rfc9686.original   rfc9686.txt 
Dynamic Host Configuration W. Kumari Internet Engineering Task Force (IETF) W. Kumari
Internet-Draft Google, LLC Request for Comments: 9686 Google, LLC
Intended status: Standards Track S. Krishnan Category: Standards Track S. Krishnan
Expires: 17 November 2024 Cisco Systems, Inc. ISSN: 2070-1721 Cisco Systems, Inc.
R. Asati R. Asati
Independent Independent
L. Colitti L. Colitti
J. Linkova J. Linkova
Google, LLC Google, LLC
S. Jiang S. Jiang
Beijing University of Posts and Telecommunications BUPT
16 May 2024 November 2024
Registering Self-generated IPv6 Addresses using DHCPv6 Registering Self-Generated IPv6 Addresses Using DHCPv6
draft-ietf-dhc-addr-notification-13
Abstract Abstract
This document defines a method to inform a DHCPv6 server that a This document defines a method to inform a DHCPv6 server that a
device has one or more self-generated or statically configured device has one or more self-generated or statically configured
addresses. addresses.
About This Document
This note is to be removed before publishing as an RFC.
The latest revision of this draft can be found at
https://wkumari.github.io/draft-wkumari-dhc-addr-notification/draft-
ietf-dhc-addr-notification.html. Status information for this
document may be found at https://datatracker.ietf.org/doc/draft-ietf-
dhc-addr-notification/.
Discussion of this document takes place on the Dynamic Host
Configuration Working Group mailing list (mailto:dhcwg@ietf.org),
which is archived at https://mailarchive.ietf.org/arch/browse/dhcwg/.
Subscribe at https://www.ietf.org/mailman/listinfo/dhcwg/.
Source for this draft and an issue tracker can be found at
https://github.com/wkumari/draft-wkumari-dhc-addr-notification.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This is an Internet Standards Track document.
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months This document is a product of the Internet Engineering Task Force
and may be updated, replaced, or obsoleted by other documents at any (IETF). It represents the consensus of the IETF community. It has
time. It is inappropriate to use Internet-Drafts as reference received public review and has been approved for publication by the
material or to cite them other than as "work in progress." Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
This Internet-Draft will expire on 17 November 2024. Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9686.
Copyright Notice Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents
license-info) in effect on the date of publication of this document. (https://trustee.ietf.org/license-info) in effect on the date of
Please review these documents carefully, as they describe your rights publication of this document. Please review these documents
and restrictions with respect to this document. Code Components carefully, as they describe your rights and restrictions with respect
extracted from this document must include Revised BSD License text as to this document. Code Components extracted from this document must
described in Section 4.e of the Trust Legal Provisions and are include Revised BSD License text as described in Section 4.e of the
provided without warranty as described in the Revised BSD License. Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction
2. Conventions and Definitions . . . . . . . . . . . . . . . . . 3 2. Conventions and Definitions
3. Registration Mechanism Overview . . . . . . . . . . . . . . . 4 3. Registration Mechanism Overview
4. DHCPv6 Address Registration Procedure . . . . . . . . . . . . 5 4. DHCPv6 Address Registration Procedure
4.1. DHCPv6 Address Registration Option . . . . . . . . . . . 5 4.1. DHCPv6 Address Registration Option
4.2. DHCPv6 Address Registration Request Message . . . . . . . 6 4.2. DHCPv6 Address Registration Request Message
4.2.1. Server message processing . . . . . . . . . . . . . . 8 4.2.1. Server Message Processing
4.3. DHCPv6 Address Registration Acknowledgement . . . . . . . 9 4.3. DHCPv6 Address Registration Acknowledgement
4.4. Signaling Address Registration Support . . . . . . . . . 10 4.4. Signaling Address Registration Support
4.5. Retransmission . . . . . . . . . . . . . . . . . . . . . 11 4.5. Retransmission
4.6. Registration Expiry and Refresh . . . . . . . . . . . . . 11 4.6. Registration Expiry and Refresh
4.6.1. SLAAC Addresses . . . . . . . . . . . . . . . . . . . 12 4.6.1. SLAAC Addresses
4.6.2. Statically Assigned Addresses . . . . . . . . . . . . 13 4.6.2. Statically Assigned Addresses
4.6.3. Transmitting Refreshes . . . . . . . . . . . . . . . 14 4.6.3. Transmitting Refreshes
5. Client configuration . . . . . . . . . . . . . . . . . . . . 14 5. Client Configuration
6. Security Considerations . . . . . . . . . . . . . . . . . . . 14 6. Security Considerations
7. Privacy Considerations . . . . . . . . . . . . . . . . . . . 15 7. Privacy Considerations
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16 8. IANA Considerations
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 16 9. References
9.1. Normative References . . . . . . . . . . . . . . . . . . 16 9.1. Normative References
9.2. Informative References . . . . . . . . . . . . . . . . . 17 9.2. Informative References
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 18 Acknowledgements
Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Contributors
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18 Authors' Addresses
1. Introduction 1. Introduction
It is very common operational practice, especially in enterprise It is very common operational practice, especially in enterprise
networks, to use IPv4 DHCP logs for troubleshooting or forensics networks, to use IPv4 DHCP logs for troubleshooting or forensics
purposes. Examples of this include a help desk dealing with a ticket purposes. An example of this includes a help desk dealing with a
such as "The CEO's laptop cannot connect to the printer"; if the MAC ticket such as "The CEO's laptop cannot connect to the printer"; if
address of the printer is known (for example from an inventory the Media Access Control (MAC) address of the printer is known (for
system), the printer's IPv4 address can be retrieved from the DHCP example, from an inventory system), the printer's IPv4 address can be
log or lease table and the printer pinged to determine if it is retrieved from the DHCP log or lease table and the printer can be
reachable. Another common example is a Security Operations team pinged to determine if it is reachable. Another common example is a
discovering suspicious events in outbound firewall logs and then security operations team discovering suspicious events in outbound
consulting DHCP logs to determine which employee's laptop had that firewall logs and then consulting DHCP logs to determine which
IPv4 address at that time so that they can quarantine it and remove employee's laptop had that IPv4 address at that time so that they can
the malware. quarantine it and remove the malware.
This operational practice relies on the DHCP server knowing the IP This operational practice relies on the DHCP server knowing the IP
address assignments. This works quite well for IPv4 addresses, as address assignments. This works quite well for IPv4 addresses, as
most addresses are either assigned by DHCP [RFC2131] or statically most addresses are either assigned by DHCP [RFC2131] or statically
configured by the network operator. For IPv6, however, this practice configured by the network operator. For IPv6, however, this practice
is much harder to implement, as devices often self-configure IPv6 is much harder to implement, as devices often self-configure IPv6
addresses via SLAAC [RFC4862]. addresses via Stateless Address Autoconfiguration (SLAAC) [RFC4862].
