<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.1 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8415 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8415.xml">
<!ENTITY RFC7858 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8126 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY RFC2131 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2131.xml">
<!ENTITY RFC2181 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC1034 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC6672 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6672.xml">
<!ENTITY I-D.ietf-homenet-front-end-naming-delegation SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-homenet-front-end-naming-delegation.xml">
<!ENTITY I-D.ietf-dhc-sedhcpv6 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dhc-sedhcpv6.xml">
<!ENTITY I-D.andrews-dnsop-pd-reverse SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.andrews-dnsop-pd-reverse.xml">
<!ENTITY I-D.sury-dnsext-cname-dname SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.sury-dnsext-cname-dname.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-homenet-naming-architecture-dhc-options-12" category="std">

  <front>
    <title abbrev="DHCPv6 Options for HNA">DHCPv6 Options for Home Network Naming Authority</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai</organization>
      <address>
        <email>ralf.weber@akamai.com</email>
      </address>
    </author>
    <author initials="T." surname="Mrugalski" fullname="Tomek Mrugalski">
      <organization>Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>950 Charter Street</street>
          <city>Redwood City</city>
          <code>94063</code>
          <country>US</country>
        </postal>
        <email>tomasz.mrugalski@gmail.com</email>
      </address>
    </author>

    <date year="2021" month="April" day="28"/>

    <area>Internet</area>
    <workgroup>Homenet</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines DHCPv6 options so an agnostic Homenet Naming Authority (HNA) can automatically proceed to the appropriate configuration and outsource the authoritative naming service for the home network.
In most cases, the outsourcing mechanism is transparent for the end user.</t>



    </abstract>


  </front>

  <middle>


<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader is expected to be familiar with <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> and its terminology section.</t>

</section>
<section anchor="introduction" title="Introduction">

<t><xref target="I-D.ietf-homenet-front-end-naming-delegation"/> specifies how an entity designated as the Homenet Naming Authority (HNA) outsources a Public Homenet Zone to an Outsourcing DNS Infrastructure (DOI).</t>

<t>This document shows how an ISP can provision automatically the HNA with a specific DOI.
Most likely the DOI will be - at least partly be - managed or provided by its ISP, but other cases may envision the ISP storing some configuration so the homenet becomes resilient to HNA replacement.</t>

<t>The ISP delegates the home network an IP prefix it owns as well as the associated reverse zone.
The ISP is well aware of the owner of that prefix, and as such becomes a natural candidate for hosting the Homenet Reverse Zone - that is the Reverse Distribution Master (RDM) and potentially the Reverse Public Authoritative Servers.</t>

<t>In addition, the ISP often identifies the home network with a name.
In most cases, the name is used by the ISP for its internal network management operations and is not a name the home network owner has registered to.
The ISP may thus leverage such infrastructure and provide the homenet a specific domain name designated as per <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> a Homenet Registered Domain.
Similarly to the reverse zone, the ISP is well aware of who owns that domain name and may become a natural candidate for hosting the Homenet Zone - that is the Distribution Master (DM) and the Public Authoritative Servers.</t>

<t>This document describes DHCPv6 options that enables the ISP to provide the necessary parameters to the HNA, to proceed.
More specifically, the ISP provides the Registered Homenet Domain, necessary information on the DM and the RDM so the HNA can manage and upload the Public Homenet Zone and the Reverse Public Homenet Zone as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

<t>The use of DHCPv6 options makes the configuration completely transparent to the end user and provides a similar level of trust as the one used to provide the IP prefix.</t>

</section>
<section anchor="sec-overview" title="Protocol Overview">

<t>This section illustrates how a HNA receives the necessary information via DHCPv6 options to outsource its authoritative naming service to the DOI.
For the sake of simplicity, and similarly to <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, this section assumes that the HNA and the home network DHCPv6 client are collocated on the CPE.
Note also that this is not mandatory and specific communications between the HNA and the DHCPv6 client only are needed.
In addition, this section assumes the responsible entity for the DHCPv6 server is able to configure the DM and RDM.
In our case, this means a Registered Homenet Domain can be associated to the DHCP client.</t>

<t>This scenario has been chosen as it is believed to be the most popular scenario. This document does not ignore scenarios where the DHCP Server does not have privileged relations with the DM or RDM.
These cases are discussed latter in <xref target="sec-scenario"/>.
Such scenarios do not necessarily require configuration for the end user and can also be zero-config.</t>

