mirror of
https://gitlab.isc.org/isc-projects/dhcp
synced 2025-08-30 22:05:23 +00:00
New option docs; remove obsolete docs
This commit is contained in:
@@ -1,188 +0,0 @@
|
||||
|
||||
CURRENT_MEETING_REPORT_
|
||||
|
||||
Reported by Walt Wimer/CMU
|
||||
|
||||
Minutes of the Dynamic Host Configuration Working Group (DHC)
|
||||
|
||||
The DHC Working Group met on 7 December and 9 December at the 31st IETF.
|
||||
|
||||
|
||||
Document Status
|
||||
|
||||
The most recent Internet-Draft of the DHCP specification includes
|
||||
several changes based on the results of the latest interoperability
|
||||
testing. Based on the results of that testing, and a review of the
|
||||
Standards process RFC, the working group decided it would be appropriate
|
||||
to ask that DHCP be considered for ``Draft Standard'' status. As soon
|
||||
as a revision of the current Internet-Draft is completed, the
|
||||
specification for DHCP will be submitted for review.
|
||||
|
||||
A few, minor changes have been made to RFC 1541 based on questions
|
||||
raised during the latest interoperability testing. Two new options have
|
||||
been defined since RFC 1533: 62, NetWare/IP domain and 63, NetWare/IP
|
||||
option.
|
||||
|
||||
The working group agreed that the minimum lease requirement (one hour)
|
||||
should be made advisory rather than mandatory.
|
||||
|
||||
|
||||
Implementations
|
||||
|
||||
The following list of implementations was compiled from information
|
||||
given by working group attendees.
|
||||
|
||||
_____________________________________________________________________
|
||||
|| | | | ||
|
||||
|| Vendor |Client |Server |Relay agent ||
|
||||
||___________________|___________________|_______________|_____________||
|
||||
|| FTP Software |DOS/Windows |Windows | ||
|
||||
||___________________|___________________|NT_(beta)______|_____________||
|
||||
|| SunSoft |DOS/Windows |Solaris 2.0 |in server ||
|
||||
||___________________|Solaris_(beta?)____|_______________|_____________||
|
||||
|| Microsoft |DOS/Windows |NT |in server ||
|
||||
|| |NT | | ||
|
||||
||___________________|Windows95_beta_____|_______________|_____________||
|
||||
|| Competitive |??? |Solaris | ||
|
||||
||_Automation________|___________________|_______________|_____________||
|
||||
|| Apple |Newton | | ||
|
||||
||___________________|Mac_(beta)_________|_______________|_____________||
|
||||
|| WIDE project |Unix, BSD386 |Unix, BSD386 |Unix, BSD386 ||
|
||||
||_(free,_avail_2/95)|News,_SunOS________|News,_SunOS____|News,_SunOS_ ||
|
||||
||_Silicon_Graphics__|IRIX_(soon)________|IRIX___________|_____________||
|
||||
|| Hewlett Packard |X-terminal |HP/UX (June 95)|in server ||
|
||||
||___________________|___________________|_______________|HP_router____||
|
||||
|| IBM |OS/2 (soon) |OS/2 (soon) | ||
|
||||
|| |AIX (soon) |AIX (soon) | ||
|
||||
||___________________|___________________|AS/400_(soon)__|_____________||
|
||||
|| cisco Systems |Terminal server? | |routers ||
|
||||
|| |(proxy for | | ||
|
||||
||___________________|terminal_clients?)_|_______________|_____________||
|
||||
|| Novell |NetWare/IP |NetWare/IP | ||
|
||||
||___________________|(spring)___________|(later)________|_____________||
|
||||
|| Shiva |Proxy for | | ||
|
||||
||___________________|dial-in_clients____|_______________|_____________||
|
||||
|
||||
|
||||
Future Interoperability Test
|
||||
|
||||
There was some discussion of a future interoperability test. Suggested
|
||||
venues include Bucknell University (summer '95), CMU (no specific time),
|
||||
next IETF (March '95) and remote via the Internet (?!?!). The working
|
||||
group will hold a discussion about the next interoperability testing via
|
||||
electronic mail.
|
||||
|
||||
|
||||
Outstanding Issues
|
||||
|
||||
The working group discussed some outstanding issues and generated some
|
||||
solutions:
|
||||
|
||||
|
||||
o New options: TFTP server address, bootfile name, to be registered
|
||||
with IANA.