This document provides a mechanism for a device to inform the DHCPv6 This document provides a mechanism for a device to inform the DHCPv6
server that the device has a self-configured IPv6 address (or has a server that the device has a self-configured IPv6 address (or has a
statically configured address), and thus provides parity with IPv4, statically configured address), and thus provides parity with IPv4 by
by making DHCPv6 infrastructure aware of self-assigned IPv6 making DHCPv6 infrastructure aware of self-assigned IPv6 addresses.
addresses.
2. Conventions and Definitions 2. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in "OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here. capitals, as shown here.
3. Registration Mechanism Overview 3. Registration Mechanism Overview
The DHCPv6 protocol is used as the address registration protocol when The DHCPv6 protocol is used as the address registration protocol and
a DHCPv6 server performs the role of an address registration server. a DHCPv6 server performs the role of an address registration server.
This document introduces a new Address Registration This document introduces a new Address Registration
(OPTION_ADDR_REG_ENABLE) option which indicates that the server (OPTION_ADDR_REG_ENABLE) option, which indicates that the server
supports the registration mechanism. Before registering any supports the registration mechanism. Before registering any
addresses, the client MUST determine whether the network supports addresses, the client MUST determine whether the network supports
address registration. It can do this by including the Address address registration. It can do this by including the Address
Registration option code in the Option Request option (see Registration option code in the Option Request option (see
Section 21.7 of [RFC8415]) of the Information-Request, Solicit, Section 21.7 of [RFC8415]) of the Information-Request, Solicit,
Request, Renew, or Rebind messages it sends to the server as part of Request, Renew, or Rebind messages it sends to the server as part of
the regular stateless or stateful DHCPv6 configuration process. If the regular stateless or stateful DHCPv6 configuration process. If
the server supports address registration, it includes an Address the server supports address registration, it includes an Address
Registration option in its Advertise or Reply messages. To avoid Registration option in its Advertise or Reply messages. To avoid
undesired multicast traffic, if the DHCPv6 infrastructure does not undesired multicast traffic, if the DHCPv6 infrastructure does not
support (or is not willing to receive) any address registration support (or is not willing to receive) any address registration
information, the client MUST NOT register any addresses using the information, the client MUST NOT register any addresses using the
mechanism in this specification. Otherwise, the client registers mechanism in this specification. Otherwise, the client registers
addresses as described below. addresses as described below.
After successfully assigning a self-generated or statically After successfully assigning a self-generated or statically
configured Valid ([RFC4862]) IPv6 address on one of its interfaces, a configured valid IPv6 address [RFC4862] on one of its interfaces, a
client implementing this specification multicasts an ADDR-REG-INFORM client implementing this specification multicasts an ADDR-REG-INFORM
message (see Section 4.2) in order to inform the DHCPv6 server that message (see Section 4.2) in order to inform the DHCPv6 server that
this self-generated address is in use. Each ADDR-REG-INFORM message this self-generated address is in use. Each ADDR-REG-INFORM message
contains a DHCPv6 IA Address option [RFC8415] to specify the address contains a DHCPv6 Identity Association (IA) Address option [RFC8415]
being registered. to specify the address being registered.
The address registration mechanism overview is shown in Fig.1. The address registration mechanism overview is shown in Figure 1.
+--------+ +------------------+ +---------------+ +--------+ +------------------+ +---------------+
| CLIENT | | FIRST-HOP ROUTER | | DHCPv6 SERVER | | CLIENT | | FIRST-HOP ROUTER | | DHCPv6 SERVER |
+--------+ +---------+--------+ +-------+-------+ +--------+ +---------+--------+ +-------+-------+
| SLAAC | | | SLAAC | |
|<--------------------> | | |<--------------------> | |
| | | | | |
| | | |
| src: link-local address | | src: link-local address |
| --------------------------------------------> | | --------------------------------------------> |
skipping to change at page 5, line 36 skipping to change at line 176
| src: address being registered | | src: address being registered |
| --------------------------------------------> | | --------------------------------------------> |
| ADDR-REG-INFORM MESSAGE |Register/ | ADDR-REG-INFORM MESSAGE |Register/
| |log addresses | |log addresses
| | | |
| | | |
| <-------------------------------------------- | | <-------------------------------------------- |
| ADDR-REG-REPLY MESSAGE | | ADDR-REG-REPLY MESSAGE |
| | | |
Figure 1: Address Registration Procedure Overview Figure 1: Address Registration Procedure Overview
4. DHCPv6 Address Registration Procedure 4. DHCPv6 Address Registration Procedure
4.1. DHCPv6 Address Registration Option 4.1. DHCPv6 Address Registration Option
The Address Registration option (OPTION_ADDR_REG_ENABLE) indicates The Address Registration option (OPTION_ADDR_REG_ENABLE) indicates
that the server supports the mechanism described in this document. that the server supports the mechanism described in this document.
The format of the Address Registration option is described as The format of the Address Registration option is described as
follows: follows:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| option-code | option-len | | option-code | option-len |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
option-code OPTION_ADDR_REG_ENABLE (TBA0) Figure 2: DHCPv6 Address Registration Option
option-len 0 option-code: OPTION_ADDR_REG_ENABLE (148)
Figure 2: DHCPv6 Address Registration option option-len: 0
If a client has the address registration mechanism enabled, it MUST If a client has the address registration mechanism enabled, it MUST
include this option in all Option Request options that it sends. include this option in all Option Request options that it sends.
A server which is configured to support the address registration A server that is configured to support the address registration
mechanism MUST include this option in Advertise and Reply messages if mechanism MUST include this option in Advertise and Reply messages if
the client message it is replying to contained this option in the the client message it is replying to contained this option in the
Option Request option. Option Request option.
4.2. DHCPv6 Address Registration Request Message 4.2. DHCPv6 Address Registration Request Message
The DHCPv6 client sends an ADDR-REG-INFORM message to inform that an The DHCPv6 client sends an ADDR-REG-INFORM message to inform that an
IPv6 address is assigned to the client's interface. The format of IPv6 address is assigned to the client's interface. The format of
the ADDR-REG-INFORM message is described as follows: the ADDR-REG-INFORM message is described as follows:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| msg-type | transaction-id | | msg-type | transaction-id |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | |
. options . . options .
. (variable) . . (variable) .
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
msg-type Identifies the DHCPv6 message type;
Set to ADDR-REG-INFORM (TBA1).
transaction-id The transaction ID for this message exchange. Figure 3: DHCPv6 ADDR-REG-INFORM Message
options Options carried in this message. msg-type: Identifies the DHCPv6 message type; set to ADDR-REG-INFORM
(36).
Figure 3: DHCPv6 ADDR-REG-INFORM message transaction-id: The transaction ID for this message exchange.
options: The options carried in this message.
