Internet DRAFT - draft-ota-dhc-auth-chap

draft-ota-dhc-auth-chap



     dhc Working Group                                                M. Ota 
                                                                   M.Yanagiya 
     Internet Draft                                                      NTT 
     Expires: December 2005                                    June 30, 2005 
                                         
      
                        CHAP-based Authentication for DHCPv6 
                           draft-ota-dhc-auth-chap-00.txt 


     Status of this Memo 

        By submitting this Internet-Draft, each author represents that       
        any applicable patent or other IPR claims of which he or she is       
        aware have been or will be disclosed, and any of which he or she       
        becomes aware will be disclosed, in accordance with Section 6 of       
        BCP 79. 

        Internet-Drafts are working documents of the Internet Engineering 
        Task Force (IETF), its areas, and its working groups.  Note that 
        other groups may also distribute working documents as Internet-Drafts. 

        Internet-Drafts are draft documents valid for a maximum of six months 
        and may be updated, replaced, or obsoleted by other documents at any 
        time.  It is inappropriate to use Internet-Drafts as reference 
        material or to cite them other than as "work in progress." 

        The list of current Internet-Drafts can be accessed at 
             http://www.ietf.org/ietf/1id-abstracts.txt 

        The list of Internet-Draft Shadow Directories can be accessed at 
             http://www.ietf.org/shadow.html 

        This Internet-Draft will expire on December 30, 2005. 

     Copyright Notice 

           Copyright (C) The Internet Society (2005).  All Rights Reserved. 

     Abstract 

         In delayed authentication in DHCPv6[RFC3315], the hardware 
        identifier is used to select the key, and the key is exchanged 
        between the server and the client in advance. Therefore, when a user 
        tries to use a new device, it is necessary to add key information to 
        the new device and DHCPv6 servers.  
         In this document, we propose a procedure for introducing 
        CHAP[RFC1994] into the DHCPv6 authentication procedure. This 
        procedure allows the client get the host configuration information 

      
      
      
      Ota                   Expires December 30, 2005                [Page 1] 
      
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

        related to the user and exchanges a secret key to use in later 
        sequence.  
           
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
        document are to be interpreted as described in RFC-2119. 

        Most of the terms used in this draft are defined in RFC3315. 
         

     Table of Contents 

         
        1. Introduction...................................................3 
        2. Issues.........................................................3 
        3. Protocol Overview..............................................4 
        4. Packet Format of the Authentication Option in the CHAP-based 
        Authentication Procedure..........................................5 
           4.1. Authentication Information in Advertise Messages..........7 
           4.2. Authentication Information in Request Messages............7 
           4.3. Authentication Information in Reply Messages corresponding to 
           Request Message................................................8 
        5. Client and Server Considerations...............................9 
           5.1. Client Considerations.....................................9 
              5.1.1. Sending Solicit Messages.............................9 
              5.1.2. Receiving Advertise Messages.........................9 
              5.1.3. Sending Request Messages.............................9 
              5.1.4. Sending Confirm, Renew, Rebind, Decline or Release 
              Messages....................................................9 
              5.1.5. Sending Information-Request Messages.................9 
              5.1.6. Receiving Reply Messages............................10 
              5.1.7. Receiving Reconfigure Messages......................10 
              5.1.8. When the key life time is over......................10 
           5.2. Server Considerations....................................10 
              5.2.1. Receiving Solicit Messages and Sending Advertise 
              Messages...................................................10 
              5.2.2. Receiving Request Messages and Sending Reply Messages10 
              5.2.3. Receiving Confirm, Renew, Rebind, Decline or Release 
              Messages...................................................11 
              5.2.4. Sending Reply Messages in Information-Request/Reply 
              sequence...................................................11 
        6. Security Considerations.......................................11 
        7. IANA Consideration............................................11 
        8. Informative Reference.........................................11 
        Author's Addresses...............................................11 
        Intellectual Property Statement..................................12 

      
      
     Ota                   Expires December 30, 2005                [Page 2] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

        Disclaimer of Validity...........................................12 
        Copyright Statement..............................................12 
        Acknowledgment...................................................13 
         
    1. Introduction 

        In delayed authentication, which is the authentication procedure 
       described in RFC3315, the hardware identifier, such as the MAC 
       address, is used to select the key, and it is assumed that the key is 
       exchanged between the server and the client in advance. Therefore, 
       when a user tries to use a new device, it is necessary to submit new 
       hardware identifiers and new key information to the DHCPv6 server. We 
       think that it will be deployment issue. 
      
          To avoid this problem, we propose a user based authentication 
        procedure. In this procedure, DHCPv6 server authenticates user using 
        CHAP mechanism during solicitation procedure. To identify users, we 
        assumed that user identifier, such as FQDN of user, is used as 
        identifier of peer. And shared secret, which is used to establish 
        security association between DHCPv6 client and server for subsequent 
        sequences, is exchanged using Diffie-Hellman mechanism.  
           
    2. Issues 

        In the Delayed Authentication procedure, the DHCPv6 server selects a 
        key based on the hardware identifier of the DHCPv6 client, such as 
        MAC address, and it is assumed that keys are exchanged between the 
        server and the client in advance. Therefore, when a user tries to use 
        a new device, it is necessary to add the key to the new device and 
        DHCPv6 servers. We think that there will be the following deployment 
        issues:  

        -The user is required to submit a new hardware identifier and a new 
        key to the operator of the DHCPv6 server. 

        The original purpose of DHCPv6 authentication was to avoid server 
        and client spoofing in general environments such as a LAN, so the 
        DHCPv6 authentication procedure is required to provide mutual 
        authentication. On the other hand, we can assume that nobody can 
        spoof the DHCPv6 server in a commercial network. In such a network, 
        we think that it is unnecessary for the client to authenticate the 
        server. A network access authentication procedure, such as CHAP, is 
        one of the major one-way authentication procedures. A lot of network 
        access procedures use the user identifier to select a secret. 
        Therefore, an AAA server is required to manage one secret per user 
        even if users change terminal.  

      
      
     Ota                   Expires December 30, 2005                [Page 3] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

        Therefore, we propose a new authentication procedure that applies an 
        access authentication method based on the user identifier to the 
        DHCPv6 authentication procedure.   

    3. Protocol Overview 

        Here, we introduce a new authentication procedure that uses CHAP as 
        the authentication method. This procedure allows the server to 
        execute authentication based on the user identifier. We call it the 
        CHAP-based Authentication Procedure. An example sequence of this 
        procedure is illustrated in Figure 1. 
        When the DHCPv6 server receives a Solicit message, the server 
        replies with the Advertise message, which carries the challenge and 
        identifier. The client calculates the Response value using the 
        challenge and a pre-shared secret such as a password. And the client 
        sends a Request message with the user-identifier, identifier, and 
        Response value. When the DHCPv6 server receives a Request message, it 
        selects a challenge based on the identifier. The DHCPv6 server may 
        send an authentication request message to the AAA server, and the AAA 
        server selects a secret based on the user identifier and evaluates 
        the Response value. But the protocol between the DHCPv6 server and 
        the AAA server is out of our scope. If the evaluation has been 
        completed successfully, the DHCPv6 server sends a Reply message to 
        the DHCPv6 client. 

      DHCPv6                      DHCPv6                      AAA 
      client                      Server                    Server  
        |                           |                          | 
        |  Solicit [Auth-opt]       |                          | 
        |   (demands authentication using this procedure)      | 
        |-------------------------->|                          | 
        |                           |                          | 
        |  Advertise                |                          | 
        | [Auth-opt (Challenge, Identifier)]                   | 
        |<--------------------------|                          | 
        |                           |                          | 
        |  Request                  |                          | 
        |[Auth-opt (User-Identifier,|                          | 
        | Identifier, Response, DH-group, KeyExchange)]        | 
        |-------------------------->|                          | 
        |                           |  Authentication Request  | 
        |                           |------------------------->| 
        |                           |                          | 
        |                           |  Authentication Reply    | 
      
      
     Ota                   Expires December 30, 2005                [Page 4] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

        | Reply[Auth-opt            |<-------------------------| 
        |  (Success or Failure, KeyExchange, etc.)]            | 
        |<--------------------------|                          | 
        |                           |                          | 
        Fig. 1. Example sequence of CHAP-based authentication procedure. 

