rfc9527.original   rfc9527.txt 
Homenet D. Migault Internet Engineering Task Force (IETF) D. Migault
Internet-Draft Ericsson Request for Comments: 9527 Ericsson
Intended status: Standards Track R. Weber Category: Standards Track R. Weber
Expires: 4 May 2023 Akamai ISSN: 2070-1721 Akamai
T. Mrugalski T. Mrugalski
Internet Systems Consortium, Inc. ISC
31 October 2022 January 2024
DHCPv6 Options for Home Network Naming Authority DHCPv6 Options for the Homenet Naming Authority
draft-ietf-homenet-naming-architecture-dhc-options-24
Abstract Abstract
This document defines DHCPv6 options so a Homenet Naming Authority This document defines DHCPv6 options so that a Homenet Naming
(HNA) can automatically proceed to the appropriate configuration and Authority (HNA) can automatically set the appropriate configuration
outsource the authoritative naming service for the home network. In and outsource the authoritative naming service for the home network.
most cases, the outsourcing mechanism is transparent for the end In most cases, the outsourcing mechanism is transparent for the end
user. user.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This is an Internet Standards Track document.
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months This document is a product of the Internet Engineering Task Force
and may be updated, replaced, or obsoleted by other documents at any (IETF). It represents the consensus of the IETF community. It has
time. It is inappropriate to use Internet-Drafts as reference received public review and has been approved for publication by the
material or to cite them other than as "work in progress." Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
This Internet-Draft will expire on 4 May 2023. Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9527.
Copyright Notice Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents
license-info) in effect on the date of publication of this document. (https://trustee.ietf.org/license-info) in effect on the date of
Please review these documents carefully, as they describe your rights publication of this document. Please review these documents
and restrictions with respect to this document. Code Components carefully, as they describe your rights and restrictions with respect
extracted from this document must include Revised BSD License text as to this document. Code Components extracted from this document must
described in Section 4.e of the Trust Legal Provisions and are include Revised BSD License text as described in Section 4.e of the
provided without warranty as described in the Revised BSD License. Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License.
Table of Contents Table of Contents
1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology
3. Procedure Overview . . . . . . . . . . . . . . . . . . . . . 4 3. Procedure Overview
4. DHCPv6 Option . . . . . . . . . . . . . . . . . . . . . . . . 5 4. DHCPv6 Options
4.1. Registered Homenet Domain Option . . . . . . . . . . . . 5 4.1. Registered Homenet Domain Option
4.2. Forward Distribution Manager Option . . . . . . . . . . . 5 4.2. Forward Distribution Manager Option
4.3. Reverse Distribution Manager Server Option . . . . . . . 7 4.3. Reverse Distribution Manager Server Option
4.4. Supported Transport . . . . . . . . . . . . . . . . . . . 7 4.4. Supported Transport
5. DHCPv6 Behavior . . . . . . . . . . . . . . . . . . . . . . . 8 5. DHCPv6 Behavior
5.1. DHCPv6 Server Behavior . . . . . . . . . . . . . . . . . 8 5.1. DHCPv6 Server Behavior
5.2. DHCPv6 Client Behavior . . . . . . . . . . . . . . . . . 8 5.2. DHCPv6 Client Behavior
5.3. DHCPv6 Relay Agent Behavior . . . . . . . . . . . . . . . 8 5.3. DHCPv6 Relay Agent Behavior
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 6. IANA Considerations
6.1. DHCPv6 Option Codes . . . . . . . . . . . . . . . . . . . 8 6.1. DHCPv6 Option Codes
6.2. Supported Transport parameter . . . . . . . . . . . . . . 9 6.2. Supported Transport parameter
7. Security Considerations . . . . . . . . . . . . . . . . . . . 10 7. Security Considerations
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 8. References
9. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 10 8.1. Normative References
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 10 8.2. Informative References
10.1. Normative References . . . . . . . . . . . . . . . . . . 10 Appendix A. Scenarios and Impact on the End User
10.2. Informative References . . . . . . . . . . . . . . . . . 11 A.1. Base Scenario
Appendix A. Scenarios and impact on the End User . . . . . . . . 12 A.2. Third-Party Registered Homenet Domain
A.1. Base Scenario . . . . . . . . . . . . . . . . . . . . . . 12 A.3. Third-Party DNS Infrastructure
A.2. Third Party Registered Homenet Domain . . . . . . . . . . 12 A.4. Multiple ISPs
A.3. Third Party DNS Infrastructure . . . . . . . . . . . . . 13 Acknowledgments
A.4. Multiple ISPs . . . . . . . . . . . . . . . . . . . . . . 14 Contributors
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses
1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
The reader should be familiar with
[I-D.ietf-homenet-front-end-naming-delegation].
2. Introduction 1. Introduction
[I-D.ietf-homenet-front-end-naming-delegation] specifies how an [RFC9526] specifies how an entity designated as the Homenet Naming
entity designated as the Homenet Naming Authority (HNA) outsources a Authority (HNA) outsources a Public Homenet Zone to a DNS Outsourcing
Public Homenet Zone to an DNS Outsourcing Infrastructure (DOI). Infrastructure (DOI).
This document describes how a network can provision the HNA with a This document describes how a network can provision the HNA with a
specific DOI. This could be particularly useful for a DOI partly specific DOI. This could be particularly useful for a DOI partly
managed by an ISP, or to make home networks resilient to HNA managed by an ISP or to make home networks resilient to HNA
replacement. The ISP delegates an IP prefix to the home network as replacement. The ISP delegates an IP prefix and the associated
well as the associated reverse zone. The ISP is thus aware of the reverse zone to the home network. The ISP is thus aware of the owner
owner of that IP prefix, and as such becomes a natural candidate for of that IP prefix and, as such, becomes a natural candidate for
hosting the Homenet Reverse Zone - that is the Reverse Distribution hosting the Homenet Reverse Zone -- that is, the Reverse Distribution
Manager (RDM) and potentially the Reverse Public Authoritative Manager (RDM) and potentially the Reverse Public Authoritative
Servers. Servers.
