| rfc9527.original | rfc9527.txt | |||
|---|---|---|---|---|
| Homenet D. Migault | Internet Engineering Task Force (IETF) D. Migault | |||
| Internet-Draft Ericsson | Request for Comments: 9527 Ericsson | |||
| Intended status: Standards Track R. Weber | Category: Standards Track R. Weber | |||
| Expires: 4 May 2023 Akamai | ISSN: 2070-1721 Akamai | |||
| T. Mrugalski | T. Mrugalski | |||
| Internet Systems Consortium, Inc. | ISC | |||
| 31 October 2022 | January 2024 | |||
| DHCPv6 Options for Home Network Naming Authority | DHCPv6 Options for the Homenet Naming Authority | |||
| draft-ietf-homenet-naming-architecture-dhc-options-24 | ||||
| Abstract | Abstract | |||
| This document defines DHCPv6 options so a Homenet Naming Authority | This document defines DHCPv6 options so that a Homenet Naming | |||
| (HNA) can automatically proceed to the appropriate configuration and | Authority (HNA) can automatically set the appropriate configuration | |||
| outsource the authoritative naming service for the home network. In | and outsource the authoritative naming service for the home network. | |||
| most cases, the outsourcing mechanism is transparent for the end | In most cases, the outsourcing mechanism is transparent for the end | |||
| user. | user. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
| provisions of BCP 78 and BCP 79. | ||||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
| Internet Standards is available in Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 4 May 2023. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9527. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2024 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
| extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
| described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
| provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
| in the Revised BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
| 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology | |||
| 3. Procedure Overview . . . . . . . . . . . . . . . . . . . . . 4 | 3. Procedure Overview | |||
| 4. DHCPv6 Option . . . . . . . . . . . . . . . . . . . . . . . . 5 | 4. DHCPv6 Options | |||
| 4.1. Registered Homenet Domain Option . . . . . . . . . . . . 5 | 4.1. Registered Homenet Domain Option | |||
| 4.2. Forward Distribution Manager Option . . . . . . . . . . . 5 | 4.2. Forward Distribution Manager Option | |||
| 4.3. Reverse Distribution Manager Server Option . . . . . . . 7 | 4.3. Reverse Distribution Manager Server Option | |||
| 4.4. Supported Transport . . . . . . . . . . . . . . . . . . . 7 | 4.4. Supported Transport | |||
| 5. DHCPv6 Behavior . . . . . . . . . . . . . . . . . . . . . . . 8 | 5. DHCPv6 Behavior | |||
| 5.1. DHCPv6 Server Behavior . . . . . . . . . . . . . . . . . 8 | 5.1. DHCPv6 Server Behavior | |||
| 5.2. DHCPv6 Client Behavior . . . . . . . . . . . . . . . . . 8 | 5.2. DHCPv6 Client Behavior | |||
| 5.3. DHCPv6 Relay Agent Behavior . . . . . . . . . . . . . . . 8 | 5.3. DHCPv6 Relay Agent Behavior | |||
| 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 | 6. IANA Considerations | |||
| 6.1. DHCPv6 Option Codes . . . . . . . . . . . . . . . . . . . 8 | 6.1. DHCPv6 Option Codes | |||
| 6.2. Supported Transport parameter . . . . . . . . . . . . . . 9 | 6.2. Supported Transport parameter | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | 7. Security Considerations | |||
| 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 | 8. References | |||
| 9. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 10 | 8.1. Normative References | |||
| 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 8.2. Informative References | |||
| 10.1. Normative References . . . . . . . . . . . . . . . . . . 10 | Appendix A. Scenarios and Impact on the End User | |||
| 10.2. Informative References . . . . . . . . . . . . . . . . . 11 | A.1. Base Scenario | |||
| Appendix A. Scenarios and impact on the End User . . . . . . . . 12 | A.2. Third-Party Registered Homenet Domain | |||
| A.1. Base Scenario . . . . . . . . . . . . . . . . . . . . . . 12 | A.3. Third-Party DNS Infrastructure | |||
| A.2. Third Party Registered Homenet Domain . . . . . . . . . . 12 | A.4. Multiple ISPs | |||
| A.3. Third Party DNS Infrastructure . . . . . . . . . . . . . 13 | Acknowledgments | |||
| A.4. Multiple ISPs . . . . . . . . . . . . . . . . . . . . . . 14 | Contributors | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | Authors' Addresses | |||
| 1. Terminology | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | ||||
| "OPTIONAL" in this document are to be interpreted as described in | ||||
| BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | ||||
| capitals, as shown here. | ||||
| The reader should be familiar with | ||||
| [I-D.ietf-homenet-front-end-naming-delegation]. | ||||
| 2. Introduction | 1. Introduction | |||
| [I-D.ietf-homenet-front-end-naming-delegation] specifies how an | [RFC9526] specifies how an entity designated as the Homenet Naming | |||
| entity designated as the Homenet Naming Authority (HNA) outsources a | Authority (HNA) outsources a Public Homenet Zone to a DNS Outsourcing | |||
| Public Homenet Zone to an DNS Outsourcing Infrastructure (DOI). | Infrastructure (DOI). | |||
| This document describes how a network can provision the HNA with a | This document describes how a network can provision the HNA with a | |||
| specific DOI. This could be particularly useful for a DOI partly | specific DOI. This could be particularly useful for a DOI partly | |||
| managed by an ISP, or to make home networks resilient to HNA | managed by an ISP or to make home networks resilient to HNA | |||
| replacement. The ISP delegates an IP prefix to the home network as | replacement. The ISP delegates an IP prefix and the associated | |||
| well as the associated reverse zone. The ISP is thus aware of the | reverse zone to the home network. The ISP is thus aware of the owner | |||
| owner of that IP prefix, and as such becomes a natural candidate for | of that IP prefix and, as such, becomes a natural candidate for | |||
| hosting the Homenet Reverse Zone - that is the Reverse Distribution | hosting the Homenet Reverse Zone -- that is, the Reverse Distribution | |||
| Manager (RDM) and potentially the Reverse Public Authoritative | Manager (RDM) and potentially the Reverse Public Authoritative | |||
| Servers. | Servers. | |||
| In addition, ISPs often identify the line of the home network with a | In addition, ISPs often identify the line of the home network with a | |||
| name. Such name is used for their internal network management | name. Such name is used for their internal network management | |||
| operations and is not a name the home network owner has registered | operations and is not a name the home network owner has registered | |||
