| rfc9445.original | rfc9445.txt | |||
|---|---|---|---|---|
| opsawg M. Boucadair | Internet Engineering Task Force (IETF) M. Boucadair | |||
| Internet-Draft Orange | Request for Comments: 9445 Orange | |||
| Updates: 4014 (if approved) T. Reddy | Updates: 4014 T. Reddy.K | |||
| Intended status: Standards Track Nokia | Category: Standards Track Nokia | |||
| Expires: 27 September 2023 A. DeKok | ISSN: 2070-1721 A. DeKok | |||
| FreeRADIUS | FreeRADIUS | |||
| 26 March 2023 | August 2023 | |||
| RADIUS Extensions for DHCP Configured Services | RADIUS Extensions for DHCP-Configured Services | |||
| draft-ietf-opsawg-add-encrypted-dns-12 | ||||
| Abstract | Abstract | |||
| This document specifies two new Remote Authentication Dial-In User | This document specifies two new Remote Authentication Dial-In User | |||
| Service (RADIUS) attributes that carry DHCP options. The | Service (RADIUS) attributes that carry DHCP options. The | |||
| specification is generic and can be applicable to any service that | specification is generic and can be applicable to any service that | |||
| relies upon DHCP. Both DHCPv4 and DHCPv6 configured services are | relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are | |||
| covered. | covered. | |||
| Also, this document updates RFC 4014 by relaxing a constraint on | Also, this document updates RFC 4014 by relaxing a constraint on | |||
| permitted RADIUS Attributes in the RADIUS Attributes DHCP suboption. | permitted RADIUS attributes in the RADIUS Attributes DHCP suboption. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
| provisions of BCP 78 and BCP 79. | ||||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
| Internet Standards is available in Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 27 September 2023. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9445. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2023 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | ||||
| Please review these documents carefully, as they describe your rights | carefully, as they describe your rights and restrictions with respect | |||
| and restrictions with respect to this document. Code Components | to this document. Code Components extracted from this document must | |||
| extracted from this document must include Revised BSD License text as | include Revised BSD License text as described in Section 4.e of the | |||
| described in Section 4.e of the Trust Legal Provisions and are | Trust Legal Provisions and are provided without warranty as described | |||
| provided without warranty as described in the Revised BSD License. | in the Revised BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology | |||
| 3. DHCP Options RADIUS Attributes . . . . . . . . . . . . . . . 4 | 3. RADIUS DHCP Options Attributes | |||
| 3.1. DHCPv6-Options Attribute . . . . . . . . . . . . . . . . 5 | 3.1. DHCPv6-Options Attribute | |||
| 3.2. DHCPv4-Options Attribute . . . . . . . . . . . . . . . . 6 | 3.2. DHCPv4-Options Attribute | |||
| 4. Passing DHCP Options RADIUS Attributes by DHCP Relay Agents to | 4. Passing RADIUS DHCP Options Attributes by DHCP Relay Agents to | |||
| DHCP Servers . . . . . . . . . . . . . . . . . . . . . . 7 | DHCP Servers | |||
| 4.1. Context . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 4.1. Context | |||
| 4.2. Updates to RFC 4014 . . . . . . . . . . . . . . . . . . . 7 | 4.2. Updates to RFC 4014 | |||
| 4.2.1. Section 3 of RFC 4014 . . . . . . . . . . . . . . . . 7 | 4.2.1. Section 3 of RFC 4014 | |||
| 4.2.2. Section 4 of RFC 4014 . . . . . . . . . . . . . . . . 8 | 4.2.2. Section 4 of RFC 4014 | |||
| 5. An Example: Applicability to Encrypted DNS Provisioning . . . 8 | 5. An Example: Applicability to Encrypted DNS Provisioning | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | 6. Security Considerations | |||
| 7. Table of Attributes . . . . . . . . . . . . . . . . . . . . . 11 | 7. Table of Attributes | |||
| 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 | 8. IANA Considerations | |||
| 8.1. New RADIUS Attributes . . . . . . . . . . . . . . . . . . 12 | 8.1. New RADIUS Attributes | |||
| 8.2. New RADIUS Attribute Permitted in DHCPv6 RADIUS Option . 12 | 8.2. New RADIUS Attribute Permitted in DHCPv6 RADIUS Option | |||
| 8.3. RADIUS Attributes Permitted in RADIUS Attributes DHCP | 8.3. RADIUS Attributes Permitted in RADIUS Attributes DHCP | |||
| Sub-option . . . . . . . . . . . . . . . . . . . . . . . 12 | Suboption | |||
| 8.4. DHCP Options Permitted in the RADIUS DHCP*-Options | 8.4. DHCP Options Permitted in the RADIUS DHCP*-Options | |||
| Attribute . . . . . . . . . . . . . . . . . . . . . . . . 13 | Attributes | |||
| 8.4.1. DHCPv6 . . . . . . . . . . . . . . . . . . . . . . . 13 | 8.4.1. DHCPv6 | |||
| 8.4.2. DHCPv4 . . . . . . . . . . . . . . . . . . . . . . . 14 | 8.4.2. DHCPv4 | |||
| 8.4.3. Guidelines for the Designated Experts . . . . . . . . 14 | 8.4.3. Guidelines for the Designated Experts | |||
| 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15 | 9. References | |||
| 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 15 | 9.1. Normative References | |||
| 10.1. Normative References . . . . . . . . . . . . . . . . . . 15 | 9.2. Informative References | |||
| 10.2. Informative References . . . . . . . . . . . . . . . . . 16 | Acknowledgements | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18 | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| In the context of broadband services, Internet Service Providers | In the context of broadband services, Internet Service Providers | |||
| (ISPs) usually provide DNS resolvers to their customers. To that | (ISPs) usually provide DNS resolvers to their customers. To that | |||
| aim, ISPs deploy dedicated mechanisms (e.g., DHCP [RFC2132] | aim, ISPs deploy dedicated mechanisms (e.g., DHCP [RFC2132] [RFC8415] | |||
| [RFC8415], IPv6 Router Advertisement [RFC4861]) to advertise a list | and IPv6 Router Advertisement [RFC4861]) to advertise a list of DNS | |||
| of DNS recursive servers to their customers. Typically, the | recursive servers to their customers. Typically, the information | |||
| information used to populate DHCP messages and/or IPv6 Router | used to populate DHCP messages and/or IPv6 Router Advertisements | |||
| Advertisements relies upon specific Remote Authentication Dial-In | relies upon specific Remote Authentication Dial-In User Service | |||
| User Service (RADIUS) [RFC2865] attributes, such as the DNS-Server- | (RADIUS) [RFC2865] attributes, such as the DNS-Server-IPv6-Address | |||
| IPv6-Address Attribute specified in [RFC6911]. | Attribute specified in [RFC6911]. | |||
| With the advent of encrypted DNS (e.g., DNS-over-HTTPS (DoH) | With the advent of encrypted DNS (e.g., DNS over HTTPS (DoH) | |||
| [RFC8484], DNS-over-TLS (DoT) [RFC7858], or DNS-over-QUIC (DoQ) | [RFC8484], DNS over TLS (DoT) [RFC7858], or DNS over QUIC (DoQ) | |||
| [RFC9250]), additional means are required to provision hosts with | [RFC9250]), additional means are required to provision hosts with | |||
| network-designated encrypted DNS. To fill that void, | network-designated encrypted DNS. To fill that void, [DNR] leverages | |||
| [I-D.ietf-add-dnr] leverages existing protocols such as DHCP to | existing protocols such as DHCP to provide hosts with the required | |||
