Internet DRAFT - draft-templin-client-cllao
draft-templin-client-cllao
Network Working Group F. Templin, Ed.
Internet-Draft Boeing Research & Technology
Intended status: Informational January 22, 2015
Expires: July 26, 2015
Client-Inserted Client Link-Layer Address Options in DHCPv6
draft-templin-client-cllao-01.txt
Abstract
RFC6939 specifies a method for DHCPv6 relay agents to insert a Client
Link Layer Address Option (CLLAO) in a DHCPv6 Relay-Forward message.
In some cases, however, the DHCPv6 client may need to insert a CLLAO
in its message on its own behalf even though it is on the same link
as the DHCPv6 server. This document discusses client-inserted
CLLAOs.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on July 26, 2015.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
Templin Expires July 26, 2015 [Page 1]
Internet-Draft Client CLLAO January 2015
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Client-Inserted CLLAOs . . . . . . . . . . . . . . . . . . . 2
3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 3
4. Security Considerations . . . . . . . . . . . . . . . . . . . 3
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 4
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
6.1. Normative References . . . . . . . . . . . . . . . . . . 4
6.2. Informative References . . . . . . . . . . . . . . . . . 4
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 4
1. Introduction
[RFC6939] specifies a method for DHCPv6 relays[RFC3315] to insert a
Client Link-Layer Address Option (CLLAO) in Relay-Forward messages.
This provides a means for a first-hop relay to inform the DHCPv6
server of the link-layer address of the DHCPv6 client on the
client<->relay link. However, on some links it may be necessary for
the client to include a CLLAO even though it is on the same link as
the server.
Asymmetric Extended Route Optimization (AERO) [I-D.templin-aerolink]
is an example of a "DHCPv6-over-(foo)" link layer where the client
and server are always on the same link but it may be difficult or
impossible for the DHCPv6 server process to determine the client's
link-layer address through normal socket API operations.
Additionally, it may be difficult or impossible for the client to
determine its own link-layer address (as seen by the server) since
the address may be altered by a link-layer switching element on the
path. In that case, if the client inserts a CLLAO option the
server's (foo) driver can use the option to convey the client's link-
layer address to the DHCPv6 server process, and then from the DHCPv6
server process back to the client in the DHCPv6 reply. The following
section specifies the protocol for client-inserted CLLAOs.
2. Client-Inserted CLLAOs
When a DHCPv6 client is on the same link as the server, and a
supplementary client link-layer address discovery method is
necessary, the client inserts a CLLAO option [RFC6939] in its DHCPv6
messages and writes any link-layer-specific values in the non-mutable
portions of the "link-layer address" field as specified by the
relevant "DHCPv6-over-(foo) document.
Templin Expires July 26, 2015 [Page 2]
Internet-Draft Client CLLAO January 2015
When a DHCPv6 server is on the same link as the client, and the
client includes a CLLAO option in a DHCPv6 message, the server's
(foo) driver writes the client's observed link-layer address in the
mutable portions of the "link-layer address" field of the option and
delivers the message to the DHCPv6 server process. The server then
processes the CLLAO option locally as necessary and returns the CLLAO
option in its DHCPv6 replies.
When a DHCPv6 relay on the same link as a client forwards the
client's DHCPv6 messages, and the server requires a means for
discovering the client's link-layer address, the relay follows the
specifications in [RFC6939].
A DHCPv6 server MUST ignore a CLLAO option supplied by the client if
it is not on the same link as the client.
A DHCPv6 client SHOULD NOT include a CLLAO option if it is not on the
same link as the server.
3. IANA Considerations
This document introduces no IANA considerations.
4. Security Considerations
The CLLAO suppled by the client may contain both a non-mutable
portion and a mutable portion that is rewritten by the server's (foo)
driver. When DHCPv6 authentication [RFC3315] and/or DHCPv6 Security
[I-D.ietf-dhc-sedhcpv6] are used, the client and server MUST first
write the value '0' in any mutable fields of the CLLAO in the
client's DHCPv6 message before performing security transformations.
When the server returns the CLLAO to the client in a DHCPv6 reply,
however, it performs security transformations with the actual client
link-layer address in the mutable fields rather than writing the
value '0'.
This means that the mutable portions of the client's link-layer
address could be rewritten by a link-layer switching element on the
path from the client to the server and not detected by the DHCPv6
security mechanism. However, such a condition would only be a matter
of concern on unmanaged/unsecured links where the link-layer
switching elements themselves present a man-in-the-middle attack
threat. For this reason, IP security MUST be used when this
mechanism is employed over unmanaged/unsecured links.
Templin Expires July 26, 2015 [Page 3]
Internet-Draft Client CLLAO January 2015
5. Acknowledgements
6. References
6.1. Normative References
[RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
and M. Carney, "Dynamic Host Configuration Protocol for
IPv6 (DHCPv6)", RFC 3315, July 2003.
[RFC6939] Halwasia, G., Bhandari, S., and W. Dec, "Client Link-Layer
Address Option in DHCPv6", RFC 6939, May 2013.
6.2. Informative References
[I-D.ietf-dhc-sedhcpv6]
Jiang, S., Shen, S., Zhang, D., and T. Jinmei, "Secure
DHCPv6", draft-ietf-dhc-sedhcpv6-05 (work in progress),
December 2014.
[I-D.templin-aerolink]
Templin, F., "Transmission of IP Packets over AERO Links",
draft-templin-aerolink-50 (work in progress), December
2014.
Author's Address
Fred L. Templin (editor)
Boeing Research & Technology
P.O. Box 3707
Seattle, WA 98124
USA
Email: fltemplin@acm.org
Templin Expires July 26, 2015 [Page 4]