<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.1 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8415 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8415.xml">
<!ENTITY RFC7858 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8126 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY I-D.ietf-homenet-front-end-naming-delegation SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-homenet-front-end-naming-delegation.xml">
<!ENTITY RFC7368 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7368.xml">
<!ENTITY RFC9103 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9103.xml">
<!ENTITY I-D.ietf-dhc-sedhcpv6 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dhc-sedhcpv6.xml">
<!ENTITY I-D.andrews-dnsop-pd-reverse SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.andrews-dnsop-pd-reverse.xml">
<!ENTITY RFC2181 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC1034 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC6672 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6672.xml">
<!ENTITY I-D.sury-dnsext-cname-dname SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.sury-dnsext-cname-dname.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-homenet-naming-architecture-dhc-options-19" category="std">

  <front>
    <title abbrev="DHCPv6 Options for HNA">DHCPv6 Options for Home Network Naming Authority</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai</organization>
      <address>
        <email>ralf.weber@akamai.com</email>
      </address>
    </author>
    <author initials="T." surname="Mrugalski" fullname="Tomek Mrugalski">
      <organization>Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>950 Charter Street</street>
          <city>Redwood City</city>
          <code>94063</code>
          <country>US</country>
        </postal>
        <email>tomasz.mrugalski@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="September" day="20"/>

    <area>Internet</area>
    <workgroup>Homenet</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines DHCPv6 options so an Homenet Naming Authority (HNA) can automatically proceed to the appropriate configuration and outsource the authoritative naming service for the home network.
In most cases, the outsourcing mechanism is transparent for the end user.</t>



    </abstract>


  </front>

  <middle>


<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader should be familiar with <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="introduction" title="Introduction">

<t><xref target="I-D.ietf-homenet-front-end-naming-delegation"/> specifies how an entity designated as the Homenet Naming Authority (HNA) outsources a Public Homenet Zone to an DNS Outsourcing Infrastructure (DOI).</t>

<t>This document describes how a network can provision the HNA with a specific DOI.
This could be particularly useful for a DOI partly managed by an ISP, or to make home networks resilient to HNA replacement. 
The ISP delegates an IP prefix to the home network as well as the associated reverse zone.
The ISP is thus aware of the owner of that IP prefix, and as such becomes a natural candidate for hosting the Homenet Reverse Zone - that is the Reverse Distribution Manager (RDM) and potentially the Reverse Public Authoritative Servers.</t>

<t>In addition, ISPs often identify the line of the home network with a name. 
Such name is used for their internal network management operations and is not a name the home network owner has registered to.
ISPs may leverage such infrastructure and provide the homenet with a specific domain name designated as per <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> a Homenet Registered Domain.
Similarly to the reverse zone, ISPs are aware of who owns that domain name and may become a natural candidate for hosting the Homenet Zone - that is the Distribution Manager (DM) and the Public Authoritative Servers.</t>

<t>This document describes DHCPv6 options that enable an ISP to provide the necessary parameters to the HNA, to proceed.
More specifically, the ISP provides the Registered Homenet Domain, necessary information on the DM and the RDM so the HNA can manage and upload the Public Homenet Zone and the Reverse Public Homenet Zone as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

<t>The use of DHCPv6 options may make the configuration completely transparent to the end user and provides a similar level of trust as the one used to provide the IP prefix - when provisioned via DHCP.</t>

</section>
<section anchor="sec-overview" title="Procedure Overview">

<t>This section illustrates how a HNA receives the necessary information via DHCPv6 options to outsource its authoritative naming service to the DOI.
For the sake of simplicity, and similarly to <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, this section assumes that the HNA and the home network DHCPv6 client are colocated on the  Customer Edge (CPE) router <xref target="RFC7368"/>.
Note also that this is not mandatory and the DHCPv6 client may instruct remotely the  HNA and the DHCPv6 either with a proprietary protocol or a protocol that will be defined in the future.
In addition, this section assumes the responsible entity for the DHCPv6 server is configured with the DM and RDM.
This means a Registered Homenet Domain can be associated to the DHCPv6 client.</t>

<t>This scenario is believed to be the most popular scenario. 
This document does not ignore scenarios where the DHCPv6 server does not have privileged relations with the DM or RDM.
These cases are discussed in <xref target="sec-scenario"/>.
Such scenarios do not necessarily require configuration for the end user and can also be zero-config.</t>

<t>The scenario considered in this section is as follows:</t>

<t><list style="numbers">
  <t>The HNA is willing to outsource the Public Homenet Zone or Homenet Reverse Zone. 
The DHCPv6 client is configured to include in its Option Request Option (ORO) the Registered Homenet Domain Option (OPTION_REGISTERED_DOMAIN), the Forward Distribution Manager Option (OPTION_FORWARD_DIST_MANAGER) and the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option codes.</t>
  <t>The DHCPv6 server responds to the HNA with the requested DHCPv6 options based on the identified homenet.
The DHCPv6 client passes the information to the HNA.</t>
</list></t>

