File: bootp-dhcp-option-95

package info (click to toggle)
doc-iana 2001.08-1
  • links: PTS
  • area: main
  • in suites: woody
  • size: 8,176 kB
  • ctags: 954
  • sloc: perl: 1,057; makefile: 83; sh: 27
file content (459 lines) | stat: -rw-r--r-- 14,390 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
From leif@netscape.com  Fri Jul 18 12:19:34 1997
To: iana@ISI.EDU
Subject: Re: DHCP extension for LDAP


Network Working Group                                        L. Hedstrom
INTERNET DRAFT                             Netscape Communications Corp.
Intended Category: Experimental                                L. Howard
                                                  Independent Consultant
Expires in six months from                                  18 July 1997




                 DHCP Options for Locating LDAP Servers
                   <draft-hedstrom-dhcp-ldap-01.txt>



Status of this Memo

   This document is an Internet-Draft.  Internet-Drafts are working
   documents of the Internet Engineering Task Force (IETF), its areas,
   and its working groups.  Note that other groups may also distribute
   working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   To learn the current status of any Internet-Draft, please check the
   "1id-abstracts.txt" listing  contained in the Internet-Drafts Shadow
   Directories on ds.internic.net (US East Coast), nic.nordu.net
   (Europe), ftp.isi.edu (US West Coast), or munnari.oz.au (Pacific
   Rim).


Notice

   All product and company names mentioned herein may be trademarks of
   their respective owners.


Abstract

   This document defines a new DHCP option for delivering configuration
   information to LDAP (Lightweight Directory Access Protocol) clients.
   The information returned is represented as LDAP URLs, as specified in
   the LDAPv3 URL draft[1].

   The DHCP client may use the URLs returned by the DHCP server to
   locate an LDAP server for the client's network. The URL may include



Hedstrom and Howard                                             [Page 1]





Internet Draft           DHCP Options for LDAP              18 July 1997


   the TCP port of the LDAP server, and the distinguished name which
   identifies the base object for searching.


1. Introduction

   This draft defines a new option in the Bootstrap Protocol (BOOTP) and
   the Dynamic Host Configuration Protocol (DHCP)[1],[2] to enable LDAP
   clients to find LDAP servers, their ports and base distinguished
   names (DNs), among other attributes. The configuration is returned to
   the DHCP client as a list of LDAP URLs (according to the syntax
   defined in [3]).

   The LDAP server name, or IP address, is mandatory. The LDAP port
   number is optional; the default assigned port is 389. While the the
   base DN is also optional, we anticipate that it will normally be
   specified.  Even if the base DN is specified in the DHCP message, it
   may be ignored by the client in preference of a locally defined DN.

   LDAP attribute list and filter components may be specified, but they
   are optional and can be ignored by the client. The clients must honor
   the LDAP search scope, if present in the returned URLs.


2. LDAP option

   This option specifies one or more LDAP URLs for the client to use to
   access LDAP servers. URLs should be listed in order of preference
   (notwithstanding section 3 of this document).

   The code for this option is <xxx>. Its minimum length is 1.

    Code   Len         LDAP URL

   +-----+-----+-----+-----+-----+-----+--
   | xxx |  n  |  u1 |  u2 |  u3 |  u4 | ...
   +-----+-----+-----+-----+-----+-----+--


   This example URL specifies the LDAP server, and the base DN:

      ldap://ldap.ace.com/o=Ace Industries


   Secure LDAP is supported using the ldaps protocol (over SSL), e.g.

      ldaps://ldap.ace.com:636/o=Ace Industries




Hedstrom and Howard                                             [Page 2]





Internet Draft           DHCP Options for LDAP              18 July 1997


3. URL extensions for server location

   Two new extensions are defined, x-weight and x-priority. Both these
   extensions are optional, and it is not required that they be
   supported by an LDAP client using DHCP in the manner described above.

   The extensions have the same meanings as defined in RFC2052 [4]. The
   client must attempt to contact the target host with the lowest-
   numbered priority (denoted by x-priority) it can reach, and target
   hosts with the same priority should be tried in pseudo random order.
   The syntax of the x-priority extension is an integer in the range 0-
   65535.

   When selecting a target from those that have the same priority, the
   chance of contacting a specific one should be proportional to its
   weight. The syntax of the x-weight extension is an integer in the
   range 1-65535. When there is no load balancing to be done, the weight
   should be zero or the extension omitted. If the x-priority extension
   is omitted, then the order of URLs returned determines their
   preference.