|
||||
|
||||
o Some clients will already have an IP address, not otherwise
|
||||
registered or managed by DHCP. Those clients will only want local
|
||||
configuration parameters, not an address. A new DHCP message,
|
||||
DHCPINFORM, will be defined for parameter requests.
|
||||
|
||||
o There was some question about the definition and interpretation of
|
||||
``client identifiers.'' The working group confirmed that a
|
||||
``client identifier'' is an opaque, unique identifier. Text will
|
||||
be added to the protocol specification to clarify this issue and to
|
||||
advise that ``client identifiers'' must be unique. ``Client
|
||||
identifier'' type 0 will indicate ``an opaque string of
|
||||
characters.''
|
||||
|
||||
|
||||
The issue of security was discussed. The primary concern is to detect
|
||||
and avoid spoof/unauthorized servers. Some sites are also concerned
|
||||
about unauthorized clients. The consensus was that a public key
|
||||
identification and authorization mechanism should be developed as an
|
||||
optional DHCP service.
|
||||
|
||||
Ralph Droms presented a preliminary proposal for a server-server
|
||||
protocol to allow automatic management of DHCP bindings by multiple DHCP
|
||||
servers at a single site. The goals are to increase availability and
|
||||
reliability through redundancy of address allocation and binding
|
||||
servers, and through load sharing. The basic model, based on a proposal
|
||||
by Jeff Mogul, is to assign each allocatable address and allocated
|
||||
binding to a specific ``owner'' server. That owner has modification
|
||||
privileges, while all other servers have read-only privileges. Servers
|
||||
use TCP connections and a simple protocol to replicate copies of new
|
||||
bindings and transfer ownership of addresses to balance the pool of
|
||||
available addresses.
|
||||
|
||||
The hard part is bindings that are released early, prior to expiration.
|
||||
Those released bindings must be reported to all other servers, so those
|
||||
servers do not respond with stale data in the future. However, servers
|
||||
may be inaccessible. The proposed solution was to add an ``owner''
|
||||
option; clients would select responses from the ``owner'' in favor of
|
||||
all other responses.
|
||||
|
||||
The suggestion was made that multiple DHCP servers might be able to use
|
||||
an underlying distributed database like DNS, NIS+ or Oracle. Questions
|
||||
were raised about the scalability of the proposed scheme -- suppose many
|
||||
clients send simultaneous update requests, how often should updates be
|
||||
replicated, what about combinatoric explosion with the number of
|
||||
servers?
|
||||
|
||||
|
||||
IPv6 Issues
|
||||
|
||||
The second meeting began with a discussion of several IPv6 issues. IPv6
|
||||
address configuration has three basic forms:
|
||||
|
||||
|
||||
1. Intra-link scope address (client forms address all on its own)
|
||||
|
||||
2. ``Stateless'' servers (e.g., in routers using some simple
|
||||
assignment algorithm)
|
||||
3. Stateful servers (`a la IPv4 DHCP)
|
||||
|
||||
|
||||
Regardless of how addresses are managed, IPv6 will need some other
|
||||
mechanism(s) to obtain other configuration parameters. Some members of
|
||||
the IPv6 design team claim there will be no other parameters.
|
||||
|
||||
The following action items were identified:
|
||||
|
||||
|
||||
o Someone to enumerate all IPv6 network layer parameters.
|
||||
Mike Carney volunteered.
|
||||
|
||||
o Extensions/changes to DHCP protocol format for IPv6.
|
||||
Walt Wimer volunteered.
