summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9445.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9445.txt')
-rw-r--r--doc/rfc/rfc9445.txt866
1 files changed, 866 insertions, 0 deletions
diff --git a/doc/rfc/rfc9445.txt b/doc/rfc/rfc9445.txt
new file mode 100644
index 0000000..464e4eb
--- /dev/null
+++ b/doc/rfc/rfc9445.txt
@@ -0,0 +1,866 @@
+
+
+
+
+Internet Engineering Task Force (IETF) M. Boucadair
+Request for Comments: 9445 Orange
+Updates: 4014 T. Reddy.K
+Category: Standards Track Nokia
+ISSN: 2070-1721 A. DeKok
+ FreeRADIUS
+ August 2023
+
+
+ RADIUS Extensions for DHCP-Configured Services
+
+Abstract
+
+ This document specifies two new Remote Authentication Dial-In User
+ Service (RADIUS) attributes that carry DHCP options. The
+ specification is generic and can be applicable to any service that
+ relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are
+ covered.
+
+ Also, this document updates RFC 4014 by relaxing a constraint on
+ permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9445.
+
+Copyright Notice
+
+ Copyright (c) 2023 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Revised BSD License text as described in Section 4.e of the
+ Trust Legal Provisions and are provided without warranty as described
+ in the Revised BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Terminology
+ 3. RADIUS DHCP Options Attributes
+ 3.1. DHCPv6-Options Attribute
+ 3.2. DHCPv4-Options Attribute
+ 4. Passing RADIUS DHCP Options Attributes by DHCP Relay Agents to
+ DHCP Servers
+ 4.1. Context
+ 4.2. Updates to RFC 4014
+ 4.2.1. Section 3 of RFC 4014
+ 4.2.2. Section 4 of RFC 4014
+ 5. An Example: Applicability to Encrypted DNS Provisioning
+ 6. Security Considerations
+ 7. Table of Attributes
+ 8. IANA Considerations
+ 8.1. New RADIUS Attributes
+ 8.2. New RADIUS Attribute Permitted in DHCPv6 RADIUS Option
+ 8.3. RADIUS Attributes Permitted in RADIUS Attributes DHCP
+ Suboption
+ 8.4. DHCP Options Permitted in the RADIUS DHCP*-Options
+ Attributes
+ 8.4.1. DHCPv6
+ 8.4.2. DHCPv4
+ 8.4.3. Guidelines for the Designated Experts
+ 9. References
+ 9.1. Normative References
+ 9.2. Informative References
+ Acknowledgements
+ Authors' Addresses
+
+1. Introduction
+
+ In the context of broadband services, Internet Service Providers
+ (ISPs) usually provide DNS resolvers to their customers. To that
+ aim, ISPs deploy dedicated mechanisms (e.g., DHCP [RFC2132] [RFC8415]
+ and IPv6 Router Advertisement [RFC4861]) to advertise a list of DNS
+ recursive servers to their customers. Typically, the information
+ used to populate DHCP messages and/or IPv6 Router Advertisements
+ relies upon specific Remote Authentication Dial-In User Service
+ (RADIUS) [RFC2865] attributes, such as the DNS-Server-IPv6-Address
+ Attribute specified in [RFC6911].
+
+ With the advent of encrypted DNS (e.g., DNS over HTTPS (DoH)
+ [RFC8484], DNS over TLS (DoT) [RFC7858], or DNS over QUIC (DoQ)
+ [RFC9250]), additional means are required to provision hosts with
+ network-designated encrypted DNS. To fill that void, [DNR] leverages
+ existing protocols such as DHCP to provide hosts with the required
+ information to connect to an encrypted DNS resolver. However, there
+ are no RADIUS attributes that can be used to populate the discovery
+ messages discussed in [DNR]. The same concern is likely to be
+ encountered for future services that are configured using DHCP.
+
+ This document specifies two new RADIUS attributes: DHCPv6-Options
+ (Section 3.1) and DHCPv4-Options (Section 3.2). These attributes can
+ include DHCP options that are listed in the "DHCPv6 Options Permitted
+ in the RADIUS DHCPv6-Options Attribute" registry (Section 8.4.1) and
+ the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute"
+ registry (Section 8.4.2). These two attributes are specified in
+ order to accommodate both IPv4 and IPv6 deployment contexts while
+ taking into account the constraints in Section 3.4 of [RFC6158].
