DHC D. Migault (Ed) Internet-Draft Francetelecom - Orange Intended status: Standards Track W. Cloetens Expires: January 06, 2014 SoftAtHome C. Griffiths Dyn R. Weber Nominum July 05, 2013 DHCP DNS Public Authoritative Server Option draft-mglt-dhc-public-authoritative-server-option-00.txt Abstract The home network naming architecture as described in [I-D.mglt-homenet-front-end-naming-delegation] requires a complex naming configuration on the CPE. This configuration MAY not be handled easily by the average end user. Furthermore, such misconfiguration MAY result in making home network unreachable. This document proposes a DHCP option that provides the CPE all necessary parameters to set up the home network naming architecture. First, this DHCP option provides automatic configuration and avoids most end users' misconfigurations. Most average end users may not require specific configuration, and their ISP default configuration MAY fully address their needs. In that case, the naming homenet architecture configuration will be completely transparent to the end users. Then, saving naming configuration outside the CPE, makes it resilient to change of CPE or CPE upgrades. Such configuration may also be configured by the end user, via the customer area of their ISP. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Migault (Ed), et al. Expires January 06, 2014 [Page 1] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 06, 2014. Copyright Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Requirements notation . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 4. Protocol Overview . . . . . . . . . . . . . . . . . . . . . . 5 5. Payload Description . . . . . . . . . . . . . . . . . . . . . 7 5.1. DNS Public Authoritative Server Option . . . . . . . . . 7 5.2. registered-domain-list . . . . . . . . . . . . . . . . . 8 5.3. master-list payload . . . . . . . . . . . . . . . . . . . 8 5.4. secure-channel-list payload . . . . . . . . . . . . . . . 8 6. Exchange Details . . . . . . . . . . . . . . . . . . . . . . 10 6.1. DHCPv6 Server . . . . . . . . . . . . . . . . . . . . . . 10 6.2. CPE . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 8. Security Considerations . . . . . . . . . . . . . . . . . . . 11 8.1. DNSSEC is recommended to authenticate DNS hosted data . . 11 8.2. Channel between the CPE and ISP DHCP Server MUST be secured . . . . . . . . . . . . . . . . . . . . . . . . . 12 8.3. CPEs are sensitive to DoS . . . . . . . . . . . . . . . . 12 9. Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . 12 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 10.1. Normative References . . . . . . . . . . . . . . . . . . 12 10.2. Informational References . . . . . . . . . . . . . . . . 13 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13 Migault (Ed), et al. Expires January 06, 2014 [Page 2] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 1. Requirements notation The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 2. Terminology - Customer Premises Equipment: (CPE) is the router providing connectivity to the home network. It is configured and managed by the end user. In this document, the CPE MAY also hosts services such as DHCPv6. This device MAY be provided by the ISP. - Registered Homenet Domain: is the Domain Name associated to the home network. - DNS Homenet Zone: is the DNS zone associated to the home network. This zone is set by the CPE and essentially contains the bindings between names and IP addresses of the nodes of the home network. In this document, the CPE does neither perform any DNSSEC management operations such as zone signing nor provide an authoritative service for the zone. Both are delegated to the Public Authoritative Server. The CPE synchronizes the DNS Homenet Zone with the Public Authoritative Server via a hidden master / slave architecture. The Public Authoritative Server MAY use specific servers for the synchronization of the DNS Homenet Zone: the Public Authoritative Name Server Set. - Public Authoritative Server: performs DNSSEC management operations as well as provides the authoritative service for the zone. In this document, the Public Authoritative Server synchronizes the DNS Homenet Zone with the CPE via a hidden master / slave architecture. The Public Authoritative Server acts as a slave and MAY use specific servers called Public Authoritative Name Server Set. Once the Public Authoritative Server synchronizes the DNS Homenet Zone, it signs the zone and generates the DNSSEC Public Zone. Then the Public Authoritative Server hosts the zone as an authoritative server on the Public Authoritative Master(s). - DNSSEC Public Zone: corresponds to the signed version of the DNS Homenet Zone. It is hosted by the Public Authoritative Server, which is authoritative for this zone, and is reachable on the Public Authoritative Master(s). Migault (Ed), et al. Expires January 06, 2014 [Page 3] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 - Public Authoritative Master(s): are the visible name server hosting the DNSSEC Public Zone. End users' resolutions for the Homenet Domain are sent to this server, and this server is a master for the zone. - Public Authoritative Name Server Set: is the server the CPE synchronizes the DNS Homenet Zone. It is configured as a slave and the CPE acts as master. The CPE sends information so the DNSSEC zone can be set and served. 