diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6422.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6422.txt')
-rw-r--r-- | doc/rfc/rfc6422.txt | 451 |
1 files changed, 451 insertions, 0 deletions
diff --git a/doc/rfc/rfc6422.txt b/doc/rfc/rfc6422.txt new file mode 100644 index 0000000..ed3e7e5 --- /dev/null +++ b/doc/rfc/rfc6422.txt @@ -0,0 +1,451 @@ + + + + + + +Internet Engineering Task Force (IETF) T. Lemon +Request for Comments: 6422 Nominum +Updates: 3315 Q. Wu +Category: Standards Track Huawei +ISSN: 2070-1721 December 2011 + + + Relay-Supplied DHCP Options + +Abstract + + DHCPv6 relay agents cannot communicate with DHCPv6 clients directly. + However, in some cases, the relay agent possesses some information + that would be useful to the DHCPv6 client. This document describes a + mechanism whereby the DHCPv6 relay agent can provide such information + to the DHCPv6 server, which can, in turn, pass this information on to + the DHCP client. + + This document updates RFC 3315 (DHCPv6) by making explicit the + implicit requirement that relay agents not modify the content of + encapsulation payloads as they are relayed back toward clients. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6422. + + + + + + + + + + + + + + + + +Lemon & Wu Standards Track [Page 1] + +RFC 6422 Relay-Supplied DHCP Options December 2011 + + +Copyright Notice + + Copyright (c) 2011 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction ....................................................2 + 1.1. Requirements Language ......................................3 + 1.2. Terminology ................................................3 + 2. Protocol Summary ................................................3 + 3. Encoding ........................................................3 + 4. RSOO-Enabled Options ............................................4 + 5. DHCP Relay Agent Behavior .......................................4 + 6. DHCP Server Behavior ............................................5 + 7. Security Considerations .........................................6 + 8. IANA Considerations .............................................7 + 9. References ......................................................7 + 9.1. Normative References .......................................7 + 9.2. Informative References .....................................7 + +1. Introduction + + The DHCPv6 specification [RFC3315] allows DHCP relay agents to + forward DHCPv6 messages between clients and servers that are not on + the same IPv6 link. In some cases, the DHCP relay agent has + information not available to the DHCP server that would be useful to + provide to a DHCP client. For example, the DHCP client may need to + learn the EAP Re-authentication Protocol (ERP) local domain name + [RFC6440] for use in EAP re-authentication [RFC5296], which is known + to the relay agent but not the server. + + The DHCPv6 protocol specification does not provide a mechanism + whereby the relay agent can provide options to the client. This + document extends DHCP with a mechanism that allows DHCP relay agents + to propose options for the server to send to DHCP clients. + + + + + +Lemon & Wu Standards Track [Page 2] + +RFC 6422 Relay-Supplied DHCP Options December 2011 + + + This document is not intended to provide a general mechanism for + storing client configuration information in the relay agent. Rather, + it is intended to address specific use cases where only the relay + agent has information needed by the client. This extension is not + applicable to DHCP options in general, but rather provided as a + mechanism for new specifications that require this functionality. + +1.1. Requirements Language + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [RFC2119]. + +1.2. Terminology + + The following terms and acronyms are used in this document: + + o DHCP: Dynamic Host Configuration Protocol Version 6 [RFC3315] + + o RSOO: Relay-Supplied Options option + +2. Protocol Summary + + DHCP clients do not support a mechanism for receiving options from + relay agents -- the relay agent is required to deliver the payload + from the DHCP server to the DHCP client without changing it. In + order for the DHCP relay agent to provide options to the client, it + sends those options to the DHCP server, encapsulated in an RSOO. The + DHCP server can then choose to place those options in the response it + sends to the client. + +3. Encoding + + In order to supply options for the DHCP server to send to the client, + the relay agent sends an RSOO in the Relay-Forward message. This + option encapsulates whatever options the relay agent