The client MUST generate a transaction ID as described in [RFC8415] The client MUST generate a transaction ID as described in [RFC8415]
and insert this value in the "transaction-id" field. and insert this value in the transaction-id field.
The client MUST include the Client Identifier option [RFC8415] in the The client MUST include the Client Identifier option [RFC8415] in the
ADDR-REG-INFORM message. ADDR-REG-INFORM message.
The ADDR-REG-INFORM message MUST NOT contain the Server Identifier The ADDR-REG-INFORM message MUST NOT contain the Server Identifier
option and MUST contain exactly one IA Address option containing the option and MUST contain exactly one IA Address option containing the
address being registered. The valid-lifetime and preferred-lifetime address being registered. The valid-lifetime and preferred-lifetime
fields in the option MUST match the current Valid Lifetime and fields in the option MUST match the current Valid Lifetime and
Preferred Lifetime of the address being registered. Preferred Lifetime of the address being registered.
The ADDR-REG-INFORM message is dedicated for clients to initiate an The ADDR-REG-INFORM message is dedicated for clients to initiate an
address registration request toward an address registration server. address registration request toward an address registration server.
Consequently, clients MUST NOT put any Option Request Option(s) in Consequently, clients MUST NOT put any Option Request option(s) in
the ADDR-REG-INFORM message. Clients MAY include other options, such the ADDR-REG-INFORM message. Clients MAY include other options, such
as the Client FQDN Option [RFC4704]. as the Client FQDN option [RFC4704].
The client sends the DHCPv6 ADDR-REG-INFORM message to the The client sends the DHCPv6 ADDR-REG-INFORM message to the
All_DHCP_Relay_Agents_and_Servers multicast address (ff02::1:2). The All_DHCP_Relay_Agents_and_Servers multicast address (ff02::1:2). The
client MUST send separate messages for each address being registered. client MUST send separate messages for each address being registered.
Unlike other types of messages, which are sent from the link-local Unlike other types of messages, which are sent from the link-local
address of the client, the ADDR-REG-INFORM message MUST be sent from address of the client, the ADDR-REG-INFORM message MUST be sent from
the address being registered. This is primarily for "fate sharing" the address being registered. This is primarily for "fate sharing"
purposes - for example, if the network implements some form of purposes; for example, if the network implements some form of Layer 2
layer-2 security to prevent a client from spoofing other clients' MAC security to prevent a client from spoofing other clients' MAC
addresses, this prevents an attacker from spoofing ADDR-REG-INFORM addresses, this prevents an attacker from spoofing ADDR-REG-INFORM
messages. messages.
On clients with multiple interfaces, the client MUST only send the On clients with multiple interfaces, the client MUST only send the
packet on the network interface that has the address being packet on the network interface that has the address being
registered, even if it has multiple interfaces with different registered, even if it has multiple interfaces with different
addresses. If the same address is configured on multiple interfaces, addresses. If the same address is configured on multiple interfaces,
then the client MUST send ADDR-REG-INFORM each time the address is then the client MUST send the ADDR-REG-INFORM message each time the
configured on an interface that did not previously have it, and address is configured on an interface that did not previously have it
refresh each registration independently from the others. and refresh each registration independently from the others.
The client MUST only send the ADDR-REG-INFORM message for valid The client MUST only send the ADDR-REG-INFORM message for valid
([RFC4862]) addresses of global scope ([RFC4007]). This includes ULA addresses [RFC4862] of global scope [RFC4007]. This includes Unique
addresses, which are defined in [RFC4193] to have global scope. This Local Addresses (ULAs), which are defined in [RFC4193] to have global
also includes statically assigned addresses of global scope (such scope. This also includes statically assigned addresses of global
addresses are considered to be valid indefinitely). The client MUST scope (such addresses are considered to be valid indefinitely). The
NOT send the ADDR-REG-INFORM message for addresses configured by client MUST NOT send the ADDR-REG-INFORM message for addresses
DHCPv6. configured by DHCPv6.
The client SHOULD NOT send the ADDR-REG-INFORM message unless it has The client SHOULD NOT send the ADDR-REG-INFORM message unless it has
received a Router Advertisement message with either M or O flags set received a Router Advertisement (RA) message with either the M or O
to 1. flags set to 1.
Clients MUST discard any received ADDR-REG-INFORM messages. Clients MUST discard any received ADDR-REG-INFORM messages.
4.2.1. Server message processing 4.2.1. Server Message Processing
Servers MUST discard any ADDR-REG-INFORM messages that meet any of Servers MUST discard any ADDR-REG-INFORM messages that meet any of
the following conditions: the following conditions:
* the message does not include a Client Identifier option; * the message does not include a Client Identifier option;
* the message includes a Server Identifier option; * the message includes a Server Identifier option;
* the message does not include the IA Address option, or the IP * the message does not include the IA Address option, or the IP
address in the IA Address option does not match the source address address in the IA Address option does not match the source address
of the original ADDR-REG-INFORM message sent by the client. The of the original ADDR-REG-INFORM message sent by the client. The
source address of the original message is the source IP address of source address of the original message is the source IP address of
the packet if it is not relayed, or the Peer-Address field of the the packet if it is not relayed or is the peer-address field of
innermost Relay-Forward message if it is relayed. the innermost Relay-forward message if it is relayed; or
* the message includes an Option Request Option. * the message includes an Option Request option.
If the message is not discarded, the address registration server If the message is not discarded, the address registration server
SHOULD verify that the address being registered is "appropriate to SHOULD verify that the address being registered is "appropriate to
the link" as defined by [RFC8415] or within a prefix delegated to the the link" as defined by [RFC8415] or within a prefix delegated to the
client via DHCPv6-PD (see Section 6.3 of [RFC8415]). If the address client via DHCPv6 for Prefix Delegation (DHCPv6-PD) (see Section 6.3
being registered fails this verification, the server MUST drop the of [RFC8415]). If the address being registered fails this
message, and SHOULD log this fact. If the message passes the verification, the server MUST drop the message and SHOULD log this
verification, the server: fact. If the message passes the verification, the server:
* MUST log the address registration information (as is done normally * MUST log the address registration information (as is done normally
for clients to which it has assigned an address), unless for clients to which it has assigned an address), unless it is
configured not to do so. The server SHOULD log the client DUID configured not to do so. The server SHOULD log the client DHCP
and the link-layer address, if available. The server MAY log any Unique Identifier (DUID) and the link-layer address, if available.
other information. The server MAY log any other information.
* SHOULD register a binding between the provided Client Identifier * SHOULD register a binding between the provided Client Identifier
and IPv6 address in its database, if no binding exists. The and IPv6 address in its database, if no binding exists. The
lifetime of the binding is equal to the Valid Lifetime of the lifetime of the binding is equal to the Valid Lifetime of the
address reported by the client. If there is already a binding address reported by the client. If there is already a binding
between the registered address and the same client, the server between the registered address and the same client, the server
MUST update its lifetime. If there is already a binding between MUST update its lifetime. If there is already a binding between
the registered address and another client, the server SHOULD log the registered address and another client, the server SHOULD log
the fact and update the binding. the fact and update the binding.
