summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7283.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc7283.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc7283.txt')
-rw-r--r--doc/rfc/rfc7283.txt395
1 files changed, 395 insertions, 0 deletions
diff --git a/doc/rfc/rfc7283.txt b/doc/rfc/rfc7283.txt
new file mode 100644
index 0000000..0f062c9
--- /dev/null
+++ b/doc/rfc/rfc7283.txt
@@ -0,0 +1,395 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) Y. Cui
+Request for Comments: 7283 Q. Sun
+Updates: 3315 Tsinghua University
+Category: Standards Track T. Lemon
+ISSN: 2070-1721 Nominum, Inc.
+ July 2014
+
+
+ Handling Unknown DHCPv6 Messages
+
+Abstract
+
+ DHCPv6 is not specific about handling messages with unknown types.
+ This memo describes the problems associated with receiving DHCPv6
+ messages with unknown types, and defines how a DHCPv6 server, client,
+ or relay agent should behave when receiving unknown DHCPv6 messages.
+ This document also provides advice for authors of future documents
+ that define new messages to be sent from DHCP servers to DHCP relay
+ agents. This document updates RFC 3315.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7283.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cui, et al. Standards Track [Page 1]
+
+RFC 7283 Handling Unknown DHCPv6 Messages July 2014
+
+
+Copyright Notice
+
+ Copyright (c) 2014 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+ This document may contain material from IETF Documents or IETF
+ Contributions published or made publicly available before November
+ 10, 2008. The person(s) controlling the copyright in some of this
+ material may not have granted the IETF Trust the right to allow
+ modifications of such material outside the IETF Standards Process.
+ Without obtaining an adequate license from the person(s) controlling
+ the copyright in such materials, this document may not be modified
+ outside the IETF Standards Process, and derivative works of it may
+ not be created outside the IETF Standards Process, except to format
+ it for publication as an RFC or to translate it into languages other
+ than English.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3
+ 3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 3
+ 4. Relay Agent Behavior Update . . . . . . . . . . . . . . . . . 3
+ 4.1. A Valid Message for Constructing a New Relay-forward
+ Message . . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 4.2. Relaying a Message toward the Server . . . . . . . . . . 5
+ 4.3. Relaying a Message toward the Client . . . . . . . . . . 5
+ 5. Client and Server Behavior Update . . . . . . . . . . . . . . 5
+ 6. Security Considerations . . . . . . . . . . . . . . . . . . . 5
+ 7. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 6
+ 8. Normative References . . . . . . . . . . . . . . . . . . . . 6
+
+
+
+
+
+
+
+
+
+
+Cui, et al. Standards Track [Page 2]
+
+RFC 7283 Handling Unknown DHCPv6 Messages July 2014
+
+
+1. Introduction
+
+ DHCPv6 [RFC3315] provides a framework for conveying IPv6
+ configuration information to hosts on a TCP/IP network. But
+ [RFC3315] is not specific about how to deal with messages with
+ unrecognized types. This document describes the problems associated
+ with receiving DHCPv6 messages with unknown types, and defines the
+ behavior of a DHCPv6 server, client, or relay agent when handling
+ unknown DHCPv6 messages.
+
+2. Requirements Language
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+3. Problem Statement
+
+ When a relay agent receives a message, it sends the message toward
+ either the server or the client. The relay agent decides on the
+ direction to forward based on the message type. Since RFC 3315 was
+ published, new message types have been defined. Additional message
+ types may be defined in the future. RFC 3315 does not specify what
+ to do when a DHCP agent does not recognize the type of message it has
+ received. This may lead to relay agents inappropriately dropping
+ these messages and to other DHCP agents inappropriately processing
+ these messages.
+
+ In addition, there is no specific requirement for dealing with
+ unknown messages by the client or server in RFC 3315.
+
+ Note that it is expected that most future DHCPv6 messages will not be
+ used to communicate directly with relay agents (though they may need
+ to be relayed by relay agents).
+
+4. Relay Agent Behavior Update
+
+ Relay agents relay messages toward servers and clients according to
+ the message type. The Relay-reply message is sent toward the client.
+ The Relay-forward message and other types of messages are sent toward
+ the server.
+
+ We say "toward the client" and "toward the server" because relay
+ agents may be chained together, so a relay message may be sent
+ through multiple relay agents along the path to its destination.
+ Relay-reply messages specify a destination address; the relay agent
+ extracts the encapsulated message and sends it to the specified
+ destination address. Any message other than a Relay-reply does not
+
+
+
+Cui, et al. Standards Track [Page 3]
+
+RFC 7283 Handling Unknown DHCPv6 Messages July 2014
+
+
+ have such a specified destination, so it follows the default
+ forwarding path configured on the relay agent, which is always toward
+ the server.
+
+ The sole purpose of requiring relay agents to relay unknown messages
+ is to ensure that when legitimate new messages are defined in the
+ protocol, relay agents (even if they were manufactured prior to the
+ definition of these new messages) will, by default, succeed in
+ relaying such messages.
+
+4.1. A Valid Message for Constructing a New Relay-forward Message
+
+ Section 20.1 of [RFC3315] states that:
+
+ When a relay agent receives a valid message to be relayed, it
+ constructs a new Relay-forward message.
