1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557
|
<pre>Internet Engineering Task Force (IETF) L. Yeh
Request for Comments: 7037 Freelancer Technologies
Category: Standards Track M. Boucadair
ISSN: 2070-1721 France Telecom
October 2013
<span class="h1">RADIUS Option for the DHCPv6 Relay Agent</span>
Abstract
The DHCPv6 RADIUS option provides a mechanism to exchange
authorization and identification information between the DHCPv6 relay
agent and DHCPv6 server. This architecture assumes that the Network
Access Server (NAS) acts as both a DHCPv6 relay agent and RADIUS
client. When receiving messages from the DHCPv6 clients, the NAS
consults the RADIUS server and adds the RADIUS response when
forwarding the DHCPv6 client's messages to the DHCPv6 server. The
DHCPv6 server then uses that additional information to generate an
appropriate response to the DHCPv6 client's requests.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in <a href="./rfc5741#section-2">Section 2 of RFC 5741</a>.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
<a href="http://www.rfc-editor.org/info/rfc7037">http://www.rfc-editor.org/info/rfc7037</a>.
<span class="grey">Yeh & Boucadair Standards Track [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
Provisions Relating to IETF Documents
(<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
<a href="#section-1">1</a>. Introduction . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-2">2</a>
<a href="#section-2">2</a>. Terminology and Language . . . . . . . . . . . . . . . . . . <a href="#page-3">3</a>
<a href="#section-3">3</a>. Network Scenarios . . . . . . . . . . . . . . . . . . . . . . <a href="#page-3">3</a>
<a href="#section-4">4</a>. DHCPv6 RADIUS Option . . . . . . . . . . . . . . . . . . . . <a href="#page-6">6</a>
<a href="#section-4.1">4.1</a>. RADIUS Attributes Permitted in DHCPv6 RADIUS Option . . . <a href="#page-7">7</a>
<a href="#section-5">5</a>. DHCPv6 Relay Agent Behavior . . . . . . . . . . . . . . . . . <a href="#page-7">7</a>
<a href="#section-6">6</a>. DHCPv6 Server Behavior . . . . . . . . . . . . . . . . . . . <a href="#page-7">7</a>
<a href="#section-7">7</a>. DHCPv6 Client Behavior . . . . . . . . . . . . . . . . . . . <a href="#page-7">7</a>
<a href="#section-8">8</a>. Security Considerations . . . . . . . . . . . . . . . . . . . <a href="#page-8">8</a>
<a href="#section-9">9</a>. IANA Considerations . . . . . . . . . . . . . . . . . . . . . <a href="#page-8">8</a>
<a href="#section-10">10</a>. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . <a href="#page-9">9</a>
<a href="#section-11">11</a>. References . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-9">9</a>
<a href="#section-11.1">11.1</a>. Normative References . . . . . . . . . . . . . . . . . . <a href="#page-9">9</a>
<a href="#section-11.2">11.2</a>. Informative References . . . . . . . . . . . . . . . . . <a href="#page-10">10</a>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
DHCPv6 provides a mechanism that allows the server to assign or
delegate both stateful and stateless configuration parameters to
clients. The stateful configuration parameters include IPv6
addresses [<a href="./rfc3315" title=""Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC3315</a>] and IPv6 prefixes [<a href="./rfc3633" title=""IPv6 Prefix Options for Dynamic Host Configuration Protocol (DHCP) version 6"">RFC3633</a>]. The stateless
configuration parameters [<a href="./rfc3736" title=""Stateless Dynamic Host Configuration Protocol (DHCP) Service for IPv6"">RFC3736</a>] include, for example, DNS
[<a href="./rfc3646" title=""DNS Configuration options for Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC3646</a>], or a Fully Qualified Domain Name (FQDN) of an Address
Family Transition Router (AFTR) [<a href="./rfc6334" title=""Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Option for Dual-Stack Lite"">RFC6334</a>]. In the scenarios
described in this document, the DHCPv6 server is deployed in the
central part of an ISP network.
RADIUS [<a href="./rfc2865" title=""Remote Authentication Dial In User Service (RADIUS)"">RFC2865</a>] is widely used as the centralized authentication,
authorization, and user management mechanism for service provision in
a Broadband access network. [<a href="./rfc3162" title=""RADIUS and IPv6"">RFC3162</a>], [<a href="./rfc4818" title=""RADIUS Delegated-IPv6-Prefix Attribute"">RFC4818</a>], [<a href="./rfc6519" title=""RADIUS Extensions for Dual- Stack Lite"">RFC6519</a>], and
[<a href="./rfc6911" title=""RADIUS Attributes for IPv6 Access Networks"">RFC6911</a>] specify the attributes that support the service provision
<span class="grey">Yeh & Boucadair Standards Track [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
for IPv6-only and IPv6-transition access. The RADIUS server
authorizes the Network Access Server (NAS) to assign an IPv6 address
or prefix from the indicated pool, or to assign an IPv6 address or
prefix with an explicitly indicated value, and to indicate other
configuration parameters as per the RADIUS attributes for the
subscribers.