3. Introduction With IPv6, nodes inside the home network are expected to be globally reachable. CPEs are already providing connectivity to the home network, and most of the time already assigns IP addresses to the nodes of the home network using for example DHCPv6. This makes CPE good candidate for defining the DNS zone file of the home network. However, CPEs have not been designed to handle heavy traffic, nor heavy operations. As a consequence, CPE SHOULD neither host the authoritative naming service of the home network, nor handle DNSSEC operations such as zone signing. In addition, CPE are usually managed by end users, and the average end user is most likely not mastering DNSSEC to administrate its DNSSEC zone. As a result, CPE SHOULD outsource both the naming authoritative service and its DNSSEC management operations to a third party. This architecture, designated as the homenet naming architecture is described in [I-D.mglt-homenet-front-end-naming-delegation], and the third party is designated as the Public Authoritative Servers. The home network naming architecture defines how the CPE and the Public Authoritative Servers interact together, so to leverage some of the issues related to the CPE, and the DNSSEC understanding of the average end user. Even though most of the DNSSEC issues are outsourced to the Public Authoritative Servers, setting the homenet naming architecture still requires some configurations. Configuration is fine as it provides the opportunity for advanced end users to make the naming architecture fit their specific needs. However most of the end users do not want to configure the homenet naming architecture. In most cases, the end users wants to subscribe and plug its CPE. The CPE is expected to be configured to set automatically and transparently the appropriated home network naming architecture. Using DHCP options to provide the necessary parameters for setting the homenet naming architecture provides multiple advantages. Firstly, it makes the network configuration independent of the CPE. Migault (Ed), et al. Expires January 06, 2014 [Page 4] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 Any new plugged CPE configures itself according to the provided configuration parameters. Secondly, it saves the configuration outside the CPE, which prevents re-configuring the CPE when it is replaced or reset. Finally ISPs are likely to propose a default homenet naming architecture that may address most of the end users needs. For these end users, no configuration will be performed at any time. This avoids unnecessary configurations or misconfiguration that could result in isolating the home network. For more advanced end users, the configuration MAY be provided also via the web GUI of the ISP's customer area for example. This configuration MAY enable third party Public Authoritative Servers. By doing so, these end users will also benefit from CPE-indepedent configuration and configuration backup. This document considers the architecture described in [I-D.mglt-homenet-front-end-naming-delegation]. The DNS(SEC) zone related to the home network is configured and set by the CPE and hosted on a Public Authoritative Server. [I-D.mglt-homenet-front-end-naming-delegation] describes how the synchronization between the CPE and the Public Authoritative Server is performed. This document describes the DNS Public Authoritative Server DHCP option (DNS_PUBLIC_AUTHORITATIVE_SERVER) that provides the necessary parameters to the CPE to set the architecture described in [I-D.mglt-homenet-front-end-naming-delegation]. Section 4 presents an overview of the DNS Public Authoritative Server DHCP option (DNS_PUBLIC_AUTHORITATIVE_SERVER) and Section 5 describes the format of this option and Section 6 details the exchange between the CPE and the DHCPv6 Server. This document assumes the reader is familiar with [I-D.mglt-homenet-front-end-naming-delegation]. This document assumes that the communication between the CPE and the ISP DHCP Server is protected. This document does not specify which mechanism should be used. [RFC3315] proposes a DHCP authentication and message exchange protection, [RFC4301], [RFC5996] proposes to secure the channel at the IP layer. This document only deals with IPv6 IP addresses and DHCPv6 [RFC3315]. When we mention DHCP, it MUST be understood as DHCPv6. 