         
    4. Packet Format of the Authentication Option in the CHAP-based 
       Authentication Procedure 

        In a Solicit message, the client fills in the protocol, algorithm, 
        and RDM fields in the Authentication option with the clientÆs 
        preferences. The client sets the replay detection field to zero and 
        omits the authentication information field. The client sets the 
        option-len field to 11. 
         
        In all other messages, the protocol and algorithm fields identify 
        the procedure used to construct the contents of the authentication 
        information field. The RDM field identifies the procedure used to 
        construct the contents of the replay detection field. 
         
        The format of the Authentication information for CHAP-based 
        authentication procedure is: 
         
         0                   1                   2                   3       
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |    MSG_TYPE   |   Identifier  |         MSG_Length            |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |                         Attribute                             |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |                         .........                             |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
         
          MSG TYPE 
                         The MSG TYPE identifies the type of message.  
                          We set the following types. 
                          1 Challenge 
                          2 Response 
                          3 Success 
                          4 Failure 
           
          Identifier      The Identifier shows that it is a series of 
                          a CHAP sequence. When a Challenge value is 
                          generated, the identifier is generated at  
                          random by DHCPv6 Server. 
         
      
      
     Ota                   Expires December 30, 2005                [Page 5] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

          MSG_Length      The total size of the authentication information 
                          field. The value contains MSG TYPE, Identifier, 
                          MSG length, and Attribute field length. 
         
          Attribute       The Attribute carries authentication information.  
                          Details of the format in the Attribute field 
                          are shown below. 
         
         
        0                   1                   2                   3       
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |      TYPE     |     Length    |            Value ...            
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
         
          TYPE            The TYPE of Attribute shows the type of  
                          information of Value. 
                          1 User-Name 
                          3 CHAP-Password 
                          60 CHAP-Challenge 
                          80 DH-group 
                          81 KeyExchange 
                          82 DHCP realm 
                          83 key ID 
                          84 life time of the key 
         
          Length 
                         Length of Value in octets. 
         
          Value 
                         Value of Attribute related to TYPE number.  
                          Information corresponding to the TYPE number 
                          buried under the Value field is shown below. 
                         TYPE  Value 
                         1  String of User-Name and domain tied by using @. 
                         3  Response value 
                         60 Challenge value  
                         80 Diffie-Hellman group value 
                         81 Diffie-Hellman public key value 
                         82 DHCP realm info 
                         83 key Identifier 
                         84 Exchanged keyÆs life time 
         
         





      
      
     Ota                   Expires December 30, 2005                [Page 6] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

     4.1. Authentication Information in Advertise Messages 

        The Advertise message has the following authentication information 
        field. 
         
         0                   1                   2                   3       
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        | Challenge(1)  |  Identifier   |         MSG_Length            |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |  Type(60)     |     Length    |         Challenge value       |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        MSG TYPE field is 1 (Challenge). The values of Identifier and 
        Challenge value are generated by the server. This authentication 
        information has an attribute, Type(60). The attribute Type 60 is 
        filled with the Challenge value. 
         
     4.2. Authentication Information in Request Messages 

        A Request message has the following authentication information field. 
         
        0                   1                   2                   3       
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |  Response(2)  |  Identifier   |         MSG_Length            |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |     Type(1)   |     Length    |       User-Name@domain        |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |     Type(3)   |     Length    |         Response value        |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   
        | DH-group(80)  |     Length    |       DH-group value          |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |KeyExchange(81)|     Length    |        public key value       |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        MSG TYPE field is 2 (Response). Identifier is the same as the one 
        included in the Advertise message. This authentication information 
        has two attributes: Type (1) and Type (3). The attribute Type 1 is 
        filled with User-Name@domain, which the client has beforehand. The 
        attribute Type 3 is filled with Response value, which is calculated 
        by the client. The attribute Type 80 is filled with DH-group value. 
        The attribute Type 81 is filled with public key value generated by 
        the client, which uses to calculate secret key with the server.  
         