+
+ The mechanism specified in this document is a generic mechanism and
+ might be employed in network scenarios where the DHCP server and the
+ RADIUS client are located in the same device. The new attributes can
+ also be used in deployments that rely upon the mechanisms defined in
+ [RFC4014] or [RFC7037], which allow a DHCP relay agent that is
+ collocated with a RADIUS client to pass attributes obtained from a
+ RADIUS server to a DHCP server. However, an update to [RFC4014] is
+ required so that a DHCP relay agent can pass the DHCPv4-Options
+ Attribute obtained from a RADIUS server to a DHCP server (Section 4).
+
+ DHCP options that are included in the new RADIUS attributes can be
+ controlled by a deployment-specific policy. Discussing such a policy
+ is out of scope.
+
+ This document adheres to [RFC8044] for defining the new attributes.
+
+ A sample deployment usage of the RADIUS DHCPv6-Options and
+ DHCPv4-Options Attributes is described in Section 5.
+
+2. Terminology
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+ This document makes use of the terms defined in [RFC2865], [RFC8415],
+ and [RFC8499]. The following additional terms are used:
+
+ DHCP: refers to both DHCPv4 [RFC2132] and DHCPv6 [RFC8415].
+
+ Encrypted DNS: refers to a scheme where DNS exchanges are
+ transported over an encrypted channel. Examples of encrypted DNS
+ are DoT, DoH, and DoQ.
+
+ Encrypted DNS resolver: refers to a resolver (Section 6 of
+ [RFC8499]) that supports encrypted DNS.
+
+ DHCP*-Options: refers to the DHCPv4-Options and DHCPv6-Options
+ Attributes (Section 3).
+
+3. RADIUS DHCP Options Attributes
+
+ This section specifies two new RADIUS attributes for RADIUS clients
+ and servers to exchange DHCP-encoded data. This data is then used to
+ feed the DHCP procedure between a DHCP client and a DHCP server.
+
+ Both the DHCPv4-Options and DHCPv6-Options Attributes use the "Long
+ Extended Type" format (Section 2.2 of [RFC6929]). The description of
+ the fields is provided in Sections 3.1 and 3.2.
+
+ These attributes use the "Long Extended Type" format in order to
+ permit the transport of attributes encapsulating more than 253 octets
+ of data. DHCP options that can be included in the RADIUS DHCP*-
+ Options Attributes are limited by the maximum packet size of 4096
+ bytes (Section 3 of [RFC2865]). In order to accommodate deployments
+ with large DHCP options, RADIUS implementations are RECOMMENDED to
+ support a packet size up to 65535 bytes. Such a recommendation can
+ be met if RADIUS implementations support a mechanism that relaxes the
+ limit of 4096 bytes (e.g., the mechanisms described in [RFC7499] or
+ [RFC7930]).
+
+ The Value fields of the DHCP*-Options Attributes are encoded in the
+ clear and not encrypted like, for example, the Tunnel-Password
+ Attribute [RFC2868].
+
+ RADIUS implementations may support a configuration parameter to
+ control the DHCP options that can be included in a RADIUS DHCP*-
+ Options Attribute. Likewise, DHCP server implementations may support
+ a configuration parameter to control the permitted DHCP options in a
+ RADIUS DHCP*-Options Attribute. Absent explicit configuration,
+ RADIUS implementations and DHCP server implementations SHOULD ignore
+ non-permitted DHCP options received in a RADIUS DHCP*-Options
+ Attribute.
+
+ RADIUS-supplied data is specific configuration data that is returned
+ as a function of authentication and authorization checks. As such,
+ absent any explicit configuration on the DHCP server, RADIUS-supplied
+ data by means of the DHCP*-Options Attributes take precedence over
+ any local configuration.
+
+ These attributes are defined with globally unique names. The naming
+ of the attributes follows the guidelines in Section 2.7.1 of
+ [RFC6929]. Invalid attributes are handled as per Section 2.8 of
+ [RFC6929].
+
+3.1. DHCPv6-Options Attribute
+
+ This attribute is of type "string" as defined in Section 3.5 of
+ [RFC8044].
+
+ The DHCPv6-Options Attribute MAY appear in a RADIUS Access-Accept
+ packet. It MAY also appear in a RADIUS Access-Request packet as a
+ hint to the RADIUS server to indicate a preference. However, the
+ server is not required to honor such a preference.
+
+ The DHCPv6-Options Attribute MAY appear in a RADIUS CoA-Request
+ packet.
+
+ The DHCPv6-Options Attribute MAY appear in a RADIUS Accounting-
+ Request packet.
+
+ The DHCPv6-Options Attribute MUST NOT appear in any other RADIUS
+ packet.
+
+ The DHCPv6-Options Attribute is structured as follows:
+
+ Type
+ 245
+
+ Length
+ This field indicates the total length, in octets, of all fields of
+ this attribute, including the Type, Length, Extended-Type, and
+ Value fields.