<t>The scenario considered in this section is as follows:</t>

<t><list style="numbers">
  <t>The HNA is willing to outsource the Public Homenet Zone or Homenet Reverse Zone and configures its DHCP Client to include in its Option Request Option (ORO) the Registered Homenet Domain Option (OPTION_REGISTERED_DOMAIN), the Distribution Master Option (OPTION_DIST_MASTER) and the Reverse Distribution Master Option (OPTION_REVERSE_DIST_MASTER) option codes.</t>
  <t>The DHCP Server responds to the HNA with the requested DHCPv6 options based on the identified homenet.
The DHCP Client transmits the information to the HNA.</t>
  <t>The HNA is able to get authenticated by the DM and the RDM. The HNA builds the Homenet Zone ( resp. the Homenet Reverse Zone) and proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The DHCPv6 options provide the necessary and non optional parameters described in section 14 of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The HNA MAY set complement the configurations with additional parameters.
Section 14 of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> describes such parameters that MAY take a default value.</t>
</list></t>

</section>
<section anchor="sec-format" title="Payload Description">

<t>This section details the payload of the DHCPv6 options.</t>

<section anchor="o_rd" title="Registered Homenet Domain Option">

<t>The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the FQDN associated to the home network.</t>

<figure title="Registered Domain Option" anchor="fig-rhd"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   OPTION_REGISTERED_DOMAIN    |         option-len            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                   Registered Homenet Domain                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REGISTERED_DOMAIN, the option code for the Registered Homenet Domain  (TBD2).</t>
  <t>option-len (16 bits): length in octets of the option-data field as described in <xref target="RFC8415"/>.</t>
  <t>Registered Homenet Domain (variable): the FQDN registered for the homenet encoded as described in section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="o_dm" title="Distribution Master Option">

<t>The Distributed Master Option (OPTION_DIST_MASTER) provides the HNA to FQDN of the DM as well as the transport protocol for the transaction between the HNA and the DM.</t>

<figure title="Distribution Master Option" anchor="fig-dm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      OPTION_DIST_MASTER       |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/                   Distribution Master  FQDN                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_DIST_MASTER, the option code for the DM Option (TBD3).</t>
  <t>option-len (16 bits): length in octets of the option-data field as
described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the DM.
Each bit represents a supported transport, and a DM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Distribution Master FQDN (variable): the FQDN of the DM encoded as described in section 10 of <xref target="RFC8415"/>.</t>
</list></t>

<section anchor="sec-st" title="Supported Transport">

<t>The Supported Transport filed of the DHCPv6 option indicates the supported transport protocol.
Each bit represents a specific transport mechanism. The bit sets to 1 indicates the associated transport protocol is supported.
The corresponding bits are assigned as described in <xref target="tab-st"/>.</t>

<figure title="Supported Transport" anchor="tab-st"><artwork><![CDATA[
Bit | Transport Protocol | Reference
----+--------------------+-----------
 0  | DNS over TLS       | This-RFC
1-15| unallocated        |
]]></artwork></figure>

<t><list style="symbols">
  <t>DNS over TLS: indicates the support of DNS over TLS as described in <xref target="RFC7858"/>.</t>
</list></t>

</section>
</section>
<section anchor="reverse-distribution-master-server-option" title="Reverse Distribution Master Server Option">

<t>The Reverse Distribution Master Server Option (OPTION_REVERSE_DIST_MASTER) provides the HNA to FQDN of the DM as well as the transport protocol for the transaction between the HNA and the DM.</t>

<figure title="Reverse Distribution Master Option" anchor="fig-rdm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_REVERSE_DIST_MASTER    |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/               Reverse Distribution Master FQDN                /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REVERSE_DIST_MASTER, the option code for the Reverse Distribution Master Option (TBD4).</t>
  <t>option-len (16 bits): length in octets of the option-data field as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the DM.
Each bit represents a supported transport, and a DM MAY indicate the support of multiple modes. The bit for DoT MUST be set.</t>
  <t>Reverse Distribution Master FQDN (variable): the FQDN of the RDM encoded as described in section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
</section>
<section anchor="sec-dhcp-behavior" title="DHCP Behavior">

<section anchor="dhcpv6-server-behavior" title="DHCPv6 Server Behavior">

<t>Sections 17.2.2 and 18.2 of <xref target="RFC8415"/> govern server operation in regards to option assignment.
As a convenience to the reader, we mention here that the server will send option foo only if configured with specific values for foo and if the client requested it.
In particular, when configured the DHCP Server sends the Registered Homenet Domain Option, Distribution Master Option, the Reverse Distribution Master Option when requested by the DHCPv6 client by including necessary option codes in its ORO.</t>