      
      
     Ota                   Expires December 30, 2005                [Page 7] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

     4.3. Authentication Information in Reply Messages corresponding to 
        Request Message 

        The server selects authentication information included in the Reply 
        message according to the authentication information received from the 
        AAA server. When the server receives the message of authentication 
        success, it sends a Reply message containing authentication 
        information with the MSG_TYPE field set to 3 (Success). The attribute 
        Type 80 is filled with DH-group value. The attribute Type 81 is 
        filled with public key value generated by the server, which uses to 
        calculate secret key by the client. Additionally, the message 
        includes other necessary information (DHCP realm, key ID, life time 
        of the key). 
         
         0                   1                   2                   3       
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |    Success    |  Identifier   |     MSG_Length (4[Octets])    |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        | DH-group(80)  |     Length    |       DH-group value          |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |KeyExchange(81)|     Length    |        public key value       |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        | DHCP realm(82)|     Length    |        DHCP realm info        |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |   key ID(83)  |     Length    |         key identifier        |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        | life time(84) |     Length    |   Exchanged keyÆs life time   |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        When the server receives the message of the authentication failure, 
        the server sends the Reply message with the MSG TYPE field set to 4 
        (Failure). 
         
         0                   1                   2                   3       
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    
        |    Failure    |  Identifier   |     MSG_Length (4[Octets])    |    
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
        The server that receives an authentication failure can be allowed to 
        send a Reply message that does not include other options. 
         





      
      
     Ota                   Expires December 30, 2005                [Page 8] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

    5. Client and Server Considerations  

     5.1. Client Considerations 

        The client announces its intention to use DHCPv6 authentication by 
        including an authentication option in its Solicit message.  
         
     5.1.1. Sending Solicit Messages 

        When the client demands to authenticate, a Solicit message includes 
        an authentication option with the desired protocol, algorithm, and 
        RDM. The client does not include any replay detection or 
        authentication information in the authentication option.  

     5.1.2. Receiving Advertise Messages 

        The client validates Advertise messages. If the Advertise messages 
        have a Challenge value in the authentication information field, the 
        client generates a Response value by applying MD5 to the data 
        connecting Identifier, the secret that the client has beforehand, and 
        the Challenge value. 
         
     5.1.3. Sending Request Messages 

        The client sends a Request message with User-Name as the user 
        identifier, Identifier, Response value, DH-group, and KeyExchange 
        attribute in the authentication information fields. A public key 
        value in KeyExchange attribute is calculated by the client using DH-
        group which received in Advertise message. 
         
     5.1.4. Sending Confirm, Renew, Rebind, Decline or Release Messages  

        If the client received Reply messages before, it can send Confirm, 
        Renew, Decline or Release Messages with authentication information 
        using generated key. In this time, the client follows the sequence at 
        section 21.4.4.3 in RFC3315. It is different only to put put the 
        number of this authentication in the protocol field in the 
        Authentication option. 
         
     5.1.5. Sending Information-Request Messages  

        In this document, we support only stateful DHCP. Because, this 
        procedure assumes use to the situation which is disbursed the address 
        to the client, and managed by the server. The client follows the 
        sequence at section 21.4.4.3 in RFC3315 using the secret key which 
        the client gets in section 5.1.6. It is different only to put put the 

      
      
     Ota                   Expires December 30, 2005                [Page 9] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

        number of this authentication in the protocol field in the 
        Authentication option. 
         
     5.1.6. Receiving Reply Messages  

        If the messages which client received include "Success" in 
        authentication information, the client draws the public key value in 
        KeyExchange Attribute. And the client calculates secret key by 
        Diffie-Hellman algorism. 
         
     5.1.1. Receiving Reconfigure Messages  

        The client follows the sequence at section 21.4.4.6 in RFC3315. It is 
        different only to put put the number of this authentication in the 
        protocol field in the Authentication option. 
         
     5.1.2. When the key life time is over  

        The client sends Solicit Message and start solicitation procedure to 
        exchange new secret key. It is different only to put put the number 
        of this authentication in the protocol field in the Authentication 
        option. 
         
     5.2. Server Considerations 

     5.2.1. Receiving Solicit Messages and Sending Advertise Messages 

        A server that receives a Solicit message with the protocol field set 
        to CHAP-based authentication procedure value generates a Challenge 
        value and Identifier. The server sends them with Advertise Messages. 
        The server MUST record the identifier related to the Challenge value 
        during the authentication procedure.  
         