+
+ Extended-Type
+ 3 (see Section 8.1)
+
+ Value
+ This field contains a list of DHCPv6 options (Section 21 of
+ [RFC8415]). Multiple instances of the same DHCPv6 option MAY be
+ included. If an option appears multiple times, each instance is
+ considered separate, and the data areas of the options MUST NOT be
+ concatenated or otherwise combined. Consistent with Section 17 of
+ [RFC7227], this document does not impose any option order when
+ multiple options are present.
+
+ The permitted DHCPv6 options are listed in the "DHCPv6 Options
+ Permitted in the RADIUS DHCPv6-Options Attribute" registry
+ (Section 8.4.1).
+
+ The DHCPv6-Options Attribute is associated with the following
+ identifier: 245.3.
+
+3.2. DHCPv4-Options Attribute
+
+ This attribute is of type "string" as defined in Section 3.5 of
+ [RFC8044].
+
+ The DHCPv4-Options Attribute MAY appear in a RADIUS Access-Accept
+ packet. It MAY also appear in a RADIUS Access-Request packet as a
+ hint to the RADIUS server to indicate a preference. However, the
+ server is not required to honor such a preference.
+
+ The DHCPv4-Options Attribute MAY appear in a RADIUS CoA-Request
+ packet.
+
+ The DHCPv4-Options Attribute MAY appear in a RADIUS Accounting-
+ Request packet.
+
+ The DHCPv4-Options Attribute MUST NOT appear in any other RADIUS
+ packet.
+
+ The DHCPv4-Options Attribute is structured as follows:
+
+ Type
+ 245
+
+ Length
+ This field indicates the total length, in octets, of all fields of
+ this attribute, including the Type, Length, Extended-Type, and
+ Value fields.
+
+ Extended-Type
+ 4 (see Section 8.1)
+
+ Value
+ This field contains a list of DHCPv4 options. Multiple instances
+ of the same DHCPv4 option MAY be included, especially for
+ concatenation-requiring options that exceed the maximum DHCPv4
+ option size of 255 octets. The mechanism specified in [RFC3396]
+ MUST be used for splitting and concatenating the instances of a
+ concatenation-requiring option.
+
+ The permitted DHCPv4 options are listed in the "DHCP Options
+ Permitted in the RADIUS DHCPv4-Options Attribute" registry
+ (Section 8.4.2).
+
+ The DHCPv4-Options Attribute is associated with the following
+ identifier: 245.4.
+
+4. Passing RADIUS DHCP Options Attributes by DHCP Relay Agents to DHCP
+ Servers
+
+4.1. Context
+
+ The RADIUS Attributes DHCP suboption [RFC4014] enables a DHCPv4 relay
+ agent to pass identification and authorization attributes received
+ during RADIUS authentication to a DHCPv4 server. However, [RFC4014]
+ defines a frozen set of RADIUS attributes that can be included in
+ such a suboption. This limitation is suboptimal in contexts where
+ new services are deployed (e.g., support of encrypted DNS [DNR]).
+
+ Section 4.2 updates [RFC4014] by relaxing that constraint and
+ allowing additional RADIUS attributes to be tagged as permitted in
+ the RADIUS Attributes DHCP suboption. The permitted attributes are
+ registered in the new "RADIUS Attributes Permitted in RADIUS
+ Attributes DHCP Suboption" registry (Section 8.3).
+
+4.2. Updates to RFC 4014
+
+
+4.2.1. Section 3 of RFC 4014
+
+ This document updates Section 3 of [RFC4014] as follows:
+
+ OLD:
+
+ | To avoid dependencies between the address allocation and other
+ | state information between the RADIUS server and the DHCP server,
+ | the DHCP relay agent SHOULD include only the attributes in the
+ | table below in an instance of the RADIUS Attributes suboption.
+ | The table, based on the analysis in RFC 3580 [8], lists attributes
+ | that MAY be included:
+ |
+ | # Attribute
+ | --- ---------
+ | 1 User-Name (RFC 2865 [3])
+ | 6 Service-Type (RFC 2865)
+ | 26 Vendor-Specific (RFC 2865)
+ | 27 Session-Timeout (RFC 2865)
+ | 88 Framed-Pool (RFC 2869)
+ | 100 Framed-IPv6-Pool (RFC 3162 [7])
+
+ NEW:
+
+ | To avoid dependencies between the address allocation and other
+ | state information between the RADIUS server and the DHCP server,
+ | the DHCP relay agent SHOULD only include the attributes in the
+ | "RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption"
+ | registry (Section 8.3 of [RFC9445]) in an instance of the RADIUS
+ | Attributes DHCP suboption. The DHCP relay agent may support a
+ | configuration parameter to control the attributes in a RADIUS
+ | Attributes DHCP suboption.