</section>
<section anchor="dhcpv6-client-behavior" title="DHCPv6 Client Behavior">

<t>The DHCPv6 client sends a ORO with the necessary option codes: Registered Homenet Domain Option, Distribution Master Option, the Reverse Distribution Master Option.</t>

<t>Upon receiving a DHCP option described in this document in the Reply
message, the HNA SHOULD proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="sec-dhcp-relay" title="DHCPv6 Relay Agent Behavior">

<t>There are no additional requirements for the DHCP Relay agents.</t>

</section>
</section>
<section anchor="sec-iana" title="IANA Considerations">

<t>IANA is requested to assign the following new DHCPv6 Option Codes in the registry maintained in: https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<figure><artwork><![CDATA[
Value Description                   Client ORO     Singleton Option
TBD1  OPTION_REGISTERED_DOMAIN      Yes            Yes
TBD2  OPTION_DIST_MASTER            Yes            Yes
TBD3  OPTION_REVERSE_DIST_MASTER    Yes            Yes
]]></artwork></figure>

<t>IANA is requested to maintain a new number space of Supported Transport parameter in the Distributed Master Option (OPTION_DIST_MASTER) or the Reverse Distribution Master Server Option (OPTION_REVERSE_DIST_MASTER). The different parameters are defined in <xref target="tab-st"/> in <xref target="sec-st"/>.
Future code points are assigned under Specification Required as per <xref target="RFC8126"/>.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The security considerations in <xref target="RFC2131"/> and <xref target="RFC8415"/> are to be considered.
The use of DHCPv6 options provides a similar level of trust as the one used to provide the IP prefix.
The link between the HNA and the DHCPv6 server may benefit from additional security for example by using <xref target="I-D.ietf-dhc-sedhcpv6"/>.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank Marcin Siodelski, Bernie Volz and Ted Lemon for their comments on the design of the DHCPv6 options.
We would also like to thank Mark Andrews, Andrew Sullivan and Lorenzo Colliti for their remarks on the architecture design. The designed solution has been largely been inspired by Mark Andrews’s document <xref target="I-D.andrews-dnsop-pd-reverse"/> as well as discussions with Mark.
We also thank Ray Hunter for its reviews, its comments and for suggesting an appropriated terminology.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The co-authors would like to thank Chris Griffiths and Wouter Cloetens that provided a significant contribution in the early versions of the document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8174;
&RFC8415;
&RFC7858;
&RFC8126;
&RFC2131;
&RFC2181;
&RFC1034;
&RFC6672;


    </references>

    <references title='Informative References'>

&I-D.ietf-homenet-front-end-naming-delegation;
&I-D.ietf-dhc-sedhcpv6;
&I-D.andrews-dnsop-pd-reverse;
&I-D.sury-dnsext-cname-dname;


    </references>


<section anchor="sec-scenario" title="Scenarios and impact on the End User">

<t>This section details various scenarios and discuss their impact on the end user.
This section is not normative and limits the description of a limited scope of scenarios that are assumed to be representative. Many other scenarios may be derived from these.</t>

</section>
<section anchor="sec-scenario-1" title="Base Scenario">

<t>The base scenario is the one described in <xref target="sec-overview"/> in which an ISP manages the DHCP Server, the DM and RDM.</t>

<t>The end user subscribes to the ISP (foo), and at subscription time registers for example.foo as its Registered Homenet Domain example.foo.</t>

<t>In this scenario, the DHCP Server, DM and RDM are managed by the ISP so the DHCP Server and as such can provide authentication credentials of the HNA to enable secure authenticated transaction with the DM and the Reverse DM.</t>

<t>The main advantage of this scenario is that the naming architecture is configured automatically and transparently for the end user.
The drawbacks are that the end user uses a Registered Homenet Domain managed by the ISP and that it relies on the ISP naming infrastructure.</t>

<section anchor="scenario-2" title="Third Party Registered Homenet Domain">

<t>This section considers the case when the end user wants its home network to use example.com not managed by her ISP (foo) as a Registered Homenet Domain.
This section still consider the ISP manages the home network and still provides example.foo as a Registered Homenet Domain.</t>

<t>When the end user buys the domain name example.com, it may request to redirect the name example.com to example.foo using static redirection with CNAME <xref target="RFC2181"/>, <xref target="RFC1034"/>, DNAME <xref target="RFC6672"/> or CNAME+DNAME <xref target="I-D.sury-dnsext-cname-dname"/>.</t>

