summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9445.txt
blob: 464e4ebf56c4cbbbf45a91d6425f2e611aa5c570 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
Internet Engineering Task Force (IETF)                      M. Boucadair
Request for Comments: 9445                                        Orange
Updates: 4014                                                 T. Reddy.K
Category: Standards Track                                          Nokia
ISSN: 2070-1721                                                 A. DeKok
                                                              FreeRADIUS
                                                             August 2023


             RADIUS Extensions for DHCP-Configured Services

Abstract

   This document specifies two new Remote Authentication Dial-In User
   Service (RADIUS) attributes that carry DHCP options.  The
   specification is generic and can be applicable to any service that
   relies upon DHCP.  Both DHCPv4- and DHCPv6-configured services are
   covered.

   Also, this document updates RFC 4014 by relaxing a constraint on
   permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc9445.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Revised BSD License text as described in Section 4.e of the
   Trust Legal Provisions and are provided without warranty as described
   in the Revised BSD License.

Table of Contents

   1.  Introduction
   2.  Terminology
   3.  RADIUS DHCP Options Attributes
     3.1.  DHCPv6-Options Attribute
     3.2.  DHCPv4-Options Attribute
   4.  Passing RADIUS DHCP Options Attributes by DHCP Relay Agents to
           DHCP Servers
     4.1.  Context
     4.2.  Updates to RFC 4014
       4.2.1.  Section 3 of RFC 4014
       4.2.2.  Section 4 of RFC 4014
   5.  An Example: Applicability to Encrypted DNS Provisioning
   6.  Security Considerations
   7.  Table of Attributes
   8.  IANA Considerations
     8.1.  New RADIUS Attributes
     8.2.  New RADIUS Attribute Permitted in DHCPv6 RADIUS Option
     8.3.  RADIUS Attributes Permitted in RADIUS Attributes DHCP
           Suboption
     8.4.  DHCP Options Permitted in the RADIUS DHCP*-Options
           Attributes
       8.4.1.  DHCPv6
       8.4.2.  DHCPv4
       8.4.3.  Guidelines for the Designated Experts
   9.  References
     9.1.  Normative References
     9.2.  Informative References
   Acknowledgements
   Authors' Addresses

1.  Introduction

   In the context of broadband services, Internet Service Providers
   (ISPs) usually provide DNS resolvers to their customers.  To that
   aim, ISPs deploy dedicated mechanisms (e.g., DHCP [RFC2132] [RFC8415]
   and IPv6 Router Advertisement [RFC4861]) to advertise a list of DNS
   recursive servers to their customers.  Typically, the information
   used to populate DHCP messages and/or IPv6 Router Advertisements
   relies upon specific Remote Authentication Dial-In User Service
   (RADIUS) [RFC2865] attributes, such as the DNS-Server-IPv6-Address
   Attribute specified in [RFC6911].

   With the advent of encrypted DNS (e.g., DNS over HTTPS (DoH)
   [RFC8484], DNS over TLS (DoT) [RFC7858], or DNS over QUIC (DoQ)
   [RFC9250]), additional means are required to provision hosts with
   network-designated encrypted DNS.  To fill that void, [DNR] leverages
   existing protocols such as DHCP to provide hosts with the required
   information to connect to an encrypted DNS resolver.  However, there
   are no RADIUS attributes that can be used to populate the discovery
   messages discussed in [DNR].  The same concern is likely to be
   encountered for future services that are configured using DHCP.

   This document specifies two new RADIUS attributes: DHCPv6-Options
   (Section 3.1) and DHCPv4-Options (Section 3.2).  These attributes can
   include DHCP options that are listed in the "DHCPv6 Options Permitted
   in the RADIUS DHCPv6-Options Attribute" registry (Section 8.4.1) and
   the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute"
   registry (Section 8.4.2).  These two attributes are specified in
   order to accommodate both IPv4 and IPv6 deployment contexts while
   taking into account the constraints in Section 3.4 of [RFC6158].

   The mechanism specified in this document is a generic mechanism and
   might be employed in network scenarios where the DHCP server and the
   RADIUS client are located in the same device.  The new attributes can
   also be used in deployments that rely upon the mechanisms defined in
   [RFC4014] or [RFC7037], which allow a DHCP relay agent that is
   collocated with a RADIUS client to pass attributes obtained from a
   RADIUS server to a DHCP server.  However, an update to [RFC4014] is
   required so that a DHCP relay agent can pass the DHCPv4-Options
   Attribute obtained from a RADIUS server to a DHCP server (Section 4).