wishes to + provide to the DHCPv6 server. + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | OPTION_RSOO | option-length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | options... + +-+-+-+-+-+-+-+-+-+-+-+ + + + + + + +Lemon & Wu Standards Track [Page 3] + +RFC 6422 Relay-Supplied DHCP Options December 2011 + + + OPTION_RSOO + + Relay-Supplied Options code (66). + + option-length + + Length of the RSOO. + + options + + One or more DHCPv6 options. + +4. RSOO-Enabled Options + + The RSOO MUST NOT contain any option that is not specifically called + out as an RSOO-enabled option. Specifications that describe RSOO- + enabled options MUST reference this specification, and MUST state + that the option they define is RSOO-enabled. No DHCP option + specified prior to the issuance of this specification is RSOO- + enabled. + + A current list of RSOO-enabled options can be found in the list + titled "Options Permitted in the Relay-Supplied Options Option" + maintained at http://www.iana.org/. + + DHCP option specifications that define RSOO-enabled options MUST add + text similar to the following to their IANA Considerations section; + "random relay option" should be replaced with the name of the option + being defined in the specification: + + We request that IANA add the name "random relay option" to the + registry titled "Options Permitted in the Relay-Supplied Options + Option" maintained at http://www.iana.org/. + +5. DHCP Relay Agent Behavior + + Relay agents MAY include an RSOO in the option payload of a Relay- + Forward message being sent toward a DHCP server. When relaying the + payload of Relay-Reply messages toward clients, relay agents MUST NOT + modify the payload. + + Relay agents MUST NOT send non-RSOO-enabled options in the Relay- + Supplied Options option. + + + + + + + + +Lemon & Wu Standards Track [Page 4] + +RFC 6422 Relay-Supplied DHCP Options December 2011 + + + In order to allow network administrators to control the flow of RSOO + options onto the network, relay agents that implement the Relay- + Supplied Options option need to have a configuration parameter that + determines whether or not they will relay Relay-Forward messages + containing RSOOs. + + Relay agents that have this configuration parameter and that are + configured to disable forwarding of a Relay-Forward message + containing an RSOO MUST silently discard any such message. + + Implementations that can be configured in this way MUST examine all + Relay-Forward encapsulations, not just the outer encapsulation. + +6. DHCP Server Behavior + + DHCP servers that implement this protocol specification MUST examine + each option contained in an RSOO to see if it is an RSOO-enabled + option. DHCP servers MUST silently discard any option contained in + an RSOO that is not RSOO-enabled. DHCP server implementations SHOULD + have an administrator-configurable list of RSOO-enabled options, so + that new RSOO-enabled options do not require software to be updated. + + DHCP servers normally construct a list of options that are candidates + to send to the DHCP client, and then construct the DHCP packet + according to Section 17.2.2 of the DHCPv6 specification [RFC3315]. + + If the server implementing this protocol specification receives an + RSOO, it SHOULD add any options that appear in the RSOO for which it + has no internal candidate to the list of options that are candidates + to send to the DHCP client. The server SHOULD discard any options + that appear in the RSOO for which it already has one or more + candidates. + + Aside from the addition of options from the RSOO, the DHCP server + should then construct a DHCP packet as it normally would, and + transmit it to the DHCP client as described in [RFC3315]. + + DHCP servers may receive multiply-nested Relay-Forward messages + containing conflicting values for options contained in RSOOs in these + messages. + + When such a conflict exists, the DHCP server MUST choose no more than + one of these options to forward to the client. The DHCP server MUST + NOT forward more than one of these options to the client. + + By default, the DHCP server MUST choose the innermost value -- the + value supplied by the relay agent closest to the DHCP client -- to + forward to the DHCP client. + + + +Lemon & Wu Standards Track [Page 5] + +RFC 6422 Relay-Supplied DHCP Options December 2011 + + + DHCP server implementations MAY provide other heuristics for choosing + which one of a set of such conflicting options to forward to the + client, as long as the specified behavior is the default behavior. + +7. Security Considerations + + This document provides a