|
||||
|
||||
|
||||
Dynamic Addressing
|
||||
|
||||
Next, the working group discussed the problem of dynamic updates to DNS
|
||||
from DHCP information (dynamic addressing). For simple registration of
|
||||
DNS hostnames for individual DHCP clients, what should we do? Should
|
||||
client be responsible for contacting DNS server directly, or should DHCP
|
||||
server contact DNS on behalf of client? It will be necessary to clarify
|
||||
DNS configuration/update mechanism with DNS Working Group. One solution
|
||||
to the question of who does the update would be to define a DHCP option
|
||||
for client to say whether it will do the registration with DNS directly
|
||||
or whether client wants DHCP server to take care of it. DHCP server may
|
||||
need a way to veto the client's preference. This permits a simple
|
||||
client (such as an embedded hub, probe, etc.) to let the DHCP server do
|
||||
everything (DHCP server probably has necessary credentials to update DNS
|
||||
while client probably does not). Or, a more sophisticated client can
|
||||
update its ``home'' DNS directly (for example, a mobile notebook
|
||||
computer belonging to XYZ, Inc. can be taken to an IETF get a local IP
|
||||
address from the IETF DHCP server, but then directly update XYZ.COM's
|
||||
DNS server in order to maintain an XYZ.COM name). The problem of name
|
||||
collisions was unresolved - should the client or the server be
|
||||
responsible? Masataka Ohta volunteered to do a DHCP-to-DNS interaction
|
||||
proposal
|
||||
|
||||
|
||||
DHCP and SNMP
|
||||
|
||||
Finally, the working group considered DHCP and SNMP. The working group
|
||||
chair asked if there were any MIB writers in the audience. The scribe
|
||||
thought there was a volunteer but did not catch the name.
|
||||
|
@@ -1,267 +0,0 @@
|
||||
|
||||
CURRENT_MEETING_REPORT_
|
||||
|
||||
Reported by Rob Austein/Epilogue Technology
|
||||
|
||||
Minutes of the Domain Name System Working Group (DNS)
|
||||
|
||||
|
||||
Documents
|
||||
|
||||
Three new DNS-related Informational RFCs have come out recently.
|
||||
RFC 1535 (also known as ``the EDU.COM emergency RFC'') details problems
|
||||
with a widely-used but ill-advised DNS search heuristic, and proposes a
|
||||
solution. RFC 1536 details common DNS implementation errors, with
|
||||
proposed solutions; this document was accepted as a DNS Working Group
|
||||
project at the 27th IETF (Amsterdam), completed, and accepted on the
|
||||
mailing list. RFC 1537 details common DNS configuration errors; while
|
||||
it was never formally accepted as a DNS Working Group document, it was
|
||||
reviewed by the working group members. These three RFCs are closely
|
||||
related and cross-reference each other, so, on advice of the RFC Editor,
|
||||
the DNS Working Group Chair approved ``fast track'' publication of these
|
||||
documents on behalf of the Working Group. If anybody has serious
|
||||
problems with these documents, blame it on the Chair.
|
||||
|
||||
Dave Perkins reported on the current status of the DNS MIB documents on
|
||||
behalf of the Network Management Area Directorate (NMDIR). Basically,
|
||||
there are no remaining hard problems, just some remaining detail work.
|
||||
One of the authors, Rob Austein, has received a detailed list of
|
||||
remaining concerns, none of which appear to be show-stoppers. It should
|
||||
be possible to get these documents out the door before the 29th IETF in
|
||||
Seattle. Dave pointed out two design issues that are not objections but
|
||||
of which he thinks the DNS Working Group should be aware:
|
||||
|
||||
|
||||
1. Due to SNMP protocol limitations, the length limits on DNS names
|
||||
used as indices to ``conceptual tables'' in the MIBs will be
|
||||
shorter than the DNS name length limit of 255 octets. Based on
|
||||
analysis of current usage, this should not be a problem, so we'll
|
||||
flag it with a warning statement in the document but otherwise
|
||||
leave it alone.
|
||||
2. The most recent versions of the documents (not yet released as
|
||||
Internet-Drafts) use the SNMPv2 SMI rather than the SNMPv1 SMI, in
|
||||
order to clear up some problems with unsigned 32-bit integers.
|
||||
NMDIR wants to be sure that the DNS Working Group realizes that
|
||||
this means only SNMPv2-capable implementations will be able to use
|
||||
these MIBs.
|
||||
|
||||
|
||||
DNS Security Sub-Group
|
||||
|
||||
James Galvin gave a report on the meeting held by the DNS Security
|
||||
``sub-group'' (a spin off from the DNS Working Group at the 26th IETF in
|
||||
Columbus).