   DHCP options that are included in the new RADIUS attributes can be
   controlled by a deployment-specific policy.  Discussing such a policy
   is out of scope.

   This document adheres to [RFC8044] for defining the new attributes.

   A sample deployment usage of the RADIUS DHCPv6-Options and
   DHCPv4-Options Attributes is described in Section 5.

2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

   This document makes use of the terms defined in [RFC2865], [RFC8415],
   and [RFC8499].  The following additional terms are used:

   DHCP:  refers to both DHCPv4 [RFC2132] and DHCPv6 [RFC8415].

   Encrypted DNS:  refers to a scheme where DNS exchanges are
      transported over an encrypted channel.  Examples of encrypted DNS
      are DoT, DoH, and DoQ.

   Encrypted DNS resolver:  refers to a resolver (Section 6 of
      [RFC8499]) that supports encrypted DNS.

   DHCP*-Options:  refers to the DHCPv4-Options and DHCPv6-Options
      Attributes (Section 3).

3.  RADIUS DHCP Options Attributes

   This section specifies two new RADIUS attributes for RADIUS clients
   and servers to exchange DHCP-encoded data.  This data is then used to
   feed the DHCP procedure between a DHCP client and a DHCP server.

   Both the DHCPv4-Options and DHCPv6-Options Attributes use the "Long
   Extended Type" format (Section 2.2 of [RFC6929]).  The description of
   the fields is provided in Sections 3.1 and 3.2.

   These attributes use the "Long Extended Type" format in order to
   permit the transport of attributes encapsulating more than 253 octets
   of data.  DHCP options that can be included in the RADIUS DHCP*-
   Options Attributes are limited by the maximum packet size of 4096
   bytes (Section 3 of [RFC2865]).  In order to accommodate deployments
   with large DHCP options, RADIUS implementations are RECOMMENDED to
   support a packet size up to 65535 bytes.  Such a recommendation can
   be met if RADIUS implementations support a mechanism that relaxes the
   limit of 4096 bytes (e.g., the mechanisms described in [RFC7499] or
   [RFC7930]).

   The Value fields of the DHCP*-Options Attributes are encoded in the
   clear and not encrypted like, for example, the Tunnel-Password
   Attribute [RFC2868].

   RADIUS implementations may support a configuration parameter to
   control the DHCP options that can be included in a RADIUS DHCP*-
   Options Attribute.  Likewise, DHCP server implementations may support
   a configuration parameter to control the permitted DHCP options in a
   RADIUS DHCP*-Options Attribute.  Absent explicit configuration,
   RADIUS implementations and DHCP server implementations SHOULD ignore
   non-permitted DHCP options received in a RADIUS DHCP*-Options
   Attribute.

   RADIUS-supplied data is specific configuration data that is returned
   as a function of authentication and authorization checks.  As such,
   absent any explicit configuration on the DHCP server, RADIUS-supplied
   data by means of the DHCP*-Options Attributes take precedence over
   any local configuration.

   These attributes are defined with globally unique names.  The naming
   of the attributes follows the guidelines in Section 2.7.1 of
   [RFC6929].  Invalid attributes are handled as per Section 2.8 of
   [RFC6929].

3.1.  DHCPv6-Options Attribute

   This attribute is of type "string" as defined in Section 3.5 of
   [RFC8044].

   The DHCPv6-Options Attribute MAY appear in a RADIUS Access-Accept
   packet.  It MAY also appear in a RADIUS Access-Request packet as a
   hint to the RADIUS server to indicate a preference.  However, the
   server is not required to honor such a preference.

   The DHCPv6-Options Attribute MAY appear in a RADIUS CoA-Request
   packet.

   The DHCPv6-Options Attribute MAY appear in a RADIUS Accounting-
   Request packet.

   The DHCPv6-Options Attribute MUST NOT appear in any other RADIUS
   packet.

   The DHCPv6-Options Attribute is structured as follows:

   Type
      245

   Length
      This field indicates the total length, in octets, of all fields of
      this attribute, including the Type, Length, Extended-Type, and
      Value fields.