+
+4.2.2. Section 4 of RFC 4014
+
+ This document updates Section 4 of [RFC4014] as follows:
+
+ OLD:
+
+ | If the relay agent relays RADIUS attributes not included in the
+ | table in Section 4, the DHCP server SHOULD ignore them.
+
+ NEW:
+
+ | If the relay agent relays RADIUS attributes not included in the
+ | "RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption"
+ | registry (Section 8.3 of [RFC9445]) and explicit configuration is
+ | absent, the DHCP server SHOULD ignore them.
+
+5. An Example: Applicability to Encrypted DNS Provisioning
+
+ Typical deployment scenarios are similar to those described, for
+ instance, in Section 2 of [RFC6911]. For illustration purposes,
+ Figure 1 shows an example where a Customer Premises Equipment (CPE)
+ is provided with an encrypted DNS resolver. This example assumes
+ that the Network Access Server (NAS) embeds both RADIUS client and
+ DHCPv6 server capabilities.
+
+ +-------------+ +-------------+ +-------+
+ | CPE | | NAS | | AAA |
+ |DHCPv6 Client| |DHCPv6 Server| |Server |
+ | | |RADIUS Client| | |
+ +------+------+ +------+------+ +---+---+
+ | | |
+ o-----DHCPv6 Solicit----->| |
+ | o----Access-Request ---->|
+ | | |
+ | |<----Access-Accept------o
+ | | DHCPv6-Options |
+ |<----DHCPv6 Advertise----o (OPTION_V6_DNR) |
+ | (OPTION_V6_DNR) | |
+ | | |
+ o-----DHCPv6 Request----->| |
+ | | |
+ |<------DHCPv6 Reply------o |
+ | (OPTION_V6_DNR) | |
+ | | |
+
+ DHCPv6 RADIUS
+
+ Figure 1: An Example of RADIUS IPv6 Encrypted DNS Exchange
+
+ Upon receipt of the DHCPv6 Solicit message from a CPE, the NAS sends
+ a RADIUS Access-Request message to the Authentication, Authorization,
+ and Accounting (AAA) server. Once the AAA server receives the
+ request, it replies with an Access-Accept message (possibly after
+ having sent a RADIUS Access-Challenge message and assuming the CPE is
+ entitled to connect to the network) that carries a list of parameters
+ to be used for this session, which includes the encrypted DNS
+ information. Such information is encoded as OPTION_V6_DNR (144)
+ instances [DNR] in the RADIUS DHCPv6-Options Attribute. These
+ instances are then used by the NAS to complete the DHCPv6 procedure
+ that the CPE initiated to retrieve information about the encrypted
+ DNS service to use. The Discovery of Network-designated Resolvers
+ (DNR) procedure defined in [DNR] is then followed between the DHCPv6
+ client and the DHCPv6 server.
+
+ Should any encrypted DNS-related information (e.g., Authentication
+ Domain Name (ADN) and IPv6 address) change, the RADIUS server sends a
+ RADIUS Change-of-Authorization (CoA) message [RFC5176] that carries
+ the DHCPv6-Options Attribute with the updated OPTION_V6_DNR
+ information to the NAS. Once that message is received and validated
+ by the NAS, it replies with a RADIUS CoA ACK message. The NAS
+ replaces the old encrypted DNS resolver information with the new one
+ and sends a DHCPv6 Reconfigure message, which leads the DHCPv6 client
+ to initiate a Renew/Reply message exchange with the DHCPv6 server.
+
+ In deployments where the NAS behaves as a DHCPv6 relay agent, the
+ procedure discussed in Section 3 of [RFC7037] can be followed. To
+ that aim, the "RADIUS Attributes Permitted in DHCPv6 RADIUS Option"
+ registry has been updated (Section 8.2). CoA-Requests can be used
+ following the procedure specified in [RFC6977].
+
+ Figure 2 shows another example where a CPE is provided with an
+ encrypted DNS resolver, but the CPE uses DHCPv4 to retrieve its
+ encrypted DNS resolver.