| to. ISPs may leverage such infrastructure and provide the home | to. ISPs may leverage such infrastructure and provide the home | |||
| network with a specific domain name designated as per | network with a specific domain name designated per a Registered | |||
| [I-D.ietf-homenet-front-end-naming-delegation] a Homenet Registered | Homenet Domain [RFC9526]. Similarly to the reverse zone, ISPs are | |||
| Domain. Similarly to the reverse zone, ISPs are aware of who owns | aware of who owns that domain name and may become a natural candidate | |||
| that domain name and may become a natural candidate for hosting the | for hosting the Homenet Zone -- that is, the Distribution Manager | |||
| Homenet Zone - that is the Distribution Manager (DM) and the Public | (DM) and the Public Authoritative Servers. | |||
| Authoritative Servers. | ||||
| This document describes DHCPv6 options that enable an ISP to provide | This document describes DHCPv6 options that enable an ISP to provide | |||
| the necessary parameters to the HNA, to proceed. More specifically, | the necessary parameters to the HNA to proceed. More specifically, | |||
| the ISP provides the Registered Homenet Domain, necessary information | the ISP provides the Registered Homenet Domain and the necessary | |||
| on the DM and the RDM so the HNA can manage and upload the Public | information on the DM and the RDM so the HNA can manage and upload | |||
| Homenet Zone and the Reverse Public Homenet Zone as described in | the Public Homenet Zone and the Reverse Public Homenet Zone as | |||
| [I-D.ietf-homenet-front-end-naming-delegation]. | described in [RFC9526]. | |||
| The use of DHCPv6 options may make the configuration completely | The use of DHCPv6 options may make the configuration completely | |||
| transparent to the end user and provides a similar level of trust as | transparent to the end user and provides a similar level of trust as | |||
| the one used to provide the IP prefix - when provisioned via DHCP. | the one used to provide the IP prefix, when provisioned via DHCP. | |||
| 2. Terminology | ||||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | ||||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | ||||
| "OPTIONAL" in this document are to be interpreted as described in BCP | ||||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | ||||
| capitals, as shown here. | ||||
| The reader should be familiar with [RFC9526]. | ||||
| 3. Procedure Overview | 3. Procedure Overview | |||
| This section illustrates how a HNA receives the necessary information | This section illustrates how an HNA receives the necessary | |||
| via DHCPv6 options to outsource its authoritative naming service to | information via DHCPv6 options to outsource its authoritative naming | |||
| the DOI. For the sake of simplicity, and similarly to | service to the DOI. For the sake of simplicity, and similarly to | |||
| [I-D.ietf-homenet-front-end-naming-delegation], this section assumes | [RFC9526], this section assumes that the HNA and the home network | |||
| that the HNA and the home network DHCPv6 client are colocated on the | DHCPv6 client are colocated on the Customer Premises Equipment (CPE) | |||
| Customer Edge (CPE) router [RFC7368]. Note also that this is not | router [RFC7368]. Also, note that this is not mandatory, and the | |||
| mandatory and the DHCPv6 client may instruct remotely the HNA with a | DHCPv6 client may remotely instruct the HNA with a protocol that will | |||
| protocol that will be standardized in the future. In addition, this | be standardized in the future. In addition, this section assumes | |||
| section assumes the responsible entity for the DHCPv6 server is | that the responsible entity for the DHCPv6 server is provisioned with | |||
| provisioned with the DM and RDM information - associated with the | the DM and RDM information, which is associated with the requested | |||
| requested Registered Homenet Domain . This means a Registered Homenet | Registered Homenet Domain. This means a Registered Homenet Domain | |||
| Domain can be associated with the DHCPv6 client. | can be associated with the DHCPv6 client. | |||
| This scenario is believed to be the most popular scenario. This | This scenario is believed to be the most popular scenario. This | |||
| document does not ignore scenarios where the DHCPv6 server does not | document does not ignore scenarios where the DHCPv6 server does not | |||
| have privileged relations with the DM or RDM. These cases are | have privileged relations with the DM or RDM. These cases are | |||
| discussed in Appendix A. Such scenarios do not necessarily require | discussed in Appendix A. Such scenarios do not necessarily require | |||
| configuration for the end user and can also be zero-config. | configuration for the end user and can also be zero configuration. | |||
| The scenario considered in this section is as follows: | The scenario considered in this section is as follows: | |||
| 1. The HNA is willing to outsource the Public Homenet Zone or | 1. The HNA is willing to outsource the Public Homenet Zone or | |||
| Homenet Reverse Zone. The DHCPv6 client is configured to include | Homenet Reverse Zone. The DHCPv6 client is configured to include | |||
| in its Option Request Option (ORO) the Registered Homenet Domain | in its Option Request Option (ORO) the Registered Homenet Domain | |||
| Option (OPTION_REGISTERED_DOMAIN), the Forward Distribution | Option (OPTION_REGISTERED_DOMAIN), the Forward Distribution | |||
| Manager Option (OPTION_FORWARD_DIST_MANAGER) and the Reverse | Manager Option (OPTION_FORWARD_DIST_MANAGER), and the Reverse | |||
| Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option | Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option | |||
| codes. | codes. | |||
| 2. The DHCPv6 server responds to the DHCPv6 client with the | 2. The DHCPv6 server responds to the DHCPv6 client with the | |||
| requested DHCPv6 options based on the identified homenet. The | requested DHCPv6 options based on the identified homenet. The | |||
| DHCPv6 client passes the information to the HNA. | DHCPv6 client passes the information to the HNA. | |||
| 3. The HNA is authenticated (see Section "Securing the Control | 3. The HNA is authenticated (see "Securing the Control Channel" | |||
| Channel" of [I-D.ietf-homenet-front-end-naming-delegation]) by | (Section 6.6) of [RFC9526]) by the DM and the RDM. The HNA | |||
| the DM and the RDM. The HNA builds the Homenet Zone (or the | builds the Homenet Zone (or the Homenet Reverse Zone) and | |||
| Homenet Reverse Zone) and proceed as described in | proceeds as described in [RFC9526]. The DHCPv6 options provide | |||
| [I-D.ietf-homenet-front-end-naming-delegation]. The DHCPv6 | the necessary non-optional parameters described in Appendix B of | |||