+
+ It does not define which types of messages are valid for constructing
+ Relay-forward messages. In this document, we specify the definition
+ as follows.
+
+ The message is valid for constructing a new Relay-forward message:
+
+ (a) if the message is a Relay-forward message, or
+
+ (b) if the relay agent recognizes the message type and is not the
+ intended target, or
+
+ (c) if the relay agent does not recognize the message type.
+
+ New DHCP message types may be defined in the future that are sent,
+ unsolicited, to relay agents. Relay agents that do not implement
+ these messages will not recognize the messages as being intended for
+ them. Therefore, a relay agent that implements this specification
+ will forward such messages to the DHCP servers to which it is
+ configured to relay client messages.
+
+ At this time, no such message types have been specified. If such a
+ message is specified in the future, it is possible that this would
+ result in needless load on DHCP servers. If such a message type is
+ defined in a future specification, authors may need to consider a
+ strategy for identifying non-conforming relays and not sending such
+ messages to those relay agents.
+
+ However, since DHCP servers do not respond to unknown messages, this
+ is unlikely to create significant load and is therefore likely to be
+ unnecessary.
+
+
+
+
+Cui, et al. Standards Track [Page 4]
+
+RFC 7283 Handling Unknown DHCPv6 Messages July 2014
+
+
+4.2. Relaying a Message toward the Server
+
+ If the relay agent receives a Relay-forward message, Section 20.1.2
+ of [RFC3315] defines the required behavior. If the relay agent
+ receives messages other than Relay-forward and Relay-reply and the
+ relay agent does not recognize its message type, it MUST forward them
+ as described in Section 20.1.1 of [RFC3315].
+
+4.3. Relaying a Message toward the Client
+
+ If the relay agent receives a Relay-reply message, it MUST process
+ the message as defined in Section 20.2 of [RFC3315], regardless of
+ the type of message encapsulated in the Relay Message option.
+
+5. Client and Server Behavior Update
+
+ A client or server MUST silently discard any received DHCPv6 message
+ with an unknown message type.
+
+6. Security Considerations
+
+ This document creates no new security issues that are not already
+ present in RFC 3315. By explicitly documenting the correct handling
+ of unknown messages, this document, if implemented, reduces any
+ security exposure that might result from incorrect handling of
+ unknown messages. The following issues are already present with
+ Section 23 of [RFC3315], but we discuss them in detail here as
+ guidance for implementors.
+
+ As the relay agent will forward all unknown types of DHCPv6 messages,
+ a malicious attacker can interfere with the relaying function by
+ constructing fake DHCPv6 messages with an arbitrary type code. The
+ same problem may occur in current DHCPv4 and DHCPv6 practice, where
+ the attacker constructs the fake DHCP message with a known type code.
+
+ Clients and servers that implement this specification will discard
+ unknown DHCPv6 messages. Since RFC 3315 did not specify relay agent,
+ client, or server behavior in the presence of unknown messages, it is
+ possible that some servers or clients that have not been updated to
+ conform to this specification will become vulnerable to attacks
+ through the relay agent as a result of this change.
+
+ For this reason, we recommend that relay agents, clients, and servers
+ be updated to follow this new specification. However, in most
+ deployment scenarios, it will be much easier to attack clients
+ directly than through a relay agent. Furthermore, attacks using
+ unknown message types are already possible on the local wire.
+
+
+
+
+Cui, et al. Standards Track [Page 5]
+
+RFC 7283 Handling Unknown DHCPv6 Messages July 2014
+
+
+ So, in most cases, if clients are not upgraded, there should be
+ minimal additional risk. At sites where only servers and relay
+ agents can be upgraded, the incremental benefit of doing so most
+ likely exceeds any risk of vulnerable clients.
+
+ Nothing in this update should be construed to mean that relay agents
+ may not be administratively configurable to drop messages based on
+ the message type, for security reasons (e.g., in a firewall).
+
+7. Contributors
+
+ Many thanks to Bernie Volz, Tomek Mrugalski, Sheng Jiang, Cong Liu,
+ and Yuchi Chen for their contributions to the document.
+
+8. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
+ and M. Carney, "Dynamic Host Configuration Protocol for
+ IPv6 (DHCPv6)", RFC 3315, July 2003.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cui, et al. Standards Track [Page 6]
+
+RFC 7283 Handling Unknown DHCPv6 Messages July 2014
+
+
+Authors' Addresses
+
+ Yong Cui
+ Tsinghua University
+ Beijing 100084
+ P.R. China
+
+ Phone: +86-10-6260-3059
+ EMail: yong@csnet1.cs.tsinghua.edu.cn
+
+
+ Qi Sun
+ Tsinghua University
+ Beijing 100084
+ P.R. China
+
+ Phone: +86-10-6278-5822
+ EMail: sunqi@csnet1.cs.tsinghua.edu.cn
+
+
+ Ted Lemon
+ Nominum, Inc.
+ 2000 Seaport Blvd
+ Redwood City, CA 94063
+ USA
+
+ Phone: +1-650-381-6000
+ EMail: Ted.Lemon@nominum.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cui, et al. Standards Track [Page 7]
+