When the NAS acts as the distributed DHCPv6 server and RADIUS client
simultaneously, it communicates with the RADIUS server after
receiving a request from the DHCPv6 client. Upon receiving the
Access-Accept message from the RADIUS server, the NAS then responds
to the DHCPv6 client's requests per the associated authorization
information indicated by the RADIUS attributes in the Access-Accept
message. When NAS acts as the DHCPv6 relay agent and RADIUS client
simultaneously, and the centralized DHCPv6 server is co-located with
the RADIUS server, they may share the same database of users.
However, when the centralized DHCPv6 server is not located in the
same place as the RADIUS server, a new communication mechanism is
needed for the DHCPv6 relay agent to transfer the authorization
information indicated by the RADIUS attributes to the DHCPv6 server.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Terminology and Language</span>
This document specifies a new DHCPv6 option for the DHCPv6 Relay
Agent to transfer the authorization information of RADIUS attributes
received in the Access-Accept message from the RADIUS server to the
centralized DHCPv6 server. Definitions for terms and acronyms not
specified in this document are defined in [<a href="./rfc2865" title=""Remote Authentication Dial In User Service (RADIUS)"">RFC2865</a>] and [<a href="./rfc3315" title=""Dynamic Host Configuration Protocol for IPv6 (DHCPv6)"">RFC3315</a>].
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Network Scenarios</span>
Figures 1 and 2 show the typical network scenarios where the
communication mechanism introduced in this document is necessary. In
these scenarios, the centralized DHCPv6 server is not co-located with
the RADIUS server, but both are in the same administrative domain.
The NAS acts as the DHCPv6 relay agent and the RADIUS client
simultaneously. Figure 1 shows the sequence of DHCPv6 and RADIUS
messages for the IP over Ethernet (IPoE) access model, when the
access loop adopts the direct Ethernet encapsulation. Figure 2 shows
the sequence of DHCPv6 and RADIUS messages for the PPP over Ethernet
(PPPoE) access model.
<span class="grey">Yeh & Boucadair Standards Track [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
The mechanism introduced in this document is a generic mechanism and
might also be employed in other network scenarios where the DHCPv6
relay agent and the RADIUS client are located in the same device.
+-------+ +-------+ +-------+
|DHCPv6 | Access Model: | NAS | |RADIUS |
|Client | IPoE | | |Server |
+-------+ +-------+ +-------+
RADIUS Client/DHCPv6 Relay Agent
| | |
|---Solicit---------------->| |
| |---Access-Request---------->|
| | |
| |<--Access-Accept------------|
| |(e.g. Delegated-IPv6-Prefix)|
| | |
DHCPv6 messages RADIUS messages
+-------+
|DHCPv6 |
|Server |
+-------+
| | |
| |---Relay-forward----------->|
| | (OPTION_RADIUS) |
| | |
| |<--Relay-reply -------------|
|<--Advertise---------------| |
| (e.g., IA_PD) | |
| | |
|---Request---------------->| |
| (e.g., IA_PD) |---Relay-forward----------->|
| | (OPTION_RADIUS) |
| | |
| |<--Relay-reply -------------|
|<--Reply-------------------| |
| (e.g., IA_PD) | |
| | |
DHCPv6 messages DHCPv6 messages
Figure 1: Network Scenario and Message Sequence When Employing DHCPv6
RADIUS Option in IPoE Access
<span class="grey">Yeh & Boucadair Standards Track [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
+-------+ +-------+ +-------+
|DHCPv6 | Access Model: | NAS | |RADIUS |
|Client | PPPoE | | |Server |
+-------+ +-------+ +-------+
RADIUS Client/DHCPv6 Relay Agent
| | |
|--PPP LCP Config-Request-->| |
| |---Access-Request---------->|
| | |
| |<--Access-Accept------------|
|<----PPP LCP Config-ACK----|(e.g. Delegated-IPv6-Prefix)|
| | |
PPP messages RADIUS messages
+-------+
|DHCPv6 |
|Server |
+-------+
| | |
|---Solicit---------------->| |
| |---Relay-forward----------->|
| | (OPTION_RADIUS) |
| | |
| |<--Relay-reply -------------|
|<--Advertise---------------| |
| (e.g., IA_PD) | |
| | |
|---Request---------------->| |
| (e.g., IA_PD) |---Relay-forward----------->|
| | (OPTION_RADIUS)
| | |
| |<--Relay-reply -------------|
|<--Reply-------------------| |
| (e.g., IA_PD) | |
| | |
DHCPv6 messages DHCPv6 messages
Figure 2: Network Scenario and Message Sequence When Employing DHCPv6
RADIUS Option in PPPoE Access
If the authentication or the authorization through RADIUS fails, the
associated message sequences will stop. The NAS acting as the DHCPv6
relay agent will not forward the message received from the client to
the DHCPv6 server. If the authentication or the authorization
through RADIUS passes, the NAS MUST store the information indicated
<span class="grey">Yeh & Boucadair Standards Track [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
in the RADIUS attributes received in the Access-Accept message from
the RADIUS server during the whole session. How the NAS manages this
information during the RADIUS session is out of the scope of this
document.