4. Protocol Overview The CPE requests the necessary parameters to set its home network naming configuration to the DHCP server. The DHCP server MAY be, for example, the one of its ISP, that already provides the IPv6 prefix to the CPE. Migault (Ed), et al. Expires January 06, 2014 [Page 5] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 The CPE sends an Option Request DHCP Option (ORO) [RFC3315] for the DHCP DNS Public Authoritative Server Option (DNS_PUBLIC_AUTHORITATIVE_SERVER) If available, the DHCP server sends back one or more DHCP DNS Public Authoritative Server Option (DNS_PUBLIC_AUTHORITATIVE_SERVER), depending if the end user has registered to one or multiple Public Authoritative Servers. A CPE MAY be associated to one or multiple Registered Homenet Domain and one or multiple Public Authoritative Servers. The CPE builds a zone for each Registered Homenet Domain. These zones are uploaded / synchronized with their associated Public Authoritative Servers. Note that synchronization is performed through master / slave configuration of the DNS servers, thus Public Authoritative Servers are configured to host specific Registered Homenet Domains. On the other hand, a given Homenet Zone MAY be hosted by multiple Public Authoritative Servers. The CPE MUST build properly the DNS Homenet Zone and synchronize properly the hidden master and slaves for the synchronizations. In order to configure properly the DNS Homenet Zone, the CPE SHOULD collect the list of Registered Homenet Domain and their associated Public Authoritative Servers. For each Registered Homenet Domain, the CPE lists the Public Authoritative Servers FQDN and set them as authoritative Name Server (RRset NS) for the zone. The CPE MAY also add in the DNS Homenet Zone their IP addresses (RRsets A or AAAA). This FQDN and IP addresses associated are designated as the Public Authoritative Master(s). Note that how the CPE manage the multiple DNS Homenet Zones is implementation dependent. It MAY synchronize all DNS Homenet Zone with the Public Authoritative Servers, or use zone redirection mechanisms like like CNAME [RFC2181], [RFC1034], DNAME [RFC6672] or CNAME+DNAME [I-D.sury-dnsext-cname-dname]. In the first case, any update requires to update all zone, whereas redirection MAY require only updating a single DNS Homenet Zone. In order to synchronize the DNS Homenet Zone with a Public Authoritative Server, the CPE needs to know how to establish a secure channel with the Public Authoritative Server. The Public Authoritative Server MAY have dedicated servers working as slave to synchronize the DNS Homenet Zone with the CPE. These servers are called Public Authoritative Name Server Set. In addition to these servers, the CPE MUST know which security protocol can be used to secure the channel as well as the security credential. In this document, we only considered Pre-Shared Key (PSK). Migault (Ed), et al. Expires January 06, 2014 [Page 6] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 As a result, the DHCP DNS Public Authoritative Server Option (DNS_PUBLIC_AUTHORITATIVE_SERVER) carries: - Registered Homenet Domain List: the list of Registered Homenet Domain the Public Authoritative Server hosts. - Master : the Public Authoritative Master(s), that is to say the FQDNs provided in the NS RRsets of the Homenet Zones associated to each of the Registered Homenet Domains. IP addresses are derived by the CPE thanks to a DNS(SEC) resolutions. - Secure Channel: the Public Authoritative Name Server Set , that is the FQDN the CPE MUST securely synchronize its DNS Homenet Zone with. This field MUST also specify, the security protocol as well as the security material. 5. Payload Description 5.1. DNS Public Authoritative Server Option The DHCP DNS Public Authoritative Server Option is constituted of three ordered sub payloads: the registered-domain-list, the master- list and the secure-channel-list payload. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |OPTION_DNS_PUBLIC_AUTH_SERVER | option-len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | registered-domain-list-len | master-list-len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | secure-channel-list-len | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | / registered-domain-list / | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | / master-list / | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | / secure-channel-list / | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - option-code: OPTION_DNS_PUBLIC_AUTH_SERVER Migault (Ed), et al. Expires January 06, 2014 [Page 7] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 - option-len: length of the OPTION_DNS_PUBLIC_AUTH_SERVER field, the option-code and the option-message in octets. - registered-domain-list-len: Length in octets of the list of Registered Homenet Domains field. - master-list-len: Length in octets of the list of the master-list field. - secure-channel-list-len: Length in octets of the Secure Channels field. - registered-domain-list: The list of Registered Homenet Domains. - master-list: The list of Public Authoritative Master(s). - secure-channel-list: The list of Secure Channels 5.2. registered-domain-list The registered-domain-list contains a list of fqdn payloads. The fqdn payload is as described below: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | fqdn | option-len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| | | | fqdn-value | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - payload-code: fqdn - option-len: length of the fqdn field, the payload-code and the payload-message in octets. - fqdn-value: fqdn value as specified in [RFC1035] 5.3. master-list payload The master-list payload contains a list of fqdn payloads. The fqdn payload is defined in Section 5.2. 5.4. secure-channel-list payload Migault (Ed), et al. Expires January 06, 2014 [Page 8] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 The registered-domain-list contains a list of secure-channel payloads. The secure-channel payload is described below. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | secure-channel | option-len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | sec-protocol | sec-cred-type | security-credential-len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | name-server-set-len | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / | | / security-credential (PSK) / | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / name-server-set | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - payload-code: secure-channel-list. Although not necessary, since payloads are ordered, we provide this code to ease implementation and future options. - option-len: Length of the delegated-naming-action-list field, the status-code and the status-message in octets. - sec-protocol: the protocol that secures the exchanges between the CPE and the Public Authoritative Server. Possible protocols are NONE, TSIG, IPSEC. - sec-cred-type: the type of credential used between the CPE and the Public Authoritative Server. The current document considers only PSK that can be used with any of the sec-protocol. - security-credential-len: length of the delegated-naming-action- list field, the sec-cred-type and the security-credential-len in octets. - security-credential: the security credential. In this document, the security credential is of type PSK. - name-server-set-len: length of the name-server-set field and the name-server-set-len in octets. Migault (Ed), et al. Expires January 06, 2014 [Page 9] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 - name-server-set: Public Authoritative Name Server Set encoded as specified in [RFC1035]. Only the FQDN representation is considered in this document. 6. Exchange Details This section details the DHCPv6 exchange between the DHCPv6 server and the CPE. 6.1. DHCPv6 Server The DHCPv6 server MUST NOT send a DHCP DNS Public Authoritative Server Option (DNS_PUBLIC_AUTHORITATIVE_SERVER) if not requested by the CPE through the DHCP Option Request Option (ORO). In the remaining of this section we suppose the DHCPv6 Server has received a DHCP Option Request Option (ORO) from the CPE for a DHCP DNS Public Authoritative Server Option (DNS_PUBLIC_AUTHORITATIVE_SERVER). If the DHCPv6 Server does not understand the DHCP DNS Public Authoritative Server Option, it ignores the Option as specified in [RFC3315]. If the DHCPv6 has no specific configuration, it MUST return a DHCP DNS Public Authoritative Server Option with the len registered- domain-list-len, master-list-len and secure-channel-list-len set to zero. This response is called the Zero Response and indicates that there are not enough arguments to set the home network architecture. The registered-domain-list is mandatory. If it does not exists, and Zero Response MUST be sent. A zero length for master-list indicates the CPE hosts the zone. In this case, a zero length secure-channel-list is expected. 6.2. CPE In this section we assume the CPE has sent a DHCP Option Request Option (ORO) from the CPE for a DHCP DNS Public Authoritative Server Option (DNS_PUBLIC_AUTHORITATIVE_SERVER). An Zero Response indicates the DHCPv6 Server has not a specific configuration for the CPE. A response with an registered-domain-list set to zero MUST be ignored. Migault (Ed), et al. Expires January 06, 2014 [Page 10] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 A zero length for master-list indicates the CPE hosts the zone. A non zero length secure-channel-list MUST be ignored. 