diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4702.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4702.txt')
-rw-r--r-- | doc/rfc/rfc4702.txt | 955 |
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc4702.txt b/doc/rfc/rfc4702.txt new file mode 100644 index 0000000..609d99f --- /dev/null +++ b/doc/rfc/rfc4702.txt @@ -0,0 +1,955 @@ + + + + + + +Network Working Group M. Stapp +Request for Comments: 4702 B. Volz +Category: Standards Track Cisco Systems, Inc. + Y. Rekhter + Juniper Networks + October 2006 + + + The Dynamic Host Configuration Protocol (DHCP) Client + Fully Qualified Domain Name (FQDN) Option + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document describes a Dynamic Host Configuration Protocol for + IPv4 (DHCPv4) option that can be used to exchange information about a + DHCPv4 client's fully qualified domain name and about responsibility + for updating the DNS RR related to the client's address assignment. + + + + + + + + + + + + + + + + + + + + + + +Stapp, et al. Standards Track [Page 1] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Terminology ................................................3 + 1.2. Models of Operation ........................................3 + 2. The Client FQDN Option ..........................................4 + 2.1. The Flags Field ............................................5 + 2.2. The RCODE Fields ...........................................6 + 2.3. The Domain Name Field ......................................6 + 2.3.1. Deprecated ASCII Encoding ...........................7 + 3. DHCP Client Behavior ............................................7 + 3.1. Interaction with Other Options .............................7 + 3.2. Client Desires to Update A RRs .............................8 + 3.3. Client Desires Server to Do DNS Updates ....................8 + 3.4. Client Desires No Server DNS Updates .......................8 + 3.5. Domain Name and DNS Update Issues ..........................9 + 4. DHCP Server Behavior ...........................................10 + 4.1. When to Perform DNS Updates ...............................11 + 5. DNS RR TTLs ....................................................12 + 6. DNS Update Conflicts ...........................................12 + 7. IANA Considerations ............................................13 + 8. Security Considerations ........................................13 + 9. Acknowledgements ...............................................14 + 10. References ....................................................14 + 10.1. Normative References .....................................14 + 10.2. Informative References ...................................15 + + + + + + + + + + + + + + + + + + + + + + + + + +Stapp, et al. Standards Track [Page 2] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + +1. Introduction + + DNS ([2], [3]) maintains (among other things) the information about + the mapping between hosts' Fully Qualified Domain Names (FQDNs) [11] + and IP addresses assigned to the hosts. The information is + maintained in two types of Resource Records (RRs): A and PTR. The + DNS update specification ([4]) describes a mechanism that enables DNS + information to be updated over a network. + + The Dynamic Host Configuration Protocol for IPv4 (DHCPv4 or just DHCP + in this document) [5] provides a mechanism by which a host (a DHCP + client) can acquire certain configuration information, along with its + address. This document specifies a DHCP option, the Client FQDN + option, which can be used by DHCP clients and servers to exchange + information about the client's fully qualified domain name for an + address and who has the responsibility for updating the DNS with the + associated A and PTR RRs. + +1.1. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [1]. + +1.2. Models of Operation + + When a DHCP client acquires a new address, a site's administrator may + desire that one or both of the A RR for the client's FQDN and the PTR + RR for the acquired address be updated. Therefore, two separate DNS + update transactions may occur. Acquiring an address via DHCP + involves two entities: a DHCP client and a DHCP server. In + principle, each of these entities could perform none, one, or both of + the transactions. However, in practice, not all permutations make + sense. The DHCP Client FQDN option is primarily intended to operate + in the following two cases: + + 1. DHCP client updates the A RR, DHCP server updates the PTR RR. + + 2. DHCP server updates both the A and the PTR RRs. + + The only difference between these two cases is whether the FQDN-to- + IP-address mapping is updated by a DHCP client or by a DHCP server. + The IP-address-to-FQDN mapping is updated by a DHCP server in