In addition, ISPs often identify the line of the home network with a In addition, ISPs often identify the line of the home network with a
name. Such name is used for their internal network management name. Such name is used for their internal network management
operations and is not a name the home network owner has registered operations and is not a name the home network owner has registered
to. ISPs may leverage such infrastructure and provide the home to. ISPs may leverage such infrastructure and provide the home
network with a specific domain name designated as per network with a specific domain name designated per a Registered
[I-D.ietf-homenet-front-end-naming-delegation] a Homenet Registered Homenet Domain [RFC9526]. Similarly to the reverse zone, ISPs are
Domain. Similarly to the reverse zone, ISPs are aware of who owns aware of who owns that domain name and may become a natural candidate
that domain name and may become a natural candidate for hosting the for hosting the Homenet Zone -- that is, the Distribution Manager
Homenet Zone - that is the Distribution Manager (DM) and the Public (DM) and the Public Authoritative Servers.
Authoritative Servers.
This document describes DHCPv6 options that enable an ISP to provide This document describes DHCPv6 options that enable an ISP to provide
the necessary parameters to the HNA, to proceed. More specifically, the necessary parameters to the HNA to proceed. More specifically,
the ISP provides the Registered Homenet Domain, necessary information the ISP provides the Registered Homenet Domain and the necessary
on the DM and the RDM so the HNA can manage and upload the Public information on the DM and the RDM so the HNA can manage and upload
Homenet Zone and the Reverse Public Homenet Zone as described in the Public Homenet Zone and the Reverse Public Homenet Zone as
[I-D.ietf-homenet-front-end-naming-delegation]. described in [RFC9526].
The use of DHCPv6 options may make the configuration completely The use of DHCPv6 options may make the configuration completely
transparent to the end user and provides a similar level of trust as transparent to the end user and provides a similar level of trust as
the one used to provide the IP prefix - when provisioned via DHCP. the one used to provide the IP prefix, when provisioned via DHCP.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
The reader should be familiar with [RFC9526].
3. Procedure Overview 3. Procedure Overview
This section illustrates how a HNA receives the necessary information This section illustrates how an HNA receives the necessary
via DHCPv6 options to outsource its authoritative naming service to information via DHCPv6 options to outsource its authoritative naming
the DOI. For the sake of simplicity, and similarly to service to the DOI. For the sake of simplicity, and similarly to
[I-D.ietf-homenet-front-end-naming-delegation], this section assumes [RFC9526], this section assumes that the HNA and the home network
that the HNA and the home network DHCPv6 client are colocated on the DHCPv6 client are colocated on the Customer Premises Equipment (CPE)
Customer Edge (CPE) router [RFC7368]. Note also that this is not router [RFC7368]. Also, note that this is not mandatory, and the
mandatory and the DHCPv6 client may instruct remotely the HNA with a DHCPv6 client may remotely instruct the HNA with a protocol that will
protocol that will be standardized in the future. In addition, this be standardized in the future. In addition, this section assumes
section assumes the responsible entity for the DHCPv6 server is that the responsible entity for the DHCPv6 server is provisioned with
provisioned with the DM and RDM information - associated with the the DM and RDM information, which is associated with the requested
requested Registered Homenet Domain . This means a Registered Homenet Registered Homenet Domain. This means a Registered Homenet Domain
Domain can be associated with the DHCPv6 client. can be associated with the DHCPv6 client.
This scenario is believed to be the most popular scenario. This This scenario is believed to be the most popular scenario. This
document does not ignore scenarios where the DHCPv6 server does not document does not ignore scenarios where the DHCPv6 server does not
have privileged relations with the DM or RDM. These cases are have privileged relations with the DM or RDM. These cases are
discussed in Appendix A. Such scenarios do not necessarily require discussed in Appendix A. Such scenarios do not necessarily require
configuration for the end user and can also be zero-config. configuration for the end user and can also be zero configuration.
The scenario considered in this section is as follows: The scenario considered in this section is as follows:
1. The HNA is willing to outsource the Public Homenet Zone or 1. The HNA is willing to outsource the Public Homenet Zone or
Homenet Reverse Zone. The DHCPv6 client is configured to include Homenet Reverse Zone. The DHCPv6 client is configured to include
in its Option Request Option (ORO) the Registered Homenet Domain in its Option Request Option (ORO) the Registered Homenet Domain
Option (OPTION_REGISTERED_DOMAIN), the Forward Distribution Option (OPTION_REGISTERED_DOMAIN), the Forward Distribution
Manager Option (OPTION_FORWARD_DIST_MANAGER) and the Reverse Manager Option (OPTION_FORWARD_DIST_MANAGER), and the Reverse
Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option
codes. codes.
2. The DHCPv6 server responds to the DHCPv6 client with the 2. The DHCPv6 server responds to the DHCPv6 client with the
requested DHCPv6 options based on the identified homenet. The requested DHCPv6 options based on the identified homenet. The
DHCPv6 client passes the information to the HNA. DHCPv6 client passes the information to the HNA.