* SHOULD mark the address as unavailable for use and not include it * SHOULD mark the address as unavailable for use and not include it
in future ADVERTISE messages. in future Advertise messages.
* MUST send back an ADDR-REG-REPLY message to ensure the client does * MUST send back an ADDR-REG-REPLY message to ensure the client does
not retransmit. not retransmit.
If a client is multihomed (connected to multiple administrative If a client is multihomed (i.e., connected to multiple administrative
domains, each operating its own DHCPv6 infrastructure), the domains, each operating its own DHCPv6 infrastructure), the
requirement to verify that the registered address is appropriate for requirement to verify that the registered address is appropriate for
the link or belongs to a delegated prefix ensures that each DHCPv6 the link or belongs to a delegated prefix ensures that each DHCPv6
server only registers bindings for addresses from the given server only registers bindings for addresses from the given
administrative domain. administrative domain.
Although a client "MUST NOT send the ADDR-REG-INFORM message for As mentioned in Section 4.2, although a client "MUST NOT send the
addresses configured by DHCPv6", if a server does receive such a ADDR-REG-INFORM message for addresses configured by DHCPv6", if a
message, it SHOULD log and discard it. server does receive such a message, it SHOULD log and discard it.
DHCPv6 relay agents and switches that relay address registration DHCPv6 relay agents and switches that relay address registration
messages directly from clients MUST include the client's link-layer messages directly from clients MUST include the client's link-layer
address in the relayed message using the Client Link-Layer Address address in the relayed message using the Client Link-Layer Address
option ([RFC6939]) if they would do so for other DHCPv6 client option [RFC6939] if they would do so for other DHCPv6 client messages
messages such as SOLICIT, REQUEST, and REBIND. such as Solicit, Request, and Rebind.
4.3. DHCPv6 Address Registration Acknowledgement 4.3. DHCPv6 Address Registration Acknowledgement
The server MUST acknowledge receipt of a valid ADDR-REG-INFORM The server MUST acknowledge receipt of a valid ADDR-REG-INFORM
message by sending back an ADDR-REG-REPLY message. The format of the message by sending back an ADDR-REG-REPLY message. The format of the
ADDR-REG-REPLY message is described as follows: ADDR-REG-REPLY message is described as follows:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| msg-type | transaction-id | | msg-type | transaction-id |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | | |
. options . . options .
. (variable) . . (variable) .
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
msg-type Identifies the DHCPv6 message type;
Set to ADDR-REG-REPLY (TBA2).
transaction-id The transaction ID for this message exchange. Figure 4: DHCPv6 ADDR-REG-REPLY Message
options Options carried in this message. msg-type: Identifies the DHCPv6 message type; set to ADDR-REG-REPLY
(37).
Figure 4: DHCPv6 ADDR-REG-REPLY message transaction-id: The transaction ID for this message exchange.
options: The options carried in this message.
If the ADDR-REG-INFORM message that the server is replying to was not If the ADDR-REG-INFORM message that the server is replying to was not
relayed, then the IPv6 destination address of the message MUST be the relayed, then the IPv6 destination address of the message MUST be the
address being registered. If the ADDR-REG-INFORM message was address being registered. If the ADDR-REG-INFORM message was
relayed, then the server MUST construct the Relay-reply message as relayed, then the server MUST construct the Relay-reply message as
specified in [RFC8415] section 19.3. specified in Section 19.3 of [RFC8415].
The server MUST copy the transaction-id from the ADDR-REG-INFORM The server MUST copy the transaction-id from the ADDR-REG-INFORM
message to the transaction-id field of the ADDR-REG-REPLY. message to the transaction-id field of the ADDR-REG-REPLY.
The ADDR-REG-REPLY message MUST contain an IA Address option for the The ADDR-REG-REPLY message MUST contain an IA Address option for the
address being registered. The option MUST be identical to the one in address being registered. The option MUST be identical to the one in
the ADDR-REG-INFORM message that the server is replying to. the ADDR-REG-INFORM message that the server is replying to.
Servers MUST ignore any received ADDR-REG-REPLY messages. Servers MUST ignore any received ADDR-REG-REPLY messages.
Clients MUST discard any ADDR-REG-REPLY messages that meet any of the Clients MUST discard any ADDR-REG-REPLY messages that meet any of the
following conditions: following conditions:
* The IPv6 destination address does not match the address being * the IPv6 destination address does not match the address being
registered. registered;
* The IA Address option does not match the address being registered. * the IA Address option does not match the address being registered;
* The address being registered is not assigned to the interface * the address being registered is not assigned to the interface
receiving the message. receiving the message; or
* The transaction-id does not match the transaction-id the client * the transaction-id does not match the transaction-id the client
used in the corresponding ADDR-REG-INFORM message. used in the corresponding ADDR-REG-INFORM message.
The ADDR-REG-REPLY message only indicates that the ADDR-REG-INFORM The ADDR-REG-REPLY message only indicates that the ADDR-REG-INFORM
message has been received and that the client should not retransmit message has been received and that the client should not retransmit
it. The ADDR-REG-REPLY message MUST NOT be considered as any it. The ADDR-REG-REPLY message MUST NOT be considered to be any
indication of the address validity and MUST NOT be required for the indication of the address validity and MUST NOT be required for the
address to be usable. DHCPv6 relays, or other devices that snoop address to be usable. DHCPv6 relays, or other devices that snoop
ADDR-REG-REPLY messages, MUST NOT add or alter any forwarding or ADDR-REG-REPLY messages, MUST NOT add or alter any forwarding or
security state based on the ADDR-REG-REPLY message. security state based on the ADDR-REG-REPLY message.
4.4. Signaling Address Registration Support 4.4. Signaling Address Registration Support
To avoid undesired multicast traffic, the client MUST NOT register To avoid undesired multicast traffic, the client MUST NOT register
addresses using this mechanism unless the DHCPv6 infrastructure addresses using this mechanism unless the DHCPv6 infrastructure
supports address registration. The client can discover this by supports address registration. The client can discover this by
including using the OPTION_ADDR_REG_ENABLE option in the Option including the OPTION_ADDR_REG_ENABLE option in the Option Request
Request options that it sends. If the client receives and processes options that it sends. If the client receives and processes an
an Advertise or Reply message with the OPTION_ADDR_REG_ENABLE option, Advertise or Reply message with the OPTION_ADDR_REG_ENABLE option, it
it concludes that the DHCPv6 infrastructure supports address concludes that the DHCPv6 infrastructure supports address
registration. When the client detects address registration support, registration. When the client detects address registration support,
it MUST start the registration process (unless configured not to do it MUST start the registration process (unless configured not to do
so) and MUST immediately register any addresses that are already in so) and MUST immediately register any addresses that are already in
use. Once the client starts the registration process, it MUST NOT use. Once the client starts the registration process, it MUST NOT
stop registering addresses until it disconnects from the link, even stop registering addresses until it disconnects from the link, even
if subsequent Advertise or Reply messages do not contain the if subsequent Advertise or Reply messages do not contain the
OPTION_ADDR_REG_ENABLE option. OPTION_ADDR_REG_ENABLE option.
The client MUST discover whether the DHCPv6 infrastructure supports The client MUST discover whether the DHCPv6 infrastructure supports
address registration every time it connects to a network or when it address registration every time it connects to a network or when it
detects it has moved to a new link, without utilizing any prior detects it has moved to a new link, without utilizing any prior
knowledge about address registration support on that network or link. knowledge about address registration support on that network or link.
This client behavior allows networks to progressively roll out This client behavior allows networks to progressively roll out
support for the address registration option across the DHCPv6 support for the Address Registration option across the DHCPv6
infrastructure without causing clients to frequently stop and restart infrastructure without causing clients to frequently stop and restart
address registration if some of the network's DHCPv6 servers support address registration if some of the network's DHCPv6 servers support
it and some of them do not. it and some do not.
A client with multiple interfaces MUST discover address registration A client with multiple interfaces MUST discover address registration
support for each interface independently. The client MUST NOT send support for each interface independently. The client MUST NOT send
address registration messsages on a given interface unless the client address registration messages on a given interface unless the client
has discovered that the interface is connected to a network which has discovered that the interface is connected to a network that
supports address registration. supports address registration.
4.5. Retransmission 4.5. Retransmission
To reduce the effects of packet loss on registration, the client MUST To reduce the effects of packet loss on registration, the client MUST
retransmit the registration message. Retransmissions SHOULD follow retransmit the registration message. Retransmissions SHOULD follow
the standard retransmission logic specified by section 15 of the standard retransmission logic specified by Section 15 of
[RFC8415] with the following default parameters: [RFC8415] with the following default parameters for the initial
retransmission time (IRT) and maximum retransmission count (MRC):
* IRT 1 sec * IRT 1 sec
* MRC 3 * MRC 3
The client SHOULD allow these parameters to be configured by the The client SHOULD allow these parameters to be configured by the
administrator. administrator.
To comply with section 16.1 of [RFC8415], the client MUST leave the To comply with Section 16.1 of [RFC8415], the client MUST leave the
transaction ID unchanged in retransmissions of an ADDR-REG-INFORM transaction ID unchanged in retransmissions of an ADDR-REG-INFORM
message. When the client retransmits the registration message, the message. When the client retransmits the registration message, the
lifetimes in the packet MUST be updated so that they match the lifetimes in the packet MUST be updated so that they match the
current lifetimes of the address. current lifetimes of the address.
If an ADDR-REG-REPLY message is received for the address being If an ADDR-REG-REPLY message is received for the address being
registered, the client MUST stop retransmission. registered, the client MUST stop retransmission.
4.6. Registration Expiry and Refresh 4.6. Registration Expiry and Refresh
The client MUST refresh registrations to ensure that the server is The client MUST refresh registrations to ensure that the server is
always aware of which addresses are still valid. The client SHOULD always aware of which addresses are still valid. The client SHOULD
perform refreshes as described below. perform refreshes as described below.
4.6.1. SLAAC Addresses 4.6.1. SLAAC Addresses
For an address configured using SLAAC, a function For an address configured using SLAAC, a function
AddrRegRefreshInterval(address) is defined as 80% of the address's AddrRegRefreshInterval(address) is defined as 80% of the address's
current Valid Lifetime. When calculating this value, the client current Valid Lifetime. When calculating this value, the client
applies a multiplier of AddrRegDesyncMultiplier to avoid applies a multiplier of AddrRegDesyncMultiplier to avoid
synchronization causing a large number of registration messages from synchronization with other clients, which could cause a large number
different clients at the same time. AddrRegDesyncMultiplier is a of registration messages to reach the server at the same time.
random value uniformly distributed between 0.9 and 1.1 (inclusive) AddrRegDesyncMultiplier is a random value uniformly distributed
and is chosen by the client when it starts the registration process, between 0.9 and 1.1 (inclusive) and is chosen by the client when it
to ensure that refreshes for addresses with the same lifetime are starts the registration process, to ensure that refreshes for
coalesced (see below). addresses with the same lifetime are coalesced (see below).
Whenever the client registers or refreshes an address, it calculates Whenever the client registers or refreshes an address, it calculates
a NextAddrRegRefreshTime for that address as AddrRegRefreshInterval a NextAddrRegRefreshTime for that address as AddrRegRefreshInterval
seconds in the future but does not schedule any refreshes. seconds in the future but does not schedule any refreshes.
Whenever the network changes the Valid Lifetime of an existing Whenever the network changes the Valid Lifetime of an existing
address by more than 1%, for example, by sending a Prefix Information address by more than 1%, for example, by sending a Prefix Information
option (PIO, [RFC4861]) with a new Valid Lifetime, the client Option (PIO) [RFC4861] with a new Valid Lifetime, the client
calculates a new AddrRegRefreshInterval. The client schedules a calculates a new AddrRegRefreshInterval. The client schedules a
refresh for min(now + AddrRegRefreshInterval, refresh for min(now + AddrRegRefreshInterval,
NextAddrRegRefreshTime). If the refresh would be scheduled in the NextAddrRegRefreshTime). If the refresh would be scheduled in the
past, then the refresh occurs immediately. past, then the refresh occurs immediately.
Justification: this algorithm ensures that refreshes are not sent too Justification: This algorithm ensures that refreshes are not sent too
frequently, while ensuring that the server never believes that the frequently while ensuring that the server never believes that the
address has expired when it has not. Specifically, after every address has expired when it has not. Specifically, after every
registration: registration:
* If the network never changes the lifetime of an address (e.g., if * If the network never changes the lifetime of an address (e.g., if
no further PIOs are received, or if all PIO lifetimes decrease in no further PIOs are received, or if all PIO lifetimes decrease in
step with the passage of time), then no refreshes occur. step with the passage of time), then no refreshes occur.
Refreshes are not necessary, because the address expires at the Refreshes are not necessary, because the address expires at the
time the server expects it to expire. time the server expects it to expire.
* Any time the network changes the lifetime of an address (i.e., * Any time the network changes the lifetime of an address (i.e.,
changes the time at which the address will expire) the client changes the time at which the address will expire), the client
ensures that a refresh is scheduled, so that server will be ensures that a refresh is scheduled, so that server will be
informed of the new expiry. informed of the new expiry.
* Because AddrRegDesyncMultiplier is at most 1.1, the refresh never * Because AddrRegDesyncMultiplier is at most 1.1, the refresh never
occurs later than a point 88% between the time when the address occurs later than a point 88% between the time when the address
was registered and the time when the address will expire. This was registered and the time when the address will expire. This
allows the client to retransmit the registration for up to 12% of allows the client to retransmit the registration for up to 12% of
the original interval before it expires. This may not be possible the original interval before it expires. This may not be possible
if the network sends a Router Advertisement (RA, [RFC4861]) very if the network sends a Router Advertisement (RA) [RFC4861] very
close to the time when the address would have expired. In this close to the time when the address would have expired. In this
case, the client refreshes immediately, which is the best it can case, the client refreshes immediately, which is the best it can
do. do.
* The 1% tolerance ensures that the client will not refresh or * The 1% tolerance ensures that the client will not refresh or
reschedule refreshes if the Valid Lifetime experiences minor reschedule refreshes if the Valid Lifetime experiences minor
changes due to transmission delays or clock skew between the changes due to transmission delays or clock skew between the
client and the router(s) sending the Router Advertisement. client and the router(s) sending the RA.
* AddrRegRefreshCoalesce (Section 4.6.3) allows battery-powered * AddrRegRefreshCoalesce (Section 4.6.3) allows battery-powered
clients to wake up less often. In particular, it allows the clients to wake up less often. In particular, it allows the
client to coalesce refreshes for multiple addresses formed from client to coalesce refreshes for multiple addresses formed from
the same prefix, such as the stable and privacy addresses. Higher the same prefix, such as the stable and privacy addresses. Higher
values will result in fewer wakeups, but may result in more values will result in fewer wakeups but may result in more network
network traffic, because if a refresh is sent early, then the next traffic, because if a refresh is sent early, then the next RA
RA received will cause the client to immediately send a refresh received will cause the client to immediately send a refresh
message. message.
* In typical networks, the lifetimes in periodic Router * In typical networks, the lifetimes in periodic RAs either contain
Advertisements either contain constant values, or values that constant values or values that decrease over time to match another
decrease over time to match another lifetime, such as the lifetime lifetime, such as the lifetime of a prefix delegated to the
of a prefix delegated to the network. In both these cases, this network. In both these cases, this algorithm will refresh on the
algorithm will refresh on the order of once per address lifetime, order of once per address lifetime, which is similar to the number
which is similar to the number of refreshes that are necessary of refreshes that are necessary using stateful DHCPv6.
using stateful DHCPv6.
* Because refreshes occur at least once per address lifetime, the * Because refreshes occur at least once per address lifetime, the
network administrator can control the address refresh frequency by network administrator can control the address refresh frequency by
appropriately setting the Valid Lifetime in the Prefix Information appropriately setting the Valid Lifetime in the PIO.
Option.
4.6.2. Statically Assigned Addresses 4.6.2. Statically Assigned Addresses
A statically assigned address has an infinite valid lifetime which is A statically assigned address has an infinite Valid Lifetime that is
not affected by Router Advertisements. Therefore whenever the client not affected by RAs. Therefore, whenever the client registers or
registers or refreshes a statically assigned address, the next refreshes a statically assigned address, the next refresh is
refresh is scheduled for StaticAddrRegRefreshInterval seconds in the scheduled for StaticAddrRegRefreshInterval seconds in the future.
future. The default value of StaticAddrRegRefreshInterval is 4 The default value of StaticAddrRegRefreshInterval is 4 hours. This
hours. This ensures static addresses are still refreshed ensures static addresses are still refreshed periodically, but
periodically, but refreshes for static addresses do not cause refreshes for static addresses do not cause excessive multicast
excessive multicast traffic. The StaticAddrRegRefreshInterval traffic. The StaticAddrRegRefreshInterval interval SHOULD be
interval SHOULD be configurable. configurable.
4.6.3. Transmitting Refreshes 4.6.3. Transmitting Refreshes
When a refresh is performed, the client MAY refresh all addresses When a refresh is performed, the client MAY refresh all addresses
assigned to the interface that are scheduled to be refreshed within assigned to the interface that are scheduled to be refreshed within
the next AddrRegRefreshCoalesce seconds. The value of the next AddrRegRefreshCoalesce seconds. The value of
AddrRegRefreshCoalesce is implementation-dependent, and a suggested AddrRegRefreshCoalesce is implementation dependent, and a suggested
default is 60 seconds. default is 60 seconds.
Registration refresh packets MUST be retransmitted using the same Registration refresh packets MUST be retransmitted using the same
logic as used for initial registrations (see the 'Retransmission' logic as used for initial registrations (see Section 4.5).
section above).
The client MUST generate a new transaction ID when refreshing the The client MUST generate a new transaction ID when refreshing the
registration. registration.
When a Client-Identifier-to-IPv6-address binding expires, the server When a Client-Identifier-to-IPv6-address binding expires, the server
MUST remove it and consider the address as available for use. MUST remove it and consider the address as available for use.
The client MAY choose to notify the server when an address is no The client MAY choose to notify the server when an address is no
longer being used (e.g., if the client is disconnecting from the longer being used (e.g., if the client is disconnecting from the
network, the address lifetime expired, or the address is being network, the address lifetime expired, or the address is being
removed from the interface). To indicate that the address is not removed from the interface). To indicate that the address is not
being used anymore the client MUST set the preferred-lifetime and being used anymore, the client MUST set the preferred-lifetime and
valid-lifetime fields of the IA Address option in the ADDR-REG-INFORM valid-lifetime fields of the IA Address option in the ADDR-REG-INFORM
message to zero. If the server receives a message with a valid- message to zero. If the server receives a message with a valid-
lifetime of zero, it MUST act as if the address has expired. lifetime of zero, it MUST act as if the address has expired.
5. Client configuration 5. Client Configuration
DHCP clients SHOULD allow the administrator to disable sending ADDR- DHCP clients SHOULD allow the administrator to disable sending ADDR-
REG-INFORM messages. This could be used, for example, to reduce REG-INFORM messages. Sending the messages SHOULD be enabled by
network traffic on networks where the servers are known not to
support the message type. Sending the messages SHOULD be enabled by
default. default.
6. Security Considerations 6. Security Considerations
An attacker may attempt to register a large number of addresses in An attacker may attempt to register a large number of addresses in
quick succession in order to overwhelm the address registration quick succession in order to overwhelm the address registration
server and / or fill up log files. Similar attack vectors exist server and/or fill up log files. Similar attack vectors exist today,
today, e.g., an attacker can DoS the server with messages containing e.g., an attacker can DoS the server with messages containing spoofed
spoofed DHCP Unique Identifiers (DUIDs) [RFC8415]. DHCP Unique Identifiers (DUIDs) [RFC8415].
If a network is using FCFS SAVI [RFC6620], then the DHCPv6 server can If a network is using First-Come, First-Served Source Address
trust that the ADDR-REG-INFORM message was sent by the legitimate Validation Improvement (FCFS SAVI) [RFC6620], then the DHCPv6 server
can trust that the ADDR-REG-INFORM message was sent by the legitimate
holder of the address. This prevents a client from registering an holder of the address. This prevents a client from registering an
address configured on another client. address configured on another client.
One of the use cases for the mechanism described in this document is One of the use cases for the mechanism described in this document is
to identify sources of malicious traffic after the fact. Note, to identify sources of malicious traffic after the fact. Note,
however, that as the device itself is responsible for informing the however, that as the device itself is responsible for informing the
DHCPv6 server that it is using an address, a malicious or compromised DHCPv6 server that it is using an address, a malicious or compromised
device can simply not send the ADDR-REG-INFORM message. This is an device can simply choose to not send the ADDR-REG-INFORM message.
informational, optional mechanism, and is designed to aid in This is an informational, optional mechanism and is designed to aid
troubleshooting and forensics. On its own, it is not intended to be in troubleshooting and forensics. On its own, it is not intended to
a strong security access mechanism. In particular, the ADDR-REG- be a strong security access mechanism. In particular, the ADDR-REG-
INFORM message MUST NOT be used for authentication and authorization INFORM message MUST NOT be used for authentication and authorization
purposes, because in addition to the reasons above, the packets purposes, because in addition to the reasons above, the packets
containing the message may be dropped. containing the message may be dropped.
7. Privacy Considerations 7. Privacy Considerations
If the network doesn't have MLD snooping enabled, then IPv6 link- If the network doesn't have Multicast Listener Discovery (MLD)
local multicast traffic is effectively transmitted as broadcast. In snooping enabled, then IPv6 link-local multicast traffic is
such networks, an on-link attacker listening to DHCPv6 messages might effectively transmitted as broadcast. In such networks, an on-link
obtain information about IPv6 addresses assigned to the client. As attacker listening to DHCPv6 messages might obtain information about
ADDR-REG-INFORM messages contain unique identifiers such as the IPv6 addresses assigned to the client. As ADDR-REG-INFORM messages
client's DUID, the attacker may be able to track addresses being contain unique identifiers such as the client's DUID, the attacker
registered and map them to the same client, even if the client uses may be able to track addresses being registered and map them to the
randomized MAC addresses. This privacy consideration is not specific same client, even if the client uses randomized MAC addresses. This
to the proposed mechanism. Section 4.3 of [RFC7844] discusses using privacy consideration is not specific to the proposed mechanism.
the DUID for device tracking in DHCPv6 environments and provides Section 4.3 of [RFC7844] discusses using the DUID for device tracking
mitigation recommendations. in DHCPv6 environments and provides mitigation recommendations.
In general, hiding information about the specific IPv6 address from In general, hiding information about the specific IPv6 address from
on-link observers should not be considered a security measure, as on-link observers should not be considered a security measure, as
such information is usually disclosed via Duplicate Address Detection such information is usually disclosed via Duplicate Address Detection
[RFC4862] to all nodes anyway, if MLD snooping is not enabled. [RFC4862] to all nodes anyway, if MLD snooping is not enabled.
If MLD snooping is enabled, an attacker might be able to join the If MLD snooping is enabled, an attacker might be able to join the
All_DHCP_Relay_Agents_and_Servers multicast address (ff02::1:2) group All_DHCP_Relay_Agents_and_Servers multicast address (ff02::1:2) group
to listen for address registration messages. However, the same to listen for address registration messages. However, the same
result can be achieved by joining the All Routers Address (ff02::2) result can be achieved by joining the All Routers Address (ff02::2)
group and listen to Gratuitous Neighbor Advertisement messages group and listen to gratuitous neighbor advertisement messages
[RFC9131]. It should be noted that this particular scenario shares [RFC9131]. It should be noted that this particular scenario shares
the fate with DHCPv6 address assignment: if an attacker can join the the fate with DHCPv6 address assignment: if an attacker can join the
All_DHCP_Relay_Agents_and_Servers multicast group, they would be able All_DHCP_Relay_Agents_and_Servers multicast group, they would be able
to monitor all DHCPv6 messages sent from the client to DHCPv6 servers to monitor all DHCPv6 messages sent from the client to DHCPv6 servers
and relays, and therefore obtain the information about addresses and relays and therefore obtain the information about addresses being
being assigned via DHCPv6. Layer 2 isolation allows mitigating this assigned via DHCPv6. Layer 2 isolation allows mitigating this threat
threat by blocking onlink peer-to-peer communication between nodes. by blocking on-link peer-to-peer communication between nodes.
8. IANA Considerations 8. IANA Considerations
This document introduces the following new entities which require an This document introduces the following entities, which have been
allocation out of the Dynamic Host Configuration Protocol for IPv6 allocated in the "Dynamic Host Configuration Protocol for IPv6
(DHCPv6) registry group defined at http://www.iana.org/assignments/ (DHCPv6)" registry group defined at <http://www.iana.org/assignments/
dhcpv6-parameters/: dhcpv6-parameters>. These include:
* one new DHCPv6 option, described in Section 4.1 which requires an
allocation out of the Option Codes registry:
- Value: TBA0
- Description: OPTION_ADDR_REG_ENABLE
- Client ORO: Yes
- Singleton Option: Yes
- Reference: This document (draft-ietf-dhc-addr-notification) * One new DHCPv6 option, described in Section 4.1, which has been
allocated in the "Option Codes" registry:
* two new DHCPv6 messages which require an allocation out of the Value: 148
Message Types registry: Description: OPTION_ADDR_REG_ENABLE
Client ORO: Yes
Singleton Option: Yes
Reference: RFC 9686
- ADDR-REG-INFORM message (TBA1) described in Section 4.2 * Two new DHCPv6 messages, which have been allocated in the "Message
Types" registry (for more information, see Sections 4.2 and 4.3,
respectively, for each DHCPv6 message):
- ADDR-REG-REPLY (TBA2) described in Section 4.3. Value: 36
Description: ADDR-REG-INFORM
Reference: RFC 9686
- Reference: This document (draft-ietf-dhc-addr-notification) Value: 37
Description: ADDR-REG-REPLY
Reference: RFC 9686
9. References 9. References
9.1. Normative References 9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/rfc/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
[RFC2131] Droms, R., "Dynamic Host Configuration Protocol", [RFC2131] Droms, R., "Dynamic Host Configuration Protocol",
RFC 2131, DOI 10.17487/RFC2131, March 1997, RFC 2131, DOI 10.17487/RFC2131, March 1997,
<https://www.rfc-editor.org/rfc/rfc2131>. <https://www.rfc-editor.org/info/rfc2131>.
