outbound UDP traffic is seen by the NAT, a new UDP implicit
     dynamic outbound mapping will be created (probably on a different
     port).

11.  MAP Opcode

  This section defines an Opcode that controls inbound forwarding from
  a NAT (or firewall) to an internal host.

  MAP:  Create an explicit dynamic mapping between an Internal Address
          + Port and an External Address + Port.

  PCP servers SHOULD provide a configuration option to allow
  administrators to disable MAP support if they wish.

  Mappings created by PCP MAP requests are, by definition, endpoint-
  independent mappings (EIMs) with endpoint-independent filtering (EIF)
  (unless the FILTER option is used), even on a NAT that usually
  creates endpoint-dependent mapping (EDM) or endpoint-dependent
  filtering (EDF) for outgoing connections, since the purpose of an
  (unfiltered) MAP mapping is to receive inbound traffic from any
  remote endpoint, not from only one specific remote endpoint.

  Note also that all NAT mappings (created by PCP or otherwise) are by
  necessity bidirectional and symmetric.  For any packet going in one
  direction (in or out) that is translated by the NAT, a reply going in



Wing, et al.                 Standards Track                   [Page 39]

RFC 6887               Port Control Protocol (PCP)            April 2013


  the opposite direction needs to have the corresponding opposite
  translation done so that the reply arrives at the right endpoint.
  This means that if a client creates a MAP mapping, and then later
  sends an outgoing packet using the mapping's internal address,
  protocol, and port, the NAT should translate that packet's internal
  address and port to the mapping's external address and port, so that
  replies addressed to the external address and port are correctly
  translated back to the mapping's internal address and port.

  On operating systems that allow multiple listening servers to bind to
  the same internal address, protocol, and port, servers MUST ensure
  that they have exclusive use of that internal address, protocol, and
  port (e.g., by binding the port using INADDR_ANY, or using
  SO_EXCLUSIVEADDRUSE or similar) before sending their PCP MAP request,
  to ensure that no other PCP clients on the same machine are also
  listening on the same internal protocol and internal port.

  As a side effect of creating a mapping, ICMP messages associated with
  the mapping MUST be forwarded (and also translated, if appropriate)
  for the duration of the mapping's lifetime.  This is done to ensure
  that ICMP messages can still be used by hosts, without application
  programmers or PCP client implementations needing to use PCP
  separately to create ICMP mappings for those flows.

  The operation of the MAP Opcode is described in this section.

11.1.  MAP Operation Packet Formats

  The MAP Opcode has a similar packet layout for both requests and
  responses.  If the assigned external IP address and port in the PCP
  response always match the internal IP address and port from the PCP
  request, then the functionality is purely a firewall; otherwise, the
  functionality is a Network Address Translator that might also perform
  firewall-like functions.

















Wing, et al.                 Standards Track                   [Page 40]

RFC 6887               Port Control Protocol (PCP)            April 2013


  The following diagram shows the format of the Opcode-specific
  information in a request for the MAP Opcode.

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                 Mapping Nonce (96 bits)                       |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |   Protocol    |          Reserved (24 bits)                   |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |        Internal Port          |    Suggested External Port    |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |           Suggested External IP Address (128 bits)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                      Figure 9: MAP Opcode Request

  These fields are described below:

  Requested lifetime (in common header):  Requested lifetime of this
     mapping, in seconds.  The value 0 indicates "delete".

  Mapping Nonce:  Random value chosen by the PCP client.  See
     Section 11.2, "Generating a MAP Request".  Zero is a legal value
     (but unlikely, occurring in roughly one in 2^96 requests).

  Protocol:  Upper-layer protocol associated with this Opcode.  Values
     are taken from the IANA protocol registry [proto_numbers].  For
     example, this field contains 6 (TCP) if the Opcode is intended to
     create a TCP mapping.  This field contains 17 (UDP) if the Opcode
     is intended to create a UDP mapping.  The value 0 has a special
     meaning for 'all protocols'.

  Reserved:  24 reserved bits, MUST be sent as 0 and MUST be ignored
     when received.

  Internal Port:  Internal port for the mapping.  The value 0 indicates
     'all ports', and is legal when the lifetime is zero (a delete
     request), if the protocol does not use 16-bit port numbers, or the
     client is requesting 'all ports'.  If the protocol is zero
     (meaning 'all protocols'), then internal port MUST be zero on
     transmission and MUST be ignored on reception.




Wing, et al.                 Standards Track                   [Page 41]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Suggested External Port:  Suggested external port for the mapping.
     This is useful for refreshing a mapping, especially after the PCP
     server loses state.  If the PCP client does not know the external
     port, or does not have a preference, it MUST use 0.

  Suggested External IP Address:  Suggested external IPv4 or IPv6
     address.  This is useful for refreshing a mapping, especially
     after the PCP server loses state.  If the PCP client does not know
     the external address, or does not have a preference, it MUST use
     the address-family-specific all-zeros address (see Section 5).

  The internal address for the request is the source IP address of the
  PCP request message itself, unless the THIRD_PARTY option is used.

  The following diagram shows the format of Opcode-specific information
  in a response packet for the MAP Opcode:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                 Mapping Nonce (96 bits)                       |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |   Protocol    |          Reserved (24 bits)                   |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |        Internal Port          |    Assigned External Port     |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Assigned External IP Address (128 bits)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                     Figure 10: MAP Opcode Response

  These fields are described below:

  Lifetime (in common header):  On an error response, this indicates
     how long clients should assume they'll get the same error response
     from the PCP server if they repeat the same request.  On a success
     response, this indicates the lifetime for this mapping, in
     seconds.

  Mapping Nonce:  Copied from the request.

  Protocol:  Copied from the request.




Wing, et al.                 Standards Track                   [Page 42]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Reserved:  24 reserved bits, MUST be sent as 0 and MUST be ignored
     when received.

  Internal Port:  Copied from the request.

  Assigned External Port:  On a success response, this is the assigned
     external port for the mapping.  On an error response, the
     suggested external port is copied from the request.

  Assigned External IP Address:  On a success response, this is the
     assigned external IPv4 or IPv6 address for the mapping.  An IPv4
     address is encoded using IPv4-mapped IPv6 address.  On an error
     response, the suggested external IP address is copied from the
     request.

11.2.  Generating a MAP Request

  This section describes the operation of a PCP client when sending
  requests with the MAP Opcode.

  The request MAY contain values in the Suggested External Port and
  Suggested External IP Address fields.  This allows the PCP client to
  attempt to rebuild lost state on the PCP server, which improves the
  chances of existing connections surviving, and helps the PCP client
  avoid having to change information maintained at its rendezvous
  server.  Of course, due to other activity on the network (e.g., by
  other users or network renumbering), the PCP server may not be able
  to grant the suggested external IP address, protocol, and port, and
  in that case it will assign a different external IP address and port.

  A PCP client MUST be written assuming that it may *never* be assigned
  the external port it suggests.  In the case of recreating state after
  a NAT gateway crash, the suggested external port, being one that was
  previously allocated to this client, is likely to be available for
  this client to continue using.  In all other cases, the client MUST
  assume that it is unlikely that its suggested external port will be
  granted.  For example, when many subscribers are sharing a Carrier-
  Grade NAT, popular ports such as 80, 443, and 8080 are likely to be
  in high demand.  At most one client can have each of those popular
  ports for each external IP address, and all the other clients will be
  assigned other, dynamically allocated, external ports.  Indeed, some
  ISPs may, by policy, choose not to grant those external ports to
  *anyone*, so that none of their clients are *ever* assigned external
  ports 80, 443, or 8080.

  If the protocol does not use 16-bit port numbers (e.g., RSVP, IP
  protocol number 46), the port number MUST be zero.  This will cause
  all traffic matching that protocol to be mapped.



Wing, et al.                 Standards Track                   [Page 43]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If the client wants all protocols mapped, it uses protocol 0 (zero)
  and internal port 0 (zero).

  The Mapping Nonce value is randomly chosen by the PCP client,
  following accepted practices for generating unguessable random
  numbers [RFC4086], and is used as part of the validation of PCP
  responses (see below) by the PCP client, and validation for mapping
  refreshes by the PCP server.  The client MUST use a different mapping
  nonce for each PCP server it communicates with, and it is RECOMMENDED
  to choose a new random mapping nonce whenever the PCP client is
  initialized.  The client MAY use a different mapping nonce for every
  mapping.

11.2.1.  Renewing a Mapping

  An existing mapping SHOULD have its lifetime extended by the PCP
  client for as long as the client wishes to have that mapping continue
  to exist.  To do this, the PCP client sends a new MAP request
  indicating the internal port.  The PCP MAP request SHOULD also
  include the currently assigned external IP address and port in the
  Suggested External IP Address and Suggested External Port fields, so
  if the PCP server has lost state it can recreate the lost mapping
  with the same parameters.

  The PCP client SHOULD renew the mapping before its expiry time;
  otherwise, it will be removed by the PCP server (see Section 15,
  "Mapping Lifetime and Deletion").  To reduce the risk of inadvertent
  synchronization of renewal requests, a random jitter component should
  be included.  It is RECOMMENDED that PCP clients send a single
  renewal request packet at a time chosen with uniform random
  distribution in the range 1/2 to 5/8 of expiration time.  If no
  SUCCESS response is received, then the next renewal request should be
  sent 3/4 to 3/4 + 1/16 to expiration, and then another 7/8 to 7/8 +
  1/32 to expiration, and so on, subject to the constraint that renewal
  requests MUST NOT be sent less than four seconds apart (a PCP client
  MUST NOT send a flood of ever-closer-together requests in the last
  few seconds before a mapping expires).

11.3.  Processing a MAP Request

  This section describes the operation of a PCP server when processing
  a request with the MAP Opcode.  Processing SHOULD be performed in the
  order of the following paragraphs.

  The Protocol, Internal Port, and Mapping Nonce fields from the MAP
  request are copied into the MAP response.  The THIRD_PARTY option, if
  present, and processed by the PCP server, is also copied into the MAP
  response.



Wing, et al.                 Standards Track                   [Page 44]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If the requested lifetime is non-zero, then:

  o  If both the protocol and internal port are non-zero, it indicates
     a request to create a mapping or extend the lifetime of an
     existing mapping.  If the PCP server or PCP-controlled device does
     not support the protocol, the UNSUPP_PROTOCOL error MUST be
     returned.

  o  If the protocol is non-zero and the internal port is zero, it
     indicates a request to create or extend a mapping for all incoming
     traffic for that entire protocol -- a 'wildcard' (all-ports)
     mapping for that protocol.  If this request cannot be fulfilled in
     its entirety, the UNSUPP_PROTOCOL error MUST be returned.

  o  If both the protocol and internal port are zero, it indicates a
     request to create or extend a mapping for all incoming traffic for
     all protocols (commonly called a 'DMZ host').  If this request
     cannot be fulfilled in its entirety, the UNSUPP_PROTOCOL error
     MUST be returned.

  o  If the protocol is zero and the internal port is non-zero, then
     the request is invalid and the PCP server MUST return a
     MALFORMED_REQUEST error to the client.

  If the requested lifetime is zero, it indicates a request to delete
  an existing mapping.

  Further processing of the lifetime is described in Section 15,
  "Mapping Lifetime and Deletion".

  If operating in the Simple Threat Model (Section 18.1), and the
  internal port, protocol, and internal address match an existing
  explicit dynamic mapping, but the mapping nonce does not match, the
  request MUST be rejected with a NOT_AUTHORIZED error with the
  lifetime of the error indicating duration of that existing mapping.
  The PCP server only needs to remember one Mapping Nonce value for
  each explicit dynamic mapping.  This specification makes no statement
  about mapping nonce with the Advanced Threat Model.

  If the internal port, protocol, and internal address match an
  existing static mapping (which will have no nonce), then a PCP reply
  is sent giving the external address and port of that static mapping,
  using the nonce from the PCP request.  The server does not record the
  nonce.







Wing, et al.                 Standards Track                   [Page 45]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If an option with value less than 128 exists (i.e., mandatory to
  process) but that option does not make sense (e.g., the
  PREFER_FAILURE option is included in a request with lifetime=0), the
  request is invalid and generates a MALFORMED_OPTION error.

  If the PCP-controlled device is stateless (that is, it does not
  establish any per-flow state, and simply rewrites the address and/or
  port in a purely algorithmic fashion, including no rewriting), the
  PCP server simply returns an answer indicating the external IP
  address and port yielded by this stateless algorithmic translation.
  This allows the PCP client to learn its external IP address and port
  as seen by remote peers.  Examples of stateless translators include
  stateless NAT64, 1:1 NAT44, and NPTv6 [RFC6296], all of which modify
  addresses but not port numbers, and pure firewalls, which modify
  neither the address nor the port.