|
||||
|
||||
|
||||
The DNS Security design team of the DNS Working Group met for
|
||||
one morning at the Houston IETF. The discussion began with a
|
||||
call for threats that the members of the group were most
|
||||
concerned about. The list included the following:
|
||||
|
||||
o disclosure of the data - some expressed a desire to be
|
||||
able to encrypt the data in responses
|
||||
|
||||
o modification of the data
|
||||
|
||||
o masquerade of the origin of the data
|
||||
|
||||
o masquerade of a secondary - some expressed a desire to be
|
||||
able to reliably identify both peers in a zone transfer;
|
||||
this would provide the basis for controlling access to
|
||||
zone transfers
|
||||
|
||||
During the discussion of these threats it was agreed to accept
|
||||
the following assumptions:
|
||||
|
||||
1. DNS data is ``public''
|
||||
2. backward/co-existence compatibility is required
|
||||
|
||||
With respect to the first, accepting it set aside any further
|
||||
discussion of the threat of disclosure of the data. The second
|
||||
assumption is included explicitly to remind everyone that we do
|
||||
not want parallel DNS systems in the Internet.
|
||||
In addition, it was explicitly agreed that we would not address
|
||||
authentication of secondaries or access control issues. Thus,
|
||||
the current list of desired security services is:
|
||||
|
||||
o data integrity
|
||||
o data origin authentication
|
||||
|
||||
It was noted that a digital signature mechanism would support
|
||||
the desired services.
|
||||
The meeting continued with a brainstorming period during which
|
||||
the desired functional requirements of a secure DNS were
|
||||
collected. This list does not represent mandatory
|
||||
functionality but, rather, it is desired functionality. It was
|
||||
agreed that this list was subject to discussion on the mailing
|
||||
list for a period of time that would conclude on November 30.
|
||||
The requirements are listed here in no particular order.
|
||||
|
||||
o sites must be able to support at least their internal
|
||||
users in the presence of external network failures
|
||||
|
||||
o it should be possible for a site to pre-configure other
|
||||
authoritative servers without having to query the
|
||||
``system'' to find the server
|
||||
|
||||
o it should be possible to request services only from
|
||||
security enhanced servers, only from non-security enhanced
|
||||
servers, or to indicate that either is acceptable
|
||||
|
||||
o it should be possible to recognize security enhanced
|
||||
responses
|
||||
|
||||
o it should be possible to assign cryptographic keys (make
|
||||
use of the security services) to leaf nodes in the DNS
|
||||
tree, i.e., fully qualified domain names
|
||||
|
||||
o it should be possible to not trust secondary servers
|
||||
|
||||
o a mechanism must exist for revoking cryptographic keys
|
||||
that works within the DNS time-to-live framework
|
||||
|
||||
o security services should be supported with no additional
|
||||
DNS queries beyond what would be required if security was
|
||||
not supported
|
||||
|
||||
o it must be possible to ensure that cached data expires
|
||||
according to its TTL
|
||||
|
||||
The meeting concluded with agreement on the following three
|
||||
milestones.
|
||||
|
||||
1. The desired functional requirements are to be reviewed and
|
||||
agreed upon by November 30.
|
||||
|
||||
2. Strawman proposals that meet as many of the desired
|
||||
requirements as possible are due by January 31, 1994.
|
||||
|
||||
3. The group would produce a single, draft proposal at the
|
||||
next IETF meeting, March 1994.
|
||||
|
||||
|
||||
|
||||
The DNS Security effort will be spun off as a separate working group in
|
||||
the Service Applications Area (SAP), as soon as James can get the
|
||||
charter approved. The DNS Security mailing list is
|
||||
dns-security@tis.com; requests to subscribe should be sent to
|
||||
dns-security-request@tis.com.
|
||||
|
||||
Discussion of the incremental zone transfer protocol
|
||||
(draft-ietf-dns-ixfr-00.txt) was deferred because none of the authors
|
||||
were present at the meeting. Comments on this draft should be sent to
|
||||
the authors and/or the Namedroppers mailing list.
|
||||
|
||||
|
||||
|
||||
DNS Efforts to Support SIPP
|
||||
|
||||
Sue Thomson gave a brief report on current DNS efforts to support SIPP
|
||||
(the merger of the SIP and PIP proposals). See the latest version of
|
||||
the Internet-Draft, draft-ietf-sip-sippdns-nn.txt, for details.