<t>This configuration is performed once when the domain name example.com is registered.
The only information the end user needs to know is the domain name assigned by the ISP.
Once this configuration is done no additional configuration is needed anymore.
More specifically, the HNA may be changed, the zone can be updated as in <xref target="sec-scenario-1"/> without any additional configuration from the end user.</t>

<t>The main advantage of this scenario is that the end user benefits from the Zero Configuration of the Base Scenario <xref target="sec-scenario-1"/>.
Then, the end user is able to register for its home network an unlimited number of domain names provided by an unlimited number of different third party providers.
The drawback of this scenario may be that the end user still rely on the ISP naming infrastructure.
Note that the only case this may be inconvenient is when the DNS Servers provided by the ISPs results in high latency.</t>

</section>
<section anchor="scenario-3" title="Third Party DNS Infrastructure">

<t>This scenario considers that the end user uses example.com as a Registered Homenet Domain, and does not want to rely on the authoritative servers provided by the ISP.</t>

<t>In this section we limit the outsourcing to the DM and Public Authoritative Server(s) to a third party.
The Reverse Public Authoritative Server(s) and the RDM remain managed by the ISP as the IP prefix is managed by the ISP.</t>

<t>Outsourcing to a third party DM can be performed in the following ways:</t>

<t><list style="numbers">
  <t>Updating the DHCP Server Information. One can imagine a GUI interface that enables the end user to modify its profile parameters. Again, this configuration update is done once-for-ever.</t>
  <t>Upload the configuration of the DM to the HNA. In some cases, the provider of the CPE hosting the HNA may be the registrar and provide the CPE already configured. In other cases, the CPE may request the end user to log into the registrar to validate the ownership of the Registered Homenet Domain and agree on the necessary credentials to secure the communication between the HNA and the DM. As described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, such settings could be performed in an almost automatic way as to limit the necessary interactions with the end user.</t>
</list></t>

</section>
<section anchor="scenario-4" title="Multiple ISPs">

<t>This scenario considers a HNA connected to multiple ISPs.</t>

<t>Suppose the HNA has been configured each of its interfaces independently with each ISPS as described in <xref target="sec-scenario-1"/>.
Each ISP provides a different Registered Homenet Domain.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs with multiple Registered Homenet Domains.
However, the HNA should be able to handle different Registered Homenet Domains.
This is an implementation issue which is outside the scope of the current document.</t>

<t>If a HNA is not able to handle multiple Registered Homenet Domains, the HNA may remain connected to multiple ISP with a single Registered Homenet Domain.
In this case, one entity is chosen to host the Registered Homenet Domain.
This entity may be one of the ISP or a third party.
Note that having multiple ISPs can be motivated for bandwidth aggregation, or connectivity fail-over.
In the case of connectivity fail-over, the fail-over concerns the access network and a failure of the access network may not impact the core network where the DM Server and Public Authoritative Primaries are hosted.
In that sense, choosing one of the ISP even in a scenario of multiple ISPs may make sense.
However, for sake of simplicity, this scenario assumes that a third party has been chosen to host the Registered Homenet Domain.
Configuration is performed as described in <xref target="scenario-2"/> and <xref target="scenario-3"/>.</t>

<t>With the configuration described in <xref target="scenario-2"/>,  the HNA is expect to be able to handle multiple Homenet Registered Domain, as the third party redirect to one of the ISPs Servers.
With the configuration described in <xref target="scenario-3"/>, DNS zone are hosted and maintained by the third party.
A single DNS(SEC) Homenet Zone is built and maintained by the HNA.
This latter configuration is likely to match most HNA implementations.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs.
To configure or not and how to configure the HNA depends on the HNA facilities.
<xref target="sec-scenario-1"/> and  <xref target="scenario-2"/> require the HNA to handle multiple Registered Homenet Domain, whereas <xref target="scenario-3"/> does not have such requirement.</t>