+
+ +-------------+ +-------------+ +-------+
+ | CPE | | NAS | | AAA |
+ |DHCPv4 Client| |DHCPv4 Server| |Server |
+ | | |RADIUS Client| | |
+ +------+------+ +------+------+ +---+---+
+ | | |
+ o------DHCPDISCOVER------>| |
+ | o----Access-Request ---->|
+ | | |
+ | |<----Access-Accept------o
+ | | DHCPv4-Options |
+ |<-----DHCPOFFER----------o (OPTION_V4_DNR) |
+ | (OPTION_V4_DNR) | |
+ | | |
+ o-----DHCPREQUEST-------->| |
+ | (OPTION_V4_DNR) | |
+ | | |
+ |<-------DHCPACK----------o |
+ | (OPTION_V4_DNR) | |
+ | | |
+
+ DHCPv4 RADIUS
+
+ Figure 2: An Example of RADIUS IPv4 Encrypted DNS Exchange
+
+ Other deployment scenarios can be envisaged, such as returning
+ customized service parameters (e.g., different DoH URI Templates) as
+ a function of the service, policies, and preferences that are set by
+ a network administrator. How an administrator indicates its service,
+ policies, and preferences to a AAA server is out of scope.
+
+6. Security Considerations
+
+ RADIUS-related security considerations are discussed in [RFC2865].
+
+ DHCPv6-related security issues are discussed in Section 22 of
+ [RFC8415], while DHCPv4-related security issues are discussed in
+ Section 7 of [RFC2131]. Security considerations specific to the DHCP
+ options that are carried in RADIUS are discussed in relevant
+ documents that specify these options. For example, security
+ considerations (including traffic theft) are discussed in Section 7
+ of [DNR].
+
+ RADIUS servers have conventionally tolerated the input of arbitrary
+ data via the "string" data type (Section 3.5 of [RFC8044]). This
+ practice allows RADIUS servers to support newer standards without
+ software upgrades, by allowing administrators to manually create
+ complex attribute content and then pass that content to a RADIUS
+ server as opaque strings. While this practice is useful, it is
+ RECOMMENDED that RADIUS servers that implement the present
+ specification are updated to understand the format and encoding of
+ DHCP options. Administrators can thus enter the DHCP options as
+ options instead of manually encoded opaque strings. This
+ recommendation increases security and interoperability by ensuring
+ that the options are encoded correctly. It also increases usability
+ for administrators.
+
+ The considerations discussed in Section 7 of [RFC4014] and Section 8
+ of [RFC7037] should be taken into account in deployments where DHCP
+ relay agents pass the DHCP*-Options Attributes to DHCP servers.
+ Additional considerations specific to the use of Reconfigure messages
+ are discussed in Section 9 of [RFC6977].
+
+7. Table of Attributes
+
+ The following table provides a guide as to what type of RADIUS
+ packets may contain these attributes and in what quantity.
+
+ +=============+=======+=========+===========+=====+================+
+ | Access- |Access-| Access- | Challenge |# | Attribute |
+ | Request |Accept | Reject | | | |
+ +=============+=======+=========+===========+=====+================+
+ | 0+ |0+ | 0 | 0 |245.3| DHCPv6-Options |
+ +-------------+-------+---------+-----------+-----+----------------+
+ | 0+ |0+ | 0 | 0 |245.4| DHCPv4-Options |
+ +=============+=======+=========+===========+=====+================+
+ | Accounting- |CoA- | CoA-ACK | CoA-NACK |# | Attribute |
+ | Request |Request| | | | |
+ +=============+=======+=========+===========+=====+================+
+ | 0+ |0+ | 0 | 0 |245.3| DHCPv6-Options |
+ +-------------+-------+---------+-----------+-----+----------------+
+ | 0+ |0+ | 0 | 0 |245.4| DHCPv4-Options |
+ +-------------+-------+---------+-----------+-----+----------------+
+
+ Table 1: Table of Attributes
+
+ Notation for Table 1:
+
+ 0 This attribute MUST NOT be present in packet.
+
+ 0+ Zero or more instances of this attribute MAY be present in
+ packet.
+
+8. IANA Considerations
+
+8.1. New RADIUS Attributes
+
+ IANA has assigned two new RADIUS attribute types in the "Radius
+ Attribute Types" [RADIUS-Types] registry:
+
+ +=======+================+===========+===========+
+ | Value | Description | Data Type | Reference |
+ +=======+================+===========+===========+
+ | 245.3 | DHCPv6-Options | string | RFC 9445 |
+ +-------+----------------+-----------+-----------+
+ | 245.4 | DHCPv4-Options | string | RFC 9445 |
+ +-------+----------------+-----------+-----------+
+
+ Table 2: New RADIUS Attributes
+
+
+8.2. New RADIUS Attribute Permitted in DHCPv6 RADIUS Option
+
+ IANA has added the following entry to the "RADIUS Attributes
+ Permitted in DHCPv6 RADIUS Option" subregistry in the "Dynamic Host
+ Configuration Protocol for IPv6 (DHCPv6)" registry [DHCPv6]:
+
+ +===========+================+===========+
+ | Type Code | Attribute | Reference |
+ +===========+================+===========+
+ | 245.3 | DHCPv6-Options | RFC 9445 |
+ +-----------+----------------+-----------+
+
+ Table 3: New RADIUS Attribute
+ Permitted in DHCPv6 RADIUS Option
+
+
+8.3. RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption
+
+ IANA has created a new subregistry entitled "RADIUS Attributes
+ Permitted in RADIUS Attributes DHCP Suboption" in the "Dynamic Host
+ Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP)
+ Parameters" registry [BOOTP].