<!--3. The HNA is authenticated (eventually by a self signed certificate (see Section 4.6 of {{I-D.ietf-homenet-front-end-naming-delegation}}) by the DM and the RDM.-->
<t><list style="numbers">
  <t>The HNA is authenticated (see Section 4.6 of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>) by the DM and the RDM. 
The HNA builds the Homenet Zone (or the Homenet Reverse Zone) and proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The DHCPv6 options provide the necessary non optional parameters described in Appendix B of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The HNA may complement the configurations with additional parameters via means not yet defined.
Appendix B of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> describes such parameters that MAY take some specific non default value.</t>
</list></t>

</section>
<section anchor="sec-format" title="DHCPv6 Option">

<t>This section details the payload of the DHCPv6 options.</t>

<section anchor="o_rd" title="Registered Homenet Domain Option">

<t>The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the FQDN associated to the home network.</t>

<figure title="Registered Domain Option" anchor="fig-rhd"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   OPTION_REGISTERED_DOMAIN    |         option-len            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                   Registered Homenet Domain                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REGISTERED_DOMAIN, the option code for the Registered Homenet Domain  (TBD1).</t>
  <t>option-len (16 bits): length in octets of the Registered Homenet Domain field as described in <xref target="RFC8415"/>.</t>
  <t>Registered Homenet Domain (variable): the FQDN registered for the homenet encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="o_dm" title="Forward Distribution Manager Option">

<t>The Forward Distributed Manager Option (OPTION_FORWARD_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.
As opposed to IP addresses, the FQDN requires a DNS resolution before establishing the communication between the HNA and the DM. 
However, the use of a FQDN provides multiple advantages over IP addresses.
Firstly, it makes the DHCPv6 Option easier to parse and smaller - especially when IPv4 and IPv6  addresses are expected to be provided. 
Then the FQDN can reasonably be seen as a more stable identifier as well as a pointer to additional information than the IP addresses may be useful to in the future to establish the communication between the HNA and the DM.</t>

<figure title="Forward Distribution Manager Option" anchor="fig-dm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPTION_FORWARD_DIST_MANAGER  |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/                  Distribution Manager  FQDN                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_FORWARD_DIST_MANAGER, the option code for the Forward Distribution Manager Option (TBD2).</t>
  <t>option-len (16 bits): length in octets of the enclosed data as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the DM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a DM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Distribution Manager FQDN (variable): the FQDN of the DM encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

<t>It is worth noticing that the Supported Transport field does not enable to specify a port and the used port is defined by standard. 
In the case of DNS over TLS <xref target="RFC7858"/>, the port is defined by <xref target="RFC7858"/> to be 853. 
The need for such flexibility has been balanced with the difficulty of handling a list of tuples ( transport, port ) as well as the possibility to use a dedicated IP address for the DM.</t>

</section>
<section anchor="reverse-distribution-manager-server-option" title="Reverse Distribution Manager Server Option">

<t>The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.</t>

<figure title="Reverse Distribution Manager Option" anchor="fig-rdm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_REVERSE_DIST_MANAGER   |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/              Reverse Distribution Manager FQDN                /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REVERSE_DIST_MANAGER, the option code for the Reverse Distribution Manager Option (TBD3).</t>
  <t>option-len (16 bits): length in octets of the option-data field as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the RDM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a RDM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Reverse Distribution Manager FQDN (variable): the FQDN of the RDM encoded as described in section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="sec-st" title="Supported Transport">

<t>The Supported Transport field of the DHCPv6 option indicates the supported transport protocols.
Each bit represents a specific transport mechanism. 
A bit sets to 1 indicates the associated transport protocol is supported.
The corresponding bits are assigned as described in <xref target="tab-st"/> and <xref target="sec-iana"/>.</t>

<figure title="Supported Transport" anchor="tab-st"><artwork><![CDATA[
Bit Position | Transport Protocol Description |  Mnemonic | Reference
-------------+--------------------------------+-----------+-----------
      0      | DNS over TLS                   | DoT       | This-RFC
     1-15    | unallocated                    |  -        |  -
]]></artwork></figure>

<t>DNS over TLS: indicates the support of DNS over TLS as described in <xref target="RFC7858"/> and <xref target="RFC9103"/>.</t>

</section>
</section>
<section anchor="sec-dhcp-behavior" title="DHCPv6 Behavior">

<section anchor="dhcpv6-server-behavior" title="DHCPv6 Server Behavior">

<t>Sections 17.2.2 and 18.2 of <xref target="RFC8415"/> govern server operation in regards to option assignment.
As a convenience to the reader, we mention here that the server will send option foo only if configured with specific values for foo and if the client requested it.
In particular, when configured the DHCPv6 server sends the Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option when requested by the DHCPv6 client by including necessary option codes in its ORO.</t>

