<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc strict='yes'?>
<?rfc iprnotified='no'?>
<rfc category="info" docName="draft-templin-dhc-authonly-sedhcpv6-00.txt"
     ipr="trust200902" obsoletes="">
  <front>
    <title abbrev="AERO Minimal Encapsulation">Authentication-only Mode for
    Secure DHCPv6</title>

    <author fullname="Fred L. Templin" initials="F. L." role="editor"
            surname="Templin">
      <organization>Boeing Research &amp; Technology</organization>

      <address>
        <postal>
          <street>P.O. Box 3707</street>

          <city>Seattle</city>

          <region>WA</region>

          <code>98124</code>

          <country>USA</country>
        </postal>

        <email>fltemplin@acm.org</email>
      </address>
    </author>

    <date day="07" month="September" year="2016"/>

    <keyword>I-D</keyword>

    <keyword>Internet-Draft</keyword>

    <abstract>
      <t>Secure DHCPv6 includes mechanisms for encryption and authentication,
      where encryption is currently mandated due to concerns for pervasive
      monitoring in the Internet. The Secure DHCPv6 specification states that
      the mechanisms are applicable in any environment where physical security
      on the link is not assured and attacks on DHCPv6 are a concern. However,
      this document presents a reference use case where physical and/or
      link-layer security are already assured. This document therefore
      proposes an authentication-only application of Secure DHCPv6 when there
      is already sufficent protection against pervasive monitoirng.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>DHCPv6 <xref target="RFC3315"/> is the stateful autoconfiguration
      protocol for IPv6 <xref target="RFC2460"/>. Secure DHCPv6 <xref
      target="I-D.ietf-dhc-sedhcpv6"/> includes mechanisms for encryption and
      authentication, where encryption is currently mandated due to concerns
      for pervasive monitoring in the Internet.</t>

      <t>The Secure DHCPv6 specification states that the mechanisms are
      applicable in any environment where physical security on the link is not
      assured and attacks on DHCPv6 are a concern. However, this document
      presents a reference use case where physical and/or link-layer security
      are assured. This document therefore proposes an authentication-only
      application of Secure DHCPv6 when there is already sufficient protection
      against pervasive monitoirng.</t>

      <t>Encryption avoidance becomes important when information sharing
      between DHCPv6 clients, relays and servers is required and/or when an
      application of an additional layer of encryption would be redundant and
      would result in poor performance. The document therefore proposes an
      authentication-only mode for specific use cases where pervasive
      monitoring is already mitigated through other means, but a means for
      authenticating the source of the DHCPv6 message is still required.</t>
    </section>

    <section anchor="minencaps"
             title="Use Case for Authentication-only Secure DHCPv6">
      <t><xref target="encrypt"/> depicts a reference use case for an
      authentication-only mode for Secure DHCPv6, where the link between the
      DHCPv6 client and relay is protected by link-layer encryption and/or
      physical security:</t>

      <figure anchor="encrypt" title="">
        <artwork><![CDATA[     +-----------------------+      +-----------------------+          +-----------------------+
     |                       |      |                       |          |                       |
     |                       |      |                       |          |                       |
     |     DHCPv6 Client     |      |      DHCPv6 Relay     +----------+    DHCPv6 Server      |
     |                       |      |                       |  Secure  |                       |
     |                       |      |                       |  Channel |                       |
     +-----------------------+      +-----------------------+          +-----------------------+
     |                       |      |                       |
     | Link-layer Encryption |      | Link-layer Encryption |
     |                       |      |                       |
     +------------+----------+      +------------+----------+
                  |                              |
                  |            Link              |
             X----+------------------------------+----X
]]></artwork>
      </figure>

      <t>In this reference use case, the link between the client and relay is
      secured against pervasive monitoring through the application of
      link-layer encryption. (The link itself also may or may not be secured
      at the phsyical layer.) No information is therefore available in plain
      text over the link that connects the client and relay. The channel
      between the relay and server (or, between the first-hop relay and
      next-hop relay) is further secured against pervasive monitoring through
      the application of mechanisms such as IPsec and/or physical
      security.</t>

      <t>In the reference use case, therefore, no opportunity for pervasive
      monitoring exists and the application of an additional layer of
      encryption at the DHCPv6 layer would be unnecessary, inefficient and
      would interfere with client/relay/server information sharing. An example
      where this use case applies is in the AERO protocol <xref
      target="I-D.templin-aerolink"/>.</t>

      <t>This document therefore recommends an amendment of the Secure DHCPv6
      specification to permit an authentication-only application of the
      protocol when pervasive monitoring is already mitigated through other
      means.</t>
    </section>

    <section anchor="iana" title="IANA Considerations">
      <t>This document introduces no IANA considerations.</t>
    </section>

    <section anchor="secure" title="Security Considerations">
      <t>Security considerations are discussed in the DHCPv6 and Secure DHCPv6
      specifications <xref target="RFC3315"/><xref
      target="I-D.ietf-dhc-sedhcpv6"/>. This document notes that, in addition
      to proection against pervasive monitoring of DHCPv6 messages, a means
      for authenticating the sources of DHCPv6 messages may still be necessary
      in some environments to mitigate insider attacks such as spoofing and
      theft of service.</t>
    </section>

    <section anchor="ack" title="Acknowledgements">
      <t>TBD</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.0791"?>

      <?rfc include="reference.RFC.2460"?>

      <?rfc include="reference.RFC.3315"?>

      <?rfc include="reference.I-D.ietf-dhc-sedhcpv6"?>
    </references>

    <references title="Informative References">
      <?rfc include="reference.I-D.templin-aerolink"?>
    </references>
  </back>
</rfc>