</section>
</section>


  </back>

<!-- ##markdown-source:
H4sIAH9kiWAAA+1c63LbRrL+j6eYY/84UpakLfkaVW2dyJISq8q6RJKTyv5J
DYEhOSUQ4OIihomdZ9lnOU92vu65YACClBx7UzlVy1QSEphLT1++7p7p0XA4
jKJKV6k6EMdvjy7vXoqLRaXzrBSTvBBv87kS56pa5sWtOJdznU3FYV3N8kJX
q0iOx4W66+94fhgleZzJOQZOCjmphlpVk+EMA2aqGmY81lAW8UxXKq7qQg2T
WTzMzRjDvf1IL4oDURV1We0/ffr10/1IFkoeiNOsUgWGiJbTA6aPvt8umxfD
Y5ouimV1IMoqieI8wVQHosb0r6NooQ8iIYpJrJKyWtG6V6rEkyqPg686S1RW
uQdlXlSFmpT+92re+lkVOvaN43wOoir/Vmepzvw0YMpcLhZMET2JJLOTaKLP
0P6fumGE45E401NZp5V/blh6LDOt0rWXeYFhT0BNWeaZfwr6lAJ9r/dfvRA3
hYSMjmQmEymu8rpSvl0MoR6Ia6mzSryTEElWDcT3R837PMHUz6/F0zcvg4d1
VhXoZ4b0z9Vc6hSyZ0JHc0PoN8rSNgKX+pd8NRI/qrEqOgu+kumk84IXe3gr
MVF3qe0ltRewRnmX5AJTjZY01TeSR99M7A3kU9RTmZa3ukPwDVTztuctU+10
VVyvykrNIQ8oPZRM1/MBXsajNdl9/eKpOJrJAv3ENT/riO1KJcs8T8QRWWZb
Yl8/f/ry2brA3l93V17lc1n+Opo7or+Z0nNefhQNh0Mhx6BHxlUU3cx0Scpc
k66LRE2g46VDAmvFsBshMyGnWV5WOnbWugYkYgdwsStialsTDWgs03QlFkUe
K5WALlHNlIDdFPmi0LJSWEU20dO6kDQTZkkEVLnM6yJWpq0dHO/vlDBwI0pV
3Gk0IISiRoRGIjPwNopOMzEHoaCjVOWAG7gxqfNcxTMoczkXWHlFVrSQZCJ+
NAUiakwxMrya6yRJFRj3WNyoAvPnaT5dEeeUuFUrgUmTUjw6e39982hg/i/O
L/j71cn370+vTo7p+/Xbw3fv/JfItrh+e/H+3XHzrel5dHF2dnJ+bDrjqWg9
ih6dHf6EN8SwRxeXN6cX54fvHkGZsYJQoFgZcX2s8AoqtyhUBTnIMkpUGRd6
jB/o8+bo8n//tfdc/Pbbf119e7S/t/f1x4/2x+u9V8/xYzlTmZktzyBQ8xPM
gvNYLJQsaBSIGjxfQFYp2C6hNrN8mYmZKhRYyfwC8idQfFCoflnAXRidAHUT
CDbVGGepqxmm/p/T4fGo5WkmRZ5VQ8jG+ZxEpWrKagP6iDJdQZ6NhKAlMb0d
keRgqEWe1Pwgij59/BLU6omGaWBNZAxgLmk82KinmTRMZe25xzi8dpdCist6
nAb29I88Y2lh+ItAYY/Pr0H/pJCw2ZpdrNg5vjjdHXWtl/jtCTy9vmRLhKnd
6ZKNq2WTTOv5oWG4dAuMBUYeRWdkP6m+VbYhHqIh5AtRAT3wToEaAcOp0IIf
zuE2pmADjIinTPB9vGKhgJSBGNeVyDFWYewS7VdgoiWN5iCCywq8IgMng25D
Q5l7UydejRXQDMMUEECqafVgHK2nUItUxooYMjJKRwNbYapyDS+YV5egGdD3
C8gV0NmShLlUWK8VqoSvizWLGZGSKkolfoWwRn587dovyeLyiUGdZYbl8g+w
zMxgjIiMo45nfhUSyAbBSjKgLNEJISPB0YwAF/wIFevKEsDaMjRja0Ome3Ws
KZQBx4lxZ5AUyNi5Oj7b5ckXeUXa67XA9bLaeNhC3GtALd6ClYBVmSSaxhx4
geUTjCU0BVnGPNbYa/WLnGkvNNMLoh+IywrjRqblk/IwbmXgjBvQKBorfL5Q
RjtKAwClyPLKTrZOiRHHTJLSTDUxheGnESKpZDWrS2g31oxJjJB02/aYhUbD