3. The HNA is authenticated (see Section "Securing the Control 3. The HNA is authenticated (see "Securing the Control Channel"
Channel" of [I-D.ietf-homenet-front-end-naming-delegation]) by (Section 6.6) of [RFC9526]) by the DM and the RDM. The HNA
the DM and the RDM. The HNA builds the Homenet Zone (or the builds the Homenet Zone (or the Homenet Reverse Zone) and
Homenet Reverse Zone) and proceed as described in proceeds as described in [RFC9526]. The DHCPv6 options provide
[I-D.ietf-homenet-front-end-naming-delegation]. The DHCPv6 the necessary non-optional parameters described in Appendix B of
options provide the necessary non optional parameters described [RFC9526]. The HNA may complement the configurations with
in Appendix B of [I-D.ietf-homenet-front-end-naming-delegation]. additional parameters via means not yet defined. Appendix B of
The HNA may complement the configurations with additional [RFC9526] describes such parameters that may take some specific
parameters via means not yet defined. Appendix B of non-default value.
[I-D.ietf-homenet-front-end-naming-delegation] describes such
parameters that may take some specific non default value.
4. DHCPv6 Option 4. DHCPv6 Options
This section details the payload of the DHCPv6 options following the This section details the payload of the DHCPv6 options following the
guidelines of [RFC7227]. guidelines of [RFC7227].
4.1. Registered Homenet Domain Option 4.1. Registered Homenet Domain Option
The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the
FQDN associated with the home network. fully qualified domain name (FQDN) associated with the home network.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_REGISTERED_DOMAIN | option-len | | OPTION_REGISTERED_DOMAIN | option-len |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | |
/ Registered Homenet Domain / / Registered Homenet Domain /
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: Registered Domain Option Figure 1: Registered Domain Option
* option-code (16 bits): OPTION_REGISTERED_DOMAIN, the option code option-code (16 bits): OPTION_REGISTERED_DOMAIN; the option code for
for the Registered Homenet Domain (TBD1). the Registered Homenet Domain (145).
* option-len (16 bits): length in octets of the Registered Homenet option-len (16 bits): Length in octets of the Registered Homenet
Domain field as described in [RFC8415]. Domain field as described in [RFC8415].
* Registered Homenet Domain (variable): the FQDN registered for the Registered Homenet Domain (variable): The FQDN registered for the
homenet encoded as described in Section 10 of [RFC8415]. homenet encoded as described in Section 10 of [RFC8415].
4.2. Forward Distribution Manager Option 4.2. Forward Distribution Manager Option
The Forward Distributed Manager Option (OPTION_FORWARD_DIST_MANAGER) The Forward Distribution Manager Option (OPTION_FORWARD_DIST_MANAGER)
provides the HNA with the FQDN of the DM as well as the transport provides the HNA with the FQDN of the DM as well as the transport
protocols for the communication between the HNA and the DM. As protocols for the communication between the HNA and the DM. As
opposed to IP addresses, the FQDN requires a DNS resolution before opposed to IP addresses, the FQDN requires a DNS resolution before
establishing the communication between the HNA and the DM. However, establishing the communication between the HNA and the DM. However,
the use of a FQDN provides multiple advantages over IP addresses. the use of an FQDN provides multiple advantages over IP addresses.
Firstly, it makes the DHCPv6 Option easier to parse and smaller - Firstly, it makes the DHCPv6 option easier to parse and smaller,
especially when IPv4 and IPv6 addresses are expected to be provided. especially when IPv4 and IPv6 addresses are expected to be provided.
Then the FQDN can reasonably be seen as a more stable identifier than Then, the FQDN can reasonably be seen as a more stable identifier
IP addresses, as well as a pointer to additional information that may than IP addresses as well as a pointer to additional information that
be useful, in the future, to establish the communication between the may be useful, in the future, to establish the communication between
HNA and the DM. the HNA and the DM.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_FORWARD_DIST_MANAGER | option-len | | OPTION_FORWARD_DIST_MANAGER | option-len |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Supported Transport | | | Supported Transport | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | | |
/ Distribution Manager FQDN / / Distribution Manager FQDN /
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 2: Forward Distribution Manager Option Figure 2: Forward Distribution Manager Option
* option-code (16 bits): OPTION_FORWARD_DIST_MANAGER, the option option-code (16 bits): OPTION_FORWARD_DIST_MANAGER; the option code
code for the Forward Distribution Manager Option (TBD2). for the Forward Distribution Manager Option (146).
* option-len (16 bits): length in octets of the enclosed data as option-len (16 bits): Length in octets of the enclosed data as
described in [RFC8415]. described in [RFC8415].
* Supported Transport (16 bits): defines the supported transport by Supported Transport (16 bits): Defines the Supported Transport by
the DM (see Section 4.4). Each bit represents a supported the DM (see Section 4.4). Each bit represents a supported
transport, and a DM MAY indicate the support of multiple modes. transport, and a DM MAY indicate the support of multiple modes.
The bit for DNS over mutually authenticated TLS (DomTLS) MUST be The bit for DNS over mutually authenticated TLS (DomTLS) MUST be
set. set.
* Distribution Manager FQDN (variable): the FQDN of the DM encoded Distribution Manager FQDN (variable): The FQDN of the DM encoded as
as described in Section 10 of [RFC8415]. described in Section 10 of [RFC8415].
It is worth noticing that the DHCP Option specifies the Supported It is worth noting that the DHCPv6 option specifies the Supported
Transport without specifying any explicit port. Unless the HNA and Transport without specifying any explicit port. Unless the HNA and
the DM have agreed on using a specific port - for example by the DM have agreed on using a specific port -- for example, by
configuration, or any out of band mechanism -, the default port is configuration, or any out-of-band mechanism -- the default port is
used and must be specified. The specification of such default port used and must be specified. The specification of such default port
may be defined in the specification of the designated Supported may be defined in the specification of the designated Supported
Transport or in any other document. In the case of DNS over mutually Transport or in any other document. In the case of DomTLS, the
authenticated TLS (DomTLS), the default port value is 853 as per DNS default port value is 853 per DNS over TLS [RFC7858] and DNS Zone
over TLS [RFC7858] and DNS Zone Transfer over TLS [RFC9103]. Transfer over TLS [RFC9103].
The need to associate in the DHCP Option the port value to each The need to associate the port value to each Supported Transport in
Supported Transport has been balanced with the difficulty of handling the DHCPv6 option has been balanced with the difficulty of handling a
a list of tuples ( transport, port ) as well as the possibility to list of tuples (transport, port) and the possibility of using a
use a dedicated IP address for the DM in case the default port was dedicated IP address for the DM in case the default port is already
already in use. in use.
4.3. Reverse Distribution Manager Server Option 4.3. Reverse Distribution Manager Server Option
The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER)
provides the HNA with the FQDN of the DM as well as the transport provides the HNA with the FQDN of the DM as well as the transport
protocols for the communication between the HNA and the DM. protocols for the communication between the HNA and the DM.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_REVERSE_DIST_MANAGER | option-len | | OPTION_REVERSE_DIST_MANAGER | option-len |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Supported Transport | | | Supported Transport | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | | |
/ Reverse Distribution Manager FQDN / / Reverse Distribution Manager FQDN /
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: Reverse Distribution Manager Option Figure 3: Reverse Distribution Manager Option
* option-code (16 bits): OPTION_REVERSE_DIST_MANAGER, the option option-code (16 bits): OPTION_REVERSE_DIST_MANAGER; the option code
code for the Reverse Distribution Manager Option (TBD3). for the Reverse Distribution Manager Option (147).
* option-len (16 bits): length in octets of the option-data field as option-len (16 bits): Length in octets of the option-data field as
described in [RFC8415]. described in [RFC8415].
* Supported Transport (16 bits): defines the supported transport by Supported Transport (16 bits): Defines the Supported Transport by
the RDM (see Section 4.4). Each bit represents a supported the RDM (see Section 4.4). Each bit represents a supported
transport, and a RDM MAY indicate the support of multiple modes. transport, and an RDM MAY indicate the support of multiple modes.
The bit for DNS over mutually authenticated TLS [RFC7858] MUST be The bit for DomTLS [RFC7858] MUST be set.
set.
* Reverse Distribution Manager FQDN (variable): the FQDN of the RDM Reverse Distribution Manager FQDN (variable): The FQDN of the RDM
encoded as described in section 10 of [RFC8415]. encoded as described in Section 10 of [RFC8415].
For the port number associated to the Supported Transport, the same For the port number associated to the Supported Transport, the same
considerations as described in Section 4.2 holds. considerations as described in Section 4.2 apply.
4.4. Supported Transport 4.4. Supported Transport
The Supported Transport field of the DHCPv6 option indicates the The Supported Transport field of the DHCPv6 option indicates the
supported transport protocols. Each bit represents a specific Supported Transport protocols. Each bit represents a specific
transport mechanism. A bit sets to 1 indicates the associated transport mechanism. A bit set to 1 indicates the associated
transport protocol is supported. The corresponding bits are assigned transport protocol is supported. The corresponding bits are assigned
as described in Figure 4 and Section 6. as described in Table 2.
Bit Position | Transport Protocol | Mnemonic | Reference DNS over mutually authenticated TLS (DomTLS): Indicates the support
left to right| Description | | of DNS over TLS [RFC7858] and DNS Zone Transfer over TLS [RFC9103]
-------------+--------------------+-----------+----------- as described in [RFC9526].
0 | DNS over mutually | DomTLS | This-RFC
| authenticated TLS | |
1-15 | unallocated | - | -
Figure 4: Supported Transport As an example, the Supported Transport field expressing support for
DomTLS looks as follows and has a numeric value of 0x0001:
DNS over mutually authenticated TLS (DomTLS): indicates the support 0 1
of DNS over TLS [RFC7858], DNS Zone Transfer over TLS [RFC9103] as 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
described in [I-D.ietf-homenet-front-end-naming-delegation]. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| must be zero |1|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
5. DHCPv6 Behavior 5. DHCPv6 Behavior
5.1. DHCPv6 Server Behavior 5.1. DHCPv6 Server Behavior
Sections 17.2.2 and 18.2 of [RFC8415] govern server operation Section 18.3 of [RFC8415] governs server operation regarding option
regarding option assignment. As a convenience to the reader, we assignment. As a convenience to the reader, we mention here that the
mention here that the server will send option foo only if configured server will send option foo only if configured with specific values
with specific values for foo and if the client requested it. In for foo and if the client requested it. In particular, when
particular, when configured the DHCPv6 server sends the Registered configured, the DHCPv6 server sends the Registered Homenet Domain
Homenet Domain Option, Distribution Manager Option, the Reverse Option, Distribution Manager Option, and Reverse Distribution Manager
Distribution Manager Option when requested by the DHCPv6 client by Option when requested by the DHCPv6 client by including necessary
including necessary option codes in its ORO. option codes in its ORO.
5.2. DHCPv6 Client Behavior 5.2. DHCPv6 Client Behavior
The DHCPv6 client includes Registered Homenet Domain Option, The DHCPv6 client includes the Registered Homenet Domain Option,
Distribution Manager Option, the Reverse Distribution Manager Option Distribution Manager Option, and Reverse Distribution Manager Option
in an ORO as specified in Sections 18.2.1, 18.2.2, 18.2.4, 18.2.5, in an ORO as specified in Sections 18.2 and 21.7 of [RFC8415].
18.2.6, and 21.7 of [RFC8415].
Upon receiving a DHCPv6 option described in this document in the Upon receiving a DHCPv6 option, as described in this document, in the
Reply message, the HNA SHOULD proceed as described in Reply message, the HNA SHOULD proceed as described in [RFC9526].
[I-D.ietf-homenet-front-end-naming-delegation].
5.3. DHCPv6 Relay Agent Behavior 5.3. DHCPv6 Relay Agent Behavior
There are no additional requirements for the DHCPv6 Relay agents. There are no additional requirements for the DHCPv6 Relay agents.
6. IANA Considerations 6. IANA Considerations
6.1. DHCPv6 Option Codes 6.1. DHCPv6 Option Codes
IANA is requested to assign the following new DHCPv6 Option Codes in IANA has assigned the following new DHCPv6 Option Codes in the
the registry maintained in: https://www.iana.org/assignments/dhcpv6- "Option Codes" registry maintained at
parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2. <https://www.iana.org/assignments/dhcpv6-parameters>.
Value Description Client ORO Singleton Option Reference +=====+=============================+======+===========+===========+
TBD1 OPTION_REGISTERED_DOMAIN Yes No [This-RFC] Section 4.1 |Value| Description |Client| Singleton | Reference |
TBD2 OPTION_FORWARD_DIST_MANAGER Yes Yes [This-RFC] Section 4.2 | | |ORO | Option | |
TBD3 OPTION_REVERSE_DIST_MANAGER Yes Yes [This-RFC] Section 4.3 +=====+=============================+======+===========+===========+
|145 | OPTION_REGISTERED_DOMAIN |Yes | No | RFC 9527, |
| | | | | Section |
| | | | | 4.1 |
+-----+-----------------------------+------+-----------+-----------+
|146 | OPTION_FORWARD_DIST_MANAGER |Yes | Yes | RFC 9527, |
| | | | | Section |
| | | | | 4.2 |
+-----+-----------------------------+------+-----------+-----------+
|147 | OPTION_REVERSE_DIST_MANAGER |Yes | Yes | RFC 9527, |
| | | | | Section |
| | | | | 4.3 |
+-----+-----------------------------+------+-----------+-----------+
Table 1: Option Codes Registry
6.2. Supported Transport parameter 6.2. Supported Transport parameter
IANA is requested to maintain a new registry of Supported Transport IANA has created and maintains a new registry called "Supported
parameter in the Distributed Manager Option Transport" under the "Dynamic Host Configuration Protocol for IPv6
(DHCPv6)" registry at <https://www.iana.org/assignments/
dhcpv6-parameters>. This registry contains Supported Transport
parameters in the Distributed Manager Option
(OPTION_FORWARD_DIST_MANAGER) or the Reverse Distribution Manager (OPTION_FORWARD_DIST_MANAGER) or the Reverse Distribution Manager
Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are
defined in Figure 4 in Section 4.4. defined in Table 2 (Section 6.2).
The Name of the registry is: Supported Transport parameter
The registry description is: The Supported Transport field of the
DHCPv6 option is a two octet field that indicates the supported
transport protocols. Each bit represents a specific transport
mechanism.
The parent grouping is Dynamic Host Configuration Protocol for IPv6
(DHCPv6) at https://www.iana.org/assignments/dhcpv6-parameters/
dhcpv6-parameters.xhtml#dhcpv6-parameters-2.
New entry MUST specify the bit position, the Transport Protocol The Supported Transport field of the DHCPv6 option is a two-octet
Description a Mnemonic and a Reference as defined in Figure 5. field that indicates the Supported Transport protocols. Each bit
represents a specific transport mechanism.
The initial registry is as specified in Figure 5. New entries MUST specify the bit position, the transport protocol
description, a mnemonic, and a reference as shown in Table 2.
Changes of the format or policies of the registry is left to the IETF Changes to the format or policies of the registry are managed by the
via the IESG. IETF via the IESG.
Future code points are assigned under RFC Required as per [RFC8126]. Future code points are assigned under RFC Required per [RFC8126].
The initial registry is as specified in Table 2 below.
Bit Position | Transport Protocol | Mnemonic | Reference +======================+====================+==========+===========+
left to right| Description | | | Bit Position (least | Transport Protocol | Mnemonic | Reference |
-------------+--------------------+-----------+----------- | to most significant) | Description | | |
0 | DNS over mutually | DomTLS | This-RFC +======================+====================+==========+===========+
| authenticated TLS | | | 0 | DNS over mutually | DomTLS | RFC 9527 |
1-15 | unallocated | - | - | | authenticated TLS | | |
+----------------------+--------------------+----------+-----------+
| 1-15 | Unassigned | | |
+----------------------+--------------------+----------+-----------+
Figure 5: Supported Transport Table 2: Supported Transport Registry
7. Security Considerations 7. Security Considerations
The security considerations in [RFC8415] are to be considered. The The security considerations in [RFC8415] are to be considered. The
trust associated with the information carried by the DHCPv6 Options trust associated with the information carried by the DHCPv6 options
described in this document is similar to the one associated with the described in this document is similar to the one associated with the
IP prefix - when configured via DHCPv6. IP prefix, when configured via DHCPv6.
In some cases, the ISP MAY identify the HNA by its wire line, that is
to say physically which may not require to rely on TLS to
authenticate the HNA. As TLS is mandatory to be used, it is expected
the HNA is provisioned with a certificate. In some cases, the HNA
may use a self signed certificate.
8. Acknowledgments
We would like to thank Marcin Siodelski, Bernie Volz and Ted Lemon
for their comments on the design of the DHCPv6 options. We would
also like to thank Mark Andrews, Andrew Sullivan and Lorenzo Colliti
for their remarks on the architecture design. The designed solution
has been largely been inspired by Mark Andrews's document
[I-D.andrews-dnsop-pd-reverse] as well as discussions with Mark. We
also thank Ray Hunter and Michael Richardson for its reviews, its
comments and for suggesting an appropriated terminology.
9. Contributors
The co-authors would like to thank Chris Griffiths and Wouter
Cloetens that provided a significant contribution in the early
versions of the document.
10. References In some cases, the ISP MAY identify the HNA by its wire line (i.e.,
physically), which may not require relying on TLS to authenticate the
HNA. As the use of TLS is mandatory, it is expected that the HNA
will be provisioned with a certificate. In some cases, the HNA may
use a self-signed certificate.
10.1. Normative References 8. References
[I-D.ietf-homenet-front-end-naming-delegation] 8.1. Normative References
Migault, D., Weber, R., Richardson, M., and R. Hunter,
"Simple Provisioning of Public Names for Residential
Networks", Work in Progress, Internet-Draft, draft-ietf-
homenet-front-end-naming-delegation-22, 31 October 2022,
<https://datatracker.ietf.org/api/v1/doc/document/draft-
ietf-homenet-front-end-naming-delegation/>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D.,
and P. Hoffman, "Specification for DNS over Transport and P. Hoffman, "Specification for DNS over Transport
Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May
2016, <https://www.rfc-editor.org/info/rfc7858>. 2016, <https://www.rfc-editor.org/info/rfc7858>.
skipping to change at page 11, line 30 skipping to change at line 456
Richardson, M., Jiang, S., Lemon, T., and T. Winters, Richardson, M., Jiang, S., Lemon, T., and T. Winters,
"Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)",
RFC 8415, DOI 10.17487/RFC8415, November 2018, RFC 8415, DOI 10.17487/RFC8415, November 2018,
<https://www.rfc-editor.org/info/rfc8415>. <https://www.rfc-editor.org/info/rfc8415>.
[RFC9103] Toorop, W., Dickinson, S., Sahib, S., Aras, P., and A. [RFC9103] Toorop, W., Dickinson, S., Sahib, S., Aras, P., and A.
Mankin, "DNS Zone Transfer over TLS", RFC 9103, Mankin, "DNS Zone Transfer over TLS", RFC 9103,
DOI 10.17487/RFC9103, August 2021, DOI 10.17487/RFC9103, August 2021,
<https://www.rfc-editor.org/info/rfc9103>. <https://www.rfc-editor.org/info/rfc9103>.
10.2. Informative References [RFC9526] Migault, D., Weber, R., Richardson, M., and R. Hunter,
"Simple Provisioning of Public Names for Residential
Networks", RFC 9526, DOI 10.17487/RFC9526, January 2024,
<https://www.rfc-editor.org/info/rfc9526>.
[I-D.andrews-dnsop-pd-reverse] 8.2. Informative References
[CNAME-PLUS-DNAME]
SurĂ½, O., "CNAME+DNAME Name Redirection", Work in
Progress, Internet-Draft, draft-sury-dnsop-cname-plus-
dname-01, 15 July 2018,
<https://datatracker.ietf.org/doc/html/draft-sury-dnsop-
cname-plus-dname-01>.
[PD-REVERSE]
Andrews, M., "Automated Delegation of IP6.ARPA reverse Andrews, M., "Automated Delegation of IP6.ARPA reverse
zones with Prefix Delegation", Work in Progress, Internet- zones with Prefix Delegation", Work in Progress, Internet-
Draft, draft-andrews-dnsop-pd-reverse-02, 4 November 2013, Draft, draft-andrews-dnsop-pd-reverse-02, 5 November 2013,
<https://www.ietf.org/archive/id/draft-andrews-dnsop-pd- <https://datatracker.ietf.org/doc/html/draft-andrews-
reverse-02.txt>. dnsop-pd-reverse-02>.
[I-D.sury-dnsext-cname-dname]
Sury, O., "CNAME+DNAME Name Redirection", Work in
Progress, Internet-Draft, draft-sury-dnsext-cname-dname-
00, 15 April 2010, <https://www.ietf.org/archive/id/draft-
sury-dnsext-cname-dname-00.txt>.
[RFC1034] Mockapetris, P., "Domain names - concepts and facilities", [RFC1034] Mockapetris, P., "Domain names - concepts and facilities",
STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987,
<https://www.rfc-editor.org/info/rfc1034>. <https://www.rfc-editor.org/info/rfc1034>.
[RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS [RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS
Specification", RFC 2181, DOI 10.17487/RFC2181, July 1997, Specification", RFC 2181, DOI 10.17487/RFC2181, July 1997,
<https://www.rfc-editor.org/info/rfc2181>. <https://www.rfc-editor.org/info/rfc2181>.
[RFC6672] Rose, S. and W. Wijngaards, "DNAME Redirection in the [RFC6672] Rose, S. and W. Wijngaards, "DNAME Redirection in the
skipping to change at page 12, line 19 skipping to change at line 499
[RFC7227] Hankins, D., Mrugalski, T., Siodelski, M., Jiang, S., and [RFC7227] Hankins, D., Mrugalski, T., Siodelski, M., Jiang, S., and
S. Krishnan, "Guidelines for Creating New DHCPv6 Options", S. Krishnan, "Guidelines for Creating New DHCPv6 Options",
BCP 187, RFC 7227, DOI 10.17487/RFC7227, May 2014, BCP 187, RFC 7227, DOI 10.17487/RFC7227, May 2014,
<https://www.rfc-editor.org/info/rfc7227>. <https://www.rfc-editor.org/info/rfc7227>.
[RFC7368] Chown, T., Ed., Arkko, J., Brandt, A., Troan, O., and J. [RFC7368] Chown, T., Ed., Arkko, J., Brandt, A., Troan, O., and J.
Weil, "IPv6 Home Networking Architecture Principles", Weil, "IPv6 Home Networking Architecture Principles",
RFC 7368, DOI 10.17487/RFC7368, October 2014, RFC 7368, DOI 10.17487/RFC7368, October 2014,
<https://www.rfc-editor.org/info/rfc7368>. <https://www.rfc-editor.org/info/rfc7368>.
