[dhcwg] Methods of protecting DHCP relay-agent information options

John Schnizlein <jschnizl@cisco.com> Mon, 24 February 2003 21:33 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA27257 for <dhcwg-archive@odin.ietf.org>; Mon, 24 Feb 2003 16:33:18 -0500 (EST)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id h1OLg0226581 for dhcwg-archive@odin.ietf.org; Mon, 24 Feb 2003 16:42:00 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h1OLg0p26578 for <dhcwg-web-archive@optimus.ietf.org>; Mon, 24 Feb 2003 16:42:00 -0500
Received: from www1.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA27244 for <dhcwg-web-archive@ietf.org>; Mon, 24 Feb 2003 16:32:47 -0500 (EST)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h1OLdap26459; Mon, 24 Feb 2003 16:39:36 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h1OLcLp26351 for <dhcwg@optimus.ietf.org>; Mon, 24 Feb 2003 16:38:21 -0500
Received: from sj-msg-core-3.cisco.com (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA27134 for <dhcwg@ietf.org>; Mon, 24 Feb 2003 16:29:08 -0500 (EST)
Received: from jschnizl-w2k.cisco.com (rtp-vpn2-224.cisco.com [10.82.240.224]) by sj-msg-core-3.cisco.com (8.12.2/8.12.6) with ESMTP id h1OLWnB7018432 for <dhcwg@ietf.org>; Mon, 24 Feb 2003 13:32:49 -0800 (PST)
Message-Id: <4.3.2.7.2.20030224161059.045e2d00@wells.cisco.com>
X-Sender: jschnizl@wells.cisco.com
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2
Date: Mon, 24 Feb 2003 16:16:07 -0500
To: dhcwg@ietf.org
From: John Schnizlein <jschnizl@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [dhcwg] Methods of protecting DHCP relay-agent information options
Sender: dhcwg-admin@ietf.org
Errors-To: dhcwg-admin@ietf.org
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Id: <dhcwg.ietf.org>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>

This is the summary I promised in Atlanta.

Two methods to protect the contents of the relay-agent information option (RAIO) have been proposed: (1) encapsulating the DHCP message in IPