Encryption Mechanism for DHCPv6
draft-cui-dhc-dhcpv6-encryption-04

Document Type Expired Internet-Draft (individual)
Authors Yong Cui  , Lishan Li  , Jianping Wu  , Yiu Lee 
Last updated 2016-04-21 (latest revision 2015-10-19)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-cui-dhc-dhcpv6-encryption-04.txt

Abstract

The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) enables DHCPv6 servers to configure network parameters dynamically. However, due to the unsecured nature, various critical identifiers used in DHCPv6 are vulnerable to several types of attack. In order to protect the DHCPv6 from passive attack, such as pervasive monitoring attack, this document provides a mechanism to achieve the encryption between the DHCPv6 client and server.

Authors

Yong Cui (yong@csnet1.cs.tsinghua.edu.cn)
Lishan Li (lilishan9248@126.com)
Jianping Wu (jianping@cernet.edu.cn)
Yiu Lee (yiu_lee@cable.comcast.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)