  It is possible that a mapping might already exist for a requested
  internal address, protocol, and port.  If so, the PCP server takes
  the following actions:

  1.  If the MAP request contains the PREFER_FAILURE option, but the
      suggested external address and port do not match the external
      address and port of the existing mapping, the PCP server MUST
      return CANNOT_PROVIDE_EXTERNAL.

  2.  If the existing mapping is static (created outside of PCP), the
      PCP server MUST return the external address and port of the
      existing mapping in its response and SHOULD indicate a lifetime
      of 2^32-1 seconds, regardless of the suggested external address
      and port in the request.

  3.  If the existing mapping is explicit dynamic inbound (created by a
      previous MAP request), the PCP server MUST return the existing
      external address and port in its response, regardless of the
      suggested external address and port in the request.
      Additionally, the PCP server MUST update the lifetime of the
      existing mapping, in accordance with Section 15, "Mapping
      Lifetime and Deletion".

  4.  If the existing mapping is dynamic outbound (created by outgoing
      traffic or a previous PEER request), the PCP server SHOULD create
      a new explicit inbound mapping, replicating the ports and
      addresses from the outbound mapping (but the outbound mapping
      continues to exist, and remains in effect if the explicit inbound
      mapping is later deleted).

  If no mapping exists for the internal address, protocol, and port,
  and the PCP server is able to create a mapping using the suggested



Wing, et al.                 Standards Track                   [Page 46]

RFC 6887               Port Control Protocol (PCP)            April 2013


  external address and port, it SHOULD do so.  This is beneficial for
  re-establishing state lost in the PCP server (e.g., due to a reboot).
  There are, however, cases where the PCP server is not able to create
  a new mapping using the suggested external address and port:

  o  The suggested external address, protocol, and port is already
     assigned to another existing explicit or implicit mapping
     (i.e., is already forwarding traffic to some other internal
     address and port).

  o  The suggested external address, protocol, and port is already used
     by the NAT gateway for one of its own services, for example, TCP
     port 80 for the NAT gateway's own configuration web pages, or UDP
     ports 5350 and 5351, used by PCP itself.  A PCP server MUST NOT
     create client mappings for external UDP ports 5350 or 5351.

  o  The suggested external address, protocol, and port is otherwise
     prohibited by the PCP server's policy.

  o  The suggested external IP address, protocol, or suggested port are
     invalid or invalid combinations (e.g., external address 127.0.0.1,
     ::1, a multicast address, or the suggested port is not valid for
     the protocol).

  o  The suggested external address does not belong to the NAT gateway.

  o  The suggested external address is not configured to be used as an
     external address of the firewall or NAT gateway.

  If the PCP server cannot assign the suggested external address,
  protocol, and port, then:

  o  If the request contained the PREFER_FAILURE option, then the PCP
     server MUST return CANNOT_PROVIDE_EXTERNAL.

  o  If the request did not contain the PREFER_FAILURE option, and the
     PCP server can assign some other external address and port for
     that protocol, then the PCP server MUST do so and return the newly
     assigned external address and port in the response.  In no case is
     the client penalized for a 'poor' choice of suggested external
     address and port.  The suggested external address and port may be
     used by the server to guide its choice of what external address
     and port to assign, but in no case do they cause the server to
     fail to allocate an external address and port where otherwise it
     would have succeeded.  The presence of a non-zero suggested
     external address or port is merely a hint; it never does any harm.





Wing, et al.                 Standards Track                   [Page 47]

RFC 6887               Port Control Protocol (PCP)            April 2013


  A PCP-controlled device MUST NOT create mappings for a protocol not
  indicated in the request.  For example, if the request was for a TCP
  mapping, an additional corresponding UDP mapping MUST NOT be
  automatically created.

  Mappings typically consume state on the PCP-controlled device, and it
  is RECOMMENDED that a per-host and/or per-subscriber limit be
  enforced by the PCP server to prevent exhausting the mapping state.
  If this limit is exceeded, the result code USER_EX_QUOTA is returned.

  If all of the preceding operations were successful (did not generate
  an error response), then the requested mapping is created or
  refreshed as described in the request and a SUCCESS response is
  built.

11.4.  Processing a MAP Response

  This section describes the operation of the PCP client when it
  receives a PCP response for the MAP Opcode.

  After performing common PCP response processing, the response is
  further matched with a previously sent MAP request by comparing the
  internal IP address (the destination IP address of the PCP response,
  or other IP address specified via the THIRD_PARTY option), the
  protocol, the internal port, and the mapping nonce.  Other fields are
  not compared, because the PCP server sets those fields.  The PCP
  server will send a Mapping Update (Section 14.2) if the mapping
  changes (e.g., due to IP renumbering).

  If the result code is NO_RESOURCES and the request was for the
  creation or renewal of a mapping, then the PCP client SHOULD NOT send
  further requests for any new mappings to that PCP server for the
  (limited) value of the lifetime.  If the result code is NO_RESOURCES
  and the request was for the deletion of a mapping, then the PCP
  client SHOULD NOT send further requests of *any kind* to that PCP
  server for the (limited) value of the lifetime.

  On a success response, the PCP client can use the external IP address
  and port as needed.  Typically, the PCP client will communicate the
  external IP address and port to another host on the Internet using an
  application-specific rendezvous mechanism such as DNS SRV records.

  After a success response, for as long as renewal is desired, the PCP
  client MUST set a timer or otherwise schedule an event to renew the
  mapping before its lifetime expires.  Renewing a mapping is performed
  by sending another MAP request, exactly as described in Section 11.2,
  except that the suggested external address and port SHOULD be set to
  the values received in the response.  From the PCP server's point of



Wing, et al.                 Standards Track                   [Page 48]

RFC 6887               Port Control Protocol (PCP)            April 2013


  view a MAP request to renew a mapping is identical to a MAP request
  to create a new mapping, and is handled identically.  Indeed, in the
  event of PCP server state loss, a renewal request from a PCP client
  will appear to the server to be a request to create a new mapping,
  with a particular suggested external address and port, which happen
  to be what the PCP server previously assigned.  See also
  Section 16.3.1, "Recreating Mappings".

  On an error response, the client SHOULD NOT repeat the same request
  to the same PCP server within the lifetime returned in the response.

11.5.  Address Change Events

  A customer premises router might obtain a new external IP address,
  for a variety of reasons including a reboot, power outage, DHCP lease
  expiry, or other action by the ISP.  If this occurs, traffic
  forwarded to a host's previous address might be delivered to another
  host that now has that address.  This affects all mapping types,
  whether implicit or explicit.  This same problem already occurs today
  when a host's IP address is reassigned, without PCP and without an
  ISP-operated CGN.  The solution is the same as today: the problems
  associated with host renumbering are caused by host renumbering, and
  are eliminated if host renumbering is avoided.  PCP defined in this
  document does not provide machinery to reduce the host renumbering
  problem.

  When an internal host changes its internal IP address (e.g., by
  having a different address assigned by the DHCP server), the NAT (or
  firewall) will continue to send traffic to the old IP address.
  Typically, the internal host will no longer receive traffic sent to
  that old IP address.  Assuming the internal host wants to continue
  receiving traffic, it needs to install new mappings for its new IP
  address.  The Suggested External Port field will not be fulfilled by
  the PCP server, in all likelihood, because it is still being
  forwarded to the old IP address.  Thus, a mapping is likely to be
  assigned a new external port number and/or external IP address.  Note
  that such host renumbering is not expected to happen routinely on a
  regular basis for most hosts, since most hosts renew their DHCP
  leases before they expire (or re-request the same address after
  reboot) and most DHCP servers honor such requests and grant the host
  the same address it was previously using before the reboot.

  A host might gain or lose interfaces while existing mappings are
  active (e.g., Ethernet cable plugged in or removed, joining/leaving a
  WiFi network).  Because of this, if the PCP client is sending a PCP
  request to maintain state in the PCP server, it SHOULD ensure that
  those PCP requests continue to use the same interface (e.g., when
  refreshing mappings).  If the PCP client is sending a PCP request to



Wing, et al.                 Standards Track                   [Page 49]

RFC 6887               Port Control Protocol (PCP)            April 2013


  create new state in the PCP server, it MAY use a different source
  interface or different source address.

11.6.  Learning the External IP Address Alone

  NAT-PMP [RFC6886] includes a mechanism to allow clients to learn the
  external IP address alone, without also requesting a port mapping.
  NAT-PMP was designed for residential NAT gateways, where such an
  operation makes sense because a typical residential NAT gateway has
  only one external IP address.  PCP has broader scope, and also
  supports Carrier-Grade NATs (CGNs) that may have a pool of external
  IP addresses, not just one.  A client may not be assigned any
  particular external IP address from that pool until it has at least
  one implicit, explicit, or static port mapping, and even then only
  for as long as that mapping remains valid.  Client software that just
  wishes to display the user's external IP address for cosmetic
  purposes can achieve that by requesting a short-lived mapping (e.g.,
  to the Discard service (TCP/9 or UDP/9) or some other port) and then
  displaying the resulting external IP address.  However, once that
  mapping expires a subsequent implicit or explicit dynamic mapping
  might be mapped to a different external IP address.

12.  PEER Opcode

  This section defines an Opcode for controlling dynamic outbound
  mappings.

  PEER: Create a new dynamic outbound mapping to a remote peer's IP
        address and port, or extend the lifetime of an existing
        outbound mapping.

  The use of this Opcodes is described in this section.

  PCP servers SHOULD provide a configuration option to allow
  administrators to disable PEER support if they wish.

  Because a mapping created or managed by PEER behaves almost exactly
  like an implicit dynamic outbound mapping created as a side effect of
  a packet (e.g., TCP SYN) sent by the host, mappings created or
  managed using PCP PEER requests may be endpoint-independent mapping
  (EIM) or endpoint-dependent mapping (EDM), with endpoint-independent
  filtering (EIF) or endpoint-dependent filtering (EDF), consistent
  with the existing behavior of the NAT gateway or firewall in question
  for implicit outbound mappings it creates automatically as a result
  of observing outgoing traffic from internal hosts.






Wing, et al.                 Standards Track                   [Page 50]

RFC 6887               Port Control Protocol (PCP)            April 2013


12.1.  PEER Operation Packet Formats

  The PEER Opcode allows a PCP client to create a new explicit dynamic
  outbound mapping (which functions similarly to an outbound mapping
  created implicitly when a host sends an outbound TCP SYN) or to
  extend the lifetime of an existing outbound mapping.

  The following diagram shows the Opcode layout for the PEER Opcode.
  The formats for the PEER request and response packets are aligned so
  that related fields fall at the same offsets in the packet.

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                 Mapping Nonce (96 bits)                       |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |   Protocol    |          Reserved (24 bits)                   |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |        Internal Port          |    Suggested External Port    |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |           Suggested External IP Address (128 bits)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |       Remote Peer Port        |     Reserved (16 bits)        |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |               Remote Peer IP Address (128 bits)               |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                     Figure 11: PEER Opcode Request

  These fields are described below:

  Requested Lifetime (in common header):  Requested lifetime of this
     mapping, in seconds.  Note that it is not possible to reduce the
     lifetime of a mapping (or delete it, with requested lifetime=0)
     using PEER.

  Mapping Nonce:  Random value chosen by the PCP client.  See
     Section 12.2, "Generating a PEER Request".  Zero is a legal value
     (but unlikely, occurring in roughly one in 2^96 requests).




Wing, et al.                 Standards Track                   [Page 51]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Protocol:  Upper-layer protocol associated with this Opcode.  Values
     are taken from the IANA protocol registry [proto_numbers].  For
     example, this field contains 6 (TCP) if the Opcode is describing a
     TCP mapping.  This field contains 17 (UDP) if the Opcode is
     describing a UDP mapping.  Protocol MUST NOT be zero.

  Reserved:  24 reserved bits, MUST be set to 0 on transmission and
     MUST be ignored on reception.

  Internal Port:  Internal port for the mapping.  Internal port MUST
     NOT be zero.

  Suggested External Port:  Suggested external port for the mapping.
     If the PCP client does not know the external port, or does not
     have a preference, it MUST use 0.

  Suggested External IP Address:  Suggested external IP address for the
     mapping.  If the PCP client does not know the external address, or
     does not have a preference, it MUST use the address-family-
     specific all-zeros address (see Section 5).

  Remote Peer Port:  Remote peer's port for the mapping.  Remote peer
     port MUST NOT be zero.