| options provide the necessary non optional parameters described | [RFC9526]. The HNA may complement the configurations with | |||
| in Appendix B of [I-D.ietf-homenet-front-end-naming-delegation]. | additional parameters via means not yet defined. Appendix B of | |||
| The HNA may complement the configurations with additional | [RFC9526] describes such parameters that may take some specific | |||
| parameters via means not yet defined. Appendix B of | non-default value. | |||
| [I-D.ietf-homenet-front-end-naming-delegation] describes such | ||||
| parameters that may take some specific non default value. | ||||
| 4. DHCPv6 Option | 4. DHCPv6 Options | |||
| This section details the payload of the DHCPv6 options following the | This section details the payload of the DHCPv6 options following the | |||
| guidelines of [RFC7227]. | guidelines of [RFC7227]. | |||
| 4.1. Registered Homenet Domain Option | 4.1. Registered Homenet Domain Option | |||
| The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the | The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the | |||
| FQDN associated with the home network. | fully qualified domain name (FQDN) associated with the home network. | |||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | OPTION_REGISTERED_DOMAIN | option-len | | | OPTION_REGISTERED_DOMAIN | option-len | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | |||
| / Registered Homenet Domain / | / Registered Homenet Domain / | |||
| | | | | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 1: Registered Domain Option | Figure 1: Registered Domain Option | |||
| * option-code (16 bits): OPTION_REGISTERED_DOMAIN, the option code | option-code (16 bits): OPTION_REGISTERED_DOMAIN; the option code for | |||
| for the Registered Homenet Domain (TBD1). | the Registered Homenet Domain (145). | |||
| * option-len (16 bits): length in octets of the Registered Homenet | option-len (16 bits): Length in octets of the Registered Homenet | |||
| Domain field as described in [RFC8415]. | Domain field as described in [RFC8415]. | |||
| * Registered Homenet Domain (variable): the FQDN registered for the | Registered Homenet Domain (variable): The FQDN registered for the | |||
| homenet encoded as described in Section 10 of [RFC8415]. | homenet encoded as described in Section 10 of [RFC8415]. | |||
| 4.2. Forward Distribution Manager Option | 4.2. Forward Distribution Manager Option | |||
| The Forward Distributed Manager Option (OPTION_FORWARD_DIST_MANAGER) | The Forward Distribution Manager Option (OPTION_FORWARD_DIST_MANAGER) | |||
| provides the HNA with the FQDN of the DM as well as the transport | provides the HNA with the FQDN of the DM as well as the transport | |||
| protocols for the communication between the HNA and the DM. As | protocols for the communication between the HNA and the DM. As | |||
| opposed to IP addresses, the FQDN requires a DNS resolution before | opposed to IP addresses, the FQDN requires a DNS resolution before | |||
| establishing the communication between the HNA and the DM. However, | establishing the communication between the HNA and the DM. However, | |||
| the use of a FQDN provides multiple advantages over IP addresses. | the use of an FQDN provides multiple advantages over IP addresses. | |||
| Firstly, it makes the DHCPv6 Option easier to parse and smaller - | Firstly, it makes the DHCPv6 option easier to parse and smaller, | |||
| especially when IPv4 and IPv6 addresses are expected to be provided. | especially when IPv4 and IPv6 addresses are expected to be provided. | |||
| Then the FQDN can reasonably be seen as a more stable identifier than | Then, the FQDN can reasonably be seen as a more stable identifier | |||
| IP addresses, as well as a pointer to additional information that may | than IP addresses as well as a pointer to additional information that | |||
| be useful, in the future, to establish the communication between the | may be useful, in the future, to establish the communication between | |||
| HNA and the DM. | the HNA and the DM. | |||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | OPTION_FORWARD_DIST_MANAGER | option-len | | | OPTION_FORWARD_DIST_MANAGER | option-len | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Supported Transport | | | | Supported Transport | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | |||
| | | | | | | |||
| / Distribution Manager FQDN / | / Distribution Manager FQDN / | |||
| | | | | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 2: Forward Distribution Manager Option | Figure 2: Forward Distribution Manager Option | |||
| * option-code (16 bits): OPTION_FORWARD_DIST_MANAGER, the option | option-code (16 bits): OPTION_FORWARD_DIST_MANAGER; the option code | |||
| code for the Forward Distribution Manager Option (TBD2). | for the Forward Distribution Manager Option (146). | |||
| * option-len (16 bits): length in octets of the enclosed data as | option-len (16 bits): Length in octets of the enclosed data as | |||
| described in [RFC8415]. | described in [RFC8415]. | |||
| * Supported Transport (16 bits): defines the supported transport by | Supported Transport (16 bits): Defines the Supported Transport by | |||
| the DM (see Section 4.4). Each bit represents a supported | the DM (see Section 4.4). Each bit represents a supported | |||
| transport, and a DM MAY indicate the support of multiple modes. | transport, and a DM MAY indicate the support of multiple modes. | |||
| The bit for DNS over mutually authenticated TLS (DomTLS) MUST be | The bit for DNS over mutually authenticated TLS (DomTLS) MUST be | |||
| set. | set. | |||
| * Distribution Manager FQDN (variable): the FQDN of the DM encoded | Distribution Manager FQDN (variable): The FQDN of the DM encoded as | |||
| as described in Section 10 of [RFC8415]. | described in Section 10 of [RFC8415]. | |||
| It is worth noticing that the DHCP Option specifies the Supported | It is worth noting that the DHCPv6 option specifies the Supported | |||
| Transport without specifying any explicit port. Unless the HNA and | Transport without specifying any explicit port. Unless the HNA and | |||
| the DM have agreed on using a specific port - for example by | the DM have agreed on using a specific port -- for example, by | |||
| configuration, or any out of band mechanism -, the default port is | configuration, or any out-of-band mechanism -- the default port is | |||
| used and must be specified. The specification of such default port | used and must be specified. The specification of such default port | |||
| may be defined in the specification of the designated Supported | may be defined in the specification of the designated Supported | |||