|
||||
|
||||
|
||||
DNS Reliability Issues - Boeing
|
||||
|
||||
Ed King gave a presentation on DNS reliability issues in Boeing's
|
||||
production environment. Ed has to support DNS on a corporate network
|
||||
with thousands of subnets and DNS software from many vendors in a
|
||||
production environment that never shuts down and where an interruption
|
||||
to DNS services due to a power hit can leave hundreds of engineers
|
||||
sitting idle waiting for their workstations to finish booting. Much of
|
||||
the problem is that each vendor has their own slightly different (and
|
||||
often more than slightly broken) interface between DNS, local host
|
||||
tables, and the vendor's own pet name resolution mechanism. Replacing
|
||||
or repairing all the DNS software in an environment isn't economically
|
||||
feasible, so the most constructive approach seems to be to write a ``DNS
|
||||
Requirements'' document to use as a reference when pressuring vendors to
|
||||
fix their DNS implementations. The DNS portion of the Host Requirements
|
||||
documents (RFC 1123 section 6.1) and the newly published DNS ``Common
|
||||
Errors'' Informational RFCs are good starting points, but companies like
|
||||
Boeing need a document that has the force of a standard and that goes
|
||||
into more detail on interface design issues than Host Requirements does.
|
||||
|
||||
No definite decision was reached as a result of Ed's presentation, but
|
||||
watch Namedroppers for further discussion and probably a call to form a
|
||||
working group.
|
||||
|
||||
|
||||
DNS Support for DHC and Mobile Hosts
|
||||
|
||||
Masataka Ohta gave a presentation on a possible way to implement some of
|
||||
the DNS support needed for dynamic host configuration and mobile hosts.
|
||||
The presentation went into more detail than there is room for in these
|
||||
minutes, so expect to see a summary of this on the Namedroppers list.
|
||||
|
||||
|
||||
The Future of the DNS Working Group
|
||||
|
||||
Dave Crocker spoke about the future of the DNS Working Group. As has
|
||||
been discussed at previous meetings, the DNS Working Group as currently
|
||||
organized doesn't really fit well into the current IETF organizational
|
||||
framework. Accordingly, Dave asks that DNS reorganize itself more along
|
||||
the current IETF pattern. The proposal is to move the ``permanent''
|
||||
functions of the DNS Working Group (DNS oversight within the IETF,
|
||||
mostly) into the SAP Area Directorate, that Dave will be forming ``Real
|
||||
Soon Now,'' while reincarnating specific closed-ended tasks as separate
|
||||
working groups within the SAP Area. The SAP Area Directorate will hold
|
||||
open meetings at regular intervals, so that there will still be a forum
|
||||
for overall DNS design work. For formal purposes, the current DNS
|
||||
Working Group will probably be retroactively construed as having been
|
||||
the DNS MIB Working Group, and will be closed down as soon as the DNS
|
||||
MIB documents hit the streets. As a practical matter, and in the
|
||||
Chair's opinion, the current DNS Working Group will effectively
|
||||
reconstitute itself as the attendees of the DNS portion of the SAP Area
|
||||
Directorate open meetings. Dave expects to have the reorganization
|
||||
completed by the 29th IETF in Seattle.
|
||||
|
||||
The discussion that followed Dave's statement made it clear that there
|
||||
are people with strong feelings on both sides of this issue (keep the
|
||||
DNS Working Group as it is versus reorganize per Dave's plan). Unless
|
||||
somebody feels strongly enough about this to make a formal appeal, the
|
||||
reorganization will probably go through.