both + cases. + + The reason these two are important, while others are unlikely, has to + do with authority over the respective DNS domain names. A DHCP + client may be given authority over mapping its own A RRs, or that + + + +Stapp, et al. Standards Track [Page 3] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + authority may be restricted to a server to prevent the client from + listing arbitrary addresses or associating its address with arbitrary + domain names. In all cases, the only reasonable place for the + authority over the PTR RRs associated with the address is in the DHCP + server that allocates the address. + + Note: A third case is supported: the client requests that the server + perform no updates. However, this case is presumed to be rare + because of the authority issues. + + It is considered local policy to permit DHCP clients and servers to + perform DNS updates to zones. This document does not require any + specific administrative policy and does not propose one. + Furthermore, this specification applies only to DHCP client and + server processes; it does not apply to other processes that initiate + DNS updates. + + This document describes a DHCP option which a client can use to + convey all or part of its domain name to a DHCP server. Site- + specific policy determines whether DHCP servers use the names that + clients offer or not, and what DHCP servers may do in cases where + clients do not supply domain names. + +2. The Client FQDN Option + + To update the IP-address-to-FQDN mapping, a DHCP server needs to know + the FQDN of the client to which the server leases the address. To + allow the client to convey its FQDN to the server, this document + defines a new DHCP option, called "Client FQDN". The Client FQDN + option also contains Flags, which DHCP servers can use to convey + information about DNS updates to clients, and two deprecated RCODEs. + + Clients MAY send the Client FQDN option, setting appropriate Flags + values, in both their DHCPDISCOVER and DHCPREQUEST messages. If a + client sends the Client FQDN option in its DHCPDISCOVER message, it + MUST send the option in subsequent DHCPREQUEST messages though the + contents of the option MAY change. + + Only one Client FQDN option MAY appear in a message, though it may be + instantiated in a message as multiple options [9]. DHCP clients and + servers supporting this option MUST implement DHCP option + concatenation [9]. In the terminology of [9], the Client FQDN option + is a concatenation-requiring option. + + The code for this option is 81. Len contains the number of octets + that follow the Len field, and the minimum value is 3 (octets). + + + + + +Stapp, et al. Standards Track [Page 4] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + The format of the Client FQDN option is: + + Code Len Flags RCODE1 RCODE2 Domain Name + +------+------+------+------+------+------+-- + | 81 | n | | | | ... + +------+------+------+------+------+------+-- + + The above figure follows the conventions of [12]. + +2.1. The Flags Field + + The format of the 1-octet Flags field is: + + 0 1 2 3 4 5 6 7 + +-+-+-+-+-+-+-+-+ + | MBZ |N|E|O|S| + +-+-+-+-+-+-+-+-+ + + The "S" bit indicates whether the server SHOULD or SHOULD NOT perform + the A RR (FQDN-to-address) DNS updates. A client sets the bit to 0 + to indicate the server SHOULD NOT perform the updates and 1 to + indicate the server SHOULD perform the updates. The state of the bit + in the reply from the server indicates the action to be taken by the + server; if 1, the server has taken responsibility for A RR updates + for the FQDN. + + The "O" bit indicates whether the server has overridden the client's + preference for the "S" bit. A client MUST set this bit to 0. A + server MUST set this bit to 1 if the "S" bit in its reply to the + client does not match the "S" bit received from the client. + + The "N" bit indicates whether the server SHOULD NOT perform any DNS + updates. A client sets this bit to 0 to request that the server + SHOULD perform updates (the PTR RR and possibly the A RR based on the + "S" bit) or to 1 to request that the server SHOULD NOT perform any + DNS updates. A server sets the "N" bit to indicate whether the + server SHALL (0) or SHALL NOT (1) perform DNS updates. If the "N" + bit is 1, the "S" bit MUST be 0. + + The "E" bit indicates the encoding of the Domain Name field. 1 + indicates canonical wire format, without compression, as described in + [3], Section 3.1. This encoding SHOULD be used by clients and MUST + be supported by servers. 