| Transport or in any other document. In the case of DNS over mutually | Transport or in any other document. In the case of DomTLS, the | |||
| authenticated TLS (DomTLS), the default port value is 853 as per DNS | default port value is 853 per DNS over TLS [RFC7858] and DNS Zone | |||
| over TLS [RFC7858] and DNS Zone Transfer over TLS [RFC9103]. | Transfer over TLS [RFC9103]. | |||
| The need to associate in the DHCP Option the port value to each | The need to associate the port value to each Supported Transport in | |||
| Supported Transport has been balanced with the difficulty of handling | the DHCPv6 option has been balanced with the difficulty of handling a | |||
| a list of tuples ( transport, port ) as well as the possibility to | list of tuples (transport, port) and the possibility of using a | |||
| use a dedicated IP address for the DM in case the default port was | dedicated IP address for the DM in case the default port is already | |||
| already in use. | in use. | |||
| 4.3. Reverse Distribution Manager Server Option | 4.3. Reverse Distribution Manager Server Option | |||
| The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) | The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) | |||
| provides the HNA with the FQDN of the DM as well as the transport | provides the HNA with the FQDN of the DM as well as the transport | |||
| protocols for the communication between the HNA and the DM. | protocols for the communication between the HNA and the DM. | |||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | OPTION_REVERSE_DIST_MANAGER | option-len | | | OPTION_REVERSE_DIST_MANAGER | option-len | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Supported Transport | | | | Supported Transport | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | |||
| | | | | | | |||
| / Reverse Distribution Manager FQDN / | / Reverse Distribution Manager FQDN / | |||
| | | | | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Figure 3: Reverse Distribution Manager Option | Figure 3: Reverse Distribution Manager Option | |||
| * option-code (16 bits): OPTION_REVERSE_DIST_MANAGER, the option | option-code (16 bits): OPTION_REVERSE_DIST_MANAGER; the option code | |||
| code for the Reverse Distribution Manager Option (TBD3). | for the Reverse Distribution Manager Option (147). | |||
| * option-len (16 bits): length in octets of the option-data field as | option-len (16 bits): Length in octets of the option-data field as | |||
| described in [RFC8415]. | described in [RFC8415]. | |||
| * Supported Transport (16 bits): defines the supported transport by | Supported Transport (16 bits): Defines the Supported Transport by | |||
| the RDM (see Section 4.4). Each bit represents a supported | the RDM (see Section 4.4). Each bit represents a supported | |||
| transport, and a RDM MAY indicate the support of multiple modes. | transport, and an RDM MAY indicate the support of multiple modes. | |||
| The bit for DNS over mutually authenticated TLS [RFC7858] MUST be | The bit for DomTLS [RFC7858] MUST be set. | |||
| set. | ||||
| * Reverse Distribution Manager FQDN (variable): the FQDN of the RDM | Reverse Distribution Manager FQDN (variable): The FQDN of the RDM | |||
| encoded as described in section 10 of [RFC8415]. | encoded as described in Section 10 of [RFC8415]. | |||
| For the port number associated to the Supported Transport, the same | For the port number associated to the Supported Transport, the same | |||
| considerations as described in Section 4.2 holds. | considerations as described in Section 4.2 apply. | |||
| 4.4. Supported Transport | 4.4. Supported Transport | |||
| The Supported Transport field of the DHCPv6 option indicates the | The Supported Transport field of the DHCPv6 option indicates the | |||
| supported transport protocols. Each bit represents a specific | Supported Transport protocols. Each bit represents a specific | |||
| transport mechanism. A bit sets to 1 indicates the associated | transport mechanism. A bit set to 1 indicates the associated | |||
| transport protocol is supported. The corresponding bits are assigned | transport protocol is supported. The corresponding bits are assigned | |||
| as described in Figure 4 and Section 6. | as described in Table 2. | |||
| Bit Position | Transport Protocol | Mnemonic | Reference | DNS over mutually authenticated TLS (DomTLS): Indicates the support | |||
| left to right| Description | | | of DNS over TLS [RFC7858] and DNS Zone Transfer over TLS [RFC9103] | |||
| -------------+--------------------+-----------+----------- | as described in [RFC9526]. | |||
| 0 | DNS over mutually | DomTLS | This-RFC | ||||
| | authenticated TLS | | | ||||
| 1-15 | unallocated | - | - | ||||
| Figure 4: Supported Transport | As an example, the Supported Transport field expressing support for | |||
| DomTLS looks as follows and has a numeric value of 0x0001: | ||||
| DNS over mutually authenticated TLS (DomTLS): indicates the support | 0 1 | |||
| of DNS over TLS [RFC7858], DNS Zone Transfer over TLS [RFC9103] as | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 | |||
| described in [I-D.ietf-homenet-front-end-naming-delegation]. | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | must be zero |1| | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| 5. DHCPv6 Behavior | 5. DHCPv6 Behavior | |||
| 5.1. DHCPv6 Server Behavior | 5.1. DHCPv6 Server Behavior | |||
| Sections 17.2.2 and 18.2 of [RFC8415] govern server operation | Section 18.3 of [RFC8415] governs server operation regarding option | |||
| regarding option assignment. As a convenience to the reader, we | assignment. As a convenience to the reader, we mention here that the | |||
| mention here that the server will send option foo only if configured | server will send option foo only if configured with specific values | |||
| with specific values for foo and if the client requested it. In | for foo and if the client requested it. In particular, when | |||
| particular, when configured the DHCPv6 server sends the Registered | configured, the DHCPv6 server sends the Registered Homenet Domain | |||
| Homenet Domain Option, Distribution Manager Option, the Reverse | Option, Distribution Manager Option, and Reverse Distribution Manager | |||
| Distribution Manager Option when requested by the DHCPv6 client by | Option when requested by the DHCPv6 client by including necessary | |||
| including necessary option codes in its ORO. | option codes in its ORO. | |||
| 5.2. DHCPv6 Client Behavior | 5.2. DHCPv6 Client Behavior | |||
| The DHCPv6 client includes Registered Homenet Domain Option, | The DHCPv6 client includes the Registered Homenet Domain Option, | |||
| Distribution Manager Option, the Reverse Distribution Manager Option | Distribution Manager Option, and Reverse Distribution Manager Option | |||
