summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5107.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5107.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5107.txt')
-rw-r--r--doc/rfc/rfc5107.txt395
1 files changed, 395 insertions, 0 deletions
diff --git a/doc/rfc/rfc5107.txt b/doc/rfc/rfc5107.txt
new file mode 100644
index 0000000..b57e180
--- /dev/null
+++ b/doc/rfc/rfc5107.txt
@@ -0,0 +1,395 @@
+
+
+
+
+
+
+Network Working Group R. Johnson
+Request for Comments: 5107 J. Jumarasamy
+Category: Standards Track K. Kinnear
+ M. Stapp
+ Cisco Systems, Inc.
+ February 2008
+
+
+ DHCP Server Identifier Override Suboption
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Abstract
+
+ This memo defines a new suboption of the DHCP relay information
+ option that allows the DHCP relay to specify a new value for the
+ Server Identifier option, which is inserted by the DHCP Server. This
+ allows the DHCP relay to act as the actual DHCP server such that
+ RENEW DHCPREQUESTs will come to the relay instead of going to the
+ server directly. This gives the relay the opportunity to include the
+ Relay Agent option with appropriate suboptions even on DHCP RENEW
+ messages.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 4. Server Identifier Override Suboption Definition . . . . . . . . 3
+ 5. Security Considerations . . . . . . . . . . . . . . . . . . . . 4
+ 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5
+ 7. Intellectual Property Rights and Copyright . . . . . . . . . . 5
+ 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 8.1. Normative References . . . . . . . . . . . . . . . . . . . 5
+ 8.2. Informative References . . . . . . . . . . . . . . . . . . 5
+
+
+
+
+
+
+
+
+
+
+Johnson, et al. Standards Track [Page 1]
+
+RFC 5107 Server ID Override Suboption February 2008
+
+
+1. Introduction
+
+ There are many situations where a DHCP relay agent is involved, and
+ it can easily insert a Relay Agent Information option [3] with
+ appropriate suboptions into DHCPDISCOVER messages. Once the lease
+ has been granted, however, future DHCPREQUEST messages sent by a
+ client in RENEWING state are sent directly to the DHCP server, as
+ specified in the Server Identifier option. In this case, the relay
+ may not see these DHCPREQUEST messages (depending upon network
+ topology) and thus cannot insert the Relay Agent Information option
+ in the DHCPREQUEST messages.
+
+ This DHCP relay agent suboption, Server Identifier Override, allows
+ the relay agent to tell the DHCP server what value to place into the
+ Server Identifier option [5]. Using this, the relay agent can force
+ a host in RENEWING state to send DHCPREQUEST messages to the relay
+ agent instead of directly to the server. The relay agent then has
+ the opportunity to insert the Relay Agent Information option with
+ appropriate suboptions and relay the DHCPREQUEST to the actual
+ server. In this fashion, the DHCP server will be provided with the
+ same relay agent information upon renewals (such as Circuit-ID,
+ Remote-ID, Device Class, etc.) as was provided in the initial
+ DHCPDISCOVER message.
+
+ In short, this new suboption allows the DHCPv4 relay to function in
+ the same fashion as the DHCPv6 relay [7] currently does.
+
+2. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY" and "OPTIONAL" in this
+ document are to be interpreted as described in [1].
+
+3. Terminology
+
+ This document uses DHCP terminology as defined in section 1.5 of RFC
+ 2131 [2], with the exception of the term "DHCP relay agent" replacing
+ "BOOTP relay agent".
+
+ Other terms used in this document:
+
+ o RENEW DHCPREQUEST - a DHCPREQUEST message sent by a client in
+ RENEWING state
+
+
+
+
+
+
+
+
+Johnson, et al. Standards Track [Page 2]
+
+RFC 5107 Server ID Override Suboption February 2008
+
+
+4. Server Identifier Override Suboption Definition
+
+ The format of the suboption is:
+
+ Code Len Overriding Server Identifier Address
+ +-----+-----+-----+-----+-----+-----+
+ | 11 | n | a1 | a2 | a3 | a4 |
+ +-----+-----+-----+-----+-----+-----+
+
+
+ Figure 1
+
+ The option length (n) is 4. The octets "a1" through "a4" specify the
+ value that MUST be inserted into the Server Identifier option by the
+ DHCP Server upon reply.