| provide hosts with the required information to connect to an | information to connect to an encrypted DNS resolver. However, there | |||
| encrypted DNS resolver. However, there are no RADIUS attributes that | are no RADIUS attributes that can be used to populate the discovery | |||
| can be used to populate the discovery messages discussed in | messages discussed in [DNR]. The same concern is likely to be | |||
| [I-D.ietf-add-dnr]. The same concern is likely to be encountered for | encountered for future services that are configured using DHCP. | |||
| future services that are configured using DHCP. | ||||
| This document specifies two new RADIUS attributes: DHCPv6-Options | This document specifies two new RADIUS attributes: DHCPv6-Options | |||
| (Section 3.1) and DHCPv4-Options (Section 3.2) Attributes. These | (Section 3.1) and DHCPv4-Options (Section 3.2). These attributes can | |||
| attributes can include DHCP options that are listed under the IANA | include DHCP options that are listed in the "DHCPv6 Options Permitted | |||
| registries that are created in Sections 8.4.1 and 8.4.2. These two | in the RADIUS DHCPv6-Options Attribute" registry (Section 8.4.1) and | |||
| attributes are specified in order to accommodate both IPv4 and IPv6 | the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute" | |||
| deployment contexts while taking into account the constraints in | registry (Section 8.4.2). These two attributes are specified in | |||
| Section 3.4 of [RFC6158]. | order to accommodate both IPv4 and IPv6 deployment contexts while | |||
| taking into account the constraints in Section 3.4 of [RFC6158]. | ||||
| The mechanism specified in this document is a generic mechanism and | The mechanism specified in this document is a generic mechanism and | |||
| might be employed in network scenarios where the DHCP server and the | might be employed in network scenarios where the DHCP server and the | |||
| RADIUS client are located in the same device. The new attributes can | RADIUS client are located in the same device. The new attributes can | |||
| also be used in deployments that rely upon the mechanisms defined in | also be used in deployments that rely upon the mechanisms defined in | |||
| [RFC4014] or [RFC7037], which allow a DHCP relay agent that is | [RFC4014] or [RFC7037], which allow a DHCP relay agent that is | |||
| collocated with a RADIUS client to pass attributes obtained from a | collocated with a RADIUS client to pass attributes obtained from a | |||
| RADIUS server to a DHCP server. However, an update to [RFC4014] is | RADIUS server to a DHCP server. However, an update to [RFC4014] is | |||
| required so that a DHCP relay agent can pass the DHCPv4-Options | required so that a DHCP relay agent can pass the DHCPv4-Options | |||
| Attribute obtained from a RADIUS server to a DHCP server (Section 4). | Attribute obtained from a RADIUS server to a DHCP server (Section 4). | |||
| DHCP options that are included in the new RADIUS attributes can be | DHCP options that are included in the new RADIUS attributes can be | |||
| controlled by a deployment specific policy. Discussing such a policy | controlled by a deployment-specific policy. Discussing such a policy | |||
| is out of scope. | is out of scope. | |||
| This document adheres to [RFC8044] for defining the new attributes. | This document adheres to [RFC8044] for defining the new attributes. | |||
| A sample deployment usage of the DHCPv6-Options and DHCPv4-Options | A sample deployment usage of the RADIUS DHCPv6-Options and | |||
| RADIUS attributes is described in Section 5. | DHCPv4-Options Attributes is described in Section 5. | |||
| 2. Terminology | 2. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in | |||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| This document makes use of the terms defined in [RFC2865], [RFC8415], | This document makes use of the terms defined in [RFC2865], [RFC8415], | |||
| and [RFC8499]. The following additional terms are used: | and [RFC8499]. The following additional terms are used: | |||
| DHCP: refers to both DHCPv4 [RFC2132] and DHCPv6 [RFC8415]. | DHCP: refers to both DHCPv4 [RFC2132] and DHCPv6 [RFC8415]. | |||
| Encrypted DNS: refers to a scheme where DNS exchanges are | Encrypted DNS: refers to a scheme where DNS exchanges are | |||
| transported over an encrypted channel. Examples of encrypted DNS | transported over an encrypted channel. Examples of encrypted DNS | |||
| are DoT, DoH, and DoQ. | are DoT, DoH, and DoQ. | |||
| Encrypted DNS resolver: refers to a resolver (Section 6 of | Encrypted DNS resolver: refers to a resolver (Section 6 of | |||
| [RFC8499]) that supports encrypted DNS. | [RFC8499]) that supports encrypted DNS. | |||
| DHCP*-Options: refers to DHCPv4-Options and DHCPv6-Options | DHCP*-Options: refers to the DHCPv4-Options and DHCPv6-Options | |||
| Attributes (Section 3). | Attributes (Section 3). | |||
| 3. DHCP Options RADIUS Attributes | 3. RADIUS DHCP Options Attributes | |||
| This section specifies two new RADIUS attributes for RADIUS clients | This section specifies two new RADIUS attributes for RADIUS clients | |||
| and servers to exchange DHCP-encoded data. This data is then used to | and servers to exchange DHCP-encoded data. This data is then used to | |||
| feed the DHCP procedure between a DHCP client and a DHCP server. | feed the DHCP procedure between a DHCP client and a DHCP server. | |||
| Both DHCPv4-Options and DHCPv6-Options Attributes use the "Long | Both the DHCPv4-Options and DHCPv6-Options Attributes use the "Long | |||
| Extended Type" format (Section 2.2 of [RFC6929]). The description of | Extended Type" format (Section 2.2 of [RFC6929]). The description of | |||
| the fields is provided in Sections 3.1 and 3.2. | the fields is provided in Sections 3.1 and 3.2. | |||
| These attributes use the "Long Extended Type" format in order to | These attributes use the "Long Extended Type" format in order to | |||
| permit the transport of attributes encapsulating more than 253 octets | permit the transport of attributes encapsulating more than 253 octets | |||
| of data. DHCP options that can be included in the DHCP*-Options | of data. DHCP options that can be included in the RADIUS DHCP*- | |||
| RADIUS attributes are limited by the maximum packet size of 4096 | Options Attributes are limited by the maximum packet size of 4096 | |||
| bytes (Section 3 of [RFC2865]). In order to accommodate deployments | bytes (Section 3 of [RFC2865]). In order to accommodate deployments | |||
| with large DHCP options, RADIUS implementations are RECOMMENDED to | with large DHCP options, RADIUS implementations are RECOMMENDED to | |||
| support a packet size up to 65535 bytes. Such a recommendation can | support a packet size up to 65535 bytes. Such a recommendation can | |||
| be met if RADIUS implementations support a mechanism that relaxes the | be met if RADIUS implementations support a mechanism that relaxes the | |||
| 4096 bytes limit (e.g., [RFC7499] or [RFC7930]). | limit of 4096 bytes (e.g., the mechanisms described in [RFC7499] or | |||
| [RFC7930]). | ||||
| The value fields of DHCP*-Options Attributes are encoded in clear and | The Value fields of the DHCP*-Options Attributes are encoded in the | |||
| not encrypted as, for example, Tunnel-Password Attribute [RFC2868]. | clear and not encrypted like, for example, the Tunnel-Password | |||
| Attribute [RFC2868]. | ||||
