draft-ietf-dhc-dhcpv6-ctep-opt-00.txt   draft-ietf-dhc-dhcpv6-ctep-opt-01.txt 
Network Working Group S. Daniel Park Network Working Group S. Daniel Park
INTERNET-DRAFT SAMSUNG Electronics Internet-Draft Samsung Electronics
Category: Standards Track A.K. Vijayabhaskar Expires : 26 September 2004 A.K. Vijayabhaskar
Expires : July 2004 Hewlett-Packard Hewlett-Packard
January 2004 27 March 2004
Configured Tunnel End Point Option for DHCPv6 Configured Tunnel End Point Option for DHCPv6
draft-ietf-dhc-dhcpv6-ctep-opt-00.txt draft-ietf-dhc-dhcpv6-ctep-opt-01.txt
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
skipping to change at page 1, line 35 skipping to change at page 1, line 35
reference material or to cite them other than as "work in progress." reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2003). All Rights Reserved. Copyright (C) The Internet Society (2004). All Rights Reserved.
Abstract Abstract
For the newly deployed IPv6 networks to interoperate with vastly For the newly deployed IPv6 networks to interoperate with vastly
deployed IPv4 networks, various transition mechanisms had been deployed IPv4 networks, various transition mechanisms had been
proposed. One such mechanism is configured tunnels. This document proposed. One such mechanism is configured tunnels. This document
provides a mechanism by which the DHCPv6 servers can provide provides a mechanism by which the DHCPv6 servers can provide
information about the various configured tunnel end points to reach information about the various configured tunnel end points to reach
the IPv6 nodes which are separated by IPv4 networks. the IPv6 nodes which are separated by IPv4 networks.
skipping to change at page 2, line 17 skipping to change at page 2, line 17
In the initial deployment of IPv6, the IPv6 nodes may need to In the initial deployment of IPv6, the IPv6 nodes may need to
communicate with the other IPv6 nodes via IPv4 networks. Configured communicate with the other IPv6 nodes via IPv4 networks. Configured
tunnels [3] provide a way to encapsulate the IPv6 packets in IPv4 tunnels [3] provide a way to encapsulate the IPv6 packets in IPv4
packets and tunnel them in the IPv4 network. packets and tunnel them in the IPv4 network.
This document defines a new option called Configured Tunnel End This document defines a new option called Configured Tunnel End
Point by which the DHCPv6 [1] server can notify the client with the Point by which the DHCPv6 [1] server can notify the client with the
list of end point of the configured tunnels to the various IPv6 list of end point of the configured tunnels to the various IPv6
networks separated by the IPv4 networks. networks separated by the IPv4 networks.
2. Requirements 2. Background
Configured Tunnel described in this document is a simple and
temporary mechanism which allows isolated IPv6 networks or hosts,
attached to a legacy IPv4 network which has no native IPv6
connectivity, to communicate with other such IPv6 networks or hosts
with manual configuration. The configured tunnel end-point received
from the DHCPv6 server is not used for IPv6 connectivity as long as
IPv6 networks or hosts are communicating with other IPv6 networks or
hosts via IPv6 network which has native IPv6 connectivity and only
available when communicating with other IPv6 networks or hosts via
IPv4 networks.
In this scenario, 6to4 [4] can be a possible alternative instead of
configured tunnel and does not require IPv4-compatible IPv6
addresses or configured tunnels.
As indicated in [4], the mechanisms are intended as a start-up
transition tool used during the period of co-existence of IPv4 and
IPv6. It is not intended as a permanent solution.
3. Requirements
The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
document, are to be interpreted as described in RFC 2119 [2] document, are to be interpreted as described in RFC 2119 [2]
3. Terminology 4. Terminology
This document uses terminology specific to IPv6 and DHCPv6 as This document uses terminology specific to IPv6 and DHCPv6 as
defined in "Terminology" section of the DHCPv6 specification [1]. defined in "Terminology" section of the DHCPv6 specification [1].
4. Configured Tunnel End Point Option 5. Configured Tunnel End Point Option
The Configured Tunnel End Point Option gives the information to the The Configured Tunnel End Point Option gives the information to the
clients about the Configured Tunnel End Point [3] to be contacted clients about the Configured Tunnel End Point [3] to be contacted
for reaching the nodes in the various IPv6 networks which are for reaching the nodes in the various IPv6 networks which are
separated by IPv4 networks. The clients are expected to install separated by IPv4 networks. The clients are expected to install
these routes in their machines. these routes in their machines.