After receiving a RENEW (5) message from the DHCPv6 client, the NAS
SHOULD NOT initiate a new Access-Request/Access-Accept message
exchange with the RADIUS server. After receiving a REBIND (6)
message from the DHCPv6 client, the NAS MUST initiate a new Access-
Request/Access-Accept message exchange with the RADIUS server, unless
RADIUS capability is disabled on the NAS.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. DHCPv6 RADIUS Option</span>
The OPTION_RADIUS is a DHCPv6 option used by the DHCPv6 relay agent
to carry the authorization information of RADIUS attributes received
in the Access-Accept message from the RADIUS server.
The format of the OPTION_RADIUS option is defined as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_RADIUS | option-len |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| option-data (List of RADIUS Attributes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
option-code 81
option-len Length of the option-data in octets
option-data List of one or more RADIUS attributes
The option-data of OPTION_RADIUS is a list of one or more RADIUS
attributes received in the Access-Accept message from the RADIUS
server. The format of RADIUS attributes is defined in <a href="./rfc2865#section-5">Section 5 of
[RFC2865]</a> as well as Sections <a href="#section-2.1">2.1</a> and <a href="#section-2.2">2.2</a> of [<a href="./rfc6929" title=""Remote Authentication Dial In User Service (RADIUS) Protocol Extensions"">RFC6929</a>]. If multiple
attributes with the same type (including the Long Extended Type
defined in <a href="./rfc6929#section-2.2">Section 2.2 of [RFC6929]</a>) are present, the order of
attributes with the same type MUST be the same as that received from
the RADIUS server. The OPTION_RADIUS can only contain the RADIUS
attributes listed in the "RADIUS Attributes Permitted in DHCPv6
RADIUS Option" registry.
<span class="grey">Yeh & Boucadair Standards Track [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
According to the network scenarios described in <a href="#section-3">Section 3</a>, the
OPTION_RADIUS should appear in the RELAY-FORW (12) message relaying
SOLICIT (1), REQUEST (3), and REBIND (6) from the DHCPv6 client and
may appear in the RELAY-FORW (12) relaying any other message from the
DHCPv6 client.
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. RADIUS Attributes Permitted in DHCPv6 RADIUS Option</span>
The RADIUS attributes listed in the following table are the initial
attributes registered in the "RADIUS Attributes Permitted in DHCPv6
RADIUS Option" registry. New RADIUS attributes can be added to this
list after Expert Review [<a href="./rfc5226" title="">RFC5226</a>].