| RADIUS implementations may support a configuration parameter to | RADIUS implementations may support a configuration parameter to | |||
| control the DHCP options that can be included in a DHCP*-Options | control the DHCP options that can be included in a RADIUS DHCP*- | |||
| RADIUS attribute. Likewise, DHCP server implementations may support | Options Attribute. Likewise, DHCP server implementations may support | |||
| a configuration parameter to control the permitted DHCP options in a | a configuration parameter to control the permitted DHCP options in a | |||
| DHCP*-Options RADIUS attribute. Absent explicit configuration, | RADIUS DHCP*-Options Attribute. Absent explicit configuration, | |||
| RADIUS implementations and DHCP server implementations SHOULD ignore | RADIUS implementations and DHCP server implementations SHOULD ignore | |||
| non-permitted DHCP options received in a DHCP*-Options RADIUS | non-permitted DHCP options received in a RADIUS DHCP*-Options | |||
| attribute. | Attribute. | |||
| RADIUS supplied data is specific configuration data that is returned | RADIUS-supplied data is specific configuration data that is returned | |||
| as a function of authentication and authorization checks. As such, | as a function of authentication and authorization checks. As such, | |||
| absent any explicit configuration on the DHCP server, RADIUS supplied | absent any explicit configuration on the DHCP server, RADIUS-supplied | |||
| data by means of DHCP*-Options Attributes take precedence over any | data by means of the DHCP*-Options Attributes take precedence over | |||
| local configuration. | any local configuration. | |||
| These attributes are defined with globally unique names. The naming | These attributes are defined with globally unique names. The naming | |||
| of the attributes follows the guidelines in Section 2.7.1 of | of the attributes follows the guidelines in Section 2.7.1 of | |||
| [RFC6929]. Invalid attributes are handled as per Section 2.8 of | [RFC6929]. Invalid attributes are handled as per Section 2.8 of | |||
| [RFC6929]. | [RFC6929]. | |||
| 3.1. DHCPv6-Options Attribute | 3.1. DHCPv6-Options Attribute | |||
| This attribute is of type "string" as defined in Section 3.5 of | This attribute is of type "string" as defined in Section 3.5 of | |||
| [RFC8044]. | [RFC8044]. | |||
| skipping to change at page 5, line 38 ¶ | skipping to change at line 224 ¶ | |||
| The DHCPv6-Options Attribute MAY appear in a RADIUS Accounting- | The DHCPv6-Options Attribute MAY appear in a RADIUS Accounting- | |||
| Request packet. | Request packet. | |||
| The DHCPv6-Options Attribute MUST NOT appear in any other RADIUS | The DHCPv6-Options Attribute MUST NOT appear in any other RADIUS | |||
| packet. | packet. | |||
| The DHCPv6-Options Attribute is structured as follows: | The DHCPv6-Options Attribute is structured as follows: | |||
| Type | Type | |||
| 245 | 245 | |||
| Length | Length | |||
| This field indicates the total length, in octets, of all fields of | This field indicates the total length, in octets, of all fields of | |||
| this attribute, including the Type, Length, Extended-Type, and | this attribute, including the Type, Length, Extended-Type, and | |||
| "Value". | Value fields. | |||
| Extended-Type | Extended-Type | |||
| 3 (see Section 8.1) | ||||
| TBA1 (see Section 8.1). | ||||
| Value | Value | |||
| This field contains a list of DHCPv6 options (Section 21 of | This field contains a list of DHCPv6 options (Section 21 of | |||
| [RFC8415]). Multiple instances of the same DHCPv6 option MAY be | [RFC8415]). Multiple instances of the same DHCPv6 option MAY be | |||
| included. If an option appears multiple times, each instance is | included. If an option appears multiple times, each instance is | |||
| considered separate and the data areas of the options MUST NOT be | considered separate, and the data areas of the options MUST NOT be | |||
| concatenated or otherwise combined. Consistent with Section 17 of | concatenated or otherwise combined. Consistent with Section 17 of | |||
| [RFC7227], this document does not impose any option order when | [RFC7227], this document does not impose any option order when | |||
| multiple options are present. | multiple options are present. | |||
| Permitted DHCPv6 options in the DHCPv6-Options Attribute are | The permitted DHCPv6 options are listed in the "DHCPv6 Options | |||
| maintained by IANA in the registry created in Section 8.4.1. | Permitted in the RADIUS DHCPv6-Options Attribute" registry | |||
| (Section 8.4.1). | ||||
| The DHCPv6-Options Attribute is associated with the following | The DHCPv6-Options Attribute is associated with the following | |||
| identifier: 245.TBA1. | identifier: 245.3. | |||
| 3.2. DHCPv4-Options Attribute | 3.2. DHCPv4-Options Attribute | |||
| This attribute is of type "string" as defined in Section 3.5 of | This attribute is of type "string" as defined in Section 3.5 of | |||
| [RFC8044]. | [RFC8044]. | |||
| The DHCPv4-Options Attribute MAY appear in a RADIUS Access-Accept | The DHCPv4-Options Attribute MAY appear in a RADIUS Access-Accept | |||
| packet. It MAY also appear in a RADIUS Access-Request packet as a | packet. It MAY also appear in a RADIUS Access-Request packet as a | |||
| hint to the RADIUS server to indicate a preference. However, the | hint to the RADIUS server to indicate a preference. However, the | |||
| server is not required to honor such a preference. | server is not required to honor such a preference. | |||
| skipping to change at page 6, line 40 ¶ | skipping to change at line 272 ¶ | |||
| The DHCPv4-Options Attribute MAY appear in a RADIUS Accounting- | The DHCPv4-Options Attribute MAY appear in a RADIUS Accounting- | |||
| Request packet. | Request packet. | |||
| The DHCPv4-Options Attribute MUST NOT appear in any other RADIUS | The DHCPv4-Options Attribute MUST NOT appear in any other RADIUS | |||
| packet. | packet. | |||
| The DHCPv4-Options Attribute is structured as follows: | The DHCPv4-Options Attribute is structured as follows: | |||
| Type | Type | |||
| 245 | 245 | |||
| Length | Length | |||
| This field indicates the total length, in octets, of all fields of | This field indicates the total length, in octets, of all fields of | |||
| this attribute, including the Type, Length, Extended-Type, and | this attribute, including the Type, Length, Extended-Type, and | |||
| "Value". | Value fields. | |||
| Extended-Type | Extended-Type | |||
| TBA2 (see Section 8.1). | 4 (see Section 8.1) | |||
| Value | Value | |||
| This field contains a list of DHCPv4 options. Multiple instances | This field contains a list of DHCPv4 options. Multiple instances | |||
| of the same DHCPv4 option MAY be included, especially for | of the same DHCPv4 option MAY be included, especially for | |||
| concatenation-requiring options that exceed the maximum DHCPv4 | concatenation-requiring options that exceed the maximum DHCPv4 | |||
| option size of 255 octets. The mechanism specified in [RFC3396] | option size of 255 octets. The mechanism specified in [RFC3396] | |||
| MUST be used for splitting and concatenating the instances of a | MUST be used for splitting and concatenating the instances of a | |||
| concatenation-requiring option. | concatenation-requiring option. | |||
| Permitted DHCPv4 options in the DHCPv4-Options Attribute are | The permitted DHCPv4 options are listed in the "DHCP Options | |||