  Reserved:  16 reserved bits, MUST be set to 0 on transmission and
     MUST be ignored on reception.

  Remote Peer IP Address:  Remote peer's IP address.  This is from the
     perspective of the PCP client, so that the PCP client does not
     need to concern itself with NAT64 or NAT46 (which both cause the
     client's idea of the remote peer's IP address to differ from the
     remote peer's actual IP address).  This field allows the PCP
     client and PCP server to disambiguate multiple connections from
     the same port on the internal host to different servers.  An IPv6
     address is represented directly, and an IPv4 address is
     represented using the IPv4-mapped address syntax (Section 5).

  When attempting to re-create a lost mapping, the suggested external
  IP address and port are set to the External IP Address and Port
  fields received in a previous PEER response from the PCP server.  On
  an initial PEER request, the external IP address and port are set to
  zero.

  Note that semantics similar to the PREFER_FAILURE option are
  automatically implied by PEER requests.  If the Suggested External IP
  Address or Suggested External Port fields are non-zero, and the PCP
  server is unable to honor the suggested external IP address,
  protocol, or port, then the PCP server MUST return a



Wing, et al.                 Standards Track                   [Page 52]

RFC 6887               Port Control Protocol (PCP)            April 2013


  CANNOT_PROVIDE_EXTERNAL error response.  The PREFER_FAILURE option is
  neither required nor allowed in PEER requests, and if a PCP server
  receives a PEER request containing the PREFER_FAILURE option it MUST
  return a MALFORMED_REQUEST error response.

  The following diagram shows the Opcode response for the PEER Opcode:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                 Mapping Nonce (96 bits)                       |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |   Protocol    |          Reserved (24 bits)                   |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |        Internal Port          |    Assigned External Port     |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Assigned External IP Address (128 bits)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |       Remote Peer Port        |     Reserved (16 bits)        |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |               Remote Peer IP Address (128 bits)               |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                     Figure 12: PEER Opcode Response

  Lifetime (in common header):  On a success response, this indicates
     the lifetime for this mapping, in seconds.  On an error response,
     this indicates how long clients should assume they'll get the same
     error response from the PCP server if they repeat the same
     request.

  Mapping Nonce:  Copied from the request.

  Protocol:  Copied from the request.

  Reserved:  24 reserved bits, MUST be set to 0 on transmission, MUST
     be ignored on reception.






Wing, et al.                 Standards Track                   [Page 53]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Internal Port:  Copied from request.

  Assigned External Port:  On a success response, this is the assigned
     external port for the mapping.  On an error response, the
     suggested external port is copied from the request.

  Assigned External IP Address:  On a success response, this is the
     assigned external IPv4 or IPv6 address for the mapping.  On an
     error response, the suggested external IP address is copied from
     the request.

  Remote Peer Port:  Copied from request.

  Reserved:  16 reserved bits, MUST be set to 0 on transmission, MUST
     be ignored on reception.

  Remote Peer IP Address:  Copied from the request.

12.2.  Generating a PEER Request

  This section describes the operation of a client when generating a
  message with the PEER Opcode.

  The PEER Opcode MAY be sent before or after establishing
  bidirectional communication with the remote peer.

  If sent before, this is considered a PEER-created mapping that
  creates a new dynamic outbound mapping in the PCP-controlled device.

  If sent after, this allows the PCP client to learn the IP address,
  port, and lifetime of the assigned external address and port for the
  existing implicit dynamic outbound mapping, and potentially to extend
  this lifetime (for reducing NAT or firewall keepalive messages, as
  described in Section 10.3).

  PEER requests are also useful for restoring mappings after a NAT has
  lost its mapping state (e.g., due to a crash).

  The Mapping Nonce value is randomly chosen by the PCP client,
  following accepted practices for generating unguessable random
  numbers [RFC4086], and is used as part of the validation of PCP
  responses (see below) by the PCP client, and validation for mapping
  refreshes by the PCP server.  The client MUST use a different mapping
  nonce for each PCP server it communicates with, and it is RECOMMENDED
  to choose a new random mapping nonce whenever the PCP client is
  initialized.  The client MAY use a different mapping nonce for every
  mapping.




Wing, et al.                 Standards Track                   [Page 54]

RFC 6887               Port Control Protocol (PCP)            April 2013


  The PEER Opcode contains a Remote Peer Address field, which is always
  from the perspective of the PCP client.  Note that when the
  PCP-controlled device is performing address family translation (NAT46
  or NAT64), the remote peer address from the perspective of the PCP
  client is different from the remote peer address on the other side of
  the address family translation device.

12.3.  Processing a PEER Request

  This section describes the operation of a server when receiving a
  request with the PEER Opcode.  Processing SHOULD be performed in the
  order of the following paragraphs.

  The following fields from a PEER request are copied into the
  response: Protocol, Internal Port, Remote Peer IP Address, Remote
  Peer Port, and Mapping Nonce.

  When an implicit dynamic mapping is created, some NATs and firewalls
  validate destination addresses and will not create an implicit
  dynamic mapping if the destination address is invalid (e.g.,
  127.0.0.1).  If a PCP-controlled device does such validation for
  implicit dynamic mappings, it SHOULD also do a similar validation of
  the remote peer IP address, protocol, and port for PEER-created
  explicit dynamic mappings.  If the validation determines the remote
  peer IP address of a PEER request is invalid, then no mapping is
  created, and a MALFORMED_REQUEST error result is returned.

  On receiving the PEER Opcode, the PCP server examines the mapping
  table for a matching five-tuple { Protocol, Internal Address,
  Internal Port, Remote Peer Address, Remote Peer Port }.

  If no matching mapping is found, and the suggested external address
  and port are either zero or can be honored for the specified
  Protocol, a new mapping is created.  By having the PEER create such a
  mapping, we avoid a race condition between the PEER request and the
  initial outgoing packet arriving at the NAT or firewall device first,
  and allow PEER to be used to recreate a lost outbound dynamic mapping
  (see Section 16.3.1, "Recreating Mappings").  Thereafter, this PEER-
  created mapping is treated as if it was an implicit dynamic outbound
  mapping (e.g., as if the PCP client sent a TCP SYN) and a lifetime
  appropriate to such a mapping is returned (note: on many NATs and
  firewalls, such mapping lifetimes are very short until bidirectional
  traffic is seen by the NAT or firewall).

  If no matching mapping is found, and the suggested external address
  and port cannot be honored, then no new state is created, and the
  error CANNOT_PROVIDE_EXTERNAL is returned.




Wing, et al.                 Standards Track                   [Page 55]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If a matching mapping is found, and no previous PEER Opcode was
  successfully processed for this mapping, then the Suggested External
  Address and Port values in the request are ignored, the lifetime of
  that mapping is adjusted as described below, and information about
  the existing mapping is returned.  This allows a client to explicitly
  extend the lifetime of an existing mapping and/or to learn an
  existing mapping's external address, port, and lifetime.  The mapping
  nonce is remembered for this mapping.

  If operating in the Simple Threat Model (Section 18.1), and the
  internal port, protocol, and internal address match a mapping that
  already exists, but the mapping nonce does not match (that is, a
  previous PEER request was processed), the request MUST be rejected
  with a NOT_AUTHORIZED error with the lifetime of the error indicating
  duration of that existing mapping.  The PCP server only needs to
  remember one Mapping Nonce value for each mapping.  This
  specification makes no statement about mapping nonce with the
  Advanced Threat Model.

  Processing the Lifetime value of the PEER Opcode is described in
  Section 15, "Mapping Lifetime and Deletion".  Sending a PEER request
  with a very short requested lifetime can be used to query the
  lifetime of an existing mapping.  So that PCP clients can reduce the
  frequency of their NAT and firewall keepalive messages, it is
  RECOMMENDED that lifetimes of mappings created or lengthened with
  PEER be longer than the lifetimes of implicitly created mappings.

  If all of the preceding operations were successful (did not generate
  an error response), then a SUCCESS response is generated, with the
  Lifetime field containing the lifetime of the mapping.

  If a PEER-created or PEER-managed mapping is not renewed using PEER,
  then it reverts to the NAT's usual behavior for implicit mappings.
  For example, continued outbound traffic keeps the mapping alive, as
  per the NAT or firewall device's existing policy.  A PEER-created or
  PEER-managed mapping may be terminated at any time by action of the
  TCP client or server (e.g., due to TCP FIN or TCP RST), as per the
  NAT or firewall device's existing policy.

12.4.  Processing a PEER Response

  This section describes the operation of a client when processing a
  response with the PEER Opcode.

  After performing common PCP response processing, the response is
  further matched with an outstanding PEER request by comparing the
  internal IP address (the destination IP address of the PCP response,
  or other IP address specified via the THIRD_PARTY option), the



Wing, et al.                 Standards Track                   [Page 56]

RFC 6887               Port Control Protocol (PCP)            April 2013


  protocol, the internal port, the remote peer address, the remote peer
  port, and the mapping nonce.  Other fields are not compared, because
  the PCP server sets those fields to provide information about the
  mapping created by the Opcode.  The PCP server will send a Mapping
  Update (Section 14.2) if the mapping changes (e.g., due to IP
  renumbering).

  If the result code is NO_RESOURCES and the request was for the
  creation or renewal of a mapping, then the PCP client SHOULD NOT send
  further requests for any new mappings to that PCP server for the
  (limited) value of the lifetime.

  On a successful response, the application can use the assigned
  Lifetime value to reduce its frequency of application keepalives for
  that particular NAT mapping.  Of course, there may be other reasons,
  specific to the application, to use more frequent application
  keepalives.  For example, the PCP assigned lifetime could be one hour
  but the application may want to maintain state on its server (e.g.,
  "busy" / "away") more frequently than once an hour.  If the response
  indicates an unexpected IP address or port (e.g., due to IP
  renumbering), the PCP client will want to re-establish its connection
  to its remote server.

  If the PCP client wishes to keep this mapping alive beyond the
  indicated lifetime, it MAY rely on continued inside-to-outside
  traffic to ensure that the mapping will continue to exist, or it MAY
  issue a new PCP request prior to the expiration.  The recommended
  timings for renewing PEER mappings are the same as for MAP mappings,
  as described in Section 11.2.1.

     Note: Implementations need to expect the PEER response may contain
     an external IP address with a different family than the remote
     peer IP address, e.g., when NAT64 or NAT46 are being used.

13.  Options for MAP and PEER Opcodes

  This section describes options for the MAP and PEER Opcodes.  These
  options MUST NOT appear with other Opcodes, unless permitted by those
  other Opcodes.

13.1.  THIRD_PARTY Option for MAP and PEER Opcodes

  This option is used when a PCP client wants to control a mapping to
  an internal host other than itself.  This is used with both MAP and
  PEER Opcodes.

  Due to security concerns with the THIRD_PARTY option, this option
  MUST NOT be implemented or used unless the network on which the PCP



Wing, et al.                 Standards Track                   [Page 57]

RFC 6887               Port Control Protocol (PCP)            April 2013


  messages are to be sent is fully trusted.  For example, if access
  control lists (ACLs) are installed on the PCP client, PCP server, and
  the network between them, so those ACLs allow only communications
  from a trusted PCP client to the PCP server.

  A management device would use this option to control a PCP server on
  behalf of users.  For example, a management device located in a
  network operations center, which presents a user interface to end
  users or to network operations staff, and issues PCP requests with
  the THIRD_PARTY option to the appropriate PCP server.

  The THIRD_PARTY option is formatted as follows:

   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Option Code=1 |  Reserved     |   Option Length=16            |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  |                Internal IP Address (128 bits)                 |
  |                                                               |
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                      Figure 13: THIRD_PARTY Option

  The fields are described below:

  Internal IP Address:  Internal IP address for this mapping.

     Option Name: THIRD_PARTY
     Number: 1
     Purpose: Indicates the MAP or PEER request is for a host other
     than the host sending the PCP option.
     Valid for Opcodes: MAP, PEER
     Length: 16 octets
     May appear in: request.  May appear in response only if it
     appeared in the associated request.
     Maximum occurrences: 1

  A THIRD_PARTY option MUST NOT contain the same address as the source
  address of the packet.  This is because many PCP servers may not
  implement the THIRD_PARTY option at all, and with those servers a
  client redundantly using the THIRD_PARTY option to specify its own IP
  address would cause such mapping requests to fail where they would
  otherwise have succeeded.  A PCP server receiving a THIRD_PARTY
  option specifying the same address as the source address of the
  packet MUST return a MALFORMED_REQUEST result code.



Wing, et al.                 Standards Track                   [Page 58]

RFC 6887               Port Control Protocol (PCP)            April 2013


  A PCP server MAY be configured to permit or to prohibit the use of
  the THIRD_PARTY option.  If this option is permitted, properly
  authorized clients may perform these operations on behalf of other
  hosts.  If this option is prohibited, and a PCP server receives a PCP
  MAP request with a THIRD_PARTY option, it MUST generate a
  UNSUPP_OPTION response.

  It is RECOMMENDED that customer premises equipment implementing a PCP
  server be configured to prohibit third-party mappings by default.
  With this default, if a user wants to create a third-party mapping,
  the user needs to interact out-of-band with their customer premises
  router (e.g., using its HTTP administrative interface).

  It is RECOMMENDED that service provider NAT and firewall devices
  implementing a PCP server be configured to permit the THIRD_PARTY
  option, when sent by a properly authorized host.  If the packet
  arrives from an unauthorized host, the PCP server MUST generate an
  UNSUPP_OPTION error.

  Note that the THIRD_PARTY option is not needed for today's common
  scenario of an ISP offering a single IP address to a customer who is
  using NAT to share that address locally, since in this scenario all
  the customer's hosts appear, from the point of view of the ISP, to be
  a single host.

  When a PCP client is using the THIRD_PARTY option to make and
  maintain mappings on behalf of some other device, it may be
  beneficial if, where possible, the PCP client verifies that the other
  device is actually present and active on the network.  Otherwise, the
  PCP client risks maintaining those mappings forever, long after the
  device that required them has gone.  This would defeat the purpose of
  PCP mappings having a finite lifetime so that they can be
  automatically deleted after they are no longer needed.

13.2.  PREFER_FAILURE Option for MAP Opcode

  This option is only used with the MAP Opcode.

  This option indicates that if the PCP server is unable to map both
  the suggested external port and suggested external address, the PCP
  server should not create a mapping.  This differs from the behavior
  without this option, which is to create a mapping.

  PREFER_FAILURE is never necessary for a PCP client to manage mappings
  for itself, and its use causes additional work in the PCP client and
  in the PCP server.  This option exists for interworking with non-PCP
  mapping protocols that have different semantics than PCP (e.g., UPnP
  IGDv1 interworking [PNP-IGD-PCP], where the semantics of UPnP IGDv1



Wing, et al.                 Standards Track                   [Page 59]

RFC 6887               Port Control Protocol (PCP)            April 2013


  only allow the UPnP IGDv1 client to dictate mapping a specific port),
  or separate port allocation systems that allocate ports to a
  subscriber (e.g., a subscriber-accessed web portal operated by the
  same ISP that operates the PCP server).  A PCP server MAY support
  this option, if its designers wish to support such downstream devices
  or separate port allocation systems.  PCP servers that are not
  intended to interface with such systems are not required to support
  this option.  PCP clients other than UPnP IGDv1 interworking clients
  or other than a separate port allocation system SHOULD NOT use this
  option because it results in inefficient operation, and they cannot
  safely assume that all PCP servers will implement it.  It is
  anticipated that this option will be deprecated in the future as more
  clients adopt PCP natively and the need for this option declines.

  The PREFER_FAILURE option is formatted as follows:

   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Option Code=2 |  Reserved     |   Option Length=0             |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                    Figure 14: PREFER_FAILURE Option

     Option Name: PREFER_FAILURE
     Number: 2
     Purpose: indicates that the PCP server should not create an
     alternative mapping if the suggested external port and address
     cannot be mapped.
     Valid for Opcodes: MAP
     Length: 0
     May appear in: request.  May appear in response only if it
     appeared in the associated request.
     Maximum occurrences: 1

  The result code CANNOT_PROVIDE_EXTERNAL is returned if the suggested
  external address, protocol, and port cannot be mapped.  This can
  occur because the external port is already mapped to another host's
  outbound dynamic mapping, an inbound dynamic mapping, a static
  mapping, or the same internal address, protocol, and port already
  have an outbound dynamic mapping that is mapped to a different
  external port than suggested.  This can also occur because the
  external address is no longer available (e.g., due to renumbering).
  The server MAY set the lifetime in the response to the remaining
  lifetime of the conflicting mapping + TIME_WAIT [RFC0793], rounded up
  to the next larger integer number of seconds.





Wing, et al.                 Standards Track                   [Page 60]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If a PCP request contains the PREFER_FAILURE option and has zero in
  the Suggested External Port field, then it is invalid.  The PCP
  server MUST reject such a message with the MALFORMED_OPTION error
  code.

  PCP servers MAY choose to rate-limit their handling of PREFER_FAILURE
  requests, to protect themselves from a rapid flurry of 65535
  consecutive PREFER_FAILURE requests from clients probing to discover
  which external ports are available.

  There can exist a race condition between the MAP Opcode using the
  PREFER_FAILURE option and Mapping Update (Section 14.2).  For
  example, a previous host on the local network could have previously
  had the same internal address, with a mapping for the same internal
  port.  At about the same moment that the current host sends a MAP
  Request using the PREFER_FAILURE option, the PCP server could send a
  spontaneous Mapping Update for the old mapping due to an external
  configuration change, which could appear to be a reply to the new
  mapping request.  Because of this, the PCP client MUST validate that
  the external IP address, protocol, port, and nonce in a success
  response match the associated suggested values from the request.  If
  they do not match, it is because the Mapping Update was sent before
  the MAP request was processed.

13.3.  FILTER Option for MAP Opcode

  This option is only used with the MAP Opcode.

  This option indicates that filtering incoming packets is desired.
  The protocol being filtered is indicated by the Protocol field in the
  MAP Request, and the remote peer IP address and remote peer port of
  the FILTER option indicate the permitted remote peer's source IP
  address and source port for packets from the Internet; other traffic
  from other addresses is blocked.  The remote peer prefix length
  indicates the length of the remote peer's IP address that is
  significant; this allows a single option to permit an entire subnet.
  After processing this MAP request containing the FILTER option and
  generating a successful response, the PCP-controlled device will drop
  packets received on its public-facing interface that don't match the
  filter fields.  After dropping the packet, if its security policy
  allows, the PCP-controlled device MAY also generate an ICMP error in
  response to the dropped packet.

  The use of the FILTER option can be seen as a performance
  optimization.  Since all software using PCP to receive incoming
  connections also has to deal with the case where it may be directly
  connected to the Internet and receive unrestricted incoming TCP
  connections and UDP packets, if it wishes to restrict incoming



Wing, et al.                 Standards Track                   [Page 61]

RFC 6887               Port Control Protocol (PCP)            April 2013


  traffic to a specific source address or group of source addresses,
  such software already needs to check the source address of incoming
  traffic and reject unwanted traffic.  However, the FILTER option is a
  particularly useful performance optimization for battery powered
  wireless devices, because it can enable them to conserve battery
  power by not having to wake up just to reject unwanted traffic.

  The FILTER option is formatted as follows:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Option Code=3 |  Reserved     |   Option Length=20            |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |    Reserved   | Prefix Length |      Remote Peer Port         |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |               Remote Peer IP address (128 bits)               |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                     Figure 15: FILTER Option Layout

  These fields are described below:

  Reserved:  8 reserved bits, MUST be sent as 0 and MUST be ignored
     when received.

  Prefix Length:  indicates how many bits of the IPv4 or IPv6 address
     are relevant for this filter.  The value 0 indicates "no filter",
     and will remove all previous filters.  See below for detail.

  Remote Peer Port:  the port number of the remote peer.  The value 0
     indicates "all ports".

  Remote Peer IP address:  The IP address of the remote peer.

     Option Name: FILTER
     Number: 3
     Purpose: specifies a filter for incoming packets
     Valid for Opcodes: MAP
     Length: 20 octets
     May appear in: request.  May appear in response only if it
     appeared in the associated request.
     Maximum occurrences: as many as fit within maximum PCP message
     size




Wing, et al.                 Standards Track                   [Page 62]

RFC 6887               Port Control Protocol (PCP)            April 2013


  The Prefix Length indicates how many bits of the address are used for
  the filter.  For IPv4 addresses (which are encoded using the
  IPv4-mapped address format (::FFFF:0:0/96)), this means valid prefix
  lengths are between 96 and 128 bits, inclusive.  That is, add 96 to
  the IPv4 prefix length.  For IPv6 addresses, valid prefix lengths are
  between 0 and 128 bits, inclusive.  Values outside those ranges cause
  the PCP server to return the MALFORMED_OPTION result code.

  If multiple occurrences of the FILTER option exist in the same MAP
  request, they are processed in the order received (as per normal PCP
  option processing), and they MAY overlap the filtering requested.  If
  there is an existing mapping (with or without a filter) and the
  server receives a MAP request with FILTER, the filters indicated in
  the new request are added to any existing filters.  If a MAP request
  has a lifetime of 0 and contains the FILTER option, the error
  MALFORMED_OPTION is returned.

  If any occurrences of the FILTER option in a request packet are not
  successfully processed then an error is returned (e.g.,
  MALFORMED_OPTION if one of the options was malformed) and as with
  other PCP errors, returning an error causes no state to be changed in
  the PCP server or in the PCP-controlled device.

  To remove all existing filters, the Prefix Length 0 is used.  There
  is no mechanism to remove a specific filter.

  To change an existing filter, the PCP client sends a MAP request
  containing two FILTER options, the first option containing a prefix
  length of 0 (to delete all existing filters) and the second
  containing the new remote peer's IP address, protocol, and port.
  Other FILTER options in that PCP request, if any, add more allowed
  remote peers.

  The PCP server or the PCP-controlled device is expected to have a
  limit on the number of remote peers it can support.  This limit might
  be as small as one.  If a MAP request would exceed this limit, the
  entire MAP request is rejected with the result code
  EXCESSIVE_REMOTE_PEERS, and the state on the PCP server is unchanged.

  All PCP servers MUST support at least one filter per MAP mapping.

14.  Rapid Recovery

  PCP includes a rapid recovery feature, which allows PCP clients to
  repair failed mappings within seconds, rather than the minutes or
  hours it might take if they relied solely on waiting for the next
  routine renewal of the mapping.  Mapping failures may occur when a
  NAT gateway is rebooted and loses its mapping state, or when a NAT



Wing, et al.                 Standards Track                   [Page 63]

RFC 6887               Port Control Protocol (PCP)            April 2013


  gateway has its external IP address changed so that its current
  mapping state becomes invalid.

  The PCP rapid recovery feature enables users to, for example, connect
  to remote machines using ssh, and then reboot their NAT or firewall
  device (or even replace it with completely new hardware) without
  losing their established ssh connections.

  Use of PCP rapid recovery is a performance optimization to PCP's
  routine self-healing.  Without rapid recovery, PCP clients will still
  recreate their correct state when they next renew their mappings, but
  this routine self-healing process may take hours rather than seconds,
  and will probably not happen fast enough to prevent active TCP
  connections from timing out.

  There are two mechanisms to perform rapid recovery, described below.
  Failing to implement and deploy a rapid recovery mechanism will
  encourage application developers to feel the need to refresh their
  PCP state more frequently than necessary, causing more network
  traffic.  Therefore, a PCP server that can lose state (e.g., due to
  reboot) or might have a mapping change (e.g., due to IP renumbering)
  MUST implement either the Announce Opcode or the Mapping Update
  mechanism and SHOULD implement both mechanisms.

14.1.  ANNOUNCE Opcode

  This rapid recovery mechanism uses the ANNOUNCE Opcode.  When the PCP
  server loses its state (e.g., it lost its state when rebooted), it
  resets its Epoch time to its initial starting value (usually zero)
  and sends the ANNOUNCE response to the link-scoped multicast address
  (specific address explained below) if a multicast network exists on
  its local interface, or, if configured with the IP address(es) and
  port(s) of PCP client(s), it sends unicast ANNOUNCE responses to
  those address(es) and port(s).  This means ANNOUNCE may not be
  available on all networks (such as networks without a multicast link
  between the PCP server and its PCP clients).  Additionally, an
  ANNOUNCE request can be sent (unicast) by a PCP client that elicits a
  unicast ANNOUNCE response like any other Opcode.

  Upon receiving PCP response packets with an anomalous Epoch time,
  clients deduce that the PCP server lost state and recreate their lost
  mappings.









Wing, et al.                 Standards Track                   [Page 64]

RFC 6887               Port Control Protocol (PCP)            April 2013


14.1.1.  ANNOUNCE Operation

  The PCP ANNOUNCE Opcode requests and responses have no
  Opcode-specific payload (that is, the length of the Opcode-specific
  data is zero).  The Requested Lifetime field of requests and Lifetime
  field of responses are both set to 0 on transmission and ignored on
  reception.