Appendix A. Scenarios and impact on the End User Appendix A. Scenarios and Impact on the End User
This appendix details various scenarios and discuss their impact on This appendix details various scenarios and discusses their impact on
the end user. This appendix is not normative and limits the the end user. This appendix is not normative and limits the
description of a limited scope of scenarios that are assumed to be description of a limited scope of scenarios that are assumed to be
representative. Many other scenarios may be derived from these. representative. Many other scenarios may be derived from these.
A.1. Base Scenario A.1. Base Scenario
The base scenario is the one described in Section 3 in which an ISP The base scenario, as described in Section 3, is one in which an ISP
manages the DHCPv6 server, the DM and RDM. manages the DHCPv6 server, DM, and RDM.
The end user subscribes to the ISP (foo), and at subscription time The end user subscribes to the ISP (foo), and at subscription time,
registers for foo.example as its Registered Homenet Domain it registers foo.example as its Registered Homenet Domain.
foo.example.
In this scenario, the DHCPv6 server, DM and RDM are managed by the In this scenario, the DHCPv6 server, DM, and RDM are managed by the
ISP so the DHCPv6 server and as such can provide authentication ISP, so the DHCPv6 server and such can provide authentication
credentials of the HNA to enable secure authenticated transaction credentials of the HNA to enable secure authenticated transaction
with the DM and the Reverse DM. with the DM and the Reverse DM.
The main advantage of this scenario is that the naming architecture The main advantage of this scenario is that the naming architecture
is configured automatically and transparently for the end user. The is configured automatically and transparently for the end user. The
drawbacks are that the end user uses a Registered Homenet Domain drawbacks are that the end user uses a Registered Homenet Domain
managed by the ISP and that it relies on the ISP naming managed by the ISP and that it relies on the ISP naming
infrastructure. infrastructure.
A.2. Third Party Registered Homenet Domain A.2. Third-Party Registered Homenet Domain
This appendix considers the case when the end user wants its home This appendix considers the case where the end user wants its home
network to use example.com not managed by her ISP (foo) as a network to use example.com but does not want it to be managed by the
Registered Homenet Domain. This appendix still considers the ISP ISP (foo) as a Registered Homenet Domain, and the ISP manages the
manages the home network and still provides foo.example as a home network and still provides foo.example as a Registered Homenet
Registered Homenet Domain. Domain.
When the end user buys the domain name example.com, it may request to When the end user buys the domain name example.com, it may request to
redirect the name example.com to foo.example using static redirection redirect example.com to foo.example using static redirection with
with CNAME [RFC2181], [RFC1034], DNAME [RFC6672] or CNAME+DNAME CNAME [RFC1034] [RFC2181], DNAME [RFC6672], or CNAME+DNAME
[I-D.sury-dnsext-cname-dname]. The only information the end user [CNAME-PLUS-DNAME]. The only information the end user needs to know
needs to know is the domain name assigned by the ISP. Once the is the domain name assigned by the ISP. Once the redirection has
redirection has been configured, the HNA may be changed, the zone can been configured, the HNA may be changed, and the zone can be updated
be updated as in Appendix A.1 without any additional configuration as described in Appendix A.1 without any additional configuration
from the end user. from the end user.
The main advantage of this scenario is that the end user benefits The main advantage of this scenario is that the end user benefits
from the Zero Configuration of the Base Scenario Appendix A.1. Then, from the zero configuration of the base scenario in Appendix A.1.
the end user is able to register for its home network an unlimited Then, the end user is able to register an unlimited number of domain
number of domain names provided by an unlimited number of different names provided by an unlimited number of different third-party
third party providers. The drawback of this scenario may be that the providers for its home network. The drawback of this scenario may be
end user still rely on the ISP naming infrastructure. Note that the that the end user still needs to rely on the ISP naming
only case this may be inconvenient is when the DNS servers provided infrastructure. Note that this may be inconvenient in the case where
by the ISPs results in high latency. the DNS servers provided by the ISPs result in high latency.
A.3. Third Party DNS Infrastructure A.3. Third-Party DNS Infrastructure
This scenario considers that the end user uses example.com as a This scenario involves the end user using example.com as a Registered
Registered Homenet Domain, and does not want to rely on the Homenet Domain and not relying on the authoritative servers provided
authoritative servers provided by the ISP. by the ISP.
In this appendix we limit the outsourcing to the DM and Public In this appendix, we limit the outsourcing of the DM and Public
Authoritative Server(s) to a third party. The Reverse Public Authoritative Server(s) to a third party. The Reverse Public
Authoritative Server(s) and the RDM remain managed by the ISP as the Authoritative Server(s) and the RDM remain managed by the ISP as the
IP prefix is managed by the ISP. IP prefix is managed by the ISP.
Outsourcing to a third party DM can be performed in the following Outsourcing to a third-party DM can be performed in the following
ways: ways:
1. Updating the DHCPv6 server Information. One can imagine a GUI 1. Updating the DHCPv6 server information. One can imagine a GUI
interface that enables the end user to modify its profile interface that enables the end user to modify its profile
parameters. Again, this configuration update is done once-for- parameters. Again, this configuration update only needs to be
ever. performed one time.
2. Upload the configuration of the DM to the HNA. In some cases, 2. Uploading the configuration of the DM to the HNA. In some cases,
the provider of the CPE router hosting the HNA may be the the provider of the CPE router hosting the HNA may be the
registrar and provide the CPE router already configured. In registrar, and the registrar may provide the CPE router already
other cases, the CPE router may request the end user to log into configured. In other cases, the CPE router may request the end
the registrar to validate the ownership of the Registered Homenet user to log into the registrar to validate the ownership of the
Domain and agree on the necessary credentials to secure the Registered Homenet Domain and agree on the necessary credentials
communication between the HNA and the DM. As described in to secure the communication between the HNA and the DM. As
[I-D.ietf-homenet-front-end-naming-delegation], such settings described in [RFC9526], such settings could be performed in an
could be performed in an almost automatic way as to limit the almost automatic way as to limit the necessary interactions with
necessary interactions with the end user. the end user.
