Privacy Considerations for DHCPv6
RFC 7824
Internet Engineering Task Force (IETF) S. Krishnan
Request for Comments: 7824 Ericsson
Category: Informational T. Mrugalski
ISSN: 2070-1721 ISC
S. Jiang
Huawei Technologies Co., Ltd.
May 2016
Privacy Considerations for DHCPv6
Abstract
DHCPv6 is a protocol that is used to provide addressing and
configuration information to IPv6 hosts. This document describes the
privacy issues associated with the use of DHCPv6 by Internet users.
It is intended to be an analysis of the present situation and does
not propose any solutions.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc7824.
Krishnan, et al. Informational [Page 1]
RFC 7824 DHCPv6 Privacy Considerations May 2016
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Krishnan, et al. Informational [Page 2]
RFC 7824 DHCPv6 Privacy Considerations May 2016
Table of Contents
1. Introduction ....................................................4
2. Terminology .....................................................4
3. Identifiers in DHCPv6 Options and Fields ........................5
3.1. Source IPv6 Address ........................................5
3.2. DUID .......................................................5
3.3. Client Identifier Option ...................................6
3.4. IA_NA, IA_TA, IA_PD, IA Address, and IA Prefix Options .....6
3.5. Client FQDN Option .........................................6
3.6. Client Link-Layer Address Option ...........................7
3.7. Option Request Option ......................................7
3.8. Vendor Class and Vendor-Specific Information Options .......7
3.9. Civic Location Option ......................................8
3.10. Coordinate-Based Location Option ..........................8
3.11. Client System Architecture Type Option ....................8
3.12. Relay Agent Options .......................................8
3.12.1. Subscriber-ID Option ...............................9
3.12.2. Interface ID Option ................................9
3.12.3. Remote ID Option ...................................9
3.12.4. Relay-ID Option ....................................9
4. Existing Mechanisms That Affect Privacy ........................10
4.1. Temporary Addresses .......................................10
4.2. DNS Updates ...............................................10
4.3. Allocation Strategies .....................................10
5. Attacks ........................................................12
5.1. Device Type Discovery (Fingerprinting) ....................12
5.2. Operating System Discovery (Fingerprinting) ...............12
5.3. Finding Location Information ..............................12
5.4. Finding Previously Visited Networks .......................13
5.5. Finding a Stable Identity .................................13
5.6. Pervasive Monitoring ......................................13
5.7. Finding a Client's IP Address or Hostname .................14
5.8. Correlation of Activities over Time .......................14
5.9. Location Tracking .........................................14
Show full document text