|
||||
|
||||
|
||||
Attendees
|
||||
|
||||
Steve Alexander stevea@lachman.com
|
||||
Garrett Alexander gda@tycho.ncsc.mil
|
||||
Robert Austein sra@epilogue.com
|
||||
Anders Baardsgaad anders@cc.uit.no
|
||||
Alireza Bahreman bahreman@bellcore.com
|
||||
William Barns barns@gateway.mitre.org
|
||||
Stephen Crocker crocker@tis.com
|
||||
Donald Eastlake dee@skidrow.lkg.dec.com
|
||||
Havard Eidnes havard.eidnes@runit.sintef.no
|
||||
Erik Fair fair@apple.com
|
||||
Roger Fajman raf@cu.nih.gov
|
||||
Patrik Faltstrom paf@nada.kth.se
|
||||
Antonio Fernandez afa@thumper.bellcore.com
|
||||
James Fielding jamesf@arl.army.mil
|
||||
James Galvin galvin@tis.com
|
||||
Chris Gorsuch chrisg@lobby.ti.com
|
||||
Ronald Jacoby rj@sgi.com
|
||||
Rick Jones raj@cup.hp.com
|
||||
Charlie Kaufman kaufman@zk3.dec.com
|
||||
Elizabeth Kaufman kaufman@biomded.med.yale.edu
|
||||
Stephen Kent kent@bbn.com
|
||||
Edwin King eek@atc.boeing.com
|
||||
Paul Lambert paul_lambert@email.mot.com
|
||||
Walter Lazear lazear@gateway.mitre.org
|
||||
Lars-Johan Liman liman@ebone.net
|
||||
John Linn linn@security.ov.com
|
||||
Jun Matsukata jm@eng.isas.ac.jp
|
||||
Paul Mockapetris pvm@darpa.mil
|
||||
Sath Nelakonda sath@lachman.com
|
||||
Masataka Ohta mohta@cc.titech.ac.jp
|
||||
Michael Patton map@bbn.com
|
||||
Jon Postel postel@isi.edu
|
||||
Jeffrey Schiller jis@mit.edu
|
||||
Richard Schmalgemeier rgs@merit.edu
|
||||
Michael St. Johns stjohns@arpa.mil
|
||||
John Stewart jstewart@cnri.reston.va.us
|
||||
Theodore Ts'o tytso@mit.edu
|
||||
Walter Wimer walter.wimer@andrew.cmu.edu
|
||||
David Woodgate David.Woodgate@its.csiro.au
|
||||
Weiping Zhao zhao@nacsis.ac.jp
|
||||
|
110
doc/draft-ietf-dhc-new-options-00.txt
Normal file
110
doc/draft-ietf-dhc-new-options-00.txt
Normal file
@@ -0,0 +1,110 @@
|
||||
|
||||
Network Working Group R. Droms
|
||||
INTERNET DRAFT Bucknell University
|
||||
Obsoletes: February 1996
|
||||
Expires August 1996
|
||||
|
||||
|
||||
Procedure for Defining New DHCP Options
|
||||
<draft-ietf-dhc-new-options-00.txt>
|
||||
|
||||
Status of this memo
|
||||
|
||||
This document is an Internet-Draft. Internet-Drafts are working
|
||||
documents of the Internet Engineering Task Force (IETF), its areas,
|
||||
and its working groups. Note that other groups may also distribute
|
||||
working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as ``work in progress.''
|
||||
|
||||
To learn the current status of any Internet-Draft, please check the
|
||||
``1id-abstracts.txt'' listing contained in the Internet-Drafts Shadow
|
||||
Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
|
||||
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
|
||||
ftp.isi.edu (US West Coast).
|
||||
|
||||
Abstract
|
||||
|
||||
The Dynamic Host Configuration Protocol (DHCP) provides a
|
||||
framework for passing configuration information to hosts on a TCP/IP
|
||||
network. Configuration parameters and other control information are
|
||||
carried in tagged data items that are stored in the 'options' field
|
||||
of the DHCP message. The data items themselves are also called
|
||||
"options."
|
||||
|
||||
This document describes the procedure for defining new DHCP options.
|
||||
The procedure will guarantee that:
|
||||
|
||||
* allocation of new option numbers is coordinated from a single
|
||||
authority,
|
||||
* new options are reviewed for technical correctness and
|
||||
appropriateness, and
|
||||
* documentation for new options is complete and published.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Droms [Page 1]
|
||||
|
||||
DRAFT Procedure for Defining New DHCP Options February 1996
|
||||
|
||||
|
||||
Procedure
|
||||
|
||||
The author of a new DHCP option will follow these steps to obtain
|
||||
acceptance of the option as a part of the DHCP Internet Standard:
|
||||
|
||||
1. The author devises the new option.
|
||||
2. The author requests a number for the new option from IANA.
|
||||
3. The author documents the new option, using the newly obtained
|
||||
option number, as an Internet Draft.
|
||||
4. The author submits the Internet Draft for review through the IETF
|
||||
standards process as defined in "Internet Official Protocol
|
||||
Standards" (STD 1). The new option will be submitted for eventual
|
||||
acceptance as an Internet Standard.
|
||||
5. The new option progresses through the IETF standards process; the
|
||||
new option will be reviewed by the Dynamic Host Configuration
|
||||
Working Group (if that group still exists), or as an Internet
|
||||
Draft not submitted by an IETF working group.