0 indicates a now-deprecated ASCII encoding + (see Section 2.3.1). A server MUST use the same encoding as that + + + + + + + +Stapp, et al. Standards Track [Page 5] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + used by the client. A server that does not support the deprecated + ASCII encoding MUST ignore Client FQDN options that use that + encoding. + + The remaining bits in the Flags field are reserved for future + assignment. DHCP clients and servers that send the Client FQDN + option MUST clear the MBZ bits, and they MUST ignore these bits. + +2.2. The RCODE Fields + + The two 1-octet RCODE1 and RCODE2 fields are deprecated. A client + SHOULD set these to 0 when sending the option and SHOULD ignore them + on receipt. A server SHOULD set these to 255 when sending the option + and MUST ignore them on receipt. + + As this option with these fields is already in wide use, the fields + are retained. These fields were originally defined for use by a DHCP + server to indicate to a DHCP client the Response Code from any A + (RCODE1) or PTR (RCODE2) RR DNS updates it has performed, or a value + of 255 was used to indicate that an update had been initiated but had + not yet completed. Each of these fields is one octet long. These + fields were defined before EDNS0 [13], which describes a mechanism + for extending the length of a DNS RCODE to 12 bits, which is another + reason to deprecate them. + + If the client needs to confirm that the DNS update has been done, it + MAY use a DNS query to check whether the mapping is up to date. + However, depending on the load on the DHCP and DNS servers and the + DNS propagation delays, the client can only infer success. If the + information is not found to be up to date in DNS, the authoritative + servers might not have completed the updates or zone transfers, or + caching resolvers may yet have updated their caches. + +2.3. The Domain Name Field + + The Domain Name part of the option carries all or part of the FQDN of + a DHCP client. The data in the Domain Name field SHOULD appear in + canonical wire format as specified in [3], Section 3.1. If the DHCP + client uses the canonical wire format, it MUST set the "E" bit in the + Flags field to 1. In order to determine whether the FQDN has changed + between message exchanges, the client and server MUST NOT alter the + Domain Name field contents unless the FQDN has actually changed. + + A client MAY be configured with a fully qualified domain name or with + a partial name that is not fully qualified. If a client knows only + part of its name, it MAY send a name that is not fully qualified, + indicating that it knows part of the name but does not necessarily + know the zone in which the name is to be embedded. + + + +Stapp, et al. Standards Track [Page 6] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + To send a fully qualified domain name, the Domain Name field is set + to the DNS-encoded domain name including the terminating zero-length + label. To send a partial name, the Domain Name field is set to the + DNS encoded domain name without the terminating zero-length label. + + A client MAY also leave the Domain Name field empty if it desires the + server to provide a name. + +2.3.1. Deprecated ASCII Encoding + + A substantial population of clients implemented an earlier draft of + this specification, which permitted an ASCII encoding of the Domain + Name field. Server implementations SHOULD be aware that clients that + send the Client FQDN option with the "E" bit set to 0 are using an + ASCII encoding of the Domain Name field. Servers MAY be prepared to + return an ASCII-encoded version of the Domain Name field to such + clients. Servers that are not prepared to return an ASCII-encoded + version MUST ignore the Client FQDN option if the "E" bit is 0. The + use of ASCII encoding in this option SHOULD be considered deprecated. + + A DHCP client that used ASCII encoding was permitted to suggest a + single label if it was not configured with a fully qualified name. + Such clients send a single label as a series of ASCII characters in + the Domain Name field, excluding the "." (dot) character. + + Clients and servers SHOULD follow the character set rules of [6], + fourth section ("Assumptions"), first 5 sentences, as modified by + [7], Section 2.1. However, implementers SHOULD also be aware that + some client software may send data intended to be in other character + sets. This specification does not require support for other + character sets. + +3. DHCP Client Behavior + + The following describes the behavior of a DHCP client that implements + the Client FQDN option. + +3.1. Interaction with Other Options + + Other DHCP options MAY carry data that is related to the Domain Name + field of the Client FQDN option. The Host Name option [12], for + example, contains an ASCII string representation of the client's host + name. In general, a client does not need to send redundant data, and + therefore clients that send the Client FQDN option in their messages + MUST NOT also send the Host Name option. Clients that receive both + the Host Name option and the Client FQDN option from a server SHOULD + + + + + +Stapp, et al. Standards Track [Page 7] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + prefer Client FQDN option data. Section 4 instructs servers to + ignore the Host Name option in client messages that include the + Client FQDN option. + +3.2. Client Desires to Update A RRs + + If a client that owns/maintains its own FQDN wants to be responsible + for updating the FQDN-to-IP-address mapping for the FQDN and + address(es) used by the client, the client MUST include the Client + FQDN option in the DHCPREQUEST message originated by the client. A + DHCP client MAY choose to include the Client FQDN option in its + DHCPDISCOVER messages as well as its DHCPREQUEST messages. The "S", + "O", and "N" bits in the Flags field in the option MUST be 0. + + Once the client's DHCP configuration is completed (the client + receives a DHCPACK message and successfully completes a final check + on the parameters passed in the message), the client MAY originate an + update for the A RR (associated with the client's FQDN) unless the + server has set the "S" bit to 1. If the "S" is 1, the DHCP client + SHOULD NOT initiate an update for the name in the server's returned + Client FQDN option Domain Name field. However, a DHCP client that is + explicitly configured with a FQDN MAY ignore the state of the "S" bit + if the server's returned name matches the client's configured name. + +3.3. Client Desires Server to Do DNS Updates + + A client can choose to delegate the responsibility for updating the + FQDN-to-IP-address mapping for the FQDN and address(es) used by the + client to the server. In order to inform the server of this choice, + the client SHOULD include the Client FQDN option in its DHCPREQUEST + message and MAY include the Client FQDN option in its DHCPDISCOVER. + The "S" bit in the Flags field in the option MUST be 1, and the "O" + and "N" bits MUST be 0. + +3.4. Client Desires No Server DNS Updates + + A client can choose to request that the server perform no DNS updates + on its behalf. In order to inform the server of this choice, the + client SHOULD include the Client FQDN option in its DHCPREQUEST + message and MAY include the Client FQDN option in its DHCPDISCOVER. + The "N" bit in the Flags field in the option MUST be 1, and the "S" + and "O" bits MUST be 0. + + Once the client's DHCP configuration is completed (the client + receives a DHCPACK message and successfully completes a final check + on the parameters passed in the message), the client MAY originate + + + + + +Stapp, et al. Standards Track [Page 8] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + its DNS updates provided the server's "N" bit is 1. If the server's + "N" bit is 0, the server MAY perform the PTR RR updates; it MAY also + perform the A RR updates if the "S" bit is 1. + +3.5. Domain Name and DNS Update Issues + + As there is a possibility that the DHCP server is configured to + complete or replace a domain name that the client sends, the client + MAY find it useful to send the Client FQDN option in its DHCPDISCOVER + messages. If the DHCP server returns different Domain Name data in + its DHCPOFFER message, the client could use that data in performing + its own eventual A RR update, or in forming the Client FQDN option + that it sends in its DHCPREQUEST message. There is no requirement + that the client send identical Client FQDN option data in its + DHCPDISCOVER and DHCPREQUEST messages. In particular, if a client + has sent the Client FQDN option to its server, and the configuration + of the client changes so that its notion of its domain name changes, + it MAY send the new name data in a Client FQDN option when it + communicates with the server again. This MAY cause the DHCP server + to update the name associated with the PTR record and, if the server + updated the A record representing the client, to delete that record + and attempt an update for the client's current domain name. + + A client that delegates the responsibility for updating the FQDN-to- + IP-address mapping to a server will not receive any indication + (either positive or negative) from the server as to whether the + server was able to perform the update. The client MAY use a DNS + query to check whether the mapping is up to date (see Section 2.2). + + If a client releases its lease prior to the lease expiration time and + is responsible for updating its A RR, the client SHOULD delete the A + RR associated with the leased address before sending a DHCPRELEASE + message. Similarly, if a client was responsible for