+
+ The allocation policy of this new subregistry is "Expert Review"
+ (Section 4.5 of [RFC8126]). Designated experts should carefully
+ consider the security implications of allowing a relay agent to
+ include new RADIUS attributes in this subregistry. Additional
+ considerations are provided in Section 8.4.3.
+
+ The initial contents of this subregistry are listed in Table 4. The
+ Reference field includes the document that registers or specifies the
+ attribute.
+
+ +===========+==================+===========+
+ | Type Code | Attribute | Reference |
+ +===========+==================+===========+
+ | 1 | User-Name | [RFC2865] |
+ +-----------+------------------+-----------+
+ | 6 | Service-Type | [RFC2865] |
+ +-----------+------------------+-----------+
+ | 26 | Vendor-Specific | [RFC2865] |
+ +-----------+------------------+-----------+
+ | 27 | Session-Timeout | [RFC2865] |
+ +-----------+------------------+-----------+
+ | 88 | Framed-Pool | [RFC2869] |
+ +-----------+------------------+-----------+
+ | 100 | Framed-IPv6-Pool | [RFC3162] |
+ +-----------+------------------+-----------+
+ | 245.4 | DHCPv4-Options | RFC 9445 |
+ +-----------+------------------+-----------+
+
+ Table 4: Initial Contents of RADIUS
+ Attributes Permitted in RADIUS
+ Attributes DHCP Suboption Registry
+
+
+8.4. DHCP Options Permitted in the RADIUS DHCP*-Options Attributes
+
+
+8.4.1. DHCPv6
+
+ IANA has created a new subregistry entitled "DHCPv6 Options Permitted
+ in the RADIUS DHCPv6-Options Attribute" in the "Dynamic Host
+ Configuration Protocol for IPv6 (DHCPv6)" registry [DHCPv6].
+
+ The registration policy for this new subregistry is "Expert Review"
+ (Section 4.5 of [RFC8126]). See more details in Section 8.4.3.
+
+ The initial content of this subregistry is listed in Table 5. The
+ Value and Description fields echo those in the "Option Codes"
+ subregistry of [DHCPv6]. The Reference field includes the document
+ that registers or specifies the option.
+
+ +=======+===============+===========+
+ | Value | Description | Reference |
+ +=======+===============+===========+
+ | 144 | OPTION_V6_DNR | RFC 9445 |
+ +-------+---------------+-----------+
+
+ Table 5: Initial Content of
+ DHCPv6 Options Permitted in the
+ RADIUS DHCPv6-Options Attribute
+ Registry
+
+
+8.4.2. DHCPv4
+
+ IANA has created a new subregistry entitled "DHCP Options Permitted
+ in the RADIUS DHCPv4-Options Attribute" in the "Dynamic Host
+ Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP)
+ Parameters" registry [BOOTP].
+
+ The registration policy for this new subregistry is Expert Review
+ (Section 4.5 of [RFC8126]). See more details in Section 8.4.3.
+
+ The initial content of this subregistry is listed in Table 6. The
+ Tag and Name fields echo those in the "BOOTP Vendor Extensions and
+ DHCP Options" subregistry of [BOOTP]. The Reference field includes
+ the document that registers or specifies the option.
+
+ +=====+===============+===========+
+ | Tag | Name | Reference |
+ +=====+===============+===========+
+ | 162 | OPTION_V4_DNR | RFC 9445 |
+ +-----+---------------+-----------+
+
+ Table 6: Initial Content of
+ DHCPv4 Options Permitted in the
+ RADIUS DHCPv4-Options Attribute
+ Registry
+
+
+8.4.3. Guidelines for the Designated Experts
+
+ It is suggested that multiple designated experts be appointed for
+ registry change requests.
+
+ Criteria that should be applied by the designated experts include
+ determining whether the proposed registration duplicates existing
+ entries and whether the registration description is clear and fits
+ the purpose of this registry.
