Skip to main content

Security of Messages Exchanged Between Servers and Relay Agents
draft-volz-dhc-relay-server-security-02

Document Type Replaced Internet-Draft (candidate for dhc WG)
Expired & archived
Authors Bernie Volz , Yogendra Pal
Last updated 2016-09-14 (Latest revision 2016-09-08)
Replaced by draft-ietf-dhc-relay-server-security
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state Call For Adoption By WG Issued
Document shepherd (None)
IESG IESG state Replaced by draft-ietf-dhc-relay-server-security
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

The Dynamic Host Configuration Protocol for IPv4 (DHCPv4) has no guidance for how to secure messages exchanged between servers and relay agents. The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) states that IPsec should be used to secure messages exchanged between servers and relay agents, but does not recommend encryption. And, with recent concerns about pervasive monitoring it is appropriate to provide recommendations for DHCPv4 and also improve the recommendations for DHCPv6. This document updates RFC1542 and RFC3315.

Authors

Bernie Volz
Yogendra Pal

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)