updating its A + RR, but is unable to renew its lease, the client SHOULD attempt to + delete the A RR before its lease expires. A DHCP client that has not + been able to delete an A RR that it added (because it has lost the + use of its DHCP IP address) SHOULD attempt to notify its + administrator, perhaps by emitting a log message. + + A client that desires to perform DNS updates to A RRs SHOULD NOT do + so if the client's address is a private address [8]. + + + + + + + + + + +Stapp, et al. Standards Track [Page 9] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + +4. DHCP Server Behavior + + The following describes the behavior of a DHCP server that implements + the Client FQDN option when the client's message includes the Client + FQDN option. + + The server examines its configuration and the Flag bits in the + client's Client FQDN option to determine how to respond: + + o If the client's "E" bit is 0 and the server does not support ASCII + encoding (Section 2.3.1), the server SHOULD ignore the Client FQDN + option. + + o The server sets to 0 the "S", "O", and "N" bits in its copy of the + option it will return to the client. The server copies the + client's "E" bit. + + o If the client's "N" bit is 1 and the server's configuration allows + it to honor the client's request for no server initiated DNS + updates, the server sets the "N" bit to 1. + + o Otherwise, if the client's "S" bit is 1 and the server's + configuration allows it to honor the client's request for the + server to initiate A RR DNS updates, the server sets the "S" to 1. + If the server's "S" bit does not match the client's "S" bit, the + server sets the "O" bit to 1. + + The server MAY be configured to use the name supplied in the client's + Client FQDN option, or it MAY be configured to modify the supplied + name or to substitute a different name. The server SHOULD send its + notion of the complete FQDN for the client in the Domain Name field. + The server MAY simply copy the Domain Name field from the Client FQDN + option that the client sent to the server. The server MUST use the + same encoding format (ASCII or DNS binary encoding) that the client + used in the Client FQDN option in its DHCPDISCOVER or DHCPREQUEST, + and it MUST set the "E" bit in the option's Flags field accordingly. + + If a client sends both the Client FQDN and Host Name option, the + server SHOULD ignore the Host Name option. + + The server SHOULD set the RCODE1 and RCODE2 fields to 255 before + sending the Client FQDN message to the client in a DHCPOFFER or + DHCPACK. + + + + + + + + +Stapp, et al. Standards Track [Page 10] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + +4.1. When to Perform DNS Updates + + The server SHOULD NOT perform any DNS updates if the "N" bit is 1 in + the Flags field of the Client FQDN option in the DHCPACK messages (to + be) sent to the client. However, the server SHOULD delete any RRs + that it previously added via DNS updates for the client. + + The server MAY perform the PTR RR DNS update (unless the "N" bit is + 1). + + The server MAY perform the A RR DNS update if the "S" bit is 1 in the + Flags field of the Client FQDN option in the DHCPACK message (to be) + sent to the client. + + The server MAY perform these updates even if the client's DHCPREQUEST + did not carry the Client FQDN option. The server MUST NOT initiate + DNS updates when responding to DHCPDISCOVER messages from a client. + + The server MAY perform its DNS updates (PTR RR or PTR and A RR) + before or after sending the DHCPACK message to the client. + + If the server's A RR DNS update does not complete until after the + server has replied to the DHCP client, the server's interaction with + the DNS server MAY cause the DHCP server to change the domain name + that it associates with the client. This can occur, for example, if + the server detects and resolves a domain-name conflict [10]. In such + cases, the domain name that the server returns to the DHCP client + would change between two DHCP exchanges. + + If the server previously performed DNS updates for the client and the + client's information has not changed, the server MAY skip performing + additional DNS updates. + + When a server detects that a lease on an address that the server + leases to a client has expired, the server SHOULD delete any PTR RR + that it added via DNS update. In addition, if the server added an A + RR on the client's behalf, the server SHOULD also delete the A RR. + + When a server terminates a lease on an address prior to the lease's + expiration time (for instance, by sending a DHCPNAK to a client), the + server SHOULD delete any PTR RR that it associated with the address + via DNS update. In addition, if the server took responsibility for + an A RR, the server SHOULD also delete that A RR. + + + + + + + + +Stapp, et al. Standards Track [Page 11] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + +5. DNS RR TTLs + + RRs associated with DHCP clients may be more volatile than statically + configured RRs. DHCP clients and servers that perform dynamic + updates should attempt to specify resource-record TTLs that reflect + this volatility, in order to minimize the possibility that answers to + DNS queries will return records that refer to DHCP IP address + assignments that have expired or been released. + + The coupling among primary, secondary, and caching DNS servers is + 'loose'; that is a fundamental part of the design of the DNS. This + looseness makes it impossible to prevent all possible situations in + which a resolver may return a record reflecting a DHCP-assigned IP + address that has expired or been released. In deployment, this + rarely, if ever, represents a significant problem. Most DHCP-managed + clients are infrequently looked up by name in the DNS, and the + deployment of IXFR ([16]) and NOTIFY ([17]) can reduce the latency + between updates and their visibility at secondary servers. + + We suggest these basic guidelines for implementers. In general, the + TTLs for RRs added as a result of DHCP IP address assignment activity + SHOULD be less than the initial lease time. The RR TTL on a DNS + record added SHOULD NOT exceed 1/3 of the lease time, but SHOULD NOT + be less than 10 minutes. We recognize that individual administrators + will have varying requirements: DHCP servers and clients SHOULD allow + administrators to configure TTLs and upper and lower bounds on the + TTL values, either as an absolute time interval or as a percentage of + the lease time. + + While clients and servers MAY update the TTL of the records as the + lease is about to expire, there is no requirement that they do so, as + this puts additional load on the DNS system with likely little + benefit. + +6. DNS Update Conflicts + + This document does not resolve how a DHCP client or server prevents + name conflicts. This document addresses only how a DHCP client and + server negotiate who will perform the DNS updates and the fully + qualified domain name requested or used. + + Implementers of this work will need to consider how name conflicts + will be prevented. If a DNS updater needs a security token in order + to successfully perform DNS updates on a specific name, name + conflicts can only occur if multiple updaters are given a security + token for that name. Or, if the fully qualified domains are based on + + + + + +Stapp, et al. Standards Track [Page 12] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + the specific address bound to a client, conflicts will not occur. + Or, a name conflict resolution technique as described in "Resolving + Name Conflicts" [10] SHOULD be used. + +7. IANA Considerations + + IANA has already assigned DHCP option 81 to the Client FQDN option. + As this document describes the option's use, IANA is requested to + reference this document for option 81. + +8. Security Considerations + + Unauthenticated updates to the DNS can lead to tremendous confusion, + through malicious attack or through inadvertent misconfiguration. + Administrators need to be wary of permitting unsecured DNS updates to + zones that are exposed to the global Internet. Both DHCP clients and + servers should use some form of update request origin authentication + procedure (e.g., Secure DNS Dynamic Update [14]) when performing DNS + updates. + + Whether a DHCP client is responsible for updating an FQDN-to-IP- + address mapping or whether this is the responsibility of the DHCP + server is a site-local matter. The choice between the two + alternatives is likely based on the security model that is used with + the DNS update protocol (e.g., only a client may have sufficient + credentials to perform updates to the FQDN-to-IP-address mapping for + its FQDN). + + Whether a DHCP server is always responsible for updating the FQDN- + to-IP-address mapping (in addition to updating the IP to FQDN + mapping), regardless of the wishes of an individual DHCP client, is + also a site-local matter. The choice between the two alternatives is + likely based on the security model that is being used with DNS + updates. In cases where a DHCP server is performing DNS updates on + behalf of a client, the DHCP server should be sure of the DNS name to + use for the client, and of the identity of the client. + + Currently, it is difficult for DHCP servers to develop much + confidence in the identities of its clients, given the absence of + entity authentication from the DHCP protocol itself. There are many + ways for a DHCP server to develop a DNS name