The Authentication Suboption for the DHCP Relay Agent Option
draft-ietf-dhc-relay-agent-auth-01
Document | Type |
Expired Internet-Draft
(dhc WG)
Expired & archived
|
|
---|---|---|---|
Authors | Mark Stapp , Ralph Droms , Ted Lemon | ||
Last updated | 2015-10-14 (Latest revision 2003-06-09) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Proposed Standard | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | WG Document | |
Document shepherd | (None) | ||
IESG | IESG state | Expired (IESG: Dead) | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Margaret Cullen | ||
IESG note | ** No value found for 'doc.notedoc.note' ** | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The DHCP Relay Agent Information Option (RFC 3046) conveys information between a DHCP relay agent and a DHCP server. This specification defines two mechanisms for securing the messages exchanged between a relay agent and a server. The first mechanism defines a new authentication suboption for the Relay Agent Information Option that supports source entity authentication and data integrity for relayed DHCP messages. The authentication suboption contains a cryptographic signature in a payload derived from the option used in DHCP Authentication (RFC 3118). The second mechanism uses IPsec (RFC 2041) to protect messages exchanged between relay agents and servers.
Authors
Mark Stapp
Ralph Droms
Ted Lemon
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)