Skip to main content

Secure DHCPv6 Using CGAs
draft-ietf-dhc-secure-dhcpv6-07

Document Type Expired Internet-Draft (dhc WG)
Expired & archived
Authors Sheng Jiang , Sean Shen
Last updated 2015-10-14 (Latest revision 2012-09-14)
Replaces draft-jiang-dhc-secure-dhcpv6
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status Proposed Standard
Formats
Reviews
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Expired (IESG: Dead)
Action Holders
(None)
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD Ted Lemon
IESG note ** No value found for 'doc.notedoc.note' **
Send notices to (None)
IANA IANA review state IANA - Review Needed

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) enables DHCPv6 servers to pass configuration parameters. It offers configuration flexibility. If not secured, DHCPv6 is vulnerable to various attacks, particularly spoofing attacks. This document analyzes the security issues of DHCPv6 and specifies a Secure DHCPv6 mechanism based on using CGAs.

Authors

Sheng Jiang
Sean Shen

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)