to use for a client, but + only in certain relatively unusual circumstances will the DHCP server + know for certain the identity of the client. If DHCP Authentication + [15] becomes widely deployed, this may become more customary. + + One example of a situation that offers some extra assurances is when + the DHCP client is connected to a network through an Multimedia Cable + Network System (MCNS) cable modem, and the cable modem termination + + + +Stapp, et al. Standards Track [Page 13] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + system (CMTS), i.e., head-end, ensures that MAC address spoofing + simply does not occur. Another example of a configuration that might + be trusted is one where clients obtain network access via a network + access server using PPP. The NAS itself might be obtaining IP + addresses via DHCP, encoding a client identification into the DHCP + client-id option. In this case, the network access server as well as + the DHCP server might be operating within a trusted environment, in + which case the DHCP server could be configured to trust that the user + authentication and authorization procedure of the remote access + server was sufficient, and would therefore trust the client + identification encoded within the DHCP client-id. + + It is critical to implement proper conflict resolution, and the + security considerations of conflict resolution apply [10]. + +9. Acknowledgements + + Many thanks to Mark Beyer, Jim Bound, Ralph Droms, Robert Elz, Peter + Ford, Olafur Gudmundsson, Edie Gunter, Andreas Gustafsson, David W. + Hankins, R. Barr Hibbs, Kim Kinnear, Stuart Kwan, Ted Lemon, Ed + Lewis, Michael Lewis, Josh Littlefield, Michael Patton, Pekka Savola, + Jyrki Soini, and Glenn Stump for their review and comments. + +10. References + +10.1. Normative References + + [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement + Levels", BCP 14, RFC 2119, March 1997. + + [2] Mockapetris, P., "Domain names - concepts and facilities", + STD 13, RFC 1034, November 1987. + + [3] Mockapetris, P., "Domain names - implementation and + specification", STD 13, RFC 1035, November 1987. + + [4] Vixie, P., Thomson, S., Rekhter, Y., and J. Bound, "Dynamic + Updates in the Domain Name System (DNS UPDATE)", RFC 2136, + April 1997. + + [5] Droms, R., "Dynamic Host Configuration Protocol", RFC 2131, + March 1997. + + [6] Harrenstien, K., Stahl, M., and E. Feinler, "DoD Internet host + table specification", RFC 952, October 1985. + + [7] Braden, R., "Requirements for Internet Hosts - Application and + Support", STD 3, RFC 1123, October 1989. + + + +Stapp, et al. Standards Track [Page 14] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + + [8] Rekhter, Y., Moskowitz, R., Karrenberg, D., Groot, G., and E. + Lear, "Address Allocation for Private Internets", BCP 5, + RFC 1918, February 1996. + + [9] Lemon, T. and S. Cheshire, "Encoding Long Options in the + Dynamic Host Configuration Protocol (DHCPv4)", RFC 3396, + November 2002. + + [10] Stapp, M. and B. Volz, "Resolution of Fully Qualified Domain + Name (FQDN) Conflicts among Dynamic Host Configuration Protocol + (DHCP) Clients", RFC 4703, October 2006. + +10.2. Informative References + + [11] Marine, A., Reynolds, J., and G. Malkin, "FYI on Questions and + Answers - Answers to Commonly asked "New Internet User" + Questions", FYI 4, RFC 1594, March 1994. + + [12] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor + Extensions", RFC 2132, March 1997. + + [13] Vixie, P., "Extension Mechanisms for DNS (EDNS0)", RFC 2671, + August 1999. + + [14] Wellington, B., "Secure Domain Name System (DNS) Dynamic + Update", RFC 3007, November 2000. + + [15] Droms, R. and W. Arbaugh, "Authentication for DHCP Messages", + RFC 3118, June 2001. + + [16] Ohta, M., "Incremental Zone Transfer in DNS", RFC 1995, + August 1996. + + [17] Vixie, P., "A Mechanism for Prompt Notification of Zone Changes + (DNS NOTIFY)", RFC 1996, August 1996. + + + + + + + + + + + + + + + + +Stapp, et al. Standards Track [Page 15] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + +Authors' Addresses + + Mark Stapp + Cisco Systems, Inc. + 1414 Massachusetts Ave. + Boxborough, MA 01719 + USA + + Phone: 978.936.1535 + EMail: mjs@cisco.com + + + Bernie Volz + Cisco Systems, Inc. + 1414 Massachusetts Ave. + Boxborough, MA 01719 + USA + + Phone: 978.936.0382 + EMail: volz@cisco.com + + + Yakov Rekhter + Juniper Networks + 1194 North Mathilda Avenue + Sunnyvale, CA 94089 + USA + + Phone: 408.745.2000 + EMail: yakov@juniper.net + + + + + + + + + + + + + + + + + + + + + +Stapp, et al. Standards Track [Page 16] + +RFC 4702 The DHCP Client FQDN Option October 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + + + +Stapp, et al. Standards Track [Page 17] + |