  If a PCP server receives an ANNOUNCE request, it first parses it and
  generates a SUCCESS if parsing and processing of ANNOUNCE is
  successful.  An error is generated if the client's IP Address field
  does not match the packet source address, or the request packet is
  otherwise malformed, such as packet length less than 24 octets.  Note
  that, in the future, options MAY be sent with the PCP ANNOUNCE
  Opcode; PCP clients and servers need to be prepared to receive
  options with the ANNOUNCE Opcode.

     Discussion: Client-to-server request messages are sent, from any
     client source port, to listening UDP port 5351 on the server;
     server-to-client multicast notifications are sent from the
     server's UDP port (5351) to listening UDP port 5350 on the client.
     The reason the same listening UDP port is not used for both
     purposes is that a single device may have multiple roles.  For
     example, a multi-function home gateway that provides NAT service
     (PCP server) may also provide printer sharing (which wants a PCP
     client), or a home computer (PCP client) may also provide
     "Internet Sharing" (NAT) functionality (which needs to offer PCP
     service).  Such devices need to act as both a PCP server and a PCP
     client at the same time, and the software that implements the PCP
     server on the device may not be the same software component that
     implements the PCP client.  The software that implements the PCP
     server needs to listen for unicast client requests, whereas the
     software that implements the PCP client needs to listen for
     multicast restart announcements.  In many networking APIs it is
     difficult or impossible to have two independent clients listening
     for both unicasts and multicasts on the same port at the same
     time.  For this reason, two ports are used.

14.1.2.  Generating and Processing a Solicited ANNOUNCE Message

  The PCP ANNOUNCE Opcode MAY be sent (unicast) by a PCP client.  The
  Requested Lifetime value MUST be set to zero.

  When the PCP server receives the ANNOUNCE Opcode and successfully
  parses and processes it, it generates SUCCESS response with an
  assigned lifetime of zero.





Wing, et al.                 Standards Track                   [Page 65]

RFC 6887               Port Control Protocol (PCP)            April 2013


  This functionality allows a PCP client to determine a server's Epoch,
  or to determine if a PCP server is running, without changing the
  server's state.

14.1.3.  Generating and Processing an Unsolicited ANNOUNCE Message

  When sending unsolicited responses, the ANNOUNCE Opcode MUST have
  result code equal to zero (SUCCESS), and the packet MUST be sent from
  the unicast IP address and UDP port number on which PCP requests are
  received (so that the PCP response processing described in
  Section 8.3 will accept the message).  This message is most typically
  multicast, but can also be unicast.  Multicast PCP restart
  announcements are sent to 224.0.0.1:5350 and/or [ff02::1]:5350, as
  described below.  Sending PCP restart announcements via unicast
  requires that the PCP server know the IP address(es) and port(s) of
  its listening clients, which means that sending PCP restart
  announcements via unicast is only applicable to PCP servers that
  retain knowledge of the IP address(es) and port(s) of their clients
  even after they otherwise lose the rest of their state.

  When a PCP server device that implements this functionality reboots,
  restarts its NAT engine, or otherwise enters a state where it may
  have lost some or all of its previous mapping state (or enters a
  state where it doesn't even know whether it may have had prior state
  that it lost), it MUST inform PCP clients of this fact by unicasting
  or multicasting a gratuitous PCP ANNOUNCE Opcode response packet, as
  shown below, via paths over which it accepts PCP requests.  If
  sending a multicast ANNOUNCE message, a PCP server device that
  accepts PCP requests over IPv4 sends the Restart Announcement to the
  IPv4 multicast address 224.0.0.1:5350 (224.0.0.1 is the All Hosts
  multicast group address), and a PCP server device that accepts PCP
  requests over IPv6 sends the Restart Announcement to the IPv6
  multicast address [ff02::1]:5350 (ff02::1 is for all nodes on the
  local segment).  A PCP server device that accepts PCP requests over
  both IPv4 and IPv6 sends a pair of Restart Announcements, one to each
  multicast address.  If sending a unicast ANNOUNCE messages, it sends
  ANNOUNCE response message to the IP address(es) and port(s) of its
  PCP clients.  To accommodate packet loss, the PCP server device MAY
  transmit such packets (or packet pairs) up to ten times (with an
  appropriate Epoch Time value in each to reflect the passage of time
  between transmissions) provided that the interval between the first
  two notifications is at least 250 ms, and the interval between
  subsequent notification at least doubles.

  A PCP client that sends PCP requests to a PCP server via a multicast-
  capable path, and implements the Restart Announcement feature, and
  wishes to receive these announcements, MUST listen to receive these
  PCP Restart Announcements (gratuitous PCP ANNOUNCE Opcode response



Wing, et al.                 Standards Track                   [Page 66]

RFC 6887               Port Control Protocol (PCP)            April 2013


  packets) on the appropriate multicast-capable interfaces on which it
  sends PCP requests, and MAY also listen for unicast announcements
  from the server too, (using the UDP port it already uses to issue
  unicast PCP requests to, and receive unicast PCP responses from, that
  server).  A PCP client device that sends PCP requests using IPv4
  listens for packets sent to the IPv4 multicast address
  224.0.0.1:5350.  A PCP client device that sends PCP requests using
  IPv6 listens for packets sent to the IPv6 multicast address
  [ff02::1]:5350.  A PCP client device that sends PCP requests using
  both IPv4 and IPv6 listens for both types of Restart Announcement.
  The SO_REUSEPORT socket option or equivalent should be used for the
  multicast UDP port, if required by the host OS to permit multiple
  independent listeners on the same multicast UDP port.

  Upon receiving a unicasted or multicasted PCP ANNOUNCE Opcode
  response packet, a PCP client MUST (as it does with all received PCP
  response packets) inspect the announcement's source IP address, and
  if the Epoch Time value is outside the expected range for that
  server, it MUST wait a random amount of time between 0 and 5 seconds
  (to prevent synchronization of all PCP clients), then for all PCP
  mappings it made at that server address the client issues new PCP
  requests to recreate any lost mapping state.  The use of the
  Suggested External IP Address and Suggested External Port fields in
  the client's renewal requests allows the client to remind the
  restarted PCP server device of what mappings the client had
  previously been given, so that in many cases the prior state can be
  recreated.  For PCP server devices that reboot relatively quickly it
  is usually possible to reconstruct lost mapping state fast enough
  that existing TCP connections and UDP communications do not time out,
  and continue without failure.  As for all PCP response messages, if
  the Epoch Time value is within the expected range for that server,
  the PCP client does not recreate its mappings.  As for all PCP
  response messages, after receiving and validating the ANNOUNCE
  message, the client updates its own Epoch time for that server, as
  described in Section 8.5.

14.2.  PCP Mapping Update

  This rapid recovery mechanism is used when the PCP server remembers
  its state and determines its existing mappings are invalid (e.g., IP
  renumbering changes the external IP address of a PCP-controlled NAT).

  It is anticipated that servers that are routinely reconfigured by an
  administrator or have their WAN address changed frequently will
  implement this feature (e.g., residential CPE routers).  It is
  anticipated that servers that are not routinely reconfigured will not
  implement this feature (e.g., service provider-operated CGN).




Wing, et al.                 Standards Track                   [Page 67]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If a PCP server device has not forgotten its mapping state, but for
  some other reason has determined that some or all of its mappings
  have become unusable (e.g., when a home gateway is assigned a
  different external IPv4 address by the upstream DHCP server), then
  the PCP server device automatically repairs its mappings and notifies
  its clients by following the procedure described below.

  For PCP-managed mappings, for each one the PCP server device should
  update the external IP address and external port to appropriate
  available values, and then send unicast PCP MAP or PEER responses (as
  appropriate for the mapping) to inform the PCP client of the new
  external IP address and external port.  Such unsolicited responses
  are identical to the MAP or PEER responses normally returned in
  response to client MAP or PEER requests, containing newly updated
  External IP Address and External Port values, and are sent to the
  same client IP address and port that the PCP server used to send the
  prior response for that mapping.  If the earlier associated request
  contained the THIRD_PARTY option, the THIRD_PARTY option MUST also
  appear in the Mapping Update as it is necessary for the PCP client to
  disambiguate the response.  If the earlier associated request
  contained the PREFER_FAILURE option, and the same external IP
  address, protocol, and port cannot be provided, the error
  CANNOT_PROVIDE_EXTERNAL SHOULD be sent.  If the earlier associated
  request contained the FILTER option, the filters are moved to the new
  mapping and the FILTER option is sent in the Mapping Update response.
  Non-mandatory options SHOULD NOT be sent in the Mapping Update
  response.

     Discussion: It could have been possible to design this so that the
     PCP server (1) sent an ANNOUNCE Opcode to the PCP client, the PCP
     client reacted by (2) sending a new MAP request and (3) receiving
     a MAP response.  Instead, the server can create a shortcut for
     that design by simply sending the message it would have sent in
     (3).

  To accommodate packet loss, the PCP server device SHOULD transmit
  such packets three times, with an appropriate Epoch Time value in
  each to reflect the passage of time between transmissions.  The
  interval between the first two notifications MUST be at least 250 ms,
  and the third packet after a 500-ms interval.  Once the PCP server
  has received a refreshed state for that mapping, the PCP server
  SHOULD cease those retransmissions for that mapping, as it serves no
  further purpose to continue sending messages regarding that mapping.

  Upon receipt of such an updated MAP or PEER response, a PCP client
  uses the information in the response to adjust rendezvous servers or
  reconnect to servers, respectively.  For MAP, this would mean
  updating the DNS entries or other address and port information



Wing, et al.                 Standards Track                   [Page 68]

RFC 6887               Port Control Protocol (PCP)            April 2013


  recorded with some kind of application-specific rendezvous server.
  For PEER responses giving a CANNOT_PROVIDE_EXTERNAL error, this would
  typically mean establishing new connections to servers.  Anytime the
  external address or port changes, existing TCP and UDP connections
  will be lost; PCP can't avoid that, but does provide immediate
  notification of the event to lessen the impact.

15.  Mapping Lifetime and Deletion

  The PCP client requests a certain lifetime, and the PCP server
  responds with the assigned lifetime.  The PCP server MAY grant a
  lifetime smaller or larger than the requested lifetime.  The PCP
  server SHOULD be configurable for permitted minimum and maximum
  lifetime, and the minimum value SHOULD be 120 seconds.  The maximum
  value SHOULD be the remaining lifetime of the IP address assigned to
  the PCP client if that information is available (e.g., from the DHCP
  server), or half the lifetime of IP address assignments on that
  network if the remaining lifetime is not available, or 24 hours.
  Excessively long lifetimes can cause consumption of ports even if the
  internal host is no longer interested in receiving the traffic or is
  no longer connected to the network.  These recommendations are not
  strict, and deployments should evaluate the trade-offs to determine
  their own minimum and maximum Lifetime values.

  Once a PCP server has responded positively to a MAP request for a
  certain lifetime, the port mapping is active for the duration of the
  lifetime unless the lifetime is reduced by the PCP client (to a
  shorter lifetime or to zero) or until the PCP server loses its state
  (e.g., crashes).  Mappings created by PCP MAP requests are not
  special or different from mappings created in other ways.  In
  particular, it is implementation-dependent if outgoing traffic
  extends the lifetime of such mappings beyond the PCP-assigned
  lifetime.  PCP clients MUST NOT depend on this behavior to keep
  mappings active, and MUST explicitly renew their mappings as required
  by the Lifetime field in PCP response messages.

  Upon receipt of a PCP response with an absurdly long assigned
  lifetime, the PCP client SHOULD behave as if it received a more sane
  value (e.g., 24 hours), and renew the mapping accordingly, to ensure
  that if the static mapping is removed, the client will continue to
  maintain the mapping it desires.

  An application that forgets its PCP-assigned mappings (e.g., the
  application or OS crashes) will request new PCP mappings.  This may
  consume port mappings, if the application binds to a different
  internal port every time it runs.  The application will also likely
  initiate new outbound TCP connections, which create implicit dynamic
  outbound mappings without using PCP, which will also consume port



Wing, et al.                 Standards Track                   [Page 69]

RFC 6887               Port Control Protocol (PCP)            April 2013


  mappings.  If there is a port mapping quota for the internal host,
  frequent restarts such as this may exhaust the quota.

