Secure DHCPv6 Using CGAs
draft-ietf-dhc-secure-dhcpv6-07

 
Document
Type Expired Internet-Draft (dhc WG)
Last updated 2013-04-17 (latest revision 2012-09-14)
Replaces draft-jiang-dhc-secure-dhcpv6
Stream IETF
Intended RFC status Proposed Standard
Formats
Expired & archived
plain text pdf html
Stream
WG state WG Document
Document shepherd No shepherd assigned
IESG
IESG state Expired (IESG: Dead)
Telechat date
Responsible AD Ted Lemon
IESG note Ted Lemon (ted.lemon@nominum.com) is the document shepherd.
Send notices to dhc-chairs@ietf.org, draft-ietf-dhc-secure-dhcpv6@ietf.org
IANA
IANA review state IANA - Review Needed
IANA action state None

Email authors IPR 1 References Referenced by Nits Search lists

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
//www.ietf.org/archive/id/draft-ietf-dhc-secure-dhcpv6-07.txt

Abstract

The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) enables DHCPv6 servers to pass configuration parameters. It offers configuration flexibility. If not secured, DHCPv6 is vulnerable to various attacks, particularly spoofing attacks. This document analyzes the security issues of DHCPv6 and specifies a Secure DHCPv6 mechanism based on using CGAs.

Authors

Sheng Jiang (jiangsheng@huawei.com)
Sean Shen (shenshuo@cnnic.cn)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)