   Extended-Type
      3 (see Section 8.1)

   Value
      This field contains a list of DHCPv6 options (Section 21 of
      [RFC8415]).  Multiple instances of the same DHCPv6 option MAY be
      included.  If an option appears multiple times, each instance is
      considered separate, and the data areas of the options MUST NOT be
      concatenated or otherwise combined.  Consistent with Section 17 of
      [RFC7227], this document does not impose any option order when
      multiple options are present.

      The permitted DHCPv6 options are listed in the "DHCPv6 Options
      Permitted in the RADIUS DHCPv6-Options Attribute" registry
      (Section 8.4.1).

   The DHCPv6-Options Attribute is associated with the following
   identifier: 245.3.

3.2.  DHCPv4-Options Attribute

   This attribute is of type "string" as defined in Section 3.5 of
   [RFC8044].

   The DHCPv4-Options Attribute MAY appear in a RADIUS Access-Accept
   packet.  It MAY also appear in a RADIUS Access-Request packet as a
   hint to the RADIUS server to indicate a preference.  However, the
   server is not required to honor such a preference.

   The DHCPv4-Options Attribute MAY appear in a RADIUS CoA-Request
   packet.

   The DHCPv4-Options Attribute MAY appear in a RADIUS Accounting-
   Request packet.

   The DHCPv4-Options Attribute MUST NOT appear in any other RADIUS
   packet.

   The DHCPv4-Options Attribute is structured as follows:

   Type
      245

   Length
      This field indicates the total length, in octets, of all fields of
      this attribute, including the Type, Length, Extended-Type, and
      Value fields.

   Extended-Type
      4 (see Section 8.1)

   Value
      This field contains a list of DHCPv4 options.  Multiple instances
      of the same DHCPv4 option MAY be included, especially for
      concatenation-requiring options that exceed the maximum DHCPv4
      option size of 255 octets.  The mechanism specified in [RFC3396]
      MUST be used for splitting and concatenating the instances of a
      concatenation-requiring option.

      The permitted DHCPv4 options are listed in the "DHCP Options
      Permitted in the RADIUS DHCPv4-Options Attribute" registry
      (Section 8.4.2).

   The DHCPv4-Options Attribute is associated with the following
   identifier: 245.4.

4.  Passing RADIUS DHCP Options Attributes by DHCP Relay Agents to DHCP
    Servers

4.1.  Context

   The RADIUS Attributes DHCP suboption [RFC4014] enables a DHCPv4 relay
   agent to pass identification and authorization attributes received
   during RADIUS authentication to a DHCPv4 server.  However, [RFC4014]
   defines a frozen set of RADIUS attributes that can be included in
   such a suboption.  This limitation is suboptimal in contexts where
   new services are deployed (e.g., support of encrypted DNS [DNR]).

   Section 4.2 updates [RFC4014] by relaxing that constraint and
   allowing additional RADIUS attributes to be tagged as permitted in
   the RADIUS Attributes DHCP suboption.  The permitted attributes are
   registered in the new "RADIUS Attributes Permitted in RADIUS
   Attributes DHCP Suboption" registry (Section 8.3).

4.2.  Updates to RFC 4014


4.2.1.  Section 3 of RFC 4014

   This document updates Section 3 of [RFC4014] as follows:

   OLD:

   |  To avoid dependencies between the address allocation and other
   |  state information between the RADIUS server and the DHCP server,
   |  the DHCP relay agent SHOULD include only the attributes in the
   |  table below in an instance of the RADIUS Attributes suboption.
   |  The table, based on the analysis in RFC 3580 [8], lists attributes
   |  that MAY be included:
   |  
   |                #   Attribute
   |              ---   ---------
   |                1   User-Name (RFC 2865 [3])
   |                6   Service-Type (RFC 2865)
   |               26   Vendor-Specific (RFC 2865)
   |               27   Session-Timeout (RFC 2865)
   |               88   Framed-Pool (RFC 2869)
   |              100   Framed-IPv6-Pool (RFC 3162 [7])

   NEW:

   |  To avoid dependencies between the address allocation and other
   |  state information between the RADIUS server and the DHCP server,
   |  the DHCP relay agent SHOULD only include the attributes in the
   |  "RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption"
   |  registry (Section 8.3 of [RFC9445]) in an instance of the RADIUS
   |  Attributes DHCP suboption.  The DHCP relay agent may support a
   |  configuration parameter to control the attributes in a RADIUS
   |  Attributes DHCP suboption.