mechanism whereby a relay agent can inject + options into the response the DHCP server sends to the DHCP client. + In currently known use cases -- for example, the ERP Local Domain + Option [RFC6440] -- RSOO-enabled options are options that will only + ever originate on a relay agent, and do not make sense when + originating on a DHCP server. + + In the event that some new RSOO-enabled option is specified that can + originate from either the server or the relay agent, this should be + addressed in the Security Considerations section of the document that + specifies the use of that option. + + In some environments, there is an interface on one side of which is + the client, and zero or more routers, and on the other side of which + is a network managed by a monolithic or effectively monolithic + administrative entity. Nodes and routers on the client side of the + interface are not controlled by this entity, and are considered + "untrusted". Nodes and routers on the network side of this interface + are considered trusted. + + It is possible for a malicious node acting as a relay agent on the + untrusted side of this interface to supply an RSOO containing one or + more RSOO-enabled options that would override the same option or + options that were provided by a relay agent on the trusted side of + the interface. + + In environments where this is a possibility, network administrators + are advised to use relay agents that are capable of dropping Relay- + Forward messages containing the RSOO, and are advised to configure + those relay agents to drop such messages. + + Note, however, that this will only be effective if the message from + the DHCP server to the DHCP client is authenticated as specified in + Section 21 of [RFC3315], or using some similar mechanism. Without + this authentication, the malicious node on the untrusted portion of + the network can simply modify the DHCP server's response in transit + back to the DHCP client, and there is no way for the client to detect + that this has happened. + + + + + + + +Lemon & Wu Standards Track [Page 6] + +RFC 6422 Relay-Supplied DHCP Options December 2011 + + +8. IANA Considerations + + IANA has assigned one new DHCPv6 option code from the registry of + DHCP Option Codes maintained at http://www.iana.org/. The option + code 66 (OPTION_RSOO) has been assigned to the Relay-Supplied Options + option. + + IANA has created a new registry on the same assignments page, titled + "Options Permitted in the Relay-Supplied Options Option". This + registry will enumerate the set of all code points from the DHCP + Option Codes table for options that may appear in the RSOO. Options + may be added to this list after IETF Review [RFC5226]. When adding + options to the list, please ensure that the description for the code + added matches the description in the DHCP Option Codes table for that + code. Option codes that have not been requested to be added + according to the stated procedure should not be mentioned at all in + the table, and should not be listed as "reserved" or "unassigned". + + IETF Review should include careful consideration of the security + implications of allowing a relay agent to provide a value for the + option being considered for addition to this registry. In the case + where an IETF working group chartered to review DHCP protocol + extensions exists, it is not sufficient for some other working group + to review the registry addition. + +9. References + +9.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC3315] Droms, R., Ed., Bound, J., Volz, B., Lemon, T., Perkins, + C., and M. Carney, "Dynamic Host Configuration Protocol + for IPv6 (DHCPv6)", RFC 3315, July 2003. + + [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an + IANA Considerations Section in RFCs", BCP 26, RFC 5226, + May 2008. + +9.2. Informative References + + [RFC5296] Narayanan, V. and L. Dondeti, "EAP Extensions for EAP + Re-authentication Protocol (ERP)", RFC 5296, August 2008. + + [RFC6440] Zorn, G., Wu, Q., and Y. Wang, "The EAP Re-authentication + Protocol (ERP) Local Domain Name DHCPv6 Option", RFC 6440, + December 2011. + + + +Lemon & Wu Standards Track [Page 7] + +RFC 6422 Relay-Supplied DHCP Options December 2011 + + +Authors' Addresses + + Ted Lemon + Nominum + 2000 Seaport Blvd. + Redwood City, CA 94063 + USA + + Phone: +1 650 381 6000 + EMail: mellon@nominum.com + + + Qin Wu + Huawei Technologies Co., Ltd. + 101 Software Avenue, Yuhua District + Nanjing, Jiangsu 210012 + China + + Phone: +86-25-56623633 + EMail: sunseawq@huawei.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Lemon & Wu Standards Track [Page 8] + |