Type Code Attribute Reference
26 Vendor-Specific [<a href="./rfc2865" title=""Remote Authentication Dial In User Service (RADIUS)"">RFC2865</a>]
123 Delegated-IPv6-Prefix [<a href="./rfc4818" title=""RADIUS Delegated-IPv6-Prefix Attribute"">RFC4818</a>]
144 DS-Lite-Tunnel-Name [<a href="./rfc6519" title=""RADIUS Extensions for Dual- Stack Lite"">RFC6519</a>]
168 Framed-IPv6-Address [<a href="./rfc6911" title=""RADIUS Attributes for IPv6 Access Networks"">RFC6911</a>]
169 DNS-Server-IPv6-Address [<a href="./rfc6911" title=""RADIUS Attributes for IPv6 Access Networks"">RFC6911</a>]
171 Delegated-IPv6-Prefix-Pool [<a href="./rfc6911" title=""RADIUS Attributes for IPv6 Access Networks"">RFC6911</a>]
172 Stateful-IPv6-Address-Pool [<a href="./rfc6911" title=""RADIUS Attributes for IPv6 Access Networks"">RFC6911</a>]
Note: The RADIUS attribute's 'Length' defined in <a href="./rfc2865#section-5">Section 5 of
[RFC2865]</a> includes the length of 'Type' and 'Length' fields.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. DHCPv6 Relay Agent Behavior</span>
If the Relay Agent is configured to send OPTION_RADIUS, and the
Access-Accept message from the RADIUS server contained RADIUS
attributes permitted for use in OPTION_RADIUS, the Relay Agent MUST
include OPTION_RADIUS in the RELAY-FORW (12) message. The DHCPv6
relay agent adds the permitted RADIUS attributes into OPTION_RADIUS
one by one; if multiple attributes with the same type are present,
the order of attributes with the same type MUST be the same as that
received from the RADIUS server.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. DHCPv6 Server Behavior</span>
Upon receipt of the RELAY-FORW (12) message with OPTION_RADIUS from a
relay agent, the DHCPv6 server that supports OPTION_RADIUS SHOULD
extract and interpret the RADIUS attributes in the OPTION_RADIUS and
use that information to select configuration parameters for the
requesting client. If the DHCPv6 server does not support
OPTION_RADIUS, the DHCPv6 server MUST silently discard this option.
<span class="grey">Yeh & Boucadair Standards Track [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. DHCPv6 Client Behavior</span>
OPTION_RADIUS is only exchanged between the relay agents and the
servers. DHCPv6 clients are not aware of the usage of OPTION_RADIUS.
DHCPv6 clients MUST NOT send OPTION_RADIUS and MUST ignore
OPTION_RADIUS if received.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Security Considerations</span>
Known security vulnerabilities of the DHCPv6 and RADIUS protocols may
apply to their options. Security issues related with DHCPv6 are
described in <a href="./rfc3315#section-23">Section 23 of [RFC3315]</a>. Security issues related with
RADIUS are described in <a href="./rfc2865#section-8">Section 8 of [RFC2865]</a>, <a href="./rfc3162#section-5">Section 5 of
[RFC3162]</a>, and <a href="./rfc6929#section-11">Section 11 of [RFC6929]</a>.
The mechanism described in this document may introduce a new attack
vector against the DHCPv6 server in cases where the DHCPv6 relay
agent is compromised. By forging the RADIUS attributes contained in
the OPTION_RADIUS of the RELAY-FORW (12) messages, the attacker may
influence the parameter assignment on the DHCPv6 server for the
DHCPv6 clients. However, as described in the <a href="#section-3">Section 3</a>, NAS always
belongs to the same administrative domain of the DHCPv6 server in the
real deployment.
Network administrators should be aware that although RADIUS messages
are encrypted, DHCPv6 messages are always unencrypted. It is
possible that some RADIUS vendor-specific attributes might contain
sensitive or confidential information. Network administrators are
strongly advised to prevent such information from being included in
DHCPv6 messages.
If the use of vendor-specific attributes with confidential content is
required, administrators are advised to use IPsec with encryption to
protect the confidentiality of the RADIUS attributes. Relay agents
and servers implementing this specification MUST support the use of
IPsec Encapsulating Security Payload (ESP) with encryption in
transport mode, according to <a href="./rfc4303#section-3.1.1">Section 3.1.1 of [RFC4303]</a> and
<a href="./rfc3315#section-21.1">Section 21.1 of [RFC3315]</a>.
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. IANA Considerations</span>
IANA has assigned OPTION_RADIUS (81) in the "DHCP Option Codes"
registry, as defined in <a href="#section-4">Section 4</a>. In addition, IANA has created a
new registry entitled "RADIUS Attributes Permitted in DHCPv6 RADIUS
Option" in the "Dynamic Host Configuration Protocol for IPv6
(DHCPv6)" registry, as defined in <a href="#section-4.1">Section 4.1</a>. The new registry
enumerates the RADIUS Attributes Types
(<a href="http://www.iana.org/assignments/radius-types">http://www.iana.org/assignments/radius-types</a>) that are permitted for
<span class="grey">Yeh & Boucadair Standards Track [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
inclusion in the DHCPv6 RADIUS option. The allocation policy of this
"RADIUS Attributes Permitted in DHCPv6 RADIUS Option" registry is
Expert Review per [<a href="./rfc5226" title="">RFC5226</a>]. Designated experts should carefully
consider the security implications of allowing the relay agent to
include new RADIUS attributes to this registry.