| in an ORO as specified in Sections 18.2.1, 18.2.2, 18.2.4, 18.2.5, | in an ORO as specified in Sections 18.2 and 21.7 of [RFC8415]. | |||
| 18.2.6, and 21.7 of [RFC8415]. | ||||
| Upon receiving a DHCPv6 option described in this document in the | Upon receiving a DHCPv6 option, as described in this document, in the | |||
| Reply message, the HNA SHOULD proceed as described in | Reply message, the HNA SHOULD proceed as described in [RFC9526]. | |||
| [I-D.ietf-homenet-front-end-naming-delegation]. | ||||
| 5.3. DHCPv6 Relay Agent Behavior | 5.3. DHCPv6 Relay Agent Behavior | |||
| There are no additional requirements for the DHCPv6 Relay agents. | There are no additional requirements for the DHCPv6 Relay agents. | |||
| 6. IANA Considerations | 6. IANA Considerations | |||
| 6.1. DHCPv6 Option Codes | 6.1. DHCPv6 Option Codes | |||
| IANA is requested to assign the following new DHCPv6 Option Codes in | IANA has assigned the following new DHCPv6 Option Codes in the | |||
| the registry maintained in: https://www.iana.org/assignments/dhcpv6- | "Option Codes" registry maintained at | |||
| parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2. | <https://www.iana.org/assignments/dhcpv6-parameters>. | |||
| Value Description Client ORO Singleton Option Reference | +=====+=============================+======+===========+===========+ | |||
| TBD1 OPTION_REGISTERED_DOMAIN Yes No [This-RFC] Section 4.1 | |Value| Description |Client| Singleton | Reference | | |||
| TBD2 OPTION_FORWARD_DIST_MANAGER Yes Yes [This-RFC] Section 4.2 | | | |ORO | Option | | | |||
| TBD3 OPTION_REVERSE_DIST_MANAGER Yes Yes [This-RFC] Section 4.3 | +=====+=============================+======+===========+===========+ | |||
| |145 | OPTION_REGISTERED_DOMAIN |Yes | No | RFC 9527, | | ||||
| | | | | | Section | | ||||
| | | | | | 4.1 | | ||||
| +-----+-----------------------------+------+-----------+-----------+ | ||||
| |146 | OPTION_FORWARD_DIST_MANAGER |Yes | Yes | RFC 9527, | | ||||
| | | | | | Section | | ||||
| | | | | | 4.2 | | ||||
| +-----+-----------------------------+------+-----------+-----------+ | ||||
| |147 | OPTION_REVERSE_DIST_MANAGER |Yes | Yes | RFC 9527, | | ||||
| | | | | | Section | | ||||
| | | | | | 4.3 | | ||||
| +-----+-----------------------------+------+-----------+-----------+ | ||||
| Table 1: Option Codes Registry | ||||
| 6.2. Supported Transport parameter | 6.2. Supported Transport parameter | |||
| IANA is requested to maintain a new registry of Supported Transport | IANA has created and maintains a new registry called "Supported | |||
| parameter in the Distributed Manager Option | Transport" under the "Dynamic Host Configuration Protocol for IPv6 | |||
| (DHCPv6)" registry at <https://www.iana.org/assignments/ | ||||
| dhcpv6-parameters>. This registry contains Supported Transport | ||||
| parameters in the Distributed Manager Option | ||||
| (OPTION_FORWARD_DIST_MANAGER) or the Reverse Distribution Manager | (OPTION_FORWARD_DIST_MANAGER) or the Reverse Distribution Manager | |||
| Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are | Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are | |||
| defined in Figure 4 in Section 4.4. | defined in Table 2 (Section 6.2). | |||
| The Name of the registry is: Supported Transport parameter | ||||
| The registry description is: The Supported Transport field of the | ||||
| DHCPv6 option is a two octet field that indicates the supported | ||||
| transport protocols. Each bit represents a specific transport | ||||
| mechanism. | ||||
| The parent grouping is Dynamic Host Configuration Protocol for IPv6 | ||||
| (DHCPv6) at https://www.iana.org/assignments/dhcpv6-parameters/ | ||||
| dhcpv6-parameters.xhtml#dhcpv6-parameters-2. | ||||
| New entry MUST specify the bit position, the Transport Protocol | The Supported Transport field of the DHCPv6 option is a two-octet | |||
| Description a Mnemonic and a Reference as defined in Figure 5. | field that indicates the Supported Transport protocols. Each bit | |||
| represents a specific transport mechanism. | ||||
| The initial registry is as specified in Figure 5. | New entries MUST specify the bit position, the transport protocol | |||
| description, a mnemonic, and a reference as shown in Table 2. | ||||
| Changes of the format or policies of the registry is left to the IETF | Changes to the format or policies of the registry are managed by the | |||
| via the IESG. | IETF via the IESG. | |||
| Future code points are assigned under RFC Required as per [RFC8126]. | Future code points are assigned under RFC Required per [RFC8126]. | |||
| The initial registry is as specified in Table 2 below. | ||||
| Bit Position | Transport Protocol | Mnemonic | Reference | +======================+====================+==========+===========+ | |||
| left to right| Description | | | | Bit Position (least | Transport Protocol | Mnemonic | Reference | | |||
| -------------+--------------------+-----------+----------- | | to most significant) | Description | | | | |||
| 0 | DNS over mutually | DomTLS | This-RFC | +======================+====================+==========+===========+ | |||
| | authenticated TLS | | | | 0 | DNS over mutually | DomTLS | RFC 9527 | | |||
| 1-15 | unallocated | - | - | | | authenticated TLS | | | | |||
| +----------------------+--------------------+----------+-----------+ | ||||
| | 1-15 | Unassigned | | | | ||||
| +----------------------+--------------------+----------+-----------+ | ||||
| Figure 5: Supported Transport | Table 2: Supported Transport Registry | |||
| 7. Security Considerations | 7. Security Considerations | |||
| The security considerations in [RFC8415] are to be considered. The | The security considerations in [RFC8415] are to be considered. The | |||
| trust associated with the information carried by the DHCPv6 Options | trust associated with the information carried by the DHCPv6 options | |||
| described in this document is similar to the one associated with the | described in this document is similar to the one associated with the | |||
| IP prefix - when configured via DHCPv6. | IP prefix, when configured via DHCPv6. | |||
| In some cases, the ISP MAY identify the HNA by its wire line, that is | ||||
| to say physically which may not require to rely on TLS to | ||||
| authenticate the HNA. As TLS is mandatory to be used, it is expected | ||||
| the HNA is provisioned with a certificate. In some cases, the HNA | ||||
| may use a self signed certificate. | ||||
| 8. Acknowledgments | ||||
| We would like to thank Marcin Siodelski, Bernie Volz and Ted Lemon | ||||
| for their comments on the design of the DHCPv6 options. We would | ||||
| also like to thank Mark Andrews, Andrew Sullivan and Lorenzo Colliti | ||||
| for their remarks on the architecture design. The designed solution | ||||
| has been largely been inspired by Mark Andrews's document | ||||