WxoZ2FACOwMgMhlthADBfwTdAuF7yo95klF0rQGdsiBhGhMJNbSR1JqGLme5
0XXWoJBkWiHxwmjnJylnj1L2KqPTRWpwj951IxTjt9ZiFJ5SZXKcWi2kRYMj
oagyBdwtZbEi5MJKQUrpuAbsGNj2FKsQBoJPTqRkLA0v7ZjO6LxIHBeMaAbB
fNChvJgbJLN4d3zmOQDTdPhGEEawbbScW9SLNJctVrW47Qdpm3G7TSlaDv+T
VdBCKYyUVKfD+rm8tbxoQza0Z5GCyaSaQZxlGe7CrNCgCAlLo89shCmjJ+WO
DolpNQwVHdF6CB9xpHZZ5Mj+8lRc3FGsqJbit8eIB4a5/fnR6pWNEQR8W00h
ceU8vPUlsYIylh3lCYV5p+WaJuZBDEsQtjWGtdxgt/utjUBLMJRWDlYsIEtE
D8ZtlKGpf7IMByY2dEuGT6vnyhqOUz2nTC3gtOuLjZ8l+ABn0zxmULPafHR5
MorO4VkQBrIq86CYzoIy9BnAkYN7vBCHlJRk1xnsy7BujBmVytbIaVPAISiR
kcFQyVQ7rql3kYSL5QKTaCCEC99cyG/HLxl0iGSCEWKyU2gVmizMleeEhNmT
2TnnijJyuRkQ2LDHrWjCSR/z29U5xCtjgFmhc3ZYY2JKDMBVtCSKUjQ9RIc7
H0LTOOxcF/miJgNyI4xEB0JzZWQCv8QYZ9uVFNa7lRJBBoOb9jMJ9UXedqeh
VBwKpVZu7OQth8BSZhDwAmhhgj0SVqLLuC7JdNGLnADjEBmlI4Bg5po8bkNR
kvPMzvY0BF+of9a66GJNN3ljQXEmSuoI9vyqinxo+lgw8xyOSSsSFphLoDwu
cCg4IXVflgdRtEfMNLpJDhWwwR4w72StfRhst+HWQjgm1KlZyYDB3D/yYa3O
4rROKIXjt2Z/DoP8s1YQt/25c3F1sbvdITVNOWH8+erku9PrmxMkqD8fX5wd
np7vDjZ67E7XY3T8+eyQeu+ueaAH9L86+eHk6vqkPY4BUN7sIMe/b3gdqqIx
4SR02o3uFYYhFBq1AXksywaofKyauMjNBIAtnpO3mnM+ST0CuG/mBYHPWsrg
IGNKsSAQn6YxEGmj2rbDb/qOa50m7eSRFWOHlzvaGPzvOs/JeytfwMXfNEjo
WNcfPdG8GUUy3AqBYRBOtYhwZrT3nNzZHySJeHR2+BMGq2xIwTC2Fm9YGHKe
oEUWgOXzSAkCT04KwgCSfB0RWJHblrSJRnuk4k6mteLdh0u54hDumMcwWm7i
EaNZ3WgkUZXUqVGJhe1rc8q2fGj0x/cb/G+P85+L5KOBvbUU4n5YgCgT1mVD
0rffH5/3OLH2LlwU/f7775F4KtY/ez3P9nuePaPue3j1TDwXL8RL8Uq8Fl9/
yrPob8PP/Cf6AEI2MYaI/ODJNTIZpvDRwefDF6Lhcz4foic9TzerzfrnyReg
4fP5QBr128FjmPywmEHv6Lzr7482KfQjKPxXTirkVMTO3ksxBqzvHmwUqd0v
bjyRjyy2sGvn5s3xPu3HfRUqQTAbfk4r2kkQeVwp+BW3Q2RaIzKWAi4p7YNx
3oV9vveCk7CvtpCxc4dohrwQJvRmGmx1hLvl1E1ltL71KT1oPzVI2SKA8GaL
fyekSeYWaXw7jPuAMKKVVRPoA1d4DQ76zrrbciarzAvaXLP5nlskv5JmIRuz
CkSpn4ZS/PlLQ5XwaBXw1plgQ28vVn05qLquFyQWyP3Gi2iNhj8KE/eO8O+B
yz6tN/q5/vnLwWUyd2i52XgJL+8FzECrNkMlLNUZOpDx2ZdCxmg7MvYpXTCT
O9vkDRbftIEQH6WPohNJe/PIsgu1QAxOVQC0MbXeye7m04IpAHRhUjgHLWiO
cFAjbkV+zqkNgSMNT/yi0x3alRI3767tml69fvEaESefJCJzLSlFwfr6JMf6
