Secure DHCPv6

The information below is for an old version of the document
Document Type None Internet-Draft (dhc WG)
Last updated 2015-12-10
Replaces draft-jiang-dhc-sedhcpv6
Stream IETF
Intended RFC status Proposed Standard
Expired & archived
pdf htmlized bibtex
Additional URLs
- Mailing list discussion
Stream WG state (None)
Revised I-D Needed - Issue raised by AD
Document shepherd Tomek Mrugalski
Shepherd write-up Show (last changed 2015-01-29)
IESG IESG state Unknown state
Consensus Boilerplate Unknown
Telechat date
Responsible AD Brian Haberman
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) enables DHCPv6 servers to pass configuration parameters. It offers configuration flexibility. If not being secured, DHCPv6 is vulnerable to various attacks, particularly spoofing attacks. This document analyzes the security issues of DHCPv6 and specifies a Secure DHCPv6 mechanism for communications between DHCPv6 clients and DHCPv6 servers. This document provides a DHCPv6 client/server authentication mechanism based on sender's public/private key pairs or certificates with associated private keys. The DHCPv6 message exchanges are protected by the signature option and the timestamp option newly defined in this document.


Sheng Jiang (
Sean Shen (
Dacheng Zhang (
Tatuya Jinmei (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)