|
||||
6. If the new option fails to gain acceptance as an Internet
|
||||
Standard, the assigned option number will be returned to IANA for
|
||||
reassignment.
|
||||
|
||||
Acceptance and publication
|
||||
|
||||
If this procedure is accepted, it will be added to the DHCP options
|
||||
specification as an Appendix.
|
||||
|
||||
Security Considerations
|
||||
|
||||
Security issues are not discussed in this memo.
|
||||
|
||||
Author's Address
|
||||
|
||||
Ralph Droms
|
||||
Computer Science Department
|
||||
323 Dana Engineering
|
||||
Bucknell University
|
||||
Lewisburg, PA 17837
|
||||
|
||||
Phone: (717) 524-1145
|
||||
EMail: droms@bucknell.edu
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Droms [Page 2]
|
||||
|
62
doc/draft-ietf-dhc-options-04.txt
Normal file
62
doc/draft-ietf-dhc-options-04.txt
Normal file
@@ -0,0 +1,62 @@
|
||||
|
||||
|
||||
A new Request for Comments is now available in online RFC libraries.
|
||||
|
||||
|
||||
RFC 1533:
|
||||
|
||||
Title: DHCP Options and BOOTP Vendor Extensions
|
||||
Author: S. Alexander & R. Droms
|
||||
Mailbox: stevea@lachman.com, droms@bucknell.edu
|
||||
Pages: 30
|
||||
Characters: 50,919
|
||||
Obsoletes: 1497, 1395, 1084, 1048
|
||||
|
||||
|
||||
The Dynamic Host Configuration Protocol (DHCP) provides a framework
|
||||
for passing configuration information to hosts on a TCP/IP network.
|
||||
Configuration parameters and other control information are carried in
|
||||
tagged data items that are stored in the "options" field of the DHCP
|
||||
message. The data items themselves are also called "options." This
|
||||
RFC specifies the current set of DHCP options. This document will be
|
||||
periodically updated as new options are defined. Each superseding
|
||||
document will include the entire current list of valid options. This
|
||||
RFC is the product of the Dynamic Host Configuration Working Group of
|
||||
the IETF.
|
||||
|
||||
This is now a Proposed Standard Protocol.
|
||||
|
||||
This RFC specifies an Internet standards track protocol for the
|
||||
Internet community, and requests discussion and suggestions for
|
||||
improvements. Please refer to the current edition of the "Internet
|
||||
Official Protocol Standards" for the standardization state and status
|
||||
of this protocol. Distribution of this memo is unlimited.
|
||||
|
||||
This announcement is sent to the IETF list and the RFC-DIST list.
|
||||
Requests to be added to or deleted from the IETF distribution list
|
||||
should be sent to IETF-REQUEST@CNRI.RESTON.VA.US. Requests to be added
|
||||
to or deleted from the RFC-DIST distribution list should be sent to
|
||||
RFC-REQUEST@NIC.DDN.MIL.
|
||||
|
||||
Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
|
||||
an EMAIL message to "rfc-info@ISI.EDU" with the message body
|
||||
"help: ways_to_get_rfcs". For example:
|
||||
|
||||
To: rfc-info@ISI.EDU
|
||||
Subject: getting rfcs
|
||||
|
||||
help: ways_to_get_rfcs
|
||||
|
||||
Requests for special distribution should be addressed to either the
|
||||
author of the RFC in question, or to admin@DS.INTERNIC.NET. Unless
|
||||
specifically noted otherwise on the RFC itself, all RFCs are for
|
||||
unlimited distribution.
|
||||
|
||||
Submissions for Requests for Comments should be sent to
|
||||
RFC-EDITOR@ISI.EDU. Please consult RFC 1111, "Instructions to RFC
|
||||
Authors", for further information.