+
+ DHCP servers that implement this Relay Agent Information suboption
+ MUST use this value, if present in a DHCP message received from a
+ client, as the value to insert into the Server Identifier option in
+ the corresponding response. The DHCP server must also record the
+ address in the suboption for use in subsequent messages to the DHCP
+ client until the next DHCP message is received from the DHCP relay
+ agent.
+
+ If a DHCP server does not understand/implement this Relay Information
+ suboption, it will ignore the suboption, and thus it will insert its
+ own appropriate interface address in the Server Identifier option.
+ In this case, the DHCP Relay will not receive RENEW DHCPREQUEST
+ messages from the client. When configuring a DHCP relay agent to use
+ this suboption, the administrator of the relay agent should take into
+ account whether or not the DHCP server to which the message will be
+ relayed will correctly understand this suboption.
+
+ When servicing a DHCPREQUEST message, the DHCP server would normally
+ look at the Server Identifier option for verification that the
+ address specified there is one of the addresses associated with the
+ DHCP server, silently ignoring the DHCPREQUEST if it does not match a
+ configured DHCP server interface address. If the DHCPREQUEST message
+ contains a Server Identifier Override suboption, however, comparison
+ should be made between the address in this suboption and the Server
+ Identifier option. If both the Server Identifier Override suboption
+ and the Server Identifier option specify the same address, then the
+ server should accept the DHCPREQUEST message for processing,
+ regardless of whether or not the Server Identifier option matches a
+ DHCP server interface.
+
+ The DHCP relay agent should fill in the giaddr field when relaying
+ the message, just as it normally would do.
+
+
+
+Johnson, et al. Standards Track [Page 3]
+
+RFC 5107 Server ID Override Suboption February 2008
+
+
+ In a situation where the DHCP relay agent is configured to forward
+ messages to more than one server, the DHCP relay agent SHOULD forward
+ all DHCP messages to all servers. This applies to RENEW DHCPREQUEST
+ messages as well. The intent is that the DHCP relay agent should not
+ need to maintain state information about the DHCP lease.
+
+ DHCP relay agents implementing this suboption SHOULD also implement
+ and use the DHCPv4 Relay Agent Flags Suboption [4] in order to
+ specify whether the DHCP relay agent received the original message as
+ a broadcast or unicast. The DHCP server receiving a message
+ containing the Server Identifier Override Suboption may use this
+ additional information in processing the message.
+
+ Note that if the DHCP relay agent becomes inaccessible by the DHCP
+ client or loses network access to the DHCP server, further RENEW
+ DHCPREQUEST messages from the DHCP client may not be properly
+ processed and the DHCP client's lease may time out.
+
+5. Security Considerations
+
+ Message authentication in DHCP for intradomain use where the out-of-
+ band exchange of a shared secret is feasible is defined in [6].
+ Potential exposures to attack are discussed in Section 7 of the DHCP
+ protocol specification in [2].
+
+ The DHCP Relay Agent Information option depends on a trusted
+ relationship between the DHCP relay agent and the DHCP server, as
+ described in Section 5 of RFC 3046. While the introduction of
+ fraudulent DHCP relay agent information options can be prevented by a
+ perimeter defense that blocks these options unless the DHCP relay
+ agent is trusted, a deeper defense using the authentication suboption
+ for DHCP relay agent information option [8] SHOULD be deployed as
+ well.