7. IANA Considerations The DHCP options detailed in this document is: - OPTION_DNS_PUBLIC_AUTH_SERVER: TBD The payload detailed in this document are: - fqdn: TBD - secure-channel: TBD The security-protocol detailed in this document are: - NONE: TBD - TSIG: TBD - IPSEC: TBD The security-credential detailed in this document are: - NONE: TBD - PSK: TBD 8. Security Considerations 8.1. DNSSEC is recommended to authenticate DNS hosted data The document describes how the Secure Delegation can be set between the Delegating DNS Server and the Delegated DNS Server. Deploying DNSSEC is recommended since in some cases the information stored in the DNS is used by the ISP or an IT department to grant access. For example some Servers may performed a PTR DNS query to grant access based on host names. With the described Delegating Naming Architecture, the ISP or the IT department MUST take into consideration that the CPE is outside its area of control. As such, with DNS, DNS responses may be forged, resulting in isolating a Service, or not enabling a host to access a service. ISPs or IT department may not base their access policies on PTR or any DNS information. DNSSEC fulfills the DNS lack of trust, and we recommend to deploy DNSSEC on CPEs. Migault (Ed), et al. Expires January 06, 2014 [Page 11] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 8.2. Channel between the CPE and ISP DHCP Server MUST be secured In the document we consider that the channel between the CPE and the ISP DHCP Server is trusted. More specifically, we suppose the CPE is authenticated and the exchanged messages are protected. The current document does not specify how to secure the channel. [RFC3315] proposes a DHCP authentication and message exchange protection, [RFC4301], [RFC5996] propose to secure the channel at the IP layer. In fact, the channel MUST be secured because the CPE provides necessary information for the configuration of the Naming Delegation. Unsecured channel may result in setting the Naming Delegation with an non legitimate CPE. The non legitimate CPE would then be redirected the DNS traffic that is intended for the legitimate CPE. This makes the CPE sensitive to three types of attacks. The first one is the Deny Of Service Attack, if for example DNS traffic for a lot of CPEs are redirected to a single CPE. CPE are even more sensitive to this attack since they have been designed for low traffic. The other type of traffic is the DNS traffic hijacking. A malicious CPE may redirect the DNS traffic of the legitimate CPE to one of its server. In return, the DNS Servers would be able to provide DNS Responses and redirect the End Users on malicious Servers. This is particularly used in Pharming Attacks. A third attack may consists in isolating a Home Network by misconfiguring the Naming Delegation for example to a non-existing DNS Server, or with a bad DS value. 8.3. CPEs are sensitive to DoS The Naming Delegation Architecture involves the CPE that hosts a DNS Server for the Home Network. CPE have not been designed for handling heavy load. The CPE are exposed on the Internet, and their IP address is publicly published on the Internet via the DNS. This makes the Home Network sensitive to Deny of Service Attacks. The Naming Delegation Architecture described in this document does not address this issue. The issue is addressed by [I-D.mglt-homenet-front-end-naming-delegation]. 9. Acknowledgment 10. References 10.1. Normative References [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", STD 13, RFC 1034, November 1987. [RFC1035] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, November 1987. Migault (Ed), et al. Expires January 06, 2014 [Page 12] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS Specification", RFC 2181, July 1997. [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and M. Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", RFC 3315, July 2003. [RFC4301] Kent, S. and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301, December 2005. [RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen, "Internet Key Exchange Protocol Version 2 (IKEv2)", RFC 5996, September 2010. [RFC6672] Rose, S. and W. Wijngaards, "DNAME Redirection in the DNS", RFC 6672, June 2012. 10.2. Informational References [I-D.mglt-homenet-front-end-naming-delegation] Migault, D., Cloetens, W., Lemordant, P., and C. Griffiths, "IPv6 Home Network Front End Naming Delegation", draft-mglt-homenet-front-end-naming- delegation-01 (work in progress), November 2012. [I-D.sury-dnsext-cname-dname] Sury, O., "CNAME+DNAME Name Redirection", draft-sury- dnsext-cname-dname-00 (work in progress), April 2010. Authors' Addresses Daniel Migault Francetelecom - Orange 38 rue du General Leclerc 92794 Issy-les-Moulineaux Cedex 9 France Phone: +33 1 45 29 60 52 Email: mglt.ietf@gmail.com Migault (Ed), et al. Expires January 06, 2014 [Page 13] Internet-Draft DHCP DNS Public Auth. Server Option July 2013 Wouter Cloetens SoftAtHome vaartdijk 3 701 3018 Wijgmaal Belgium Email: wouter.cloetens@softathome.com Chris Griffiths Dyn 150 Dow Street Manchester, NH 03101 US Email: cgriffiths@dyn.com URI: http://dyn.com Ralf Weber Nominum 2000 Seaport Blvd #400 Redwood City, CA 94063 US Email: ralf.weber@nominum.com URI: http://www.nominum.com Migault (Ed), et al. Expires January 06, 2014 [Page 14]