The format of the Configured Tunnel End Point Option is as shown The format of the Configured Tunnel End Point Option is as shown
below: below:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_CTEP | option-len | | OPTION_CTEP | option-len |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| prefix-len | | | prefix-len | |
+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+ |
| | | |
| Destination Prefix (16 bytes) | | Destination Prefix (16 bytes) |
| | | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | | | |
+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+ |
| Configured TEP Address (16 bytes) | | Configured TEP Address (16 bytes) |
| | | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | prefix-len | | | | prefix-len | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | | |
| Destination Prefix (16 bytes) | | Destination Prefix (16 bytes) |
| | | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | | |
| Configured TEP Address (16 bytes) | | Configured TEP Address (16 bytes) |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| . . . | | . . . |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
option-code: OPTION_CTEP (TBD) option-code: OPTION_CTEP (TBD)
option-len: Total length of the prefix-len, Destination Prefix and option-len: Total length of the prefix-len, Destination Prefix and
Configured Tunnel Address lists in octets; It should be Configured Tunnel Address lists in octets; It should be
a multiple of 33. a multiple of 33.
prefix-len: prefix length of the Destination Prefix prefix-len: prefix length of the Destination Prefix
Destination Prefix: An IPv6 Prefix; Destination Prefix: An IPv6 Prefix;
skipping to change at page 3, line 47 skipping to change at page 4, line 14
option-code: OPTION_CTEP (TBD) option-code: OPTION_CTEP (TBD)
option-len: Total length of the prefix-len, Destination Prefix and option-len: Total length of the prefix-len, Destination Prefix and
Configured Tunnel Address lists in octets; It should be Configured Tunnel Address lists in octets; It should be
a multiple of 33. a multiple of 33.
prefix-len: prefix length of the Destination Prefix prefix-len: prefix length of the Destination Prefix
Destination Prefix: An IPv6 Prefix; Destination Prefix: An IPv6 Prefix;
Configured TEP Address: IPv6 Address of the Configured TEP. Configured TEP Address: IPv6 Address of the Configured TEP. This
address is a IPv4-compatible IPv6 address.
The clients are expected to install the routes identified by the The clients are expected to install the routes identified by the
tuples <Destination Prefix/prefix-len, Configured TEP Address> once tuples <Destination Prefix/prefix-len, Configured TEP Address> once
they receive this option from the server. they receive this option from the server.
5. Appearance of this option 6. Appearance of this option
The Configured Tunnel End Point Option MUST NOT appear in other The Configured Tunnel End Point Option MUST NOT appear in other
than the following messages: Solicit, Advertise, Request, Renew, than the following messages: Solicit, Advertise, Request, Renew,
Rebind, Information-Request and Reply. Rebind, Information-Request and Reply.
The option numbers of Configured Tunnel End Point option MAY appear The option numbers of Configured Tunnel End Point option MAY appear
in the Option Request Option [1] in the following messages: Solicit, in the Option Request Option [1] in the following messages: Solicit,
Request, Renew, Rebind, Information-Request and Reconfigure. Request, Renew, Rebind, Information-Request and Reconfigure.
6. Security Considerations 7. Security Considerations
The Configured Tunnel End Point Option may be used by an intruder The Configured Tunnel End Point Option may be used by an intruder
DHCPv6 server to provide invalid or incorrect configured tunnel end DHCPv6 server to provide invalid or incorrect configured tunnel end
point. This makes the client unable to reach its destination IPv6 point. This makes the client unable to reach its destination IPv6
node or to reach incorrect destination. The latter one has very node or to reach incorrect destination. The latter one has very
severe security issues as IPv6 destination is spoofed here. severe security issues as IPv6 destination is spoofed here.
To avoid attacks through this option, the DHCPv6 client SHOULD use To avoid attacks through this option, the DHCPv6 client SHOULD use
authenticated DHCP (see section "Authentication of DHCP messages" in authenticated DHCP (see section "Authentication of DHCP messages" in
the DHCPv6 specification [1]). the DHCPv6 specification [1]).