  To help clean PCP state, when the PCP-controlled device is collocated
  with the address assignment (DHCP) server, such as in a typical
  residential CPE, it is RECOMMENDED that when an IP address becomes
  invalid (e.g., the DHCP lease expires, or the DHCP client sends an
  explicit DHCP RELEASE) the PCP-controlled device SHOULD also discard
  any dynamic mapping state relating to that expired IP address.

  When using NAT, the same external port may be assigned for use by
  different internal hosts at different times.  For example, if an
  internal host using an external port ceases sending traffic using
  that port, then its mapping may expire, and then later the same
  external port may be assigned to a new internal host.  The new
  internal host could then receive incoming traffic that was intended
  for the previous internal host.  This generally happens
  inadvertently, and this reassignment of the external port only
  happens after the current holder of the external port has ceased
  using it for some period of time.  It would be unacceptable if an
  attacker could use PCP to intentionally speed up this reassignment of
  the external port in order to deliberately steal traffic intended for
  the current holder, by (i) spoofing PCP requests using the current
  holder's source IP address and mapping nonce to fraudulently delete
  the mapping or shorten its lifetime, and then (ii) subsequently
  claiming the external port for itself.

  Therefore, in the simple security model, to protect against this
  attack, PCP MUST NOT allow a PCP request (even a PCP request that
  appears to come from the current holder of the mapping) to cause a
  mapping to expire sooner than it would naturally have expired
  otherwise by virtue of outbound traffic keeping the mapping active.
  A PCP server MUST set the lifetime of a mapping to no less than the
  remaining time before the mapping would expire if no further outbound
  traffic is seen for that mapping.  This means a MAP or PEER request
  with lifetime of 0 will only set the assigned lifetime to 0 (i.e.,
  delete the mapping) if the internal host had not sent a packet using
  that mapping for the idle-timeout time, otherwise the assigned
  lifetime will be the remaining idle-timeout time.

  Finally, to reduce unwanted traffic and data corruption for both TCP
  and UDP, the assigned external port created by the MAP Opcode or PEER
  Opcode SHOULD NOT be reused for an interval equal to the reuse time
  limit enforced by the NAT for its implicit dynamic mappings
  (typically, the maximum TCP segment lifetime of 2 minutes [RFC0793]).
  Furthermore, to reduce port stealing attacks, the assigned external
  port also SHOULD NOT be reused for an interval equal to the time the
  PCP- controlled device would normally maintain an idle (no traffic)



Wing, et al.                 Standards Track                   [Page 70]

RFC 6887               Port Control Protocol (PCP)            April 2013


  implicit dynamic mapping (e.g., 2 minutes for UDP [RFC4787] and 124
  minutes for TCP [RFC5382]).  However, within these time windows, the
  PCP server SHOULD allow an external port to be reclaimed by the same
  client, where "same client" means "same internal IP address, internal
  port, and mapping nonce".

15.1.  Lifetime Processing for the MAP Opcode

  If the requested lifetime is zero then:

  o  If both the protocol and internal port are non-zero, it indicates
     a request to delete the indicated mapping immediately.

  o  If the protocol is non-zero and the internal port is zero, it
     indicates a request to delete a previous 'wildcard' (all-ports)
     mapping for that protocol.  The nonce MUST match the nonce used to
     create the 'wildcard' mapping.

  o  If both the protocol and internal port are zero, it indicates a
     request to delete a previous 'DMZ host' (all incoming traffic for
     all protocols) mapping.  The nonce MUST match the nonce used to
     create the 'DMZ host' mapping.

  o  If the protocol is zero and the internal port is non-zero, then
     the request is invalid and the PCP server MUST return a
     MALFORMED_REQUEST error to the client.

  In requests where the requested Lifetime is 0, the Suggested External
  Address and Suggested External Port fields MUST be set to zero on
  transmission and MUST be ignored on reception, and these fields MUST
  be copied into the assigned external IP address and assigned external
  port of the response.

  PCP MAP requests can only delete or shorten lifetimes of MAP-created
  mappings.  If the PCP client attempts to delete a static mapping
  (i.e., a mapping created outside of PCP itself), or an outbound
  (implicit or PEER-created) mapping, the PCP server MUST return
  NOT_AUTHORIZED.  If the PCP client attempts to delete a mapping that
  does not exist, the SUCCESS result code is returned (this is
  necessary for PCP to return the same response for retransmissions or
  duplications of the same request).  If the deletion request was
  properly formatted and successfully processed, a SUCCESS response is
  generated with the protocol and internal port number copied from the
  request, and the response lifetime set to zero.  An inbound mapping
  (i.e., static mapping or MAP-created dynamic mapping) MUST NOT have
  its lifetime reduced by transport protocol messages (e.g., TCP RST,
  TCP FIN).  Note the THIRD_PARTY option (Section 13.1), if authorized,
  can also delete PCP-created MAP mappings.



Wing, et al.                 Standards Track                   [Page 71]

RFC 6887               Port Control Protocol (PCP)            April 2013


16.  Implementation Considerations

  Section 16 provides non-normative guidance that may be useful to
  implementers.

16.1.  Implementing MAP with EDM Port-Mapping NAT

  For implicit dynamic outbound mappings, some existing NAT devices
  have endpoint-independent mapping (EIM) behavior while other NAT
  devices have endpoint-dependent mapping (EDM) behavior.  NATs that
  have EIM behavior do not suffer from the problem described in this
  section.  The IETF strongly encourages EIM behavior
  [RFC4787][RFC5382].

  In EDM NAT devices, the same external port may be used by an outbound
  dynamic mapping and an inbound dynamic mapping (from the same
  internal host or from a different internal host).  This complicates
  the interaction with the MAP Opcode.  With such NAT devices, there
  are two ways envisioned to implement the MAP Opcode:

  1.  Have outbound mappings use a different set of external ports than
      inbound mappings (e.g., those created with MAP), thus reducing
      the interaction problem between them; or

  2.  On arrival of a packet (inbound from the Internet or outbound
      from an internal host), first attempt to use a dynamic outbound
      mapping to process that packet.  If none match, attempt to use an
      inbound mapping to process that packet.  This effectively
      'prioritizes' outbound mappings above inbound mappings.

16.2.  Lifetime of Explicit and Implicit Dynamic Mappings

  No matter if a NAT is EIM or EDM, it is possible that one (or more)
  outbound mappings, using the same internal port on the internal host,
  might be created before or after a MAP request.  When this occurs, it
  is important that the NAT honor the lifetime returned in the MAP
  response.  Specifically, if an inbound mapping was created with the
  MAP Opcode, the implementation needs to ensure that termination of an
  outbound mapping (e.g., via a TCP FIN handshake) does not prematurely
  destroy the MAP-created inbound mapping.

16.3.  PCP Failure Recovery

  If an event occurs that causes the PCP server to lose dynamic mapping
  state (such as a crash or power outage), the mappings created by PCP
  are lost.  Occasional loss of state may be unavoidable in a
  residential NAT device that does not write transient information to
  non-volatile memory.  Loss of state is expected to be rare in a



Wing, et al.                 Standards Track                   [Page 72]

RFC 6887               Port Control Protocol (PCP)            April 2013


  service provider environment (due to redundant power, disk drives for
  storage, etc.).  Of course, due to outright failure of service
  provider equipment (e.g., software malfunction), state may still be
  lost.

  The Epoch time allows a client to deduce when a PCP server may have
  lost its state.  When the Epoch Time value is observed to be outside
  the expected range, the PCP client can attempt to recreate the
  mappings following the procedures described in this section.

  Further analysis of PCP failure scenarios is planned for a future
  document [PCP-FAIL].

16.3.1.  Recreating Mappings

  A mapping renewal packet is formatted identically to an original
  mapping request; from the point of view of the client, it is a
  renewal of an existing mapping; however, from the point of view of a
  newly rebooted PCP server, it appears as a new mapping request.  In
  the normal process of routinely renewing its mappings before they
  expire, a PCP client will automatically recreate all its lost
  mappings.

  When the PCP server loses state and begins processing new PCP
  messages, its Epoch time is reset and begins counting again.  As the
  result of receiving a packet where the Epoch Time field is outside
  the expected range (Section 8.5), indicating that a reboot or similar
  loss of state has occurred, the client can renew its port mappings
  sooner, without waiting for the normal routine renewal time.

16.3.2.  Maintaining Mappings

  A PCP client refreshes a mapping by sending a new PCP request
  containing information learned from the earlier PCP response.  The
  PCP server will respond indicating the new lifetime.  It is possible,
  due to reconfiguration or failure of the PCP server, that the
  external IP address and/or external port, or the PCP server itself,
  has changed (due to a new route to a different PCP server).  Such
  events are rare, but not an error.  The PCP server will simply return
  a new external address and/or external port to the client, and the
  client should record this new external address and port with its
  rendezvous service.  To detect such events more quickly, a server
  that requires extremely high availability may find it beneficial to
  use shorter lifetimes in its PCP mappings requests, so that it
  communicates with the PCP server more often.  This is an engineering
  trade-off based on (i) the acceptable downtime for the service in
  question, (ii) the expected likelihood of NAT or firewall state loss,
  and (iii) the amount of PCP maintenance traffic that is acceptable.



Wing, et al.                 Standards Track                   [Page 73]

RFC 6887               Port Control Protocol (PCP)            April 2013


  If the PCP client has several mappings, the Epoch Time value only
  needs to be retrieved for one of them to determine whether or not it
  appears the PCP server may have suffered a catastrophic loss of
  state.  If the client wishes to check the PCP server's Epoch time, it
  sends a PCP request for any one of the client's mappings.  This will
  return the current Epoch Time value.  In that request, the PCP client
  could extend the mapping lifetime (by asking for more time) or
  maintain the current lifetime (by asking for the same number of
  seconds that it knows are remaining of the lifetime).

  If a PCP client changes its internal IP address (e.g., because the
  internal host has moved to a new network), and the PCP client wishes
  to still receive incoming traffic, it needs create new mappings on
  that new network.  New mappings will typically also require an update
  to the application-specific rendezvous server if the external address
  or port is different from the previous values (see Sections 10.1 and
  11.5).

16.3.3.  SCTP

  Although SCTP has port numbers like TCP and UDP, SCTP works
  differently when behind an address-sharing NAT, in that SCTP port
  numbers are not changed [SCTPNAT].  Outbound dynamic SCTP mappings
  use the verification tag of the association instead of the local and
  remote peer port numbers.  As with TCP, explicit outbound mappings
  can be made to reduce keepalive intervals, and explicit inbound
  mappings can be made by passive listeners expecting to receive new
  associations at the external port.

  Because an SCTP-aware NAT does not (currently) rewrite SCTP port
  numbers, it will not be able to assign an external port that is
  different from the client's internal port.  A PCP client making a MAP
  request for SCTP should be aware of this restriction.  The PCP client
  SHOULD make its SCTP MAP request just as it would for a TCP MAP
  request: in its initial PCP MAP request it SHOULD specify zero for
  the external address and port, and then in subsequent renewals it
  SHOULD echo the assigned external address and port.  However, since a
  current SCTP-aware NAT can only assign an external port that is the
  same as the internal port, it may not be able to do that if the
  external port is already assigned to a different PCP client.  This is
  likely if there is more than one instance of a given SCTP service on
  the local network, since both instances are likely to listen on the
  same well-known SCTP port for that service on their respective hosts,
  but they can't both have the same external port on the NAT gateway's
  external address.  A particular external port may not be assignable
  for other reasons, such as when it is already in use by the NAT
  device itself, or otherwise prohibited by policy, as described in
  Section 11.3, "Processing a MAP Request".  In the event that the



Wing, et al.                 Standards Track                   [Page 74]

RFC 6887               Port Control Protocol (PCP)            April 2013


  external port matching the internal port cannot be assigned (and the
  SCTP-aware NAT does not perform SCTP port rewriting), the SCTP-aware
  NAT MUST return a CANNOT_PROVIDE_EXTERNAL error to the requesting PCP
  client.  Note that this restriction places an extra burden on the
  SCTP server whose MAP request failed, because it then has to tear
  down its exiting listening socket and try again with a different
  internal port, repeatedly until it is successful in finding an
  external port it can use.

  The SCTP complications described above occur because of address
  sharing.  The SCTP complications are avoided when address sharing is
  avoided (e.g., 1:1 NAT, firewall).

