Secure DHCPv6 Using CGAs
draft-ietf-dhc-secure-dhcpv6-07
| Document | Type | Expired Internet-Draft (dhc WG) | |
|---|---|---|---|
| Authors | Sheng Jiang , Sean Shen | ||
| Last updated | 2015-10-14 (Latest revision 2012-09-14) | ||
| Replaces | draft-jiang-dhc-secure-dhcpv6 | ||
| Stream | Internet Engineering Task Force (IETF) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Reviews |
GENART Last Call review
Not Ready
SECDIR Last Call review
Has Issues
|
||
| Stream | WG state | WG Document | |
| Document shepherd | (None) | ||
| IESG | IESG state | Expired (IESG: Dead) | |
| Consensus boilerplate | Unknown | ||
| Telechat date | (None) | ||
| Responsible AD | Ted Lemon | ||
| IESG note | Ted Lemon (ted.lemon@nominum.com) is the document shepherd. | ||
| Send notices to | (None) | ||
| IANA | IANA review state | IANA - Review Needed |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-ietf-dhc-secure-dhcpv6-07.txt
https://www.ietf.org/archive/id/draft-ietf-dhc-secure-dhcpv6-07.txt
Abstract
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) enables DHCPv6 servers to pass configuration parameters. It offers configuration flexibility. If not secured, DHCPv6 is vulnerable to various attacks, particularly spoofing attacks. This document analyzes the security issues of DHCPv6 and specifies a Secure DHCPv6 mechanism based on using CGAs.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)