</section>
<section anchor="dhcpv6-client-behavior" title="DHCPv6 Client Behavior">

<t>The DHCPv6 client includes Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option in an ORO as specified in Sections 18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of <xref target="RFC8415"/>.</t>

<t>Upon receiving a DHCPv6 option described in this document in the Reply
message, the HNA SHOULD proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="sec-dhcp-relay" title="DHCPv6 Relay Agent Behavior">

<t>There are no additional requirements for the DHCPv6 Relay agents.</t>

</section>
</section>
<section anchor="sec-iana" title="IANA Considerations">

<section anchor="dhcpv6-option-codes" title="DHCPv6 Option Codes">

<t>IANA is requested to assign the following new DHCPv6 Option Codes in the registry maintained in: https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<figure><artwork><![CDATA[
Value Description                   Client ORO     Singleton Option  Reference
TBD1  OPTION_REGISTERED_DOMAIN       Yes            No               [This-RFC] Section 4.1
TBD2  OPTION_FORWARD_DIST_MANAGER    Yes            Yes              [This-RFC] Section 4.2
TBD3  OPTION_REVERSE_DIST_MANAGER    Yes            Yes              [This-RFC] Section 4.3
]]></artwork></figure>

</section>
<section anchor="supported-transport-parameter" title="Supported Transport parameter">

<t>IANA is requested to maintain a new registry of Supported Transport parameter in the Distributed Manager Option (OPTION_FORWARD_DIST_MANAGER) or the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are defined in <xref target="tab-st"/> in <xref target="sec-st"/>.</t>

<t>The Name of the registry is: Supported Transport parameter</t>

<t>The registry description is:  The Supported Transport field of the DHCPv6 option is a tow byte field that indicates the supported transport protocols. 
Each bit represents a specific transport mechanism.</t>

<t>The parent grouping is Dynamic Host Configuration Protocol for IPv6 (DHCPv6) at https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<t>New entry MUST specify the bit position, the Transport Protocol Description a Mnemonic and a Reference as defined in <xref target="tab-iana"/>.</t>

<t>The initial registry is as specified in <xref target="tab-iana"/>.</t>

<t>Changes of the  format or policies of the registry is left to the IETF via the IESG.</t>

<t>Future code points are assigned under RFC Required as per <xref target="RFC8126"/>.</t>

<figure title="Supported Transport" anchor="tab-iana"><artwork><![CDATA[
Bit Position | Transport Protocol Description |  Mnemonic | Reference
-------------+--------------------------------+-----------+-----------
      0      | DNS over TLS                   | DoT       | This-RFC
     1-15    | unallocated                    |  -        |  -
]]></artwork></figure>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The security considerations in <xref target="RFC8415"/> are to be considered.
The use of DHCPv6 options provides a similar level of trust as the one used to provide the IP prefix.
The link between the HNA and the DHCPv6 server may benefit from additional security for example by using <xref target="I-D.ietf-dhc-sedhcpv6"/>.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank Marcin Siodelski, Bernie Volz and Ted Lemon for their comments on the design of the DHCPv6 options.
We would also like to thank Mark Andrews, Andrew Sullivan and Lorenzo Colliti for their remarks on the architecture design. The designed solution has been largely been inspired by Mark Andrews’s document <xref target="I-D.andrews-dnsop-pd-reverse"/> as well as discussions with Mark.
We also thank Ray Hunter and Michael Richardson for its reviews, its comments and for suggesting an appropriated terminology.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The co-authors would like to thank Chris Griffiths and Wouter Cloetens that provided a significant contribution in the early versions of the document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8174;
&RFC8415;
&RFC7858;
&RFC8126;


    </references>

    <references title='Informative References'>

&I-D.ietf-homenet-front-end-naming-delegation;
&RFC7368;
&RFC9103;
&I-D.ietf-dhc-sedhcpv6;
&I-D.andrews-dnsop-pd-reverse;
&RFC2181;
&RFC1034;
&RFC6672;
&I-D.sury-dnsext-cname-dname;


    </references>


<section anchor="sec-scenario" title="Scenarios and impact on the End User">

<t>This section details various scenarios and discuss their impact on the end user.
This section is not normative and limits the description of a limited scope of scenarios that are assumed to be representative. Many other scenarios may be derived from these.</t>

</section>
<section anchor="sec-scenario-1" title="Base Scenario">

<t>The base scenario is the one described in <xref target="sec-overview"/> in which an ISP manages the DHCPv6 server, the DM and RDM.</t>

<t>The end user subscribes to the ISP (foo), and at subscription time registers for foo.example as its Registered Homenet Domain foo.example.</t>