+
+ If a rogue DHCP relay agent were inserted between the DHCP client and
+ the DHCP server, it could redirect clients to itself using this
+ suboption. This would allow such a system to later deny RENEW
+ DHCPREQUESTs and thus force clients to discontinue use of their
+ allocated addresses. It could also allow the rogue relay to change,
+ insert, or delete DHCP options in DHCPACK messages and extend leases
+ beyond what the server has allowed. DHCP authentication [6] and/or
+ DHCP Relay Agent Information option authentication [8] would address
+ this case. (Note that, as is always the case, lack of DHCP
+ authentication would allow a rogue DHCP relay agent to change the
+ Server Identifier Override option in the DHCPOFFER and DHCPACK
+ messages without detection. This threat is not new to the Server
+ Identifier Override suboption.)
+
+
+
+
+Johnson, et al. Standards Track [Page 4]
+
+RFC 5107 Server ID Override Suboption February 2008
+
+
+ This document does not add any new vulnerabilities that were not
+ already present, except in the case where DHCP authentication is
+ already in place, and DHCP clients require its use. It is suggested
+ that DHCP Authentication and DHCP Relay Agent Option Authentication
+ SHOULD be deployed when this option is used, or protection should be
+ provided against the insertion of rogue DHCP relay agents between the
+ client and server.
+
+ This relay suboption is not intended, by itself, to provide any
+ additional security benefits.
+
+6. IANA Considerations
+
+ IANA has assigned a suboption number (11) for the Server Identifier
+ Override Suboption from the DHCP Relay Agent Information Option [3]
+ suboption number space.
+
+7. Intellectual Property Rights and Copyright
+
+ The IETF has been notified of intellectual property rights claimed in
+ regard to some or all of the specification contained in this
+ document. For more information consult the online list of claimed
+ rights.
+
+8. References
+
+8.1. Normative References
+
+ [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
+ Levels", BCP 14, RFC 2119, March 1997.
+
+ [2] Droms, R., "Dynamic Host Configuration Protocol", RFC 2131,
+ March 1997.
+
+ [3] Patrick, M., "DHCP Relay Agent Information Option", RFC 3046,
+ January 2001.
+
+ [4] Kinnear, K., Normoyle, M., and M. Stapp, "The Dynamic Host
+ Configuration Protocol Version 4 (DHCPv4) Relay Agent Flags
+ Suboption", RFC 5010, September 2007.
+
+8.2. Informative References
+
+ [5] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor
+ Extensions", RFC 2132, March 1997.
+
+ [6] Droms, R. and W. Arbaugh, "Authentication for DHCP Messages",
+ RFC 3118, June 2001.
+
+
+
+Johnson, et al. Standards Track [Page 5]
+
+RFC 5107 Server ID Override Suboption February 2008
+
+
+ [7] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and M.
+ Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)",
+ RFC 3315, July 2003.
+
+ [8] Stapp, M. and T. Lemon, "The Authentication Suboption for the
+ Dynamic Host Configuration Protocol (DHCP) Relay Agent Option",
+ RFC 4030, March 2005.
+
+Authors' Addresses
+
+ Richard A. Johnson
+ Cisco Systems, Inc.
+ 170 W. Tasman Dr.
+ San Jose, CA 95134
+ US
+
+ Phone: +1 408 526 4000
+ EMail: raj@cisco.com
+
+
+ Jay Kumarasamy
+ Cisco Systems, Inc.
+ 170 W. Tasman Dr.
+ San Jose, CA 95134
+ US
+
+ Phone: +1 408 526 4000
+ EMail: jayk@cisco.com
+
+
+ Kim Kinnear
+ Cisco Systems, Inc.
+ 170 W. Tasman Dr.
+ San Jose, CA 95134
+ US
+
+ Phone: +1 408 526 4000
+ EMail: kkinnear@cisco.com
+
+
+ Mark Stapp
+ Cisco Systems, Inc.
+ 170 W. Tasman Dr.
+ San Jose, CA 95134
+ US
+
+ Phone: +1 408 526 4000
+ EMail: mjs@cisco.com
+
+
+
+Johnson, et al. Standards Track [Page 6]
+
+RFC 5107 Server ID Override Suboption February 2008
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2008).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+
+
+
+
+
+
+
+
+
+
+
+Johnson, et al. Standards Track [Page 7]
+