| maintained by IANA in the registry created in Section 8.4.2. | Permitted in the RADIUS DHCPv4-Options Attribute" registry | |||
| (Section 8.4.2). | ||||
| The DHCPv4-Options Attribute is associated with the following | The DHCPv4-Options Attribute is associated with the following | |||
| identifier: 245.TBA2. | identifier: 245.4. | |||
| 4. Passing DHCP Options RADIUS Attributes by DHCP Relay Agents to DHCP | 4. Passing RADIUS DHCP Options Attributes by DHCP Relay Agents to DHCP | |||
| Servers | Servers | |||
| 4.1. Context | 4.1. Context | |||
| The RADIUS Attributes suboption [RFC4014] enables a DHCPv4 relay | The RADIUS Attributes DHCP suboption [RFC4014] enables a DHCPv4 relay | |||
| agent to pass identification and authorization attributes received | agent to pass identification and authorization attributes received | |||
| during RADIUS authentication to a DHCPv4 server. However, [RFC4014] | during RADIUS authentication to a DHCPv4 server. However, [RFC4014] | |||
| defines a frozen set of RADIUS attributes that can be included in | defines a frozen set of RADIUS attributes that can be included in | |||
| such a suboption. This limitation is suboptimal in contexts where | such a suboption. This limitation is suboptimal in contexts where | |||
| new services are deployed (e.g., support of encrypted DNS | new services are deployed (e.g., support of encrypted DNS [DNR]). | |||
| [I-D.ietf-add-dnr]). | ||||
| Section 4.2 updates [RFC4014] by relaxing that constraint and | Section 4.2 updates [RFC4014] by relaxing that constraint and | |||
| allowing to tag additional RADIUS attributes as permitted in the | allowing additional RADIUS attributes to be tagged as permitted in | |||
| RADIUS Attributes DHCP suboption. Section 8.3 creates a new IANA | the RADIUS Attributes DHCP suboption. The permitted attributes are | |||
| registry to maintain the set of permitted attributes in the RADIUS | registered in the new "RADIUS Attributes Permitted in RADIUS | |||
| Attributes DHCP suboption. | Attributes DHCP Suboption" registry (Section 8.3). | |||
| 4.2. Updates to RFC 4014 | 4.2. Updates to RFC 4014 | |||
| 4.2.1. Section 3 of RFC 4014 | 4.2.1. Section 3 of RFC 4014 | |||
| This document updates Section 3 of [RFC4014] as follows: | This document updates Section 3 of [RFC4014] as follows: | |||
| OLD: | OLD: | |||
| To avoid dependencies between the address allocation and other | | To avoid dependencies between the address allocation and other | |||
| state information between the RADIUS server and the DHCP server, | | state information between the RADIUS server and the DHCP server, | |||
| the DHCP relay agent SHOULD include only the attributes in the | | the DHCP relay agent SHOULD include only the attributes in the | |||
| table below in an instance of the RADIUS Attributes suboption. | | table below in an instance of the RADIUS Attributes suboption. | |||
| The table, based on the analysis in RFC 3580 [8], lists attributes | | The table, based on the analysis in RFC 3580 [8], lists attributes | |||
| that MAY be included: | | that MAY be included: | |||
| | | ||||
| # Attribute | | # Attribute | |||
| --- --------- | | --- --------- | |||
| 1 User-Name (RFC 2865 [3]) | | 1 User-Name (RFC 2865 [3]) | |||
| 6 Service-Type (RFC 2865) | | 6 Service-Type (RFC 2865) | |||
| 26 Vendor-Specific (RFC 2865) | | 26 Vendor-Specific (RFC 2865) | |||
| 27 Session-Timeout (RFC 2865) | | 27 Session-Timeout (RFC 2865) | |||
| 88 Framed-Pool (RFC 2869) | | 88 Framed-Pool (RFC 2869) | |||
| 100 Framed-IPv6-Pool (RFC 3162 [7]) | | 100 Framed-IPv6-Pool (RFC 3162 [7]) | |||
| NEW: | NEW: | |||
| To avoid dependencies between the address allocation and other | ||||
| state information between the RADIUS server and the DHCP server, | | To avoid dependencies between the address allocation and other | |||
| the DHCP relay agent SHOULD include only the attributes in the | | state information between the RADIUS server and the DHCP server, | |||
| IANA-maintained registry (Section 8.3 of [This-Document]) in an | | the DHCP relay agent SHOULD only include the attributes in the | |||
| instance of the RADIUS Attributes suboption. The DHCP relay agent | | "RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption" | |||
| may support a configuration parameter to control the attributes in | | registry (Section 8.3 of [RFC9445]) in an instance of the RADIUS | |||
| a RADIUS Attributes suboption. | | Attributes DHCP suboption. The DHCP relay agent may support a | |||
| | configuration parameter to control the attributes in a RADIUS | ||||
| | Attributes DHCP suboption. | ||||
| 4.2.2. Section 4 of RFC 4014 | 4.2.2. Section 4 of RFC 4014 | |||
| This document updates Section 4 of [RFC4014] as follows: | This document updates Section 4 of [RFC4014] as follows: | |||
| OLD: | OLD: | |||
| If the relay agent relays RADIUS attributes not included in the | ||||
| table in Section 4, the DHCP server SHOULD ignore them. | | If the relay agent relays RADIUS attributes not included in the | |||
| | table in Section 4, the DHCP server SHOULD ignore them. | ||||
| NEW: | NEW: | |||
| If the relay agent relays RADIUS attributes not included in the | ||||
| IANA-maintained registry (Section 8.3 of [This-Document]), and | | If the relay agent relays RADIUS attributes not included in the | |||
| absent explicit configuration, the DHCP server SHOULD ignore them. | | "RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption" | |||
| | registry (Section 8.3 of [RFC9445]) and explicit configuration is | ||||
| | absent, the DHCP server SHOULD ignore them. | ||||
| 5. An Example: Applicability to Encrypted DNS Provisioning | 5. An Example: Applicability to Encrypted DNS Provisioning | |||
| Typical deployment scenarios are similar to those described, for | Typical deployment scenarios are similar to those described, for | |||
| instance, in Section 2 of [RFC6911]. For illustration purposes, | instance, in Section 2 of [RFC6911]. For illustration purposes, | |||
| Figure 1 shows an example where a Customer Premises Equipment (CPE) | Figure 1 shows an example where a Customer Premises Equipment (CPE) | |||
| is provided with an encrypted DNS resolver. This example assumes | is provided with an encrypted DNS resolver. This example assumes | |||
| that the Network Access Server (NAS) embeds both RADIUS client and | that the Network Access Server (NAS) embeds both RADIUS client and | |||
| DHCPv6 server capabilities. | DHCPv6 server capabilities. | |||
| +-------------+ +-------------+ +-------+ | +-------------+ +-------------+ +-------+ | |||
| | CPE | | NAS | | AAA | | | CPE | | NAS | | AAA | | |||
| |DHCPv6 client| |DHCPv6 server| |Server | | |DHCPv6 Client| |DHCPv6 Server| |Server | | |||
| | | |RADIUS client| | | | | | |RADIUS Client| | | | |||
| +------+------+ +------+------+ +---+---+ | +------+------+ +------+------+ +---+---+ | |||
| | | | | | | | | |||
| o-----DHCPv6 Solicit----->| | | o-----DHCPv6 Solicit----->| | | |||
| | o----Access-Request ---->| | | o----Access-Request ---->| | |||
| | | | | | | | | |||
| | |<----Access-Accept------o | | |<----Access-Accept------o | |||
| | | DHCPv6-Options | | | | DHCPv6-Options | | |||
| |<----DHCPv6 Advertise----o (OPTION_V6_DNR) | | |<----DHCPv6 Advertise----o (OPTION_V6_DNR) | | |||
| | (OPTION_V6_DNR) | | | | (OPTION_V6_DNR) | | | |||
| | | | | | | | | |||