+
+ Registration requests are to be sent to <radius-dhcp-review@ietf.org>
+ and are evaluated within a three-week review period on the advice of
+ one or more designated experts. Within the review period, the
+ designated experts will either approve or deny the registration
+ request, communicating this decision to the review list and IANA.
+ Denials should include an explanation and, if applicable, suggestions
+ as to how to make the request successful.
+
+9. References
+
+9.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson,
+ "Remote Authentication Dial In User Service (RADIUS)",
+ RFC 2865, DOI 10.17487/RFC2865, June 2000,
+ <https://www.rfc-editor.org/info/rfc2865>.
+
+ [RFC3396] Lemon, T. and S. Cheshire, "Encoding Long Options in the
+ Dynamic Host Configuration Protocol (DHCPv4)", RFC 3396,
+ DOI 10.17487/RFC3396, November 2002,
+ <https://www.rfc-editor.org/info/rfc3396>.
+
+ [RFC4014] Droms, R. and J. Schnizlein, "Remote Authentication Dial-
+ In User Service (RADIUS) Attributes Suboption for the
+ Dynamic Host Configuration Protocol (DHCP) Relay Agent
+ Information Option", RFC 4014, DOI 10.17487/RFC4014,
+ February 2005, <https://www.rfc-editor.org/info/rfc4014>.
+
+ [RFC6158] DeKok, A., Ed. and G. Weber, "RADIUS Design Guidelines",
+ BCP 158, RFC 6158, DOI 10.17487/RFC6158, March 2011,
+ <https://www.rfc-editor.org/info/rfc6158>.
+
+ [RFC6929] DeKok, A. and A. Lior, "Remote Authentication Dial In User
+ Service (RADIUS) Protocol Extensions", RFC 6929,
+ DOI 10.17487/RFC6929, April 2013,
+ <https://www.rfc-editor.org/info/rfc6929>.
+
+ [RFC8044] DeKok, A., "Data Types in RADIUS", RFC 8044,
+ DOI 10.17487/RFC8044, January 2017,
+ <https://www.rfc-editor.org/info/rfc8044>.
+
+ [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
+ Writing an IANA Considerations Section in RFCs", BCP 26,
+ RFC 8126, DOI 10.17487/RFC8126, June 2017,
+ <https://www.rfc-editor.org/info/rfc8126>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+ [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A.,
+ Richardson, M., Jiang, S., Lemon, T., and T. Winters,
+ "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)",
+ RFC 8415, DOI 10.17487/RFC8415, November 2018,
+ <https://www.rfc-editor.org/info/rfc8415>.
+
+9.2. Informative References
+
+ [BOOTP] IANA, "Dynamic Host Configuration Protocol (DHCP) and
+ Bootstrap Protocol (BOOTP) Parameters",
+ <https://www.iana.org/assignments/bootp-dhcp-parameters>.
+
+ [DHCPv6] IANA, "Dynamic Host Configuration Protocol for IPv6
+ (DHCPv6)",
+ <https://www.iana.org/assignments/dhcpv6-parameters>.
+
+ [DNR] Boucadair, M., Ed., Reddy.K, T., Ed., Wing, D., Cook, N.,
+ and T. Jensen, "DHCP and Router Advertisement Options for
+ the Discovery of Network-designated Resolvers (DNR)", Work
+ in Progress, Internet-Draft, draft-ietf-add-dnr-16, 27
+ April 2023, <https://datatracker.ietf.org/doc/html/draft-
+ ietf-add-dnr-16>.
+
+ [RADIUS-Types]
+ IANA, "RADIUS Types",
+ <http://www.iana.org/assignments/radius-types>.
+
+ [RFC2131] Droms, R., "Dynamic Host Configuration Protocol",
+ RFC 2131, DOI 10.17487/RFC2131, March 1997,
+ <https://www.rfc-editor.org/info/rfc2131>.
+
+ [RFC2132] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor
+ Extensions", RFC 2132, DOI 10.17487/RFC2132, March 1997,
+ <https://www.rfc-editor.org/info/rfc2132>.
+
+ [RFC2868] Zorn, G., Leifer, D., Rubens, A., Shriver, J., Holdrege,
+ M., and I. Goyret, "RADIUS Attributes for Tunnel Protocol
+ Support", RFC 2868, DOI 10.17487/RFC2868, June 2000,
+ <https://www.rfc-editor.org/info/rfc2868>.
+
+ [RFC2869] Rigney, C., Willats, W., and P. Calhoun, "RADIUS
+ Extensions", RFC 2869, DOI 10.17487/RFC2869, June 2000,
+ <https://www.rfc-editor.org/info/rfc2869>.