4.2.2.  Section 4 of RFC 4014

   This document updates Section 4 of [RFC4014] as follows:

   OLD:

   |  If the relay agent relays RADIUS attributes not included in the
   |  table in Section 4, the DHCP server SHOULD ignore them.

   NEW:

   |  If the relay agent relays RADIUS attributes not included in the
   |  "RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption"
   |  registry (Section 8.3 of [RFC9445]) and explicit configuration is
   |  absent, the DHCP server SHOULD ignore them.

5.  An Example: Applicability to Encrypted DNS Provisioning

   Typical deployment scenarios are similar to those described, for
   instance, in Section 2 of [RFC6911].  For illustration purposes,
   Figure 1 shows an example where a Customer Premises Equipment (CPE)
   is provided with an encrypted DNS resolver.  This example assumes
   that the Network Access Server (NAS) embeds both RADIUS client and
   DHCPv6 server capabilities.

   +-------------+           +-------------+             +-------+
   |     CPE     |           |     NAS     |             |  AAA  |
   |DHCPv6 Client|           |DHCPv6 Server|             |Server |
   |             |           |RADIUS Client|             |       |
   +------+------+           +------+------+             +---+---+
          |                         |                        |
          o-----DHCPv6 Solicit----->|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv6-Options     |
          |<----DHCPv6 Advertise----o    (OPTION_V6_DNR)     |
          |     (OPTION_V6_DNR)     |                        |
          |                         |                        |
          o-----DHCPv6 Request----->|                        |
          |                         |                        |
          |<------DHCPv6 Reply------o                        |
          |     (OPTION_V6_DNR)     |                        |
          |                         |                        |

                   DHCPv6                     RADIUS

         Figure 1: An Example of RADIUS IPv6 Encrypted DNS Exchange

   Upon receipt of the DHCPv6 Solicit message from a CPE, the NAS sends
   a RADIUS Access-Request message to the Authentication, Authorization,
   and Accounting (AAA) server.  Once the AAA server receives the
   request, it replies with an Access-Accept message (possibly after
   having sent a RADIUS Access-Challenge message and assuming the CPE is
   entitled to connect to the network) that carries a list of parameters
   to be used for this session, which includes the encrypted DNS
   information.  Such information is encoded as OPTION_V6_DNR (144)
   instances [DNR] in the RADIUS DHCPv6-Options Attribute.  These
   instances are then used by the NAS to complete the DHCPv6 procedure
   that the CPE initiated to retrieve information about the encrypted
   DNS service to use.  The Discovery of Network-designated Resolvers
   (DNR) procedure defined in [DNR] is then followed between the DHCPv6
   client and the DHCPv6 server.

   Should any encrypted DNS-related information (e.g., Authentication
   Domain Name (ADN) and IPv6 address) change, the RADIUS server sends a
   RADIUS Change-of-Authorization (CoA) message [RFC5176] that carries
   the DHCPv6-Options Attribute with the updated OPTION_V6_DNR
   information to the NAS.  Once that message is received and validated
   by the NAS, it replies with a RADIUS CoA ACK message.  The NAS
   replaces the old encrypted DNS resolver information with the new one
   and sends a DHCPv6 Reconfigure message, which leads the DHCPv6 client
   to initiate a Renew/Reply message exchange with the DHCPv6 server.

   In deployments where the NAS behaves as a DHCPv6 relay agent, the
   procedure discussed in Section 3 of [RFC7037] can be followed.  To
   that aim, the "RADIUS Attributes Permitted in DHCPv6 RADIUS Option"
   registry has been updated (Section 8.2).  CoA-Requests can be used
   following the procedure specified in [RFC6977].

   Figure 2 shows another example where a CPE is provided with an
   encrypted DNS resolver, but the CPE uses DHCPv4 to retrieve its
   encrypted DNS resolver.