| skipping to change at page 9, line 35 ¶ | skipping to change at line 405 ¶ | |||
| DHCPv6 RADIUS | DHCPv6 RADIUS | |||
| Figure 1: An Example of RADIUS IPv6 Encrypted DNS Exchange | Figure 1: An Example of RADIUS IPv6 Encrypted DNS Exchange | |||
| Upon receipt of the DHCPv6 Solicit message from a CPE, the NAS sends | Upon receipt of the DHCPv6 Solicit message from a CPE, the NAS sends | |||
| a RADIUS Access-Request message to the Authentication, Authorization, | a RADIUS Access-Request message to the Authentication, Authorization, | |||
| and Accounting (AAA) server. Once the AAA server receives the | and Accounting (AAA) server. Once the AAA server receives the | |||
| request, it replies with an Access-Accept message (possibly after | request, it replies with an Access-Accept message (possibly after | |||
| having sent a RADIUS Access-Challenge message and assuming the CPE is | having sent a RADIUS Access-Challenge message and assuming the CPE is | |||
| entitled to connect to the network) that carries a list of parameters | entitled to connect to the network) that carries a list of parameters | |||
| to be used for this session, and which include the encrypted DNS | to be used for this session, which includes the encrypted DNS | |||
| information. Such an information is encoded as OPTION_V6_DNR (144) | information. Such information is encoded as OPTION_V6_DNR (144) | |||
| instances ([I-D.ietf-add-dnr]) in the DHCPv6-Options RADIUS | instances [DNR] in the RADIUS DHCPv6-Options Attribute. These | |||
| attribute. These instances are then used by the NAS to complete the | instances are then used by the NAS to complete the DHCPv6 procedure | |||
| DHCPv6 procedure that the CPE initiated to retrieve information about | that the CPE initiated to retrieve information about the encrypted | |||
| the encrypted DNS service to use. The Discovery of Network- | DNS service to use. The Discovery of Network-designated Resolvers | |||
| designated Resolvers (DNR) procedure defined in [I-D.ietf-add-dnr] is | (DNR) procedure defined in [DNR] is then followed between the DHCPv6 | |||
| then followed between the DHCPv6 client and the DHCPv6 server. | client and the DHCPv6 server. | |||
| Should any encrypted DNS-related information (e.g., Authentication | Should any encrypted DNS-related information (e.g., Authentication | |||
| Domain Name (ADN), IPv6 address) change, the RADIUS server sends a | Domain Name (ADN) and IPv6 address) change, the RADIUS server sends a | |||
| RADIUS Change-of-Authorization (CoA) message [RFC5176] that carries | RADIUS Change-of-Authorization (CoA) message [RFC5176] that carries | |||
| the DHCPv6-Options Attribute with the updated OPTION_V6_DNR | the DHCPv6-Options Attribute with the updated OPTION_V6_DNR | |||
| information to the NAS. Once that message is received and validated | information to the NAS. Once that message is received and validated | |||
| by the NAS, it replies with a RADIUS CoA ACK message. The NAS | by the NAS, it replies with a RADIUS CoA ACK message. The NAS | |||
| replaces the old encrypted DNS resolver information with the new one | replaces the old encrypted DNS resolver information with the new one | |||
| and sends a DHCPv6 Reconfigure message which leads the DHCPv6 client | and sends a DHCPv6 Reconfigure message, which leads the DHCPv6 client | |||
| to initiate a Renew/Reply message exchange with the DHCPv6 server. | to initiate a Renew/Reply message exchange with the DHCPv6 server. | |||
| In deployments where the NAS behaves as a DHCPv6 relay agent, the | In deployments where the NAS behaves as a DHCPv6 relay agent, the | |||
| procedure discussed in Section 3 of [RFC7037] can be followed. To | procedure discussed in Section 3 of [RFC7037] can be followed. To | |||
| that aim, Section 8.2 updates the "RADIUS Attributes Permitted in | that aim, the "RADIUS Attributes Permitted in DHCPv6 RADIUS Option" | |||
| DHCPv6 RADIUS Option" registry ([DHCP-RADIUS]). CoA-Requests can be | registry has been updated (Section 8.2). CoA-Requests can be used | |||
| used following the procedure specified in [RFC6977]. | following the procedure specified in [RFC6977]. | |||
| Figure 2 shows another example where a CPE is provided with an | Figure 2 shows another example where a CPE is provided with an | |||
| encrypted DNS resolver, but the CPE uses DHCPv4 to retrieve its | encrypted DNS resolver, but the CPE uses DHCPv4 to retrieve its | |||
| encrypted DNS resolver. | encrypted DNS resolver. | |||
| +-------------+ +-------------+ +-------+ | +-------------+ +-------------+ +-------+ | |||
| | CPE | | NAS | | AAA | | | CPE | | NAS | | AAA | | |||
| |DHCPv4 client| |DHCPv4 server| |Server | | |DHCPv4 Client| |DHCPv4 Server| |Server | | |||
| | | |RADIUS client| | | | | | |RADIUS Client| | | | |||
| +------+------+ +------+------+ +---+---+ | +------+------+ +------+------+ +---+---+ | |||
| | | | | | | | | |||
| o------DHCPDISCOVER------>| | | o------DHCPDISCOVER------>| | | |||
| | o----Access-Request ---->| | | o----Access-Request ---->| | |||
| | | | | | | | | |||
| | |<----Access-Accept------o | | |<----Access-Accept------o | |||
| | | DHCPv4_Options | | | | DHCPv4-Options | | |||
| |<-----DHCPOFFER----------o (OPTION_V4_DNR) | | |<-----DHCPOFFER----------o (OPTION_V4_DNR) | | |||
| | (OPTION_V4_DNR) | | | | (OPTION_V4_DNR) | | | |||
| | | | | | | | | |||
| o-----DHCPREQUEST-------->| | | o-----DHCPREQUEST-------->| | | |||
| | (OPTION_V4_DNR) | | | | (OPTION_V4_DNR) | | | |||
| | | | | | | | | |||
| |<-------DHCPACK----------o | | |<-------DHCPACK----------o | | |||
| | (OPTION_V4_DNR) | | | | (OPTION_V4_DNR) | | | |||
| | | | | | | | | |||
| DHCPv4 RADIUS | DHCPv4 RADIUS | |||
| Figure 2: An Example of RADIUS IPv4 Encrypted DNS Exchange | Figure 2: An Example of RADIUS IPv4 Encrypted DNS Exchange | |||
| Other deployment scenarios can be envisaged, such as returning | Other deployment scenarios can be envisaged, such as returning | |||
| customized service parameters (e.g., different DoH URI Templates) as | customized service parameters (e.g., different DoH URI Templates) as | |||
| a function of the service/policies/preferences that are set by a | a function of the service, policies, and preferences that are set by | |||
| network administrator. How an administrator indicates its | a network administrator. How an administrator indicates its service, | |||
| service/policies/preferences to an AAA server is out of scope. | policies, and preferences to an AAA server is out of scope. | |||
| 6. Security Considerations | 6. Security Considerations | |||
| RADIUS-related security considerations are discussed in [RFC2865]. | RADIUS-related security considerations are discussed in [RFC2865]. | |||
| DHCPv6-related security issues are discussed in Section 22 of | DHCPv6-related security issues are discussed in Section 22 of | |||
| [RFC8415], while DHCPv4-related security issues are discussed in | [RFC8415], while DHCPv4-related security issues are discussed in | |||
| Section 7 of [RFC2131]. Security considerations specific to the DHCP | Section 7 of [RFC2131]. Security considerations specific to the DHCP | |||
| options that are carried in RADIUS are discussed in relevant | options that are carried in RADIUS are discussed in relevant | |||
| documents that specify these options. For example, security | documents that specify these options. For example, security | |||
