Security of Messages Exchanged Between Servers and Relay Agents
draft-volz-dhc-relay-server-security-02
Document | Type |
Replaced Internet-Draft
(candidate for dhc WG)
Expired & archived
|
|
---|---|---|---|
Authors | Bernie Volz , Yogendra Pal | ||
Last updated | 2016-09-14 (Latest revision 2016-09-08) | ||
Replaced by | draft-ietf-dhc-relay-server-security | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Call For Adoption By WG Issued | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-dhc-relay-server-security | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The Dynamic Host Configuration Protocol for IPv4 (DHCPv4) has no guidance for how to secure messages exchanged between servers and relay agents. The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) states that IPsec should be used to secure messages exchanged between servers and relay agents, but does not recommend encryption. And, with recent concerns about pervasive monitoring it is appropriate to provide recommendations for DHCPv4 and also improve the recommendations for DHCPv6. This document updates RFC1542 and RFC3315.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)