     5.2.2. Receiving Request Messages and Sending Reply Messages 

        If the Request message includes authentication option which type is 
        set with CHAP Authentication, the receiving server chooses a 
        Challenge value related to the Identifier and sends the User-Name, 
        Identifier, Challenge value, and Response value to the AAA server. 
        After the server has received the authentication result from the AAA 
        server, it sends the client a Reply message containing the 
        authentication option, which includes success or failure in MSG TYPE 
        and KeyExchange attribute which include public key value generated by 
        the server and other information. And the server get secret key of 
        the client calculated by received public key value from the client. 
         

      
      
     Ota                   Expires December 30, 2005               [Page 10] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

         
     5.2.3. Receiving Confirm, Renew, Rebind, Decline or Release Messages  

        The client follows the sequence at section 21.4.5.2 in RFC3315. It 
        is different only to put put the number of this authentication in the 
        protocol field in the Authentication option. 
         
     5.2.4. Sending Reply Messages in Information-Request/Reply sequence 

        The client follows the sequence at section 21.4.5.2 in RFC3315. It 
        is different only to put put the number of this authentication in the 
        protocol field in the Authentication option. 
         
    6. Security Considerations  

        The CHAP-based authentication procedure gives the procedure for 
       authenticating the client. This protocol does not give the means of 
       server authentication, so it has a weakness in terms of clarifying 
       the server. 
         

    7. IANA Consideration 

        This document introduces a new authentication mechanism. The type 
        numbers for the protocol field in the authentication option are 
        currently TBD. An appropriate request will be made to IANA if this 
        Internet draft gets accepted as an RFC. 

    8. Informative Reference 

        [RFC3315] R. Dorms ed., "Dynamic Host Configuration Protocol for IPv6 
        (DHCPv6)," July 2003. 
         
        [RFC1994] W. Simpson, "PPP Challenge Handshake Authentication 
        Protocol (CHAP)," August 1996. 
         

     Author's Addresses 

        Masazumi Ota, Mayumi Yanagiya 
        NTT Network Service Systems Laboratories  
        3-9-11 Midori-cho, Musashino-shi 
        Tokyo, Japan 
        Phone: 81-422-597629 
        Email: oota.masazumi@lab.ntt.co.jp 
               yanagiya.mayumi@lab.ntt.co.jp 

      
      
     Ota                   Expires December 30, 2005               [Page 11] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

         

     Intellectual Property Statement 

        The IETF takes no position regarding the validity or scope of any 
        Intellectual Property Rights or other rights that might be claimed to 
        pertain to the implementation or use of the technology described in 
        this document or the extent to which any license under such rights 
        might or might not be available; nor does it represent that it has 
        made any independent effort to identify any such rights.  Information 
        on the procedures with respect to rights in RFC documents can be 
        found in BCP 78 and BCP 79. 

        Copies of IPR disclosures made to the IETF Secretariat and any 
        assurances of licenses to be made available, or the result of an 
        attempt made to obtain a general license or permission for the use of 
        such proprietary rights by implementers or users of this 
        specification can be obtained from the IETF on-line IPR repository at 
        http://www.ietf.org/ipr. 

        The IETF invites any interested party to bring to its attention any 
        copyrights, patents or patent applications, or other proprietary 
        rights that may cover technology that may be required to implement 
        this standard.  Please address the information to the IETF at 
        ietf-ipr@ietf.org 

     Disclaimer of Validity 

        This document and the information contained herein are provided on an 
        "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
        OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
        ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
        INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
        INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
        WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 

     Copyright Statement 

        Copyright (C) The Internet Society (2005). 

        This document is subject to the rights, licenses and restrictions 
        contained in BCP 78, and except as set forth therein, the authors 
        retain all their rights. 




      
      
     Ota                   Expires December 30, 2005               [Page 12] 
         
     Internet-Draft   CHAP based authentication for DHCPv6         June 2005 
         

     Acknowledgment 

        Funding for the RFC Editor function is currently provided by the 
        Internet Society. 











































      
      
     Ota                   Expires December 30, 2005               [Page 13]