| [I-D.andrews-dnsop-pd-reverse] as well as discussions with Mark. We | ||||
| also thank Ray Hunter and Michael Richardson for its reviews, its | ||||
| comments and for suggesting an appropriated terminology. | ||||
| 9. Contributors | ||||
| The co-authors would like to thank Chris Griffiths and Wouter | ||||
| Cloetens that provided a significant contribution in the early | ||||
| versions of the document. | ||||
| 10. References | In some cases, the ISP MAY identify the HNA by its wire line (i.e., | |||
| physically), which may not require relying on TLS to authenticate the | ||||
| HNA. As the use of TLS is mandatory, it is expected that the HNA | ||||
| will be provisioned with a certificate. In some cases, the HNA may | ||||
| use a self-signed certificate. | ||||
| 10.1. Normative References | 8. References | |||
| [I-D.ietf-homenet-front-end-naming-delegation] | 8.1. Normative References | |||
| Migault, D., Weber, R., Richardson, M., and R. Hunter, | ||||
| "Simple Provisioning of Public Names for Residential | ||||
| Networks", Work in Progress, Internet-Draft, draft-ietf- | ||||
| homenet-front-end-naming-delegation-22, 31 October 2022, | ||||
| <https://datatracker.ietf.org/api/v1/doc/document/draft- | ||||
| ietf-homenet-front-end-naming-delegation/>. | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | |||
| and P. Hoffman, "Specification for DNS over Transport | and P. Hoffman, "Specification for DNS over Transport | |||
| Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | |||
| 2016, <https://www.rfc-editor.org/info/rfc7858>. | 2016, <https://www.rfc-editor.org/info/rfc7858>. | |||
| skipping to change at page 11, line 30 ¶ | skipping to change at line 456 ¶ | |||
| Richardson, M., Jiang, S., Lemon, T., and T. Winters, | Richardson, M., Jiang, S., Lemon, T., and T. Winters, | |||
| "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", | "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", | |||
| RFC 8415, DOI 10.17487/RFC8415, November 2018, | RFC 8415, DOI 10.17487/RFC8415, November 2018, | |||
| <https://www.rfc-editor.org/info/rfc8415>. | <https://www.rfc-editor.org/info/rfc8415>. | |||
| [RFC9103] Toorop, W., Dickinson, S., Sahib, S., Aras, P., and A. | [RFC9103] Toorop, W., Dickinson, S., Sahib, S., Aras, P., and A. | |||
| Mankin, "DNS Zone Transfer over TLS", RFC 9103, | Mankin, "DNS Zone Transfer over TLS", RFC 9103, | |||
| DOI 10.17487/RFC9103, August 2021, | DOI 10.17487/RFC9103, August 2021, | |||
| <https://www.rfc-editor.org/info/rfc9103>. | <https://www.rfc-editor.org/info/rfc9103>. | |||
| 10.2. Informative References | [RFC9526] Migault, D., Weber, R., Richardson, M., and R. Hunter, | |||
| "Simple Provisioning of Public Names for Residential | ||||
| Networks", RFC 9526, DOI 10.17487/RFC9526, January 2024, | ||||
| <https://www.rfc-editor.org/info/rfc9526>. | ||||
| [I-D.andrews-dnsop-pd-reverse] | 8.2. Informative References | |||
| [CNAME-PLUS-DNAME] | ||||
| SurĂ½, O., "CNAME+DNAME Name Redirection", Work in | ||||
| Progress, Internet-Draft, draft-sury-dnsop-cname-plus- | ||||
| dname-01, 15 July 2018, | ||||
| <https://datatracker.ietf.org/doc/html/draft-sury-dnsop- | ||||
| cname-plus-dname-01>. | ||||
| [PD-REVERSE] | ||||
| Andrews, M., "Automated Delegation of IP6.ARPA reverse | Andrews, M., "Automated Delegation of IP6.ARPA reverse | |||
| zones with Prefix Delegation", Work in Progress, Internet- | zones with Prefix Delegation", Work in Progress, Internet- | |||
| Draft, draft-andrews-dnsop-pd-reverse-02, 4 November 2013, | Draft, draft-andrews-dnsop-pd-reverse-02, 5 November 2013, | |||
| <https://www.ietf.org/archive/id/draft-andrews-dnsop-pd- | <https://datatracker.ietf.org/doc/html/draft-andrews- | |||
| reverse-02.txt>. | dnsop-pd-reverse-02>. | |||
| [I-D.sury-dnsext-cname-dname] | ||||
| Sury, O., "CNAME+DNAME Name Redirection", Work in | ||||
| Progress, Internet-Draft, draft-sury-dnsext-cname-dname- | ||||
| 00, 15 April 2010, <https://www.ietf.org/archive/id/draft- | ||||
| sury-dnsext-cname-dname-00.txt>. | ||||
| [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", | [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", | |||
| STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, | STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, | |||
| <https://www.rfc-editor.org/info/rfc1034>. | <https://www.rfc-editor.org/info/rfc1034>. | |||
| [RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS | [RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS | |||
| Specification", RFC 2181, DOI 10.17487/RFC2181, July 1997, | Specification", RFC 2181, DOI 10.17487/RFC2181, July 1997, | |||
| <https://www.rfc-editor.org/info/rfc2181>. | <https://www.rfc-editor.org/info/rfc2181>. | |||
| [RFC6672] Rose, S. and W. Wijngaards, "DNAME Redirection in the | [RFC6672] Rose, S. and W. Wijngaards, "DNAME Redirection in the | |||
| skipping to change at page 12, line 19 ¶ | skipping to change at line 499 ¶ | |||
| [RFC7227] Hankins, D., Mrugalski, T., Siodelski, M., Jiang, S., and | [RFC7227] Hankins, D., Mrugalski, T., Siodelski, M., Jiang, S., and | |||
| S. Krishnan, "Guidelines for Creating New DHCPv6 Options", | S. Krishnan, "Guidelines for Creating New DHCPv6 Options", | |||
| BCP 187, RFC 7227, DOI 10.17487/RFC7227, May 2014, | BCP 187, RFC 7227, DOI 10.17487/RFC7227, May 2014, | |||
| <https://www.rfc-editor.org/info/rfc7227>. | <https://www.rfc-editor.org/info/rfc7227>. | |||
| [RFC7368] Chown, T., Ed., Arkko, J., Brandt, A., Troan, O., and J. | [RFC7368] Chown, T., Ed., Arkko, J., Brandt, A., Troan, O., and J. | |||
| Weil, "IPv6 Home Networking Architecture Principles", | Weil, "IPv6 Home Networking Architecture Principles", | |||
| RFC 7368, DOI 10.17487/RFC7368, October 2014, | RFC 7368, DOI 10.17487/RFC7368, October 2014, | |||
| <https://www.rfc-editor.org/info/rfc7368>. | <https://www.rfc-editor.org/info/rfc7368>. | |||
| Appendix A. Scenarios and impact on the End User | Appendix A. Scenarios and Impact on the End User | |||
| This appendix details various scenarios and discuss their impact on | This appendix details various scenarios and discusses their impact on | |||
| the end user. This appendix is not normative and limits the | the end user. This appendix is not normative and limits the | |||
| description of a limited scope of scenarios that are assumed to be | description of a limited scope of scenarios that are assumed to be | |||
| representative. Many other scenarios may be derived from these. | representative. Many other scenarios may be derived from these. | |||
| A.1. Base Scenario | A.1. Base Scenario | |||
| The base scenario is the one described in Section 3 in which an ISP | The base scenario, as described in Section 3, is one in which an ISP | |||