+
+ [RFC3162] Aboba, B., Zorn, G., and D. Mitton, "RADIUS and IPv6",
+ RFC 3162, DOI 10.17487/RFC3162, August 2001,
+ <https://www.rfc-editor.org/info/rfc3162>.
+
+ [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
+ "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
+ DOI 10.17487/RFC4861, September 2007,
+ <https://www.rfc-editor.org/info/rfc4861>.
+
+ [RFC5176] Chiba, M., Dommety, G., Eklund, M., Mitton, D., and B.
+ Aboba, "Dynamic Authorization Extensions to Remote
+ Authentication Dial In User Service (RADIUS)", RFC 5176,
+ DOI 10.17487/RFC5176, January 2008,
+ <https://www.rfc-editor.org/info/rfc5176>.
+
+ [RFC6911] Dec, W., Ed., Sarikaya, B., Zorn, G., Ed., Miles, D., and
+ B. Lourdelet, "RADIUS Attributes for IPv6 Access
+ Networks", RFC 6911, DOI 10.17487/RFC6911, April 2013,
+ <https://www.rfc-editor.org/info/rfc6911>.
+
+ [RFC6977] Boucadair, M. and X. Pougnard, "Triggering DHCPv6
+ Reconfiguration from Relay Agents", RFC 6977,
+ DOI 10.17487/RFC6977, July 2013,
+ <https://www.rfc-editor.org/info/rfc6977>.
+
+ [RFC7037] Yeh, L. and M. Boucadair, "RADIUS Option for the DHCPv6
+ Relay Agent", RFC 7037, DOI 10.17487/RFC7037, October
+ 2013, <https://www.rfc-editor.org/info/rfc7037>.
+
+ [RFC7227] Hankins, D., Mrugalski, T., Siodelski, M., Jiang, S., and
+ S. Krishnan, "Guidelines for Creating New DHCPv6 Options",
+ BCP 187, RFC 7227, DOI 10.17487/RFC7227, May 2014,
+ <https://www.rfc-editor.org/info/rfc7227>.
+
+ [RFC7499] Perez-Mendez, A., Ed., Marin-Lopez, R., Pereniguez-Garcia,
+ F., Lopez-Millan, G., Lopez, D., and A. DeKok, "Support of
+ Fragmentation of RADIUS Packets", RFC 7499,
+ DOI 10.17487/RFC7499, April 2015,
+ <https://www.rfc-editor.org/info/rfc7499>.
+
+ [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D.,
+ and P. Hoffman, "Specification for DNS over Transport
+ Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May
+ 2016, <https://www.rfc-editor.org/info/rfc7858>.
+
+ [RFC7930] Hartman, S., "Larger Packets for RADIUS over TCP",
+ RFC 7930, DOI 10.17487/RFC7930, August 2016,
+ <https://www.rfc-editor.org/info/rfc7930>.
+
+ [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS
+ (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018,
+ <https://www.rfc-editor.org/info/rfc8484>.
+
+ [RFC8499] Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS
+ Terminology", BCP 219, RFC 8499, DOI 10.17487/RFC8499,
+ January 2019, <https://www.rfc-editor.org/info/rfc8499>.
+
+ [RFC9250] Huitema, C., Dickinson, S., and A. Mankin, "DNS over
+ Dedicated QUIC Connections", RFC 9250,
+ DOI 10.17487/RFC9250, May 2022,
+ <https://www.rfc-editor.org/info/rfc9250>.
+
+Acknowledgements
+
+ Thanks to Christian Jacquenet, Neil Cook, Joe Clarke, Qin Wu, Dirk
+ von-Hugo, Tom Petch, and Chongfeng Xie for the review and
+ suggestions.
+
+ Thanks to Ben Schwartz and Bernie Volz for the comments.
+
+ Thanks to Rob Wilton for the careful AD review.
+
+ Thanks to Ralf Weber for the dnsdir reviews, Robert Sparks for the
+ genart review, and Tatuya Jinmei for the intdir review.
+
+ Thanks to Éric Vyncke, Paul Wouters, and Warren Kumari for the IESG
+ review.
+
+Authors' Addresses
+
+ Mohamed Boucadair
+ Orange
+ 35000 Rennes
+ France
+ Email: mohamed.boucadair@orange.com
+
+
+ Tirumaleswar Reddy.K
+ Nokia
+ India
+ Email: kondtir@gmail.com
+
+
+ Alan DeKok
+ FreeRADIUS
+ Email: aland@freeradius.org