| considerations (including traffic theft) are discussed in Section 7 | considerations (including traffic theft) are discussed in Section 7 | |||
| of [I-D.ietf-add-dnr]. | of [DNR]. | |||
| RADIUS servers have conventionally tolerated the input of arbitrary | RADIUS servers have conventionally tolerated the input of arbitrary | |||
| data via the "string" data type (Section 3.5 of [RFC8044]). This | data via the "string" data type (Section 3.5 of [RFC8044]). This | |||
| practice allows RADIUS servers to support newer standards without | practice allows RADIUS servers to support newer standards without | |||
| software upgrades, by allowing administrators to manually create | software upgrades, by allowing administrators to manually create | |||
| complex attribute content and, then, to pass that content to a RADIUS | complex attribute content and then pass that content to a RADIUS | |||
| server as opaque strings. While this practice is useful, it is | server as opaque strings. While this practice is useful, it is | |||
| RECOMMENDED that RADIUS servers that implement the present | RECOMMENDED that RADIUS servers that implement the present | |||
| specification are updated to understand the format and encoding of | specification are updated to understand the format and encoding of | |||
| DHCP options. Administrators can, thus, enter the DHCP options as | DHCP options. Administrators can thus enter the DHCP options as | |||
| options instead of manually-encoded opaque strings. This | options instead of manually encoded opaque strings. This | |||
| recommendation increases security and interoperability by ensuring | recommendation increases security and interoperability by ensuring | |||
| that the options are encoded correctly. It also increases usability | that the options are encoded correctly. It also increases usability | |||
| for administrators. | for administrators. | |||
| The considerations discussed in Section 7 of [RFC4014] and Section 8 | The considerations discussed in Section 7 of [RFC4014] and Section 8 | |||
| of [RFC7037] should be taken into account in deployments where DHCP | of [RFC7037] should be taken into account in deployments where DHCP | |||
| relay agents pass the DHCP*-Options Attributes to DHCP servers. | relay agents pass the DHCP*-Options Attributes to DHCP servers. | |||
| Additional considerations specific to the use of Reconfigure messages | Additional considerations specific to the use of Reconfigure messages | |||
| are discussed in Section 9 of [RFC6977]. | are discussed in Section 9 of [RFC6977]. | |||
| 7. Table of Attributes | 7. Table of Attributes | |||
| The following table provides a guide as what type of RADIUS packets | The following table provides a guide as to what type of RADIUS | |||
| that may contain these attributes, and in what quantity. | packets may contain these attributes and in what quantity. | |||
| Access- Access- Access- Challenge Acct. # Attribute | +=============+=======+=========+===========+=====+================+ | |||
| Request Accept Reject Request | | Access- |Access-| Access- | Challenge |# | Attribute | | |||
| 0+ 0+ 0 0 0+ 245.TBA1 DHCPv6-Options | | Request |Accept | Reject | | | | | |||
| 0+ 0+ 0 0 0+ 245.TBA2 DHCPv4-Options | +=============+=======+=========+===========+=====+================+ | |||
| | 0+ |0+ | 0 | 0 |245.3| DHCPv6-Options | | ||||
| +-------------+-------+---------+-----------+-----+----------------+ | ||||
| | 0+ |0+ | 0 | 0 |245.4| DHCPv4-Options | | ||||
| +=============+=======+=========+===========+=====+================+ | ||||
| | Accounting- |CoA- | CoA-ACK | CoA-NACK |# | Attribute | | ||||
| | Request |Request| | | | | | ||||
| +=============+=======+=========+===========+=====+================+ | ||||
| | 0+ |0+ | 0 | 0 |245.3| DHCPv6-Options | | ||||
| +-------------+-------+---------+-----------+-----+----------------+ | ||||
| | 0+ |0+ | 0 | 0 |245.4| DHCPv4-Options | | ||||
| +-------------+-------+---------+-----------+-----+----------------+ | ||||
| CoA-Request CoA-ACK CoA-NACK # Attribute | Table 1: Table of Attributes | |||
| 0+ 0 0 245.TBA1 DHCPv6-Options | ||||
| 0+ 0 0 245.TBA2 DHCPv4-Options | ||||
| The following table defines the meaning of the above table entries: | Notation for Table 1: | |||
| 0 This attribute MUST NOT be present in packet. | 0 This attribute MUST NOT be present in packet. | |||
| 0+ Zero or more instances of this attribute MAY be present in packet. | ||||
| 0+ Zero or more instances of this attribute MAY be present in | ||||
| packet. | ||||
| 8. IANA Considerations | 8. IANA Considerations | |||
| 8.1. New RADIUS Attributes | 8.1. New RADIUS Attributes | |||
| IANA is requested to assign two new RADIUS attribute types from the | IANA has assigned two new RADIUS attribute types in the "Radius | |||
| IANA registry "Radius Attribute Types" [RADIUS-Types]: | Attribute Types" [RADIUS-Types] registry: | |||
| +==========+================+===========+===============+ | +=======+================+===========+===========+ | |||
| | Value | Description | Data Type | Reference | | | Value | Description | Data Type | Reference | | |||
| +==========+================+===========+===============+ | +=======+================+===========+===========+ | |||
| | 245.TBA1 | DHCPv6-Options | string | This-Document | | | 245.3 | DHCPv6-Options | string | RFC 9445 | | |||
| +----------+----------------+-----------+---------------+ | +-------+----------------+-----------+-----------+ | |||
| | 245.TBA2 | DHCPv4-Options | string | This-Document | | | 245.4 | DHCPv4-Options | string | RFC 9445 | | |||
| +----------+----------------+-----------+---------------+ | +-------+----------------+-----------+-----------+ | |||
| Table 1: New RADIUS Attributes | Table 2: New RADIUS Attributes | |||
| 8.2. New RADIUS Attribute Permitted in DHCPv6 RADIUS Option | 8.2. New RADIUS Attribute Permitted in DHCPv6 RADIUS Option | |||
| IANA is requested to add the following entry to the "RADIUS | IANA has added the following entry to the "RADIUS Attributes | |||
| Attributes Permitted in DHCPv6 RADIUS Option" subregistry in the | Permitted in DHCPv6 RADIUS Option" subregistry in the "Dynamic Host | |||
| "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)" registry | Configuration Protocol for IPv6 (DHCPv6)" registry [DHCPv6]: | |||
| [DHCP-RADIUS]: | ||||
| +===========+================+===============+ | +===========+================+===========+ | |||
| | Type Code | Attribute | Reference | | | Type Code | Attribute | Reference | | |||
| +===========+================+===============+ | +===========+================+===========+ | |||
| | 245.TBA1 | DHCPv6-Options | This-Document | | | 245.3 | DHCPv6-Options | RFC 9445 | | |||
| +-----------+----------------+---------------+ | +-----------+----------------+-----------+ | |||
| Table 2: New RADIUS Attribute Permitted in | Table 3: New RADIUS Attribute | |||
| DHCPv6 RADIUS Option | Permitted in DHCPv6 RADIUS Option | |||
| 8.3. RADIUS Attributes Permitted in RADIUS Attributes DHCP Sub-option | 8.3. RADIUS Attributes Permitted in RADIUS Attributes DHCP Suboption | |||
| IANA is requested to create a new sub-registry entitled "RADIUS | IANA has created a new subregistry entitled "RADIUS Attributes | |||
| Attributes Permitted in RADIUS Attributes Sub-option" in the "Dynamic | Permitted in RADIUS Attributes DHCP Suboption" in the "Dynamic Host | |||
| Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) | Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) | |||
| Parameters" registry [BOOTP]. | Parameters" registry [BOOTP]. | |||
| The allocation policy of this new sub-registry is Expert Review | The allocation policy of this new subregistry is "Expert Review" | |||
| (Section 4.5 of [RFC8126]). Designated experts should carefully | (Section 4.5 of [RFC8126]). Designated experts should carefully | |||
| consider the security implications of allowing the relay agent to | consider the security implications of allowing a relay agent to | |||
| include new RADIUS attributes to this registry. Additional | include new RADIUS attributes in this subregistry. Additional | |||
| considerations are provided in Section 8.4.3. | considerations are provided in Section 8.4.3. | |||
| The initial content of this sub-registry is listed in Table 3. The | The initial contents of this subregistry are listed in Table 4. The | |||
| reference may include the document that registers or specifies the | Reference field includes the document that registers or specifies the | |||
| Attribute. | attribute. | |||
| +===========+==================+===============+ | +===========+==================+===========+ | |||
| | Type Code | Attribute | Reference | | | Type Code | Attribute | Reference | | |||
| +===========+==================+===============+ | +===========+==================+===========+ | |||
| | 1 | User-Name | [RFC2865] | | | 1 | User-Name | [RFC2865] | | |||
| +-----------+------------------+---------------+ | +-----------+------------------+-----------+ | |||
| | 6 | Service-Type | [RFC2865] | | | 6 | Service-Type | [RFC2865] | | |||
| +-----------+------------------+---------------+ | +-----------+------------------+-----------+ | |||
| | 26 | Vendor-Specific | [RFC2865] | | | 26 | Vendor-Specific | [RFC2865] | | |||
| +-----------+------------------+---------------+ | +-----------+------------------+-----------+ | |||
| | 27 | Session-Timeout | [RFC2865] | | | 27 | Session-Timeout | [RFC2865] | | |||
| +-----------+------------------+---------------+ | +-----------+------------------+-----------+ | |||
| | 88 | Framed-Pool | [RFC2869] | | | 88 | Framed-Pool | [RFC2869] | | |||
| +-----------+------------------+---------------+ | +-----------+------------------+-----------+ | |||
| | 100 | Framed-IPv6-Pool | [RFC3162] | | | 100 | Framed-IPv6-Pool | [RFC3162] | | |||
| +-----------+------------------+---------------+ | +-----------+------------------+-----------+ | |||
| | 245.TBA2 | DHCPv4-Options | This-Document | | | 245.4 | DHCPv4-Options | RFC 9445 | | |||
| +-----------+------------------+---------------+ | +-----------+------------------+-----------+ | |||
| Table 3: RADIUS Attributes Permitted in | Table 4: Initial Contents of RADIUS | |||
| RADIUS Attributes DHCP Suboption | Attributes Permitted in RADIUS | |||
| Attributes DHCP Suboption Registry | ||||
| 8.4. DHCP Options Permitted in the RADIUS DHCP*-Options Attribute | 8.4. DHCP Options Permitted in the RADIUS DHCP*-Options Attributes | |||
| 8.4.1. DHCPv6 | 8.4.1. DHCPv6 | |||
| IANA is requested to create a new sub-registry entitled "DHCPv6 | IANA has created a new subregistry entitled "DHCPv6 Options Permitted | |||
| Options Permitted in the RADIUS DHCPv6-Options Attribute" in the | in the RADIUS DHCPv6-Options Attribute" in the "Dynamic Host | |||
| "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)" registry | Configuration Protocol for IPv6 (DHCPv6)" registry [DHCPv6]. | |||
| [DHCP-RADIUS]. | ||||
| The registration policy for this new sub-registry is Expert Review | The registration policy for this new subregistry is "Expert Review" | |||
| (Section 4.5 of [RFC8126]). See more details in Section 8.4.3. | (Section 4.5 of [RFC8126]). See more details in Section 8.4.3. | |||
| The initial content of this sub-registry is listed in Table 4. The | The initial content of this subregistry is listed in Table 5. The | |||
| Value and Description fields echo those of [DHCPv6]. The reference | Value and Description fields echo those in the "Option Codes" | |||
| may include the document that registers the option or the document | subregistry of [DHCPv6]. The Reference field includes the document | |||
| that specifies the option. | that registers or specifies the option. | |||
| +=======+===============+===============+ | +=======+===============+===========+ | |||
| | Value | Description | Reference | | | Value | Description | Reference | | |||
| +=======+===============+===============+ | +=======+===============+===========+ | |||
| | 144 | OPTION_V6_DNR | This-Document | | | 144 | OPTION_V6_DNR | RFC 9445 | | |||
| +-------+---------------+---------------+ | +-------+---------------+-----------+ | |||
| Table 4: Initial DHCPv6 Options | Table 5: Initial Content of | |||
| Permitted in the RADIUS | DHCPv6 Options Permitted in the | |||
| DHCPv6-Options Attribute | RADIUS DHCPv6-Options Attribute | |||
| Registry | ||||
| 8.4.2. DHCPv4 | 8.4.2. DHCPv4 | |||
| IANA is requested to create a new sub-registry entitled "DHCP Options | IANA has created a new subregistry entitled "DHCP Options Permitted | |||
| Permitted in the RADIUS DHCPv4-Options Attribute" in the "Dynamic | in the RADIUS DHCPv4-Options Attribute" in the "Dynamic Host | |||
| Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) | Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) | |||
| Parameters" registry [BOOTP]. | Parameters" registry [BOOTP]. | |||
| The registration policy for this new sub-registry is Expert Review | The registration policy for this new subregistry is Expert Review | |||
| (Section 4.5 of [RFC8126]). See more details in Section 8.4.3. | (Section 4.5 of [RFC8126]). See more details in Section 8.4.3. | |||
| The initial content of this sub-registry is listed in Table 5. The | The initial content of this subregistry is listed in Table 6. The | |||
| Tag and Name fields echo those of [BOOTP]. The reference may include | Tag and Name fields echo those in the "BOOTP Vendor Extensions and | |||
| the document that registers the option or the document that specifies | DHCP Options" subregistry of [BOOTP]. The Reference field includes | |||
| the option. | the document that registers or specifies the option. | |||
| +=====+===============+===============+ | +=====+===============+===========+ | |||
| | Tag | Name | Reference | | | Tag | Name | Reference | | |||
| +=====+===============+===============+ | +=====+===============+===========+ | |||
| | 162 | OPTION_V4_DNR | This-Document | | | 162 | OPTION_V4_DNR | RFC 9445 | | |||
| +-----+---------------+---------------+ | +-----+---------------+-----------+ | |||
| Table 5: Initial DHCPv4 Options | Table 6: Initial Content of | |||
| Permitted in the RADIUS | DHCPv4 Options Permitted in the | |||
| DHCPv4-Options Attribute | RADIUS DHCPv4-Options Attribute | |||
| Registry | ||||
| 8.4.3. Guidelines for the Designated Experts | 8.4.3. Guidelines for the Designated Experts | |||
| It is suggested that multiple designated experts be appointed for | It is suggested that multiple designated experts be appointed for | |||
| registry change requests. | registry change requests. | |||
| Criteria that should be applied by the designated experts include | Criteria that should be applied by the designated experts include | |||