| manages the DHCPv6 server, the DM and RDM. | manages the DHCPv6 server, DM, and RDM. | |||
| The end user subscribes to the ISP (foo), and at subscription time | The end user subscribes to the ISP (foo), and at subscription time, | |||
| registers for foo.example as its Registered Homenet Domain | it registers foo.example as its Registered Homenet Domain. | |||
| foo.example. | ||||
| In this scenario, the DHCPv6 server, DM and RDM are managed by the | In this scenario, the DHCPv6 server, DM, and RDM are managed by the | |||
| ISP so the DHCPv6 server and as such can provide authentication | ISP, so the DHCPv6 server and such can provide authentication | |||
| credentials of the HNA to enable secure authenticated transaction | credentials of the HNA to enable secure authenticated transaction | |||
| with the DM and the Reverse DM. | with the DM and the Reverse DM. | |||
| The main advantage of this scenario is that the naming architecture | The main advantage of this scenario is that the naming architecture | |||
| is configured automatically and transparently for the end user. The | is configured automatically and transparently for the end user. The | |||
| drawbacks are that the end user uses a Registered Homenet Domain | drawbacks are that the end user uses a Registered Homenet Domain | |||
| managed by the ISP and that it relies on the ISP naming | managed by the ISP and that it relies on the ISP naming | |||
| infrastructure. | infrastructure. | |||
| A.2. Third Party Registered Homenet Domain | A.2. Third-Party Registered Homenet Domain | |||
| This appendix considers the case when the end user wants its home | This appendix considers the case where the end user wants its home | |||
| network to use example.com not managed by her ISP (foo) as a | network to use example.com but does not want it to be managed by the | |||
| Registered Homenet Domain. This appendix still considers the ISP | ISP (foo) as a Registered Homenet Domain, and the ISP manages the | |||
| manages the home network and still provides foo.example as a | home network and still provides foo.example as a Registered Homenet | |||
| Registered Homenet Domain. | Domain. | |||
| When the end user buys the domain name example.com, it may request to | When the end user buys the domain name example.com, it may request to | |||
| redirect the name example.com to foo.example using static redirection | redirect example.com to foo.example using static redirection with | |||
| with CNAME [RFC2181], [RFC1034], DNAME [RFC6672] or CNAME+DNAME | CNAME [RFC1034] [RFC2181], DNAME [RFC6672], or CNAME+DNAME | |||
| [I-D.sury-dnsext-cname-dname]. The only information the end user | [CNAME-PLUS-DNAME]. The only information the end user needs to know | |||
| needs to know is the domain name assigned by the ISP. Once the | is the domain name assigned by the ISP. Once the redirection has | |||
| redirection has been configured, the HNA may be changed, the zone can | been configured, the HNA may be changed, and the zone can be updated | |||
| be updated as in Appendix A.1 without any additional configuration | as described in Appendix A.1 without any additional configuration | |||
| from the end user. | from the end user. | |||
| The main advantage of this scenario is that the end user benefits | The main advantage of this scenario is that the end user benefits | |||
| from the Zero Configuration of the Base Scenario Appendix A.1. Then, | from the zero configuration of the base scenario in Appendix A.1. | |||
| the end user is able to register for its home network an unlimited | Then, the end user is able to register an unlimited number of domain | |||
| number of domain names provided by an unlimited number of different | names provided by an unlimited number of different third-party | |||
| third party providers. The drawback of this scenario may be that the | providers for its home network. The drawback of this scenario may be | |||
| end user still rely on the ISP naming infrastructure. Note that the | that the end user still needs to rely on the ISP naming | |||
| only case this may be inconvenient is when the DNS servers provided | infrastructure. Note that this may be inconvenient in the case where | |||
| by the ISPs results in high latency. | the DNS servers provided by the ISPs result in high latency. | |||
| A.3. Third Party DNS Infrastructure | A.3. Third-Party DNS Infrastructure | |||
| This scenario considers that the end user uses example.com as a | This scenario involves the end user using example.com as a Registered | |||
| Registered Homenet Domain, and does not want to rely on the | Homenet Domain and not relying on the authoritative servers provided | |||
| authoritative servers provided by the ISP. | by the ISP. | |||
| In this appendix we limit the outsourcing to the DM and Public | In this appendix, we limit the outsourcing of the DM and Public | |||
| Authoritative Server(s) to a third party. The Reverse Public | Authoritative Server(s) to a third party. The Reverse Public | |||
| Authoritative Server(s) and the RDM remain managed by the ISP as the | Authoritative Server(s) and the RDM remain managed by the ISP as the | |||
| IP prefix is managed by the ISP. | IP prefix is managed by the ISP. | |||
| Outsourcing to a third party DM can be performed in the following | Outsourcing to a third-party DM can be performed in the following | |||
| ways: | ways: | |||
| 1. Updating the DHCPv6 server Information. One can imagine a GUI | 1. Updating the DHCPv6 server information. One can imagine a GUI | |||
| interface that enables the end user to modify its profile | interface that enables the end user to modify its profile | |||
| parameters. Again, this configuration update is done once-for- | parameters. Again, this configuration update only needs to be | |||
| ever. | performed one time. | |||
| 2. Upload the configuration of the DM to the HNA. In some cases, | 2. Uploading the configuration of the DM to the HNA. In some cases, | |||
| the provider of the CPE router hosting the HNA may be the | the provider of the CPE router hosting the HNA may be the | |||
| registrar and provide the CPE router already configured. In | registrar, and the registrar may provide the CPE router already | |||
| other cases, the CPE router may request the end user to log into | configured. In other cases, the CPE router may request the end | |||
| the registrar to validate the ownership of the Registered Homenet | user to log into the registrar to validate the ownership of the | |||
| Domain and agree on the necessary credentials to secure the | Registered Homenet Domain and agree on the necessary credentials | |||
| communication between the HNA and the DM. As described in | to secure the communication between the HNA and the DM. As | |||
| [I-D.ietf-homenet-front-end-naming-delegation], such settings | described in [RFC9526], such settings could be performed in an | |||