<t>In this scenario, the DHCPv6 server, DM and RDM are managed by the ISP so the DHCPv6 server and as such can provide authentication credentials of the HNA to enable secure authenticated transaction with the DM and the Reverse DM.</t>

<t>The main advantage of this scenario is that the naming architecture is configured automatically and transparently for the end user.
The drawbacks are that the end user uses a Registered Homenet Domain managed by the ISP and that it relies on the ISP naming infrastructure.</t>

<section anchor="scenario-2" title="Third Party Registered Homenet Domain">

<t>This section considers the case when the end user wants its home network to use example.com not managed by her ISP (foo) as a Registered Homenet Domain.
This section still considers the ISP manages the home network and still provides foo.example as a Registered Homenet Domain.</t>

<t>When the end user buys the domain name example.com, it may request to redirect the name example.com to foo.example using static redirection with CNAME <xref target="RFC2181"/>, <xref target="RFC1034"/>, DNAME <xref target="RFC6672"/> or CNAME+DNAME <xref target="I-D.sury-dnsext-cname-dname"/>.
The only information the end user needs to know is the domain name assigned by the ISP.
Once the redirection has been configured, the HNA may be changed, the zone can be updated as in <xref target="sec-scenario-1"/> without any additional configuration from the end user.</t>

<t>The main advantage of this scenario is that the end user benefits from the Zero Configuration of the Base Scenario <xref target="sec-scenario-1"/>.
Then, the end user is able to register for its home network an unlimited number of domain names provided by an unlimited number of different third party providers.
The drawback of this scenario may be that the end user still rely on the ISP naming infrastructure.
Note that the only case this may be inconvenient is when the DNS servers provided by the ISPs results in high latency.</t>

</section>
<section anchor="scenario-3" title="Third Party DNS Infrastructure">

<t>This scenario considers that the end user uses example.com as a Registered Homenet Domain, and does not want to rely on the authoritative servers provided by the ISP.</t>

<t>In this section we limit the outsourcing to the DM and Public Authoritative Server(s) to a third party.
The Reverse Public Authoritative Server(s) and the RDM remain managed by the ISP as the IP prefix is managed by the ISP.</t>

<t>Outsourcing to a third party DM can be performed in the following ways:</t>

<t><list style="numbers">
  <t>Updating the DHCPv6 server Information. One can imagine a GUI interface that enables the end user to modify its profile parameters. Again, this configuration update is done once-for-ever.</t>
  <t>Upload the configuration of the DM to the HNA. In some cases, the provider of the CPE router hosting the HNA may be the registrar and provide the CE router already configured. In other cases, the CE router may request the end user to log into the registrar to validate the ownership of the Registered Homenet Domain and agree on the necessary credentials to secure the communication between the HNA and the DM. As described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, such settings could be performed in an almost automatic way as to limit the necessary interactions with the end user.</t>
</list></t>

</section>
<section anchor="scenario-4" title="Multiple ISPs">

<t>This scenario considers a HNA connected to multiple ISPs.</t>

<t>Suppose the HNA has been configured each of its interfaces independently with each ISPS as described in <xref target="sec-scenario-1"/>.
Each ISP provides a different Registered Homenet Domain.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs with multiple Registered Homenet Domains.
However, the HNA should be able to handle different Registered Homenet Domains.
This is an implementation issue which is outside the scope of the current document.</t>

<t>If a HNA is not able to handle multiple Registered Homenet Domains, the HNA may remain connected to multiple ISP with a single Registered Homenet Domain.
In this case, one entity is chosen to host the Registered Homenet Domain.
This entity may be one of the ISP or a third party.
Note that having multiple ISPs can be motivated for bandwidth aggregation, or connectivity fail-over.
In the case of connectivity fail-over, the fail-over concerns the access network and a failure of the access network may not impact the core network where the DM and Public Authoritative Primaries are hosted.
In that sense, choosing one of the ISP even in a scenario of multiple ISPs may make sense.
However, for sake of simplicity, this scenario assumes that a third party has been chosen to host the Registered Homenet Domain.
Configuration is performed as described in <xref target="scenario-2"/> and <xref target="scenario-3"/>.</t>

<t>With the configuration described in <xref target="scenario-2"/>,  the HNA is expect to be able to handle multiple Homenet Registered Domain, as the third party redirect to one of the ISPs servers.
With the configuration described in <xref target="scenario-3"/>, DNS zone are hosted and maintained by the third party.
A single DNS(SEC) Homenet Zone is built and maintained by the HNA.
This latter configuration is likely to match most HNA implementations.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs.
To configure or not and how to configure the HNA depends on the HNA facilities.
<xref target="sec-scenario-1"/> and  <xref target="scenario-2"/> require the HNA to handle multiple Registered Homenet Domain, whereas <xref target="scenario-3"/> does not have such requirement.</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

