Secure Access Mechanism for DHCPv6
draft-yiu-dhc-dhcpv6-sa-00

Document Type Expired Internet-Draft (individual)
Authors Yiu Lee  , Yong Cui  , ZiLong Liu  , Linhui Sun 
Last updated 2015-09-09 (latest revision 2015-03-08)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-yiu-dhc-dhcpv6-sa-00.txt

Abstract

DHCPv6 [RFC3315] provides configuration parameters such as IPv6 network addresses for hosts. The unencrypted nature and use of various identifiers make its privacy and security become more vulnerable. With appropriate protection mechanisms, the privacy and security can be improved to some extent. This document specifies such a mechanism that builds a trusted relationship between DHCPv6 clients and servers before solicitation. The mechanism enables a valid client to find and access the legitimate server or reject and blacklist a rogue server.

Authors

Yiu Lee (yiu_lee@cable.comcast.com)
Yong Cui (yong@csnet1.cs.tsinghua.edu.cn)
ZiLong Liu (liuzilong8266@163.com)
Linhui Sun (lh.sunlinh@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)