1wv8DWj+IZx/DJzvY6gJW8vKQnxfk4lOVX+82okj+6TggHyjENzOUdPFH+ia
lIq6lKRJcB97nRnDoHXdd1AE7kgyQorzwqaclOaPeTOv4GH0NOtNuio5Ju58
tJ7lDYj5EPDG70t+gCOfwC1nsaJTZthrzyd8yE7qQ1tdLFTw/s4Q0ov2hnsv
PogauY/bnvNwYsHA0OfAoEd8jwSHTeE8B/1y453gkJz+2MVos8tUNu8Q2BTf
AIdLVR7YfPu+wn8Ci8926pvZazTQf/4TWGwdoRtYbNPwvtjirxFYWDARJhNr
Yov7NwA5xnhAVramZtvysvt3HRGFPP+T8rP/N1GIaEUh+c1avHGvbm6LO67+
cOBhdmLfqJm806DMBBzJLF4Mx/bZR5OFmsjC+gHXPnIbfaXYezXaH+0zb/Ze
40tnLjElx5W5Qx9fS0AUImuWhdlmtipnXL6pKjkkOcR5dqcyTQ68OXin6qYB
PImghtTNHqjYEzY7FVfSlHRSYQef5Lk51NKT5iggMduZPuDh7URTlUvtueDB
8NoeizX737ri8ykqz9ExnQUNuGIrHLt7yEPk3HOeba1psMXSBg+1SCanIdhp
feuYj6qH+OSDYq9m8zk8JfBHIlcXbm/CDGE38hutuFkb3qxYUt/mDKF/moM/
hSlYwXuEmvbUmRZtjpYdKS0bapf56czOsUhX0ZxWMLWlHxSW2NLCzScFn1wL
EHD6SqVyJQ6nIbtDo6VDwpXJFihyplPbPNyjt8d5XGrdOo+1I0sauTRFfIdY
zJE9rLNb/mYmLTOJObiBLgPFomo6tlwe1pzjGXVatsvdMa7VJ2PJJG5oAYm4
wr/MqQMxq6pFefDkyXK5HNGco7yYPmmgoXxCS757OWxOB9afjH6ZVfP08drz
4b4NGn8gQ2+dFax/rH6T7tLnGmtKVZU7dYzg8Pa271sL8RPWG3zwk7rtb9lA
2tLtmbgnRuzpRovtl5ljO9UeQVJZPR8TRi1kzHURfT7WM9LJ8BN3Hx8QTTw8
5TDONdETTvGq8LSIj8I5COhkjMF5OOeP39ZcbsaxziLXWTf3rDMqpb12BUr+
TFgXYamZqeHdf2l9K5xjzdWofWbEb4Zx643N891b0X7bRED7e8/2bB1uy8k2
BcjNKftoSy3RlywEollSnd3eV1Zi3bIpecvQFzFRkc9DlPLrJ4RSv0g6hSQH
VZeEJuFpIt1+AVls3Zbph/Ftli9TlUwZJKLoRyWWeY1okkpsTfQgQeaZpIJf
GDNETmX7AwBqgRBD/JCnvzLRN1jvOzVv6h104e+puANuU3C46bzQT811EWvz
34rDLCnUshzYL7C1NNV30tTmv8uhzr/m0B48rHRABRAcvT0R4YUgS5G1CWXV
t8xTY1y+vgWyniouJ6aSUpg1azKYHNL134HXs2yX5s0wycp8MVwkQ1sASdrX
pPW2/KQ5J6ZRmR+uYAkcuIIKvK2p4tTXn2IwzfygH57XxAxqUdbTqTJlkMSi
5mJDEpaisxbA4gyi5EUZ2d2loSkNK3vV4WhWABe/K4AioNfM+SNd9CkA/znQ
xFU9+nprsplpxnCQ0Vl51kCYBUXF1WPEHmaEVRLH0ZG9HjKW8S2jha/D4Whz
DvytnIRP8OQ9FdrYHUFXw7PhKJtShbwug9IeGtIKxepQe4LmGsZNpyKHK4JM
ScadqZ9Jta/WSAK/ieVJ844ULkaIz1V1ngTmngVVMMBVUvl8iycYQVOyla1d
b/oatMB0haYaLAaMikqeWNhvJNDNsa/DouGeBVWqS2mqkHSDa53wrFW4yH5i
OdPIDW2VvykVLbsh/WCtZI0n9QVSZT12FQ02f6HBdpBb7NqEsnJtDDcrPVf+
PLEMkXDECYmpXdocKQeNTTl5Fda5Ddbpb2hnIbkbBkGReJl3e7XK6/39h0SF
JTkc14NAUwXvrcDuDJoaYoP4qlPJE27+hTVvaxVQjtu8cJkAPysq5+WZwuI+