   For example:

      ldap://ldap.ace.com/o=Ace Industries??sub??x-weight=0,x-
   priority=10

   denotes the LDAP server ldap.ace.com, serving the naming context
   o=Ace Industries, with a weight of 0 and a priority of 10.


4. URL extensions for server binding

   The bindname extension, defined in [3], may be used to specify the
   distinguished name with which the LDAP client should bind to the
   server.

   The x-bindpw extension (defined here) may be used to provide the
   client with bind credentials for binding to an LDAP server, although
   it should be noted that this information may be easily retrieved by
   malicious DHCP clients, and is thus of little use.


5. Security considerations

   Security considerations discussed in [3], particularly with respect
   to the provision of authentication information, are directly
   applicable here.  Additionally, it should be noted that providing
   LDAP server information by a broadcast protocol such as DHCP may



Hedstrom and Howard                                             [Page 3]





Internet Draft           DHCP Options for LDAP              18 July 1997


   allow unauthorized clients to learn the location of and
   authentication information for LDAP servers and hence pose as valid
   clients. This presents a security problem when sensitive information,
   such as user passwords, is published via LDAP servers.

   The DHCP protocol provides no mechanisms for the client to verify the
   validity and correctness of the received information. The security
   considerations in [1] discuss several weaknesses, particularly the
   problem with unauthorized DHCP servers.


References

      [1]  Droms, R., "Dynamic Host Configuration Protocol", RFC 2131.

      [2]  Alexander, S., and R. Droms, "DHCP Options and BOOTP Vendor
           Extensions", RFC 1533.

      [3]  T. Howes and M. Smith., "The LDAP URL Format", INTERNET-DRAFT
           <draft-ietf-asid-ldapv3-url-03.txt>, June 1997.

      [4]  Vixie, P., "A DNS RR for specifying the location of services
           (DNS SRV)", RFC 2052.


Authors' Addresses

   Leif Hedstrom
   Netscape Communications Corp.
   501 E. Middlefield Rd.
   Mountain View, CA 94043
   USA
   +1 415 937-2507
   leif@netscape.com

   Luke Howard
   PO Box 59
   Central Park Vic 3145
   Australia
   lukeh@xedoc.com











Hedstrom and Howard                                             [Page 4]



--------------60AFE91858B96D9ACBADD5F7
Content-Type: text/plain; charset=us-ascii; name="dhc-ldap.ms"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="dhc-ldap.ms"

.pl 10.0i
.po 0
.ll 7.2i
.lt 7.2i
.nr LL 7.2i
.nr LT 7.2i
.ds LF Hedstrom and Howard
.ds RF [Page %]
.ds CF
.ds LH Internet Draft
.ds RH 18 July 1997
.ds CH DHCP Options for LDAP
.hy 0
.ad l
.in 0
Network Working Group                                        L. Hedstrom
INTERNET DRAFT                             Netscape Communications Corp.
Intended Category: Experimental                                L. Howard
                                                  Independent Consultant
Expires in six months from                                  18 July 1997




.ce
DHCP Options for Locating LDAP Servers
.ce
<draft-hedstrom-dhcp-ldap-01.txt>



.ti 0
Status of this Memo

.fi
.in 3
This document is an Internet-Draft.  Internet-Drafts are working 
documents of the Internet Engineering Task Force (IETF), its areas, and
its working groups.  Note that other groups may also distribute working
documents as Internet-Drafts.
 
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time.  It is inappropriate to use Internet-Drafts as reference material
or to cite them other than as "work in progress."
 
To learn the current status of any Internet-Draft, please check the
"1id-abstracts.txt" listing  contained in the Internet-Drafts Shadow
Directories on ds.internic.net (US East Coast), nic.nordu.net (Europe),
ftp.isi.edu (US West Coast), or munnari.oz.au (Pacific Rim).


.ti 0
Notice

All product and company names mentioned herein may be trademarks of
their respective owners.


.ti 0
Abstract

This document defines a new DHCP option for delivering
configuration information to LDAP (Lightweight Directory Access
Protocol) clients. The information returned is represented as LDAP URLs,
as specified in the LDAPv3 URL draft[1].

The DHCP client may use the URLs returned by the DHCP server to locate an
LDAP server for the client's network. The URL may include the TCP port of
the LDAP server, and the distinguished name which identifies the base
object for searching.