| determining whether the proposed registration duplicates existing | determining whether the proposed registration duplicates existing | |||
| entries and whether the registration description is clear and fits | entries and whether the registration description is clear and fits | |||
| the purpose of this registry. | the purpose of this registry. | |||
| Registration requests are to be sent to radius-dhcp-review@ietf.org | Registration requests are to be sent to <radius-dhcp-review@ietf.org> | |||
| and are evaluated within a three-week review period on the advice of | and are evaluated within a three-week review period on the advice of | |||
| one or more designated experts. Within the review period, the | one or more designated experts. Within the review period, the | |||
| designated experts will either approve or deny the registration | designated experts will either approve or deny the registration | |||
| request, communicating this decision to the review list and IANA. | request, communicating this decision to the review list and IANA. | |||
| Denials should include an explanation and, if applicable, suggestions | Denials should include an explanation and, if applicable, suggestions | |||
| as to how to make the request successful. | as to how to make the request successful. | |||
| 9. Acknowledgements | 9. References | |||
| Thanks to Christian Jacquenet, Neil Cook, Joe Clarke, Qin Wu, Dirk | ||||
| von-Hugo, Tom Petch, and Chongfeng Xie for the review and | ||||
| suggestions. | ||||
| Thanks to Ben Schwartz and Bernie Volz for the comments. | ||||
| Thanks to Rob Wilton for the careful AD review. | ||||
| Thanks to Ralf Weber for the dnsdir reviews, Robert Sparks for genart | ||||
| review, and Tatuya Jinmei for the int-dir review. | ||||
| Thanks to Eric Vyncke, Paul Wouters, and Warren Kumari for the IESG | ||||
| review. | ||||
| 10. References | ||||
| 10.1. Normative References | 9.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, | [RFC2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, | |||
| "Remote Authentication Dial In User Service (RADIUS)", | "Remote Authentication Dial In User Service (RADIUS)", | |||
| RFC 2865, DOI 10.17487/RFC2865, June 2000, | RFC 2865, DOI 10.17487/RFC2865, June 2000, | |||
| <https://www.rfc-editor.org/info/rfc2865>. | <https://www.rfc-editor.org/info/rfc2865>. | |||
| skipping to change at page 16, line 33 ¶ | skipping to change at line 722 ¶ | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A., | [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A., | |||
| Richardson, M., Jiang, S., Lemon, T., and T. Winters, | Richardson, M., Jiang, S., Lemon, T., and T. Winters, | |||
| "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", | "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", | |||
| RFC 8415, DOI 10.17487/RFC8415, November 2018, | RFC 8415, DOI 10.17487/RFC8415, November 2018, | |||
| <https://www.rfc-editor.org/info/rfc8415>. | <https://www.rfc-editor.org/info/rfc8415>. | |||
| 10.2. Informative References | 9.2. Informative References | |||
| [BOOTP] IANA, "Dynamic Host Configuration Protocol (DHCP) and | [BOOTP] IANA, "Dynamic Host Configuration Protocol (DHCP) and | |||
| Bootstrap Protocol (BOOTP) Parameters", | Bootstrap Protocol (BOOTP) Parameters", | |||
| <https://www.iana.org/assignments/bootp-dhcp-parameters/ | <https://www.iana.org/assignments/bootp-dhcp-parameters>. | |||
| bootp-dhcp-parameters.xhtml>. | ||||
| [DHCP-RADIUS] | ||||
| IANA, "Dynamic Host Configuration Protocol for IPv6 | ||||
| (DHCPv6)", <https://www.iana.org/assignments/dhcpv6- | ||||
| parameters/dhcpv6-parameters.xhtml>. | ||||
| [DHCPv6] IANA, "Dynamic Host Configuration Protocol for IPv6 | [DHCPv6] IANA, "Dynamic Host Configuration Protocol for IPv6 | |||
| (DHCPv6), Option Codes", | (DHCPv6)", | |||
| <https://www.iana.org/assignments/dhcpv6-parameters/ | <https://www.iana.org/assignments/dhcpv6-parameters>. | |||
| dhcpv6-parameters.xhtml#dhcpv6-parameters-2>. | ||||
| [I-D.ietf-add-dnr] | [DNR] Boucadair, M., Ed., Reddy.K, T., Ed., Wing, D., Cook, N., | |||
| Boucadair, M., Reddy.K, T., Wing, D., Cook, N., and T. | and T. Jensen, "DHCP and Router Advertisement Options for | |||
| Jensen, "DHCP and Router Advertisement Options for the | the Discovery of Network-designated Resolvers (DNR)", Work | |||
| Discovery of Network-designated Resolvers (DNR)", Work in | in Progress, Internet-Draft, draft-ietf-add-dnr-16, 27 | |||
| Progress, Internet-Draft, draft-ietf-add-dnr-14, 13 March | April 2023, <https://datatracker.ietf.org/doc/html/draft- | |||
| 2023, <https://datatracker.ietf.org/doc/html/draft-ietf- | ietf-add-dnr-16>. | |||
| add-dnr-14>. | ||||
| [RADIUS-Types] | [RADIUS-Types] | |||
| IANA, "RADIUS Types", | IANA, "RADIUS Types", | |||
| <http://www.iana.org/assignments/radius-types>. | <http://www.iana.org/assignments/radius-types>. | |||
| [RFC2131] Droms, R., "Dynamic Host Configuration Protocol", | [RFC2131] Droms, R., "Dynamic Host Configuration Protocol", | |||
| RFC 2131, DOI 10.17487/RFC2131, March 1997, | RFC 2131, DOI 10.17487/RFC2131, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2131>. | <https://www.rfc-editor.org/info/rfc2131>. | |||
| [RFC2132] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor | [RFC2132] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor | |||
| skipping to change at page 18, line 47 ¶ | skipping to change at line 822 ¶ | |||
| [RFC8499] Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS | [RFC8499] Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS | |||
| Terminology", BCP 219, RFC 8499, DOI 10.17487/RFC8499, | Terminology", BCP 219, RFC 8499, DOI 10.17487/RFC8499, | |||
| January 2019, <https://www.rfc-editor.org/info/rfc8499>. | January 2019, <https://www.rfc-editor.org/info/rfc8499>. | |||
| [RFC9250] Huitema, C., Dickinson, S., and A. Mankin, "DNS over | [RFC9250] Huitema, C., Dickinson, S., and A. Mankin, "DNS over | |||
| Dedicated QUIC Connections", RFC 9250, | Dedicated QUIC Connections", RFC 9250, | |||
| DOI 10.17487/RFC9250, May 2022, | DOI 10.17487/RFC9250, May 2022, | |||
| <https://www.rfc-editor.org/info/rfc9250>. | <https://www.rfc-editor.org/info/rfc9250>. | |||
| Acknowledgements | ||||
| Thanks to Christian Jacquenet, Neil Cook, Joe Clarke, Qin Wu, Dirk | ||||
| von-Hugo, Tom Petch, and Chongfeng Xie for the review and | ||||
| suggestions. | ||||
| Thanks to Ben Schwartz and Bernie Volz for the comments. | ||||
| Thanks to Rob Wilton for the careful AD review. | ||||
| Thanks to Ralf Weber for the dnsdir reviews, Robert Sparks for the | ||||
| genart review, and Tatuya Jinmei for the intdir review. | ||||
| Thanks to Éric Vyncke, Paul Wouters, and Warren Kumari for the IESG | ||||
| review. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Mohamed Boucadair | Mohamed Boucadair | |||
| Orange | Orange | |||
| 35000 Rennes | 35000 Rennes | |||
| France | France | |||
| Email: mohamed.boucadair@orange.com | Email: mohamed.boucadair@orange.com | |||
| Tirumaleswar Reddy | Tirumaleswar Reddy.K | |||
| Nokia | Nokia | |||
| India | India | |||
| Email: kondtir@gmail.com | Email: kondtir@gmail.com | |||
| Alan DeKok | Alan DeKok | |||
| FreeRADIUS | FreeRADIUS | |||
| Email: aland@freeradius.org | Email: aland@freeradius.org | |||
| End of changes. 102 change blocks. | ||||
| 312 lines changed or deleted | 315 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||