<span class="h2"><a class="selflink" id="section-10" href="#section-10">10</a>. Acknowledgements</span>
Thanks to Tomek Mrugalski, Bernie Volz, Gaurav Halwasia, and Roberta
Maglione for their thorough review comments in the DHC working group
mailing list. Thanks also to Ted Lemon for his continuous
encouragement and technical guidance.
<span class="h2"><a class="selflink" id="section-11" href="#section-11">11</a>. References</span>
<span class="h3"><a class="selflink" id="section-11.1" href="#section-11.1">11.1</a>. Normative References</span>
[<a id="ref-RFC2119">RFC2119</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
[<a id="ref-RFC2865">RFC2865</a>] Rigney, C., Willens, S., Rubens, A., and W. Simpson,
"Remote Authentication Dial In User Service (RADIUS)", <a href="./rfc2865">RFC</a>
<a href="./rfc2865">2865</a>, June 2000.
[<a id="ref-RFC3315">RFC3315</a>] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
and M. Carney, "Dynamic Host Configuration Protocol for
IPv6 (DHCPv6)", <a href="./rfc3315">RFC 3315</a>, July 2003.
[<a id="ref-RFC4303">RFC4303</a>] Kent, S., "IP Encapsulating Security Payload (ESP)", <a href="./rfc4303">RFC</a>
<a href="./rfc4303">4303</a>, December 2005.
[<a id="ref-RFC4818">RFC4818</a>] Salowey, J. and R. Droms, "RADIUS Delegated-IPv6-Prefix
Attribute", <a href="./rfc4818">RFC 4818</a>, April 2007.
[<a id="ref-RFC5226">RFC5226</a>] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", <a href="https://www.rfc-editor.org/bcp/bcp26">BCP 26</a>, <a href="./rfc5226">RFC 5226</a>,
May 2008.
[<a id="ref-RFC6519">RFC6519</a>] Maglione, R. and A. Durand, "RADIUS Extensions for Dual-
Stack Lite", <a href="./rfc6519">RFC 6519</a>, February 2012.
[<a id="ref-RFC6911">RFC6911</a>] Dec, W., Sarikaya, B., Zorn, G., Miles, D., and B.
Lourdelet, "RADIUS Attributes for IPv6 Access Networks",
<a href="./rfc6911">RFC 6911</a>, April 2013.
[<a id="ref-RFC6929">RFC6929</a>] DeKok, A. and A. Lior, "Remote Authentication Dial In User
Service (RADIUS) Protocol Extensions", <a href="./rfc6929">RFC 6929</a>, April
2013.
<span class="grey">Yeh & Boucadair Standards Track [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc7037">RFC 7037</a> DHCPv6 RADIUS Option October 2013</span>
<span class="h3"><a class="selflink" id="section-11.2" href="#section-11.2">11.2</a>. Informative References</span>
[<a id="ref-RFC3162">RFC3162</a>] Aboba, B., Zorn, G., and D. Mitton, "RADIUS and IPv6", <a href="./rfc3162">RFC</a>
<a href="./rfc3162">3162</a>, August 2001.
[<a id="ref-RFC3633">RFC3633</a>] Troan, O. and R. Droms, "IPv6 Prefix Options for Dynamic
Host Configuration Protocol (DHCP) version 6", <a href="./rfc3633">RFC 3633</a>,
December 2003.
[<a id="ref-RFC3646">RFC3646</a>] Droms, R., "DNS Configuration options for Dynamic Host
Configuration Protocol for IPv6 (DHCPv6)", <a href="./rfc3646">RFC 3646</a>,
December 2003.
[<a id="ref-RFC3736">RFC3736</a>] Droms, R., "Stateless Dynamic Host Configuration Protocol
(DHCP) Service for IPv6", <a href="./rfc3736">RFC 3736</a>, April 2004.
[<a id="ref-RFC6334">RFC6334</a>] Hankins, D. and T. Mrugalski, "Dynamic Host Configuration
Protocol for IPv6 (DHCPv6) Option for Dual-Stack Lite",
<a href="./rfc6334">RFC 6334</a>, August 2011.
Authors' Addresses
Leaf Y. Yeh
Freelancer Technologies
P. R. China
EMail: leaf.yeh.sdo@gmail.com
Mohamed Boucadair
France Telecom
France
EMail: mohamed.boucadair@orange.com
Yeh & Boucadair Standards Track [Page 10]
</pre>
|