[RFC4007] Deering, S., Haberman, B., Jinmei, T., Nordmark, E., and [RFC4007] Deering, S., Haberman, B., Jinmei, T., Nordmark, E., and
B. Zill, "IPv6 Scoped Address Architecture", RFC 4007, B. Zill, "IPv6 Scoped Address Architecture", RFC 4007,
DOI 10.17487/RFC4007, March 2005, DOI 10.17487/RFC4007, March 2005,
<https://www.rfc-editor.org/rfc/rfc4007>. <https://www.rfc-editor.org/info/rfc4007>.
[RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast [RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast
Addresses", RFC 4193, DOI 10.17487/RFC4193, October 2005, Addresses", RFC 4193, DOI 10.17487/RFC4193, October 2005,
<https://www.rfc-editor.org/rfc/rfc4193>. <https://www.rfc-editor.org/info/rfc4193>.
[RFC4704] Volz, B., "The Dynamic Host Configuration Protocol for [RFC4704] Volz, B., "The Dynamic Host Configuration Protocol for
IPv6 (DHCPv6) Client Fully Qualified Domain Name (FQDN) IPv6 (DHCPv6) Client Fully Qualified Domain Name (FQDN)
Option", RFC 4704, DOI 10.17487/RFC4704, October 2006, Option", RFC 4704, DOI 10.17487/RFC4704, October 2006,
<https://www.rfc-editor.org/rfc/rfc4704>. <https://www.rfc-editor.org/info/rfc4704>.
[RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
Address Autoconfiguration", RFC 4862, Address Autoconfiguration", RFC 4862,
DOI 10.17487/RFC4862, September 2007, DOI 10.17487/RFC4862, September 2007,
<https://www.rfc-editor.org/rfc/rfc4862>. <https://www.rfc-editor.org/info/rfc4862>.
[RFC6939] Halwasia, G., Bhandari, S., and W. Dec, "Client Link-Layer [RFC6939] Halwasia, G., Bhandari, S., and W. Dec, "Client Link-Layer
Address Option in DHCPv6", RFC 6939, DOI 10.17487/RFC6939, Address Option in DHCPv6", RFC 6939, DOI 10.17487/RFC6939,
May 2013, <https://www.rfc-editor.org/rfc/rfc6939>. May 2013, <https://www.rfc-editor.org/info/rfc6939>.
[RFC7844] Huitema, C., Mrugalski, T., and S. Krishnan, "Anonymity [RFC7844] Huitema, C., Mrugalski, T., and S. Krishnan, "Anonymity
Profiles for DHCP Clients", RFC 7844, Profiles for DHCP Clients", RFC 7844,
DOI 10.17487/RFC7844, May 2016, DOI 10.17487/RFC7844, May 2016,
<https://www.rfc-editor.org/rfc/rfc7844>. <https://www.rfc-editor.org/info/rfc7844>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/rfc/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A., [RFC8415] Mrugalski, T., Siodelski, M., Volz, B., Yourtchenko, A.,
Richardson, M., Jiang, S., Lemon, T., and T. Winters, Richardson, M., Jiang, S., Lemon, T., and T. Winters,
"Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)",
RFC 8415, DOI 10.17487/RFC8415, November 2018, RFC 8415, DOI 10.17487/RFC8415, November 2018,
<https://www.rfc-editor.org/rfc/rfc8415>. <https://www.rfc-editor.org/info/rfc8415>.
[RFC9131] Linkova, J., "Gratuitous Neighbor Discovery: Creating [RFC9131] Linkova, J., "Gratuitous Neighbor Discovery: Creating
Neighbor Cache Entries on First-Hop Routers", RFC 9131, Neighbor Cache Entries on First-Hop Routers", RFC 9131,
DOI 10.17487/RFC9131, October 2021, DOI 10.17487/RFC9131, October 2021,
<https://www.rfc-editor.org/rfc/rfc9131>. <https://www.rfc-editor.org/info/rfc9131>.
9.2. Informative References 9.2. Informative References
[RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
"Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
DOI 10.17487/RFC4861, September 2007, DOI 10.17487/RFC4861, September 2007,
<https://www.rfc-editor.org/rfc/rfc4861>. <https://www.rfc-editor.org/info/rfc4861>.
[RFC6620] Nordmark, E., Bagnulo, M., and E. Levy-Abegnoli, "FCFS [RFC6620] Nordmark, E., Bagnulo, M., and E. Levy-Abegnoli, "FCFS
SAVI: First-Come, First-Served Source Address Validation SAVI: First-Come, First-Served Source Address Validation
Improvement for Locally Assigned IPv6 Addresses", Improvement for Locally Assigned IPv6 Addresses",
RFC 6620, DOI 10.17487/RFC6620, May 2012, RFC 6620, DOI 10.17487/RFC6620, May 2012,
<https://www.rfc-editor.org/rfc/rfc6620>. <https://www.rfc-editor.org/info/rfc6620>.
Acknowledgments Acknowledgements
Many thanks to Bernie Volz for significant review and feedback, as Many thanks to Bernie Volz for the significant review and feedback,
well as Hermin Anggawijaya, Carlos Jesus Bernardos, Brian Carpenter, as well as Hermin Anggawijaya, Carlos Jesus Bernardos, Brian
Stuart Cheshire, Roman Danyliw, Alan DeKok, James Guichard, James Carpenter, Stuart Cheshire, Roman Danyliw, Alan DeKok, James
Guichard, Erik Kline, Mallory Knodel, Murray Kucherawy, David Guichard, James Guichard, Erik Kline, Mallory Knodel, Murray
Lamparter, Ted Lemon, Eric Levy-Abegnoli, Aditi Patange, Jim Reid, Kucherawy, David Lamparter, Ted Lemon, Eric Levy-Abegnoli, Aditi
Michael Richardson, Patrick Rohr, John Scudder, Mark Smith, Gunter Patange, Jim Reid, Michael Richardson, Patrick Rohr, John Scudder,
Van de Velde, Eric Vyncke, Timothy Winters, Peter Yee for their Mark Smith, Gunter Van de Velde, Eric Vyncke, Timothy Winters, and
feedback, comments and guidance. We apologize if we inadvertently Peter Yee for their feedback, comments, and guidance. We apologize
forgot to acknowledge anyone's contributions. if we inadvertently forgot to acknowledge anyone's contributions.
Contributors Contributors
Gang Chen Gang Chen
China Mobile China Mobile
53A, Xibianmennei Ave. 53A, Xibianmennei Ave.
Xuanwu District Xuanwu District
Beijing Beijing
P.R. China China
Email: phdgang@gmail.com Email: phdgang@gmail.com
Authors' Addresses Authors' Addresses
Warren Kumari Warren Kumari
Google, LLC Google, LLC
Email: warren@kumari.net Email: warren@kumari.net
Suresh Krishnan Suresh Krishnan
Cisco Systems, Inc. Cisco Systems, Inc.
 End of changes. 101 change blocks. 
268 lines changed or deleted 244 lines changed or added

This html diff was produced by rfcdiff 1.48.