| could be performed in an almost automatic way as to limit the | almost automatic way as to limit the necessary interactions with | |||
| necessary interactions with the end user. | the end user. | |||
| A.4. Multiple ISPs | A.4. Multiple ISPs | |||
| This scenario considers a HNA connected to multiple ISPs. | This scenario involves an HNA connected to multiple ISPs. | |||
| Suppose the HNA has been configured each of its interfaces | Suppose the HNA has configured each of its interfaces independently | |||
| independently with each ISPS as described in Appendix A.1. Each ISP | with each ISP as described in Appendix A.1. Each ISP provides a | |||
| provides a different Registered Homenet Domain. | different Registered Homenet Domain. | |||
| The protocol and DHCPv6 options described in this document are fully | The protocol and DHCPv6 options described in this document are fully | |||
| compatible with a HNA connected to multiple ISPs with multiple | compatible with an HNA connected to multiple ISPs with multiple | |||
| Registered Homenet Domains. However, the HNA should be able to | Registered Homenet Domains. However, the HNA should be able to | |||
| handle different Registered Homenet Domains. This is an | handle different Registered Homenet Domains. This is an | |||
| implementation issue which is outside the scope of the current | implementation issue, which is outside the scope of this document. | |||
| document. | ||||
| If a HNA is not able to handle multiple Registered Homenet Domains, | If an HNA is not able to handle multiple Registered Homenet Domains, | |||
| the HNA may remain connected to multiple ISP with a single Registered | the HNA may remain connected to multiple ISPs with a single | |||
| Homenet Domain. In this case, one entity is chosen to host the | Registered Homenet Domain. In this case, one entity is chosen to | |||
| Registered Homenet Domain. This entity may be one of the ISP or a | host the Registered Homenet Domain. This entity may be an ISP or a | |||
| third party. Note that having multiple ISPs can be motivated for | third party. Note that having multiple ISPs can be motivation for | |||
| bandwidth aggregation, or connectivity fail-over. In the case of | bandwidth aggregation or connectivity failover. In the case of | |||
| connectivity fail-over, the fail-over concerns the access network and | connectivity failover, the failover concerns the access network, and | |||
| a failure of the access network may not impact the core network where | a failure of the access network may not impact the core network where | |||
| the DM and Public Authoritative Primaries are hosted. In that sense, | the DM and Public Authoritative Primaries are hosted. In that sense, | |||
| choosing one of the ISP even in a scenario of multiple ISPs may make | choosing one of the ISPs even in a scenario of multiple ISPs may make | |||
| sense. However, for sake of simplicity, this scenario assumes that a | sense. However, for the sake of simplicity, this scenario assumes | |||
| third party has been chosen to host the Registered Homenet Domain. | that a third party has been chosen to host the Registered Homenet | |||
| Configuration is performed as described in Appendix A.2 and | Domain. Configuration is performed as described in Appendices A.2 | |||
| Appendix A.3. | and A.3. | |||
| With the configuration described in Appendix A.2, the HNA is expected | With the configuration described in Appendix A.2, the HNA is expected | |||
| to be able to handle multiple Homenet Registered Domain, as the third | to be able to handle multiple Registered Homenet Domains as the | |||
| party redirect to one of the ISPs servers. With the configuration | third-party redirect to one of the ISP's servers. With the | |||
| described in Appendix A.3, DNS zone are hosted and maintained by the | configuration described in Appendix A.3, DNS zones are hosted and | |||
| third party. A single DNS(SEC) Homenet Zone is built and maintained | maintained by the third party. A single DNS(SEC) Homenet Zone is | |||
| by the HNA. This latter configuration is likely to match most HNA | built and maintained by the HNA. This latter configuration is likely | |||
| implementations. | to match most HNA implementations. | |||
| The protocol and DHCPv6 options described in this document are fully | The protocol and DHCPv6 options described in this document are fully | |||
| compatible with a HNA connected to multiple ISPs. To configure or | compatible with an HNA connected to multiple ISPs. Whether to | |||
| not and how to configure the HNA depends on the HNA facilities. | configure the HNA or not, and how to configure the HNA, depends on | |||
| Appendix A.1 and Appendix A.2 require the HNA to handle multiple | the HNA facilities. Appendices A.1 and A.2 require the HNA to handle | |||
| Registered Homenet Domain, whereas Appendix A.3 does not have such | multiple Registered Homenet Domains, whereas Appendix A.3 does not | |||
| requirement. | have such a requirement. | |||
| Acknowledgments | ||||
| We would like to thank Marcin Siodelski, Bernie Volz, and Ted Lemon | ||||
| for their comments on the design of the DHCPv6 options. We would | ||||
| also like to thank Mark Andrews, Andrew Sullivan, and Lorenzo Colliti | ||||
| for their remarks on the architecture design. The designed solution | ||||
| has been largely inspired by Mark Andrews's document [PD-REVERSE] as | ||||
| well as discussions with Mark. We also thank Ray Hunter and Michael | ||||
| Richardson for their reviews and comments and for suggesting | ||||
| appropriate terminology. | ||||
| Contributors | ||||
| The coauthors would like to thank Chris Griffiths and Wouter Cloetens | ||||
| for providing significant contributions to the early draft versions | ||||
| of this document. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Daniel Migault | Daniel Migault | |||
| Ericsson | Ericsson | |||
| 8275 Trans Canada Route | 8275 Trans Canada Route | |||
| Saint Laurent, QC 4S 0B6 | Saint Laurent QC 4S 0B6 | |||
| Canada | Canada | |||
| Email: daniel.migault@ericsson.com | Email: daniel.migault@ericsson.com | |||
| Ralf Weber | Ralf Weber | |||
| Akamai | Akamai | |||
| Email: ralf.weber@akamai.com | Email: ralf.weber@akamai.com | |||
| Tomek Mrugalski | Tomek Mrugalski | |||
| Internet Systems Consortium, Inc. | Internet Systems Consortium, Inc. | |||
| 950 Charter Street | PO Box 360 | |||
| Redwood City, 94063 | Newmarket, NH 03857 | |||
| United States of America | United States of America | |||
| Email: tomasz.mrugalski@gmail.com | Email: tomasz.mrugalski@gmail.com | |||
| End of changes. 99 change blocks. | ||||
| 345 lines changed or deleted | 344 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||