16.4.  Source Address Replicated in PCP Header

  All PCP requests include the PCP client's IP address replicated in
  the PCP header.  This is used to detect unexpected address rewriting
  (NAT) on the path between the PCP client and its PCP server.  On
  operating systems that support the sockets API, the following steps
  are RECOMMENDED for a PCP client to insert the correct source address
  in the PCP header:

  1.  Create a UDP socket.
  2.  Call "connect" on this UDP socket using the address and port of
      the desired PCP server.
  3.  Call the getsockname() function to retrieve a sockaddr containing
      the source address the kernel will use for UDP packets sent
      through this socket.
  4.  If the IP address is an IPv4 address, encode the address into an
      IPv4-mapped IPv6 address.  Place the IPv4-mapped IPv6 address or
      the native IPv6 address into the PCP Client's IP Address field in
      the PCP header.
  5.  Send PCP requests using this connected UDP socket.


















Wing, et al.                 Standards Track                   [Page 75]

RFC 6887               Port Control Protocol (PCP)            April 2013


16.5.  State Diagram

  Each mapping entry of the PCP-controlled device would go through the
  state machine shown below.  This state diagram is non-normative.

      CLOSE_MSG or
     (NO_TRAFFIC and EXPIRY)   +---------+  NO_TRAFFIC and EXPIRY
               +-------------->|         |<------------+
               |               |NO_ENTRY |             |
               |   +-----------|         |---------+   |
               |   |           +---------+         |   |
               |   |              ^  |             |   |
               |   |   NO_TRAFFIC |  |             |   |
               |   |           or |  |             |   |
               |   |   CLOSE_MSGS |  |             |   |
               |   |              |  |             |   |
               |   |PEER request  |  |  MAP request|   |
               |   V              |  |             V   |
            +---------+           |  |         +---------+
        +-->|  "P",   |           |  |    M-R  |  "M",   |<--+
    P-R |   | PEER    |-----------|--|-------->| MAP     |   | M-R or
        +---|  mapping|           |  |         |  mapping|---+ P-R or
            +---------+           |  |         +---------+  CLOSE_MSGS
               |   ^              |  |             ^   |
               |   |PEER request  |  |  MAP request|   |
               |   |              |  |             |   |
               |   |              |  |             |   |
               |   |              |  |             |   |
               |   |              |  | outbound    |   |
               |   |              |  | TRAFFIC     |   |
               |   |              |  V             |   |
               |   |           +---------+         |   |
               |   +-----------| "I",    |---------+   |
               |               | implicit|             |
               +-------------->| mapping |<------------+
           TRAFFIC and EXPIRY  +---------+  TRAFFIC and EXPIRY

                      Figure 16: PCP State Diagram

  The meanings of the states and events are:

     NO_ENTRY:  Invalid state represents Entry does not exist.  This is
           the only possible start state.

     M-R:  MAP request

     P-R:  PEER request




Wing, et al.                 Standards Track                   [Page 76]

RFC 6887               Port Control Protocol (PCP)            April 2013


     M:    Mapping entry when created by MAP request

     P:    Mapping entry when created/managed by PEER request

     I:    Implicit mapping created by an outgoing packet from the
           client (e.g., TCP SYN), and also the state when a
           PCP-created mapping's lifetime expires while there is still
           active traffic.

     EXPIRY: PEER or MAP lifetime expired

     TRAFFIC:  Traffic seen by PCP-controlled device using this entry
           within the expiry time for that entry.  This traffic may be
           inbound or outbound.

     NO_TRAFFIC:  Indicates that there is no TRAFFIC.

     CLOSE_MSG:  Protocol messages from the client or server to close
           the session (e.g., TCP FIN or TCP RST), as per the NAT or
           firewall device's handling of such protocol messages.

  Notes on the diagram:

  1.  The 'and' clause indicates the events on either side of 'and' are
      required for the state-transition.  The 'or' clause indicates
      either one of the events are enough for the state-transition.

  2.  Transition from state M to state I is implementation dependent.

17.  Deployment Considerations

17.1.  Ingress Filtering

  As with implicit dynamic mappings created by outgoing TCP SYN
  packets, explicit dynamic mappings created via PCP use the source IP
  address of the packet as the internal address for the mappings.
  Therefore, ingress filtering [RFC2827] SHOULD be used on the path
  between the internal host and the PCP server to prevent the injection
  of spoofed packets onto that path.

17.2.  Mapping Quota

  On PCP-controlled devices that create state when a mapping is created
  (e.g., NAT), the PCP server SHOULD maintain per-host and/or per-
  subscriber quotas for mappings.  It is implementation specific
  whether the PCP server uses a separate quotas for implicit, explicit,
  and static mappings, a combined quota for all of them, or some other
  policy.



Wing, et al.                 Standards Track                   [Page 77]

RFC 6887               Port Control Protocol (PCP)            April 2013


18.  Security Considerations

  The goal of the PCP protocol is to improve the ability of end nodes
  to control their associated NAT state, and to improve the efficiency
  and error handling of NAT mappings when compared to existing implicit
  mapping mechanisms in NAT boxes and stateful firewalls.  It is the
  security goal of the PCP protocol to limit any new denial-of-service
  opportunities, and to avoid introducing new attacks that can result
  in unauthorized changes to mapping state.  One of the most serious
  consequences of unauthorized changes in mapping state is traffic
  theft.  All mappings that could be created by a specific host using
  implicit mapping mechanisms are inherently considered to be
  authorized.  Confidentiality of mappings is not a requirement, even
  in cases where the PCP messages may transit paths that would not be
  traveled by the mapped traffic.

18.1.  Simple Threat Model

  PCP servers are secure against off-path attackers who cannot spoof a
  packet that the PCP server will view as a packet received from the
  internal network.  PCP clients are secure against off-path attackers
  who can spoof the PCP server's IP address.

  Defending against attackers who can modify or drop packets between
  the internal network and the PCP server, or who can inject spoofed
  packets that appear to come from the internal network is out of
  scope.  Such an attacker can redirect traffic to a host of their
  choosing.

  A PCP server is secure under this threat model if the PCP server is
  constrained so that it does not configure any explicit mapping that
  it would not configure implicitly.  In most cases, this means that
  PCP servers running on NAT boxes or stateful firewalls that support
  the PEER and MAP Opcodes can be secure under this threat model if
  (1) all of their hosts are within a single administrative domain (or
  if the internal hosts can be securely partitioned into separate
  administrative domains, as in the DS-Lite B4 case), (2) explicit
  mappings are created with the same lifetime as implicit mappings, and
  (3) the THIRD_PARTY option is not supported.  PCP servers can also
  securely support the MAP Opcode under this threat model if the
  security policy on the device running the PCP server would permit
  endpoint-independent filtering of implicit mappings.

  PCP servers that comply with the Simple Threat Model and do not
  implement a PCP security mechanism described in Section 18.2 MUST
  enforce the constraints described in the paragraph above.





Wing, et al.                 Standards Track                   [Page 78]

RFC 6887               Port Control Protocol (PCP)            April 2013


18.1.1.  Attacks Considered

  o  If you allow multiple administrative domains to send PCP requests
     to a single PCP server that does not enforce a boundary between
     the domains, it is possible for a node in one domain to perform a
     denial-of-service attack on other domains or to capture traffic
     that is intended for a node in another domain.

  o  If explicit mappings have longer lifetimes than implicit mappings,
     it makes it easier to perpetrate a denial-of-service attack than
     it would be if the PCP server was not present.

  o  If the PCP server supports deleting or reducing the lifetime of
     existing mappings, this allows an attacking node to steal an
     existing mapping and receive traffic that was intended for another
     node.

  o  If the THIRD_PARTY option is supported, this also allows an
     attacker to open a window for an external node to attack an
     internal node, allows an attacker to steal traffic that was
     intended for another node, or may facilitate a denial-of-service
     attack.  One example of how the THIRD_PARTY option could grant an
     attacker more capability than a spoofed implicit mapping is that
     the PCP server (especially if it is running in a service
     provider's network) may not be aware of internal filtering that
     would prevent spoofing an equivalent implicit mapping, such as
     filtering between a guest and corporate network.

  o  If the MAP Opcode is supported by the PCP server in cases where
     the security policy would not support endpoint-independent
     filtering of implicit mappings, then the MAP Opcode changes the
     security properties of the device running the PCP server by
     allowing explicit mappings that violate the security policy.

18.1.2.  Deployment Examples Supporting the Simple Threat Model

  This section offers two examples of how the Simple Threat Model can
  be supported in real-world deployment scenarios.

18.1.2.1.  Residential Gateway Deployment

  Parity with many currently deployed residential gateways can be
  achieved using a PCP server that is constrained as described in
  Section 18.1 above.







Wing, et al.                 Standards Track                   [Page 79]

RFC 6887               Port Control Protocol (PCP)            April 2013


18.2.  Advanced Threat Model

  In the Advanced Threat Model, the PCP protocol ensures that attackers
  (on- or off-path) cannot create unauthorized mappings or make
  unauthorized changes to existing mappings.  The protocol must also
  limit the opportunity for on- or off-path attackers to perpetrate
  denial-of-service attacks.

  The Advanced Threat Model security model will be needed in the
  following cases:

  o  Security infrastructure equipment, such as corporate firewalls,
     that does not create implicit mappings.

  o  Equipment (such as CGNs or service provider firewalls) that serves
     multiple administrative domains and does not have a mechanism to
     securely partition traffic from those domains.

  o  Any implementation that wants to be more permissive in authorizing
     explicit mappings than it is in authorizing implicit mappings.

  o  Implementations that wish to support any deployment scenario that
     does not meet the constraints described in Section 18.1.

  To protect against attacks under this threat model, a PCP security
  mechanism that provides an authenticated, integrity-protected
  signaling channel would need to be specified.

  PCP servers that implement a PCP security mechanism MAY accept
  unauthenticated requests.  In their default configuration, PCP
  servers implementing the PCP security mechanism MUST still enforce
  the constraints described in Section 18.1 when processing
  unauthenticated requests.

18.3.  Residual Threats

  This section describes some threats that are not addressed in either
  of the above threat models and recommends appropriate mitigation
  strategies.

18.3.1.  Denial of Service

  Because of the state created in a NAT or firewall, a per-host and/or
  per-subscriber quota will likely exist for both implicit dynamic
  mappings and explicit dynamic mappings.  A host might make an
  excessive number of implicit or explicit dynamic mappings, consuming





Wing, et al.                 Standards Track                   [Page 80]

RFC 6887               Port Control Protocol (PCP)            April 2013


  an inordinate number of ports, causing a denial of service to other
  hosts.  Thus, Section 17.2 recommends that hosts be limited to a
  reasonable number of explicit dynamic mappings.

  An attacker, on the path between the PCP client and PCP server, can
  drop PCP requests, drop PCP responses, or spoof a PCP error, all of
  which will effectively deny service.  Through such actions, the PCP
  client might not be aware the PCP server might have actually
  processed the PCP request.  An attacker sending a NO_RESOURCES error
  can cause the PCP client to not send messages to that server for a
  while.  There is no mitigation to this on-path attacker.

18.3.2.  Ingress Filtering

  It is important to prevent a host from fraudulently creating,
  deleting, or refreshing a mapping (or filtering) for another host,
  because this can expose the other host to unwanted traffic, prevent
  it from receiving wanted traffic, or consume the other host's mapping
  quota.  Both implicit and explicit dynamic mappings are created based
  on the source IP address in the packet, and hence depend on ingress
  filtering to guard against spoof source IP addresses.

18.3.3.  Mapping Theft

  In the time between when a PCP server loses state and the PCP client
  notices the lower-than-expected Epoch Time value, it is possible that
  the PCP client's mapping will be acquired by another host (via an
  explicit dynamic mapping or implicit dynamic mapping).  This means
  incoming traffic will be sent to a different host ("theft").  Rapid
  recovery reduces this interval, but does not completely eliminate
  this threat.  The PCP client can reduce this interval by using a
  relatively short lifetime; however, this increases the amount of PCP
  chatter.  This threat is reduced by using persistent storage of
  explicit dynamic mappings in the PCP server (so it does not lose
  explicit dynamic mapping state), or by ensuring that the previous
  external IP address, protocol, and port cannot be used by another
  host (e.g., by using a different IP address pool).

18.3.4.  Attacks against Server Discovery

  This document does not specify server discovery, beyond contacting
  the default gateway.









Wing, et al.                 Standards Track                   [Page 81]

RFC 6887               Port Control Protocol (PCP)            April 2013


19.  IANA Considerations

  IANA has performed the following actions.

19.1.  Port Number

  PCP uses ports 5350 and 5351, previously assigned by IANA to NAT-PMP
  [RFC6886].  IANA has reassigned those ports to PCP.