HdRf2sLQFnTqMkza2jc4eNKmrjZd9dxgYsgt5JIs2sQPfjqvCDVX6G0RXA/j
zYKpyJvyzpQq/4NrHHYl7cJ5swMMWy4ScYnMdLVlRhiMM5b9LqK4OMJWHJMN
cTbZWtNSEkqTPrYqWSFeCjucJgLOXXGqWyAZubcDUqQtjOkgE9wA3YCy5Hlm
hObZuXiS2D4+6OnY09a5ox/XVj2uVxYEg2r+YLHkxBi4bLBN/MDQ8LOxV8E2
d8geAppMuFMSMMa+pzeGo/PDsxMfD77eo5Jj82vv6bPn9Os4aPHy5at9oBlU
lvv9zb1jn17WxYocuvqlGvLtY/zAf20hemAV0jkFhLtUTMWFfnGgEhtYYVIO
x1xjKGYLJqz2C5lLxcYMlRTMObRuXZtwkXljJ6PogveHeilOCOrbyfBaG1Ph
DFVZzXMyoQ2XEgi6rEOiszDosnlOV0Bc1XG9SNwtlLXK2yHF7iRDhBc02Waa
nJ8Lb0l+KtA1+mqi7bIZ9R+qoOgynNGic8ejrpHPIrR7LX6CoCzTCdsHdt1L
YHXmIgWbbmLiQLxl61rbpvY+46sY5xaMc7ZjUbbxeJ1JVoTrjDIwUVB0fD/M
chW+H4OVmlHSFKmbKXTm9y+5ltybCx3o2bs3rQXbOfnCXZ3yvSwx09MZFXOr
LF7ZTaEQ3nvuLQa4/uxjt9A9BPZeHxWa73Z0NAGML1wnb2B0oGFg+1JGuXnJ
Yazi0E6ZqNIwOLiq6cr5TUSw5WLTTrnLe1OhnoxaZ573dA6vDlHutcFNl+2c
WLAGdJthhRftRbToouVYDGlAVnd31JZyZQvk3xPQuIthYWh22kDrSFxYZNJz
OdVUBi++e39qbvtNZGwVOLzP5XWB9odyWJq5XAqJUcFBWOsrDqesAz2wa0DQ
oy+5CqrBHRLTTcn5++a2VdyHQ2BGUASONdnLqs2NRmfursfR5Un7rlwD1sFe
o2xdhPIdZUqnCqsgCuQ5g5u0A9+25dk7HEMaSszNO1PiwZ1MzZ0+Vma6I1nO
9MKf42yM0TjQnhZKOYtq9s7D4Boz2FDasDS477Pt/Fwcfm49+8DkAKWqiPOk
CJRid5WYb4jwtRkfXJMqs+XkgZWHt7/ADhl3Lr4E7hAweOaO2hgyA9R7vgX1
zJ0z/M78zfh5OA6G5o3PUnmGNXeDmiRB0bEhpOcvz5I50ddELRT/ORS6wE90
c0uM3Fe5se5eT2zrcIuu8XfbAtUbYxSmjoJk3Nnz23KwQRnLpKZshyr/IR3y
5vZK8XZumVb+0Ub6wNa3+VL5hJlGLWdOV1z0gKAqSdVD1lvarIBCD0I3e13B
RXRlrWz2jgbkOpyx++0JNpO6KMxVLb8xczqxS3a3nNuUPWCh7VDROo2NDPR/
GICPFrbJ13lHcxWOYNXerqNn5s4a0ZlbVLovnbKdLUIySk+8Q0Ps1vGZTbRD
Z0/09z1aWmAd1zyH/+Twl8K/MXi21AmtbzotLGIMaHDLDn3He71Sp7zxYtdo
s818sqGZYbD/Sa1iVWS29CwmAGklf5Lb1s0fDOi0IRbwPT2zL2bwswiu1jfX
9c7C7Y/e0OGygKcttL2MR9KwNyeZdxASCQ/iyjnF67Ad5sFbiLLBrbCggDlN
1NJNYDNWYFW8T9pzo7Ud+7auo7bjj+4NyAdq09HmFLEH75r9BneKEYSqlHb+
6KC+HRZsGWcgvMX5v3hitxg3We/Ge/4DX5oWMKbJ3fOOxMrmAv0n0v3M5OnX
JndsdMX+VQB/HGrDx5YtHjq0QP+d65Oj3faFNrqzWuu02jAUX6pjCLAXRNey
YfcXSShTqgCh7LeZvS2YLd2fm/nTnQ7oD+8MQ/EZqrOEL5Wv3SemwYxX9ttn
9AgOW9PxCpUK9+TpNFxXY92l2GAf88GOYWCABPrVVoPOxV+OpoLTemLy/wGj
+290d04AAA==

-->

</rfc>