A.4. Multiple ISPs A.4. Multiple ISPs
This scenario considers a HNA connected to multiple ISPs. This scenario involves an HNA connected to multiple ISPs.
Suppose the HNA has been configured each of its interfaces Suppose the HNA has configured each of its interfaces independently
independently with each ISPS as described in Appendix A.1. Each ISP with each ISP as described in Appendix A.1. Each ISP provides a
provides a different Registered Homenet Domain. different Registered Homenet Domain.
The protocol and DHCPv6 options described in this document are fully The protocol and DHCPv6 options described in this document are fully
compatible with a HNA connected to multiple ISPs with multiple compatible with an HNA connected to multiple ISPs with multiple
Registered Homenet Domains. However, the HNA should be able to Registered Homenet Domains. However, the HNA should be able to
handle different Registered Homenet Domains. This is an handle different Registered Homenet Domains. This is an
implementation issue which is outside the scope of the current implementation issue, which is outside the scope of this document.
document.
If a HNA is not able to handle multiple Registered Homenet Domains, If an HNA is not able to handle multiple Registered Homenet Domains,
the HNA may remain connected to multiple ISP with a single Registered the HNA may remain connected to multiple ISPs with a single
Homenet Domain. In this case, one entity is chosen to host the Registered Homenet Domain. In this case, one entity is chosen to
Registered Homenet Domain. This entity may be one of the ISP or a host the Registered Homenet Domain. This entity may be an ISP or a
third party. Note that having multiple ISPs can be motivated for third party. Note that having multiple ISPs can be motivation for
bandwidth aggregation, or connectivity fail-over. In the case of bandwidth aggregation or connectivity failover. In the case of
connectivity fail-over, the fail-over concerns the access network and connectivity failover, the failover concerns the access network, and
a failure of the access network may not impact the core network where a failure of the access network may not impact the core network where
the DM and Public Authoritative Primaries are hosted. In that sense, the DM and Public Authoritative Primaries are hosted. In that sense,
choosing one of the ISP even in a scenario of multiple ISPs may make choosing one of the ISPs even in a scenario of multiple ISPs may make
sense. However, for sake of simplicity, this scenario assumes that a sense. However, for the sake of simplicity, this scenario assumes
third party has been chosen to host the Registered Homenet Domain. that a third party has been chosen to host the Registered Homenet
Configuration is performed as described in Appendix A.2 and Domain. Configuration is performed as described in Appendices A.2
Appendix A.3. and A.3.
With the configuration described in Appendix A.2, the HNA is expected With the configuration described in Appendix A.2, the HNA is expected
to be able to handle multiple Homenet Registered Domain, as the third to be able to handle multiple Registered Homenet Domains as the
party redirect to one of the ISPs servers. With the configuration third-party redirect to one of the ISP's servers. With the
described in Appendix A.3, DNS zone are hosted and maintained by the configuration described in Appendix A.3, DNS zones are hosted and
third party. A single DNS(SEC) Homenet Zone is built and maintained maintained by the third party. A single DNS(SEC) Homenet Zone is
by the HNA. This latter configuration is likely to match most HNA built and maintained by the HNA. This latter configuration is likely
implementations. to match most HNA implementations.
The protocol and DHCPv6 options described in this document are fully The protocol and DHCPv6 options described in this document are fully
compatible with a HNA connected to multiple ISPs. To configure or compatible with an HNA connected to multiple ISPs. Whether to
not and how to configure the HNA depends on the HNA facilities. configure the HNA or not, and how to configure the HNA, depends on
Appendix A.1 and Appendix A.2 require the HNA to handle multiple the HNA facilities. Appendices A.1 and A.2 require the HNA to handle
Registered Homenet Domain, whereas Appendix A.3 does not have such multiple Registered Homenet Domains, whereas Appendix A.3 does not
requirement. have such a requirement.
Acknowledgments
We would like to thank Marcin Siodelski, Bernie Volz, and Ted Lemon
for their comments on the design of the DHCPv6 options. We would
also like to thank Mark Andrews, Andrew Sullivan, and Lorenzo Colliti
for their remarks on the architecture design. The designed solution
has been largely inspired by Mark Andrews's document [PD-REVERSE] as
well as discussions with Mark. We also thank Ray Hunter and Michael
Richardson for their reviews and comments and for suggesting
appropriate terminology.
Contributors
The coauthors would like to thank Chris Griffiths and Wouter Cloetens
for providing significant contributions to the early draft versions
of this document.
Authors' Addresses Authors' Addresses
Daniel Migault Daniel Migault
Ericsson Ericsson
8275 Trans Canada Route 8275 Trans Canada Route
Saint Laurent, QC 4S 0B6 Saint Laurent QC 4S 0B6
Canada Canada
Email: daniel.migault@ericsson.com Email: daniel.migault@ericsson.com
Ralf Weber Ralf Weber
Akamai Akamai
Email: ralf.weber@akamai.com Email: ralf.weber@akamai.com
Tomek Mrugalski Tomek Mrugalski
Internet Systems Consortium, Inc. Internet Systems Consortium, Inc.
950 Charter Street PO Box 360
Redwood City, 94063 Newmarket, NH 03857
United States of America United States of America
Email: tomasz.mrugalski@gmail.com Email: tomasz.mrugalski@gmail.com
 End of changes. 99 change blocks. 
345 lines changed or deleted 344 lines changed or added

This html diff was produced by rfcdiff 1.48.