7. IANA Considerations 8. IANA Considerations
IANA is requested to assign an option code to the following options IANA is requested to assign an option code to the following options
from the option-code space defined in "DHCPv6 Options" section of from the option-code space defined in "DHCPv6 Options" section of
the DHCPv6 specification [1]. the DHCPv6 specification [1].
Option Name Value Described in Option Name Value Described in
OPTION_CTEP TBD Section 4 OPTION_CTEP TBD Section 4
8. References
8.1 Normative References 9. References
9.1 Normative References
[1] Bound, J., Carney, M., Perkins, C., Lemon, T., Volz, B. and [1] Bound, J., Carney, M., Perkins, C., Lemon, T., Volz, B. and
R.Droms (ed.), "Dynamic Host Configuration Protocol for IPv6 R.Droms (ed.), "Dynamic Host Configuration Protocol for IPv6
(DHCPv6)", RFC 3315, July 2003. (DHCPv6)", RFC 3315, July 2003.
[2] Bradner, S., "Key words for use in RFCs to Indicate Requirement [2] Bradner, S., "Key words for use in RFCs to Indicate
Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
8.2 Informative References 9.2 Informative References
[3] R. Gilligan, E. Nordmark, "Transition Mechanisms for IPv6 [3] Gilligan, R, Nordmark, E., "Transition Mechanisms for IPv6
Hosts and Routers", RFC 2893, August 2000. Hosts and Routers", RFC 2893, August 2000.
9. Authors' Addresses [4] Carpenter, B., Moore K., "Connection of IPv6 Domains via IPv4
Clouds", RFC 3056, February 2001.
Authors' Addresses
Soohong Daniel Park Soohong Daniel Park
Mobile Platform Laboratory, SAMSUNG Electronics. Mobile Platform Laboratory
416. Maetan-Dong, Yeongtong-Gu, Samsung Electronics.
Suwon, Gyeonggi-Do Suwon
Korea Korea
Phone: +81-31-200-4508 Phone: +81-31-200-4508
E-Mail: soohong.park@samsung.com E-Mail: soohong.park@samsung.com
Vijayabhaskar A K Vijayabhaskar A K
Hewlett-Packard STSD-I Hewlett-Packard STSD-I
29, Cunningham Road 29, Cunningham Road
Bangalore - 560052 Bangalore - 560052
India India
Phone: +91-80-2053085 Phone: +91-80-2053085
E-Mail: vijayak@india.hp.com E-Mail: vijayak@india.hp.com
10. Acknowledgements Acknowledgements
Thanks to the DHC Working Group for their time and input into the Thanks to the DHC Working Group for their time and input into the
specification. In particular, thanks to Pekka Savola, Bernie Volz, specification. In particular, thanks to Pekka Savola, Bernie Volz,
Ralph Droms, for their valuable comments on this work. Ralph Droms, Margaret Wasserman for their valuable comments on this
work.
Intellectual Property Statement Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to intellectual property or other rights that might be claimed to
pertain to the implementation or use of the technology described in pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights this document or the extent to which any license under such rights
might or might not be available; neither does it represent that it might or might not be available; neither does it represent that it
has made any effort to identify any such rights. Information on the has made any effort to identify any such rights. Information on the
IETF's procedures with respect to rights in standards-track and IETF's procedures with respect to rights in standards-track and
skipping to change at page 7, line 7 skipping to change at page 7, line 29
can be obtained from the IETF Secretariat. can be obtained from the IETF Secretariat.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights which may cover technology that may be required to practice rights which may cover technology that may be required to practice
this standard. Please address the information to the IETF Executive this standard. Please address the information to the IETF Executive
Director. Director.
Full Copyright Statement Full Copyright Statement
Copyright (C) The Internet Society (2003). All Rights Reserved. Copyright (C) The Internet Society (2004). All Rights Reserved.
This document and translations of it may be copied and furnished to This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph kind, provided that the above copyright notice and this paragraph
are included on all such copies and derivative works. However, this are included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of Internet organizations, except as needed for the purpose of
 End of changes. 

This html diff was produced by rfcdiff 1.23, available from http://www.levkowetz.com/ietf/tools/rfcdiff/