|
||||
|
||||
|
||||
Joyce K. Reynolds
|
||||
USC/Information Sciences Institute
|
||||
|
111
doc/draft-ietf-dhc-options-opt127-01.txt
Normal file
111
doc/draft-ietf-dhc-options-opt127-01.txt
Normal file
@@ -0,0 +1,111 @@
|
||||
|
||||
|
||||
Network Working Group R. Droms
|
||||
INTERNET DRAFT Bucknell University
|
||||
Obsoletes: draft-ietf-dhc-options-opt127-00.txt February 1996
|
||||
Expires August 1996
|
||||
|
||||
|
||||
An Extension to the DHCP Option Codes
|
||||
<draft-ietf-dhc-options-opt127-01.txt>
|
||||
|
||||
Status of this memo
|
||||
|
||||
This document is an Internet-Draft. Internet-Drafts are working
|
||||
documents of the Internet Engineering Task Force (IETF), its areas,
|
||||
and its working groups. Note that other groups may also distribute
|
||||
working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as ``work in progress.''
|
||||
|
||||
To learn the current status of any Internet-Draft, please check the
|
||||
``1id-abstracts.txt'' listing contained in the Internet-Drafts Shadow
|
||||
Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
|
||||
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
|
||||
ftp.isi.edu (US West Coast).
|
||||
|
||||
Abstract
|
||||
|
||||
The Dynamic Host Configuration Protocol (DHCP) provides a framework
|
||||
for passing configuration information to hosts on a TCP/IP network.
|
||||
This document defines a new option to extend the available option
|
||||
codes.
|
||||
|
||||
Introduction
|
||||
|
||||
The Dynamic Host Configuration Protocol (DHCP) [1] provides a
|
||||
framework for passing configuration information to hosts on a TCP/IP
|
||||
network. Configuration parameters and other control information are
|
||||
carried in tagged data items that are stored in the 'options' field
|
||||
of the DHCP message. The data items themselves are also called
|
||||
"options."
|
||||
|
||||
Each option is assigned a one-octet option code. Options 128-254 are
|
||||
reserved for local use and at this time over half of the available
|
||||
options in the range 0-127 and option 255 have been assigned. This
|
||||
document defines a new option to extend the available option codes.
|
||||
|
||||
|
||||
|
||||
|
||||
Droms [Page 1]
|
||||
|
||||
DRAFT An extension to the DHCP Option Codes February 1996
|
||||
|
||||
|
||||
Definition of option 127
|
||||
|
||||
Option code 127 indicates that the DHCP option has a two-octet
|
||||
extended option code. The format of these options is:
|
||||
|
||||
Extended
|
||||
Code Len option code Data...
|
||||
+-----+-----+-----+-----+-----+-----+----
|
||||
| 127 | XXX | oh | ol | d1 | d2 | ...
|
||||
+-----+-----+-----+-----+-----+-----+----
|
||||
|
||||
Other than the two-octet extended option code, these options are
|
||||
encoded and carried in DHCP messages identically to the options
|
||||
defined in RFC 1533 [2]. The high-order and low-order octets of the
|
||||
extended option code are stored in 'oh' and 'ol', respectively. The
|
||||
number of octets given in the 'len' field includes the two-octet
|
||||
extended option code.
|
||||
|
||||
The two-octet extended option codes will be assigned through the
|
||||
mechanisms defined for the assignment of new options [3] after the
|
||||
current one-octet option codes have been exhausted.
|
||||
|
||||
References
|
||||
|
||||
[1] Droms, R., "Dynamic Host Configuration Protocol", RFC 1531,
|
||||
Bucknell University, October 1993.
|
||||
|
||||
[2] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor
|
||||
Extensions", RFC 1533, Lachman Associates, October 1993.
|
||||
|
||||
[3] Droms, R., "Procedure for Defining New DHCP Options", Work in
|
||||
progress, February, 1996.
|
||||
|
||||
Security Considerations
|
||||
|
||||
Security issues are not discussed in this document.
|
||||
|
||||
Author's Address
|
||||
|
||||
Ralph Droms
|
||||
Computer Science Department
|
||||
323 Dana Engineering
|
||||
Bucknell University
|
||||
Lewisburg, PA 17837
|
||||
|
||||
Phone: (717) 524-1145
|
||||
EMail: droms@bucknell.edu
|
||||
|
||||
|
||||
|
||||
|
||||
Droms [Page 2]
|
||||
|
File diff suppressed because it is too large
Load Diff
@@ -1,5 +0,0 @@
|
||||
|
||||
This Internet-Draft was deleted. For more information, send a message to
|
||||
|
||||
Internet-Drafts@cnri.reston.va.us
|
||||
|
1683
doc/rfc1533.txt
1683
doc/rfc1533.txt
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user