.ti 0
1. Introduction

This draft defines a new option in the Bootstrap Protocol (BOOTP) and the
Dynamic Host Configuration Protocol (DHCP)[1],[2] to enable LDAP clients
to find LDAP servers, their ports and base distinguished names (DNs),
among other attributes. The configuration is returned to the DHCP client
as a list of LDAP URLs (according to the syntax defined in [3]).

The LDAP server name, or IP address, is mandatory. The LDAP port number is
optional; the default assigned port is 389. While the the base DN is also
optional, we anticipate that it will normally be specified.  Even if the
base DN is specified in the DHCP message, it may be ignored by the client
in preference of a locally defined DN.

LDAP attribute list and filter components may be specified, but they are
optional and can be ignored by the client. The clients must honor the LDAP
search scope, if present in the returned URLs.


.ti 0
2. LDAP option

This option specifies one or more LDAP URLs for the client to use to
access LDAP servers. URLs should be listed in order of preference
(notwithstanding section 3 of this document).

The code for this option is <xxx>. Its minimum length is 1.

.nf
 Code   Len         LDAP URL
 
+-----+-----+-----+-----+-----+-----+--
| xxx |  n  |  u1 |  u2 |  u3 |  u4 | ...
+-----+-----+-----+-----+-----+-----+--
.fi


This example URL specifies the LDAP server, and the base DN:

   ldap://ldap.ace.com/o=Ace Industries


Secure LDAP is supported using the ldaps protocol (over SSL), e.g.

   ldaps://ldap.ace.com:636/o=Ace Industries


.ti 0
3. URL extensions for server location

Two new extensions are defined, x-weight and x-priority. Both these
extensions are optional, and it is not required that they be supported by
an LDAP client using DHCP in the manner described above.

The extensions have the same meanings as defined in RFC2052 [4]. The
client must attempt to contact the target host with the lowest-numbered
priority (denoted by x-priority) it can reach, and target hosts with the
same priority should be tried in pseudo random order. The syntax of the
x-priority extension is an integer in the range 0-65535.

When selecting a target from those that have the same priority, the chance
of contacting a specific one should be proportional to its weight. The
syntax of the x-weight extension is an integer in the range 1-65535. When
there is no load balancing to be done, the weight should be zero or the
extension omitted. If the x-priority extension is omitted, then the order
of URLs returned determines their preference.

For example:

   ldap://ldap.ace.com/o=Ace Industries??sub??x-weight=0,x-priority=10

denotes the LDAP server ldap.ace.com, serving the naming context
o=Ace Industries, with a weight of 0 and a priority of 10.


.ti 0
4. URL extensions for server binding

The bindname extension, defined in [3], may be used to specify the
distinguished name with which the LDAP client should bind to the server.

The x-bindpw extension (defined here) may be used to provide the client
with bind credentials for binding to an LDAP server, although it should be
noted that this information may be easily retrieved by malicious DHCP
clients, and is thus of little use.


.ti 0
5. Security considerations

Security considerations discussed in [3], particularly with respect to the
provision of authentication information, are directly applicable here.
Additionally, it should be noted that providing LDAP server information by
a broadcast protocol such as DHCP may allow unauthorized clients to learn
the location of and authentication information for LDAP servers and hence
pose as valid clients. This presents a security problem when sensitive
information, such as user passwords, is published via LDAP servers.

The DHCP protocol provides no mechanisms for the client to verify the
validity and correctness of the received information. The security
considerations in [1] discuss several weaknesses, particularly the problem
with unauthorized DHCP servers.


.ti 0
References
 
   [1]  Droms, R., "Dynamic Host Configuration Protocol", RFC 2131.
 
   [2]  Alexander, S., and R. Droms, "DHCP Options and BOOTP Vendor
        Extensions", RFC 1533.

   [3]  T. Howes and M. Smith., "The LDAP URL Format", INTERNET-DRAFT
        <draft-ietf-asid-ldapv3-url-03.txt>, June 1997.

   [4]  Vixie, P., "A DNS RR for specifying the location of services
        (DNS SRV)", RFC 2052.


.ti 0
Authors' Addresses

.nf
Leif Hedstrom
Netscape Communications Corp.
501 E. Middlefield Rd.
Mountain View, CA 94043
USA
+1 415 937-2507
leif@netscape.com

Luke Howard
PO Box 59
Central Park Vic 3145
Australia
lukeh@xedoc.com

--------------60AFE91858B96D9ACBADD5F7--