   +-------------+           +-------------+             +-------+
   |     CPE     |           |     NAS     |             |  AAA  |
   |DHCPv4 Client|           |DHCPv4 Server|             |Server |
   |             |           |RADIUS Client|             |       |
   +------+------+           +------+------+             +---+---+
          |                         |                        |
          o------DHCPDISCOVER------>|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv4-Options     |
          |<-----DHCPOFFER----------o    (OPTION_V4_DNR)     |
          |     (OPTION_V4_DNR)     |                        |
          |                         |                        |
          o-----DHCPREQUEST-------->|                        |
          |     (OPTION_V4_DNR)     |                        |
          |                         |                        |
          |<-------DHCPACK----------o                        |
          |     (OPTION_V4_DNR)     |                        |
          |                         |                        |

                  DHCPv4                      RADIUS

         Figure 2: An Example of RADIUS IPv4 Encrypted DNS Exchange

   Other deployment scenarios can be envisaged, such as returning
   customized service parameters (e.g., different DoH URI Templates) as
   a function of the service, policies, and preferences that are set by
   a network administrator.  How an administrator indicates its service,
   policies, and preferences to a AAA server is out of scope.

6.  Security Considerations

   RADIUS-related security considerations are discussed in [RFC2865].

   DHCPv6-related security issues are discussed in Section 22 of
   [RFC8415], while DHCPv4-related security issues are discussed in
   Section 7 of [RFC2131].  Security considerations specific to the DHCP
   options that are carried in RADIUS are discussed in relevant
   documents that specify these options.  For example, security
   considerations (including traffic theft) are discussed in Section 7
   of [DNR].

   RADIUS servers have conventionally tolerated the input of arbitrary
   data via the "string" data type (Section 3.5 of [RFC8044]).  This
   practice allows RADIUS servers to support newer standards without
   software upgrades, by allowing administrators to manually create
   complex attribute content and then pass that content to a RADIUS
   server as opaque strings.  While this practice is useful, it is
   RECOMMENDED that RADIUS servers that implement the present
   specification are updated to understand the format and encoding of
   DHCP options.  Administrators can thus enter the DHCP options as
   options instead of manually encoded opaque strings.  This
   recommendation increases security and interoperability by ensuring
   that the options are encoded correctly.  It also increases usability
   for administrators.

   The considerations discussed in Section 7 of [RFC4014] and Section 8
   of [RFC7037] should be taken into account in deployments where DHCP
   relay agents pass the DHCP*-Options Attributes to DHCP servers.
   Additional considerations specific to the use of Reconfigure messages
   are discussed in Section 9 of [RFC6977].

7.  Table of Attributes

   The following table provides a guide as to what type of RADIUS
   packets may contain these attributes and in what quantity.

   +=============+=======+=========+===========+=====+================+
   | Access-     |Access-| Access- | Challenge |#    | Attribute      |
   | Request     |Accept | Reject  |           |     |                |
   +=============+=======+=========+===========+=====+================+
   | 0+          |0+     | 0       | 0         |245.3| DHCPv6-Options |
   +-------------+-------+---------+-----------+-----+----------------+
   | 0+          |0+     | 0       | 0         |245.4| DHCPv4-Options |
   +=============+=======+=========+===========+=====+================+
   | Accounting- |CoA-   | CoA-ACK | CoA-NACK  |#    | Attribute      |
   | Request     |Request|         |           |     |                |
   +=============+=======+=========+===========+=====+================+
   | 0+          |0+     | 0       | 0         |245.3| DHCPv6-Options |
   +-------------+-------+---------+-----------+-----+----------------+
   | 0+          |0+     | 0       | 0         |245.4| DHCPv4-Options |
   +-------------+-------+---------+-----------+-----+----------------+

                       Table 1: Table of Attributes

   Notation for Table 1:

   0   This attribute MUST NOT be present in packet.

   0+  Zero or more instances of this attribute MAY be present in
       packet.

8.  IANA Considerations

8.1.  New RADIUS Attributes

   IANA has assigned two new RADIUS attribute types in the "Radius
   Attribute Types" [RADIUS-Types] registry:

            +=======+================+===========+===========+
            | Value | Description    | Data Type | Reference |
            +=======+================+===========+===========+
            | 245.3 | DHCPv6-Options | string    | RFC 9445  |
            +-------+----------------+-----------+-----------+
            | 245.4 | DHCPv4-Options | string    | RFC 9445  |
            +-------+----------------+-----------+-----------+

                      Table 2: New RADIUS Attributes


8.2.  New RADIUS Attribute Permitted in DHCPv6 RADIUS Option

   IANA has added the following entry to the "RADIUS Attributes
   Permitted in DHCPv6 RADIUS Option" subregistry in the "Dynamic Host
   Configuration Protocol for IPv6 (DHCPv6)" registry [DHCPv6]:

                +===========+================+===========+
                | Type Code | Attribute      | Reference |
                +===========+================+===========+
                | 245.3     | DHCPv6-Options | RFC 9445  |
                +-----------+----------------+-----------+

                      Table 3: New RADIUS Attribute
                    Permitted in DHCPv6 RADIUS Option


8.3.  RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption

   IANA has created a new subregistry entitled "RADIUS Attributes
   Permitted in RADIUS Attributes DHCP Suboption" in the "Dynamic Host
   Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP)
   Parameters" registry [BOOTP].