19.2.  Opcodes

  IANA has created a new protocol registry for PCP Opcodes, numbered
  0-127, initially populated with the values:

          Value            Opcode
          -----            -------------------------
          0                ANNOUNCE
          1                MAP
          2                PEER
          3-31             Standards Action [RFC5226]
          32-63            Specification Required [RFC5226]
          96-126           Reserved for Private Use [RFC5226]
          127              Reserved, Standards Action [RFC5226]

  The value 127 is Reserved and may be assigned via Standards Action
  [RFC5226].  The values in the range 3-31 can be assigned via
  Standards Action [RFC5226], 32-63 via Specification Required
  [RFC5226], and the range 96-126 is for Private Use [RFC5226].

19.3.  Result Codes

  IANA has created a new registry for PCP result codes, numbered 0-255,
  initially populated with the result codes from Section 7.4.  The
  value 255 is Reserved and may be assigned via Standards Action
  [RFC5226].

  The values in the range 14-127 can be assigned via Standards Action
  [RFC5226], 128-191 via Specification Required [RFC5226], and the
  range 191-254 is for Private Use [RFC5226].

19.4.  Options

  IANA has created a new registry for PCP options, numbered 0-255, each
  with an associated mnemonic.  The values 0-127 are mandatory to
  process, and 128-255 are optional to process.  The initial registry
  contains the options described in Section 13.  The option values 0,
  127, and 255 are Reserved and may be assigned via Standards Action
  [RFC5226].



Wing, et al.                 Standards Track                   [Page 82]

RFC 6887               Port Control Protocol (PCP)            April 2013


  Additional PCP option codes in the ranges 4-63 and 128-191 can be
  created via Standards Action [RFC5226], the ranges 64-95 and 192-223
  are for Specification Required [RFC5226], and the ranges 96-126 and
  224-254 are for Private Use [RFC5226].

  Documents describing an option should describe the processing for
  both the PCP client and server, and the information below:

     Option Name: <mnemonic>
     Number: <value>
     Purpose: <textual description>
     Valid for Opcodes: <list of Opcodes>
     Length: <rules for length>
     May appear in: <requests/responses/both>
     Maximum occurrences: <count>

20.  Acknowledgments

  Thanks to Xiaohong Deng, Alain Durand, Christian Jacquenet, Jacni
  Qin, Simon Perreault, James Yu, Tina TSOU (Ting ZOU), Felipe Miranda
  Costa, James Woodyatt, Dave Thaler, Masataka Ohta, Vijay K. Gurbani,
  Loa Andersson, Richard Barnes, Russ Housley, Adrian Farrel, Pete
  Resnick, Pasi Sarolahti, Robert Sparks, Wesley Eddy, Dan Harkins,
  Peter Saint-Andre, Stephen Farrell, Ralph Droms, Felipe Miranda
  Costa, Amit Jain, and Wim Henderickx for their comments and review.

  Thanks to Simon Perreault for highlighting the interaction of dynamic
  connections with PCP-created mappings and for many other review
  comments.

  Thanks to Francis Dupont for his several thorough reviews of the
  specification, which improved the protocol significantly.

  Thanks to T. S. Ranganathan for the state diagram.

  Thanks to Peter Lothberg for clock skew information, which guided the
  choice of tolerance levels for deciding when an Epoch time should be
  considered to be anomalous.

  Thanks to Margaret Wasserman and Sam Hartman for writing the Security
  Considerations section.

  Thanks to authors of DHCPv6 for retransmission text.








Wing, et al.                 Standards Track                   [Page 83]

RFC 6887               Port Control Protocol (PCP)            April 2013


21.  References

21.1.  Normative References

  [RFC0768]        Postel, J., "User Datagram Protocol", STD 6,
                   RFC 768, August 1980.

  [RFC2119]        Bradner, S., "Key words for use in RFCs to Indicate
                   Requirement Levels", BCP 14, RFC 2119, March 1997.

  [RFC2827]        Ferguson, P. and D. Senie, "Network Ingress
                   Filtering: Defeating Denial of Service Attacks which
                   employ IP Source Address Spoofing", BCP 38,
                   RFC 2827, May 2000.

  [RFC4086]        Eastlake, D., Schiller, J., and S. Crocker,
                   "Randomness Requirements for Security", BCP 106,
                   RFC 4086, June 2005.

  [RFC4193]        Hinden, R. and B. Haberman, "Unique Local IPv6
                   Unicast Addresses", RFC 4193, October 2005.

  [RFC4291]        Hinden, R. and S. Deering, "IP Version 6 Addressing
                   Architecture", RFC 4291, February 2006.

  [RFC5226]        Narten, T. and H. Alvestrand, "Guidelines for
                   Writing an IANA Considerations Section in RFCs",
                   BCP 26, RFC 5226, May 2008.

  [RFC6056]        Larsen, M. and F. Gont, "Recommendations for
                   Transport-Protocol Port Randomization", BCP 156,
                   RFC 6056, January 2011.

  [proto_numbers]  IANA, "Protocol Numbers", 2011,
                   <http://www.iana.org/assignments/protocol-numbers>.

21.2.  Informative References

  [IGDv1]          UPnP Gateway Committee, "WANIPConnection:1",
                   November 2001, <http://upnp.org/specs/gw/
                   UPnP-gw-WANIPConnection-v1-Service.pdf>.

  [L2NAT]          Miles, D. and M. Townsley, "Layer2-Aware NAT", Work
                   in Progress, March 2009.

  [PCP-FAIL]       Boucadair, M., Dupont, F., and R. Penno, "Port
                   Control Protocol (PCP) Failure Scenarios", Work
                   in Progress, August 2012.



Wing, et al.                 Standards Track                   [Page 84]

RFC 6887               Port Control Protocol (PCP)            April 2013


  [PNP-IGD-PCP]    Boucadair, M., Penno, R., and D. Wing, "Universal
                   Plug and Play (UPnP) Internet Gateway Device (IGD)-
                   Port Control Protocol (PCP) Interworking Function",
                   Work in Progress, December 2012.

  [RFC0793]        Postel, J., "Transmission Control Protocol", STD 7,
                   RFC 793, September 1981.

  [RFC1918]        Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot,
                   G., and E. Lear, "Address Allocation for Private
                   Internets", BCP 5, RFC 1918, February 1996.

  [RFC2136]        Vixie, P., Thomson, S., Rekhter, Y., and J. Bound,
                   "Dynamic Updates in the Domain Name System (DNS
                   UPDATE)", RFC 2136, April 1997.

  [RFC3007]        Wellington, B., "Secure Domain Name System (DNS)
                   Dynamic Update", RFC 3007, November 2000.

  [RFC3022]        Srisuresh, P. and K. Egevang, "Traditional IP
                   Network Address Translator (Traditional NAT)",
                   RFC 3022, January 2001.

  [RFC3581]        Rosenberg, J. and H. Schulzrinne, "An Extension to
                   the Session Initiation Protocol (SIP) for Symmetric
                   Response Routing", RFC 3581, August 2003.

  [RFC3587]        Hinden, R., Deering, S., and E. Nordmark, "IPv6
                   Global Unicast Address Format", RFC 3587,
                   August 2003.

  [RFC4303]        Kent, S., "IP Encapsulating Security Payload (ESP)",
                   RFC 4303, December 2005.

  [RFC4340]        Kohler, E., Handley, M., and S. Floyd, "Datagram
                   Congestion Control Protocol (DCCP)", RFC 4340,
                   March 2006.

  [RFC4787]        Audet, F. and C. Jennings, "Network Address
                   Translation (NAT) Behavioral Requirements for
                   Unicast UDP", BCP 127, RFC 4787, January 2007.

  [RFC4941]        Narten, T., Draves, R., and S. Krishnan, "Privacy
                   Extensions for Stateless Address Autoconfiguration
                   in IPv6", RFC 4941, September 2007.

  [RFC4960]        Stewart, R., "Stream Control Transmission Protocol",
                   RFC 4960, September 2007.



Wing, et al.                 Standards Track                   [Page 85]

RFC 6887               Port Control Protocol (PCP)            April 2013


  [RFC4961]        Wing, D., "Symmetric RTP / RTP Control Protocol
                   (RTCP)", BCP 131, RFC 4961, July 2007.

  [RFC5382]        Guha, S., Biswas, K., Ford, B., Sivakumar, S., and
                   P. Srisuresh, "NAT Behavioral Requirements for TCP",
                   BCP 142, RFC 5382, October 2008.

  [RFC6092]        Woodyatt, J., "Recommended Simple Security
                   Capabilities in Customer Premises Equipment (CPE)
                   for Providing Residential IPv6 Internet Service",
                   RFC 6092, January 2011.

  [RFC6145]        Li, X., Bao, C., and F. Baker, "IP/ICMP Translation
                   Algorithm", RFC 6145, April 2011.

  [RFC6146]        Bagnulo, M., Matthews, P., and I. van Beijnum,
                   "Stateful NAT64: Network Address and Protocol
                   Translation from IPv6 Clients to IPv4 Servers",
                   RFC 6146, April 2011.

  [RFC6296]        Wasserman, M. and F. Baker, "IPv6-to-IPv6 Network
                   Prefix Translation", RFC 6296, June 2011.

  [RFC6333]        Durand, A., Droms, R., Woodyatt, J., and Y. Lee,
                   "Dual-Stack Lite Broadband Deployments Following
                   IPv4 Exhaustion", RFC 6333, August 2011.

  [RFC6619]        Arkko, J., Eggert, L., and M. Townsley, "Scalable
                   Operation of Address Translators with Per-Interface
                   Bindings", RFC 6619, June 2012.

  [RFC6763]        Cheshire, S. and M. Krochmal, "DNS-Based Service
                   Discovery", RFC 6763, February 2013.

  [RFC6886]        Cheshire, S. and M. Krochmal, "NAT Port Mapping
                   Protocol (NAT-PMP)", RFC 6886, April 2013.

  [RFC6888]        Perreault, S., Ed., Yamagata, I., Miyakawa, S.,
                   Nakagawa, A., and H. Ashida, "Common Requirements
                   for Carrier-Grade NATs (CGNs)", BCP 127, RFC 6888,
                   April 2013.

  [SCTPNAT]        Stewart, R., Tuexen, M., and I. Ruengeler, "Stream
                   Control Transmission Protocol (SCTP) Network Address
                   Translation", Work in Progress, February 2013.






Wing, et al.                 Standards Track                   [Page 86]

RFC 6887               Port Control Protocol (PCP)            April 2013


Appendix A.  NAT-PMP Transition

  The Port Control Protocol (PCP) is a successor to the NAT Port
  Mapping Protocol, NAT-PMP [RFC6886], and shares similar semantics,
  concepts, and packet formats.  Because of this, NAT-PMP and PCP both
  use the same port and use NAT-PMP and PCP's version negotiation
  capabilities to determine which version to use.  This section
  describes how an orderly transition from NAT-PMP to PCP may be
  achieved.

  A client supporting both NAT-PMP and PCP SHOULD send its request
  using the PCP packet format.  This will be received by a NAT-PMP
  server or a PCP server.  If received by a NAT-PMP server, the
  response will be UNSUPP_VERSION, as indicated by the NAT-PMP
  specification [RFC6886], which will cause the client to downgrade to
  NAT-PMP and resend its request in NAT-PMP format.  If received by a
  PCP server, the response will be as described by this document and
  processing continues as expected.

  A PCP server supporting both NAT-PMP and PCP can handle requests in
  either format.  The first octet of the packet indicates if it is
  NAT-PMP (first octet zero) or PCP (first octet non-zero).

  A PCP-only gateway receiving a NAT-PMP request (identified by the
  first octet being zero) will interpret the request as a version
  mismatch.  Normal PCP processing will emit a PCP response that is
  compatible with NAT-PMP, without any special handling by the PCP
  server.























Wing, et al.                 Standards Track                   [Page 87]

RFC 6887               Port Control Protocol (PCP)            April 2013


Authors' Addresses

  Dan Wing (editor)
  Cisco Systems, Inc.
  170 West Tasman Drive
  San Jose, California  95134
  USA

  EMail: [email protected]


  Stuart Cheshire
  Apple Inc.
  1 Infinite Loop
  Cupertino, California  95014
  USA

  Phone: +1 408 974 3207
  EMail: [email protected]


  Mohamed Boucadair
  France Telecom
  Rennes  35000
  France

  EMail: [email protected]


  Reinaldo Penno
  Cisco Systems, Inc.
  170 West Tasman Drive
  San Jose, California  95134
  USA

  EMail: [email protected]


  Paul Selkirk
  Internet Systems Consortium
  950 Charter Street
  Redwood City, California  94063
  USA

  EMail: [email protected]






Wing, et al.                 Standards Track                   [Page 88]