   The allocation policy of this new subregistry is "Expert Review"
   (Section 4.5 of [RFC8126]).  Designated experts should carefully
   consider the security implications of allowing a relay agent to
   include new RADIUS attributes in this subregistry.  Additional
   considerations are provided in Section 8.4.3.

   The initial contents of this subregistry are listed in Table 4.  The
   Reference field includes the document that registers or specifies the
   attribute.

               +===========+==================+===========+
               | Type Code | Attribute        | Reference |
               +===========+==================+===========+
               | 1         | User-Name        | [RFC2865] |
               +-----------+------------------+-----------+
               | 6         | Service-Type     | [RFC2865] |
               +-----------+------------------+-----------+
               | 26        | Vendor-Specific  | [RFC2865] |
               +-----------+------------------+-----------+
               | 27        | Session-Timeout  | [RFC2865] |
               +-----------+------------------+-----------+
               | 88        | Framed-Pool      | [RFC2869] |
               +-----------+------------------+-----------+
               | 100       | Framed-IPv6-Pool | [RFC3162] |
               +-----------+------------------+-----------+
               | 245.4     | DHCPv4-Options   | RFC 9445  |
               +-----------+------------------+-----------+

                   Table 4: Initial Contents of RADIUS
                      Attributes Permitted in RADIUS
                    Attributes DHCP Suboption Registry


8.4.  DHCP Options Permitted in the RADIUS DHCP*-Options Attributes


8.4.1.  DHCPv6

   IANA has created a new subregistry entitled "DHCPv6 Options Permitted
   in the RADIUS DHCPv6-Options Attribute" in the "Dynamic Host
   Configuration Protocol for IPv6 (DHCPv6)" registry [DHCPv6].

   The registration policy for this new subregistry is "Expert Review"
   (Section 4.5 of [RFC8126]).  See more details in Section 8.4.3.

   The initial content of this subregistry is listed in Table 5.  The
   Value and Description fields echo those in the "Option Codes"
   subregistry of [DHCPv6].  The Reference field includes the document
   that registers or specifies the option.

                   +=======+===============+===========+
                   | Value | Description   | Reference |
                   +=======+===============+===========+
                   | 144   | OPTION_V6_DNR | RFC 9445  |
                   +-------+---------------+-----------+

                        Table 5: Initial Content of
                      DHCPv6 Options Permitted in the
                      RADIUS DHCPv6-Options Attribute
                                  Registry


8.4.2.  DHCPv4

   IANA has created a new subregistry entitled "DHCP Options Permitted
   in the RADIUS DHCPv4-Options Attribute" in the "Dynamic Host
   Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP)
   Parameters" registry [BOOTP].

   The registration policy for this new subregistry is Expert Review
   (Section 4.5 of [RFC8126]).  See more details in Section 8.4.3.

   The initial content of this subregistry is listed in Table 6.  The
   Tag and Name fields echo those in the "BOOTP Vendor Extensions and
   DHCP Options" subregistry of [BOOTP].  The Reference field includes
   the document that registers or specifies the option.

                    +=====+===============+===========+
                    | Tag | Name          | Reference |
                    +=====+===============+===========+
                    | 162 | OPTION_V4_DNR | RFC 9445  |
                    +-----+---------------+-----------+

                        Table 6: Initial Content of
                      DHCPv4 Options Permitted in the
                      RADIUS DHCPv4-Options Attribute
                                  Registry


8.4.3.  Guidelines for the Designated Experts

   It is suggested that multiple designated experts be appointed for
   registry change requests.

   Criteria that should be applied by the designated experts include
   determining whether the proposed registration duplicates existing
   entries and whether the registration description is clear and fits
   the purpose of this registry.

   Registration requests are to be sent to <radius-dhcp-review@ietf.org>
   and are evaluated within a three-week review period on the advice of
   one or more designated experts.  Within the review period, the
   designated experts will either approve or deny the registration
   request, communicating this decision to the review list and IANA.
   Denials should include an explanation and, if applicable, suggestions
   as to how to make the request successful.

9.  References

9.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC2865]  Rigney, C., Willens, S., Rubens, A., and W. Simpson,
              "Remote Authentication Dial In User Service (RADIUS)",
              RFC 2865, DOI 10.17487/RFC2865, June 2000,
              <https://www.rfc-editor.org/info/rfc2865>.

   [RFC3396]  Lemon, T. and S. Cheshire, "Encoding Long Options in the
              Dynamic Host Configuration Protocol (DHCPv4)", RFC 3396,
              DOI 10.17487/RFC3396, November 2002,
              <https://www.rfc-editor.org/info/rfc3396>.

   [RFC4014]  Droms, R. and J. Schnizlein, "Remote Authentication Dial-
              In User Service (RADIUS) Attributes Suboption for the
              Dynamic Host Configuration Protocol (DHCP) Relay Agent
              Information Option", RFC 4014, DOI 10.17487/RFC4014,
              February 2005, <https://www.rfc-editor.org/info/rfc4014>.

   [RFC6158]  DeKok, A., Ed. and G. Weber, "RADIUS Design Guidelines",
              BCP 158, RFC 6158, DOI 10.17487/RFC6158, March 2011,
              <https://www.rfc-editor.org/info/rfc6158>.

   [RFC6929]  DeKok, A. and A. Lior, "Remote Authentication Dial In User
              Service (RADIUS) Protocol Extensions", RFC 6929,
              DOI 10.17487/RFC6929, April 2013,
              <https://www.rfc-editor.org/info/rfc6929>.

   [RFC8044]  DeKok, A., "Data Types in RADIUS", RFC 8044,
              DOI 10.17487/RFC8044, January 2017,
              <https://www.rfc-editor.org/info/rfc8044>.

   [RFC8126]  Cotton, M., Leiba, B., and T. Narten, "Guidelines for
              Writing an IANA Considerations Section in RFCs", BCP 26,
              RFC 8126, DOI 10.17487/RFC8126, June 2017,
              <https://www.rfc-editor.org/info/rfc8126>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8415]  Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A.,
              Richardson, M., Jiang, S., Lemon, T., and T. Winters,
              "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)",
              RFC 8415, DOI 10.17487/RFC8415, November 2018,
              <https://www.rfc-editor.org/info/rfc8415>.

9.2.  Informative References

   [BOOTP]    IANA, "Dynamic Host Configuration Protocol (DHCP) and
              Bootstrap Protocol (BOOTP) Parameters",
              <https://www.iana.org/assignments/bootp-dhcp-parameters>.

   [DHCPv6]   IANA, "Dynamic Host Configuration Protocol for IPv6
              (DHCPv6)",
              <https://www.iana.org/assignments/dhcpv6-parameters>.

   [DNR]      Boucadair, M., Ed., Reddy.K, T., Ed., Wing, D., Cook, N.,
              and T. Jensen, "DHCP and Router Advertisement Options for
              the Discovery of Network-designated Resolvers (DNR)", Work
              in Progress, Internet-Draft, draft-ietf-add-dnr-16, 27
              April 2023, <https://datatracker.ietf.org/doc/html/draft-
              ietf-add-dnr-16>.

   [RADIUS-Types]
              IANA, "RADIUS Types",
              <http://www.iana.org/assignments/radius-types>.

   [RFC2131]  Droms, R., "Dynamic Host Configuration Protocol",
              RFC 2131, DOI 10.17487/RFC2131, March 1997,
              <https://www.rfc-editor.org/info/rfc2131>.

   [RFC2132]  Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor
              Extensions", RFC 2132, DOI 10.17487/RFC2132, March 1997,
              <https://www.rfc-editor.org/info/rfc2132>.

   [RFC2868]  Zorn, G., Leifer, D., Rubens, A., Shriver, J., Holdrege,
              M., and I. Goyret, "RADIUS Attributes for Tunnel Protocol
              Support", RFC 2868, DOI 10.17487/RFC2868, June 2000,
              <https://www.rfc-editor.org/info/rfc2868>.

   [RFC2869]  Rigney, C., Willats, W., and P. Calhoun, "RADIUS
              Extensions", RFC 2869, DOI 10.17487/RFC2869, June 2000,
              <https://www.rfc-editor.org/info/rfc2869>.

   [RFC3162]  Aboba, B., Zorn, G., and D. Mitton, "RADIUS and IPv6",
              RFC 3162, DOI 10.17487/RFC3162, August 2001,
              <https://www.rfc-editor.org/info/rfc3162>.

   [RFC4861]  Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
              "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
              DOI 10.17487/RFC4861, September 2007,
              <https://www.rfc-editor.org/info/rfc4861>.

   [RFC5176]  Chiba, M., Dommety, G., Eklund, M., Mitton, D., and B.
              Aboba, "Dynamic Authorization Extensions to Remote
              Authentication Dial In User Service (RADIUS)", RFC 5176,
              DOI 10.17487/RFC5176, January 2008,
              <https://www.rfc-editor.org/info/rfc5176>.

   [RFC6911]  Dec, W., Ed., Sarikaya, B., Zorn, G., Ed., Miles, D., and
              B. Lourdelet, "RADIUS Attributes for IPv6 Access
              Networks", RFC 6911, DOI 10.17487/RFC6911, April 2013,
              <https://www.rfc-editor.org/info/rfc6911>.

   [RFC6977]  Boucadair, M. and X. Pougnard, "Triggering DHCPv6
              Reconfiguration from Relay Agents", RFC 6977,
              DOI 10.17487/RFC6977, July 2013,
              <https://www.rfc-editor.org/info/rfc6977>.

   [RFC7037]  Yeh, L. and M. Boucadair, "RADIUS Option for the DHCPv6
              Relay Agent", RFC 7037, DOI 10.17487/RFC7037, October
              2013, <https://www.rfc-editor.org/info/rfc7037>.

   [RFC7227]  Hankins, D., Mrugalski, T., Siodelski, M., Jiang, S., and
              S. Krishnan, "Guidelines for Creating New DHCPv6 Options",
              BCP 187, RFC 7227, DOI 10.17487/RFC7227, May 2014,
              <https://www.rfc-editor.org/info/rfc7227>.

   [RFC7499]  Perez-Mendez, A., Ed., Marin-Lopez, R., Pereniguez-Garcia,
              F., Lopez-Millan, G., Lopez, D., and A. DeKok, "Support of
              Fragmentation of RADIUS Packets", RFC 7499,
              DOI 10.17487/RFC7499, April 2015,
              <https://www.rfc-editor.org/info/rfc7499>.

   [RFC7858]  Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D.,
              and P. Hoffman, "Specification for DNS over Transport
              Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May
              2016, <https://www.rfc-editor.org/info/rfc7858>.

   [RFC7930]  Hartman, S., "Larger Packets for RADIUS over TCP",
              RFC 7930, DOI 10.17487/RFC7930, August 2016,
              <https://www.rfc-editor.org/info/rfc7930>.

   [RFC8484]  Hoffman, P. and P. McManus, "DNS Queries over HTTPS
              (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018,
              <https://www.rfc-editor.org/info/rfc8484>.

   [RFC8499]  Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS
              Terminology", BCP 219, RFC 8499, DOI 10.17487/RFC8499,
              January 2019, <https://www.rfc-editor.org/info/rfc8499>.

   [RFC9250]  Huitema, C., Dickinson, S., and A. Mankin, "DNS over
              Dedicated QUIC Connections", RFC 9250,
              DOI 10.17487/RFC9250, May 2022,
              <https://www.rfc-editor.org/info/rfc9250>.

Acknowledgements

   Thanks to Christian Jacquenet, Neil Cook, Joe Clarke, Qin Wu, Dirk
   von-Hugo, Tom Petch, and Chongfeng Xie for the review and
   suggestions.

   Thanks to Ben Schwartz and Bernie Volz for the comments.

   Thanks to Rob Wilton for the careful AD review.

   Thanks to Ralf Weber for the dnsdir reviews, Robert Sparks for the
   genart review, and Tatuya Jinmei for the intdir review.

   Thanks to Éric Vyncke, Paul Wouters, and Warren Kumari for the IESG
   review.

Authors' Addresses

   Mohamed Boucadair
   Orange
   35000 Rennes
   France
   Email: mohamed.boucadair@orange.com


   Tirumaleswar Reddy.K
   Nokia
   India
   Email: kondtir@gmail.com


   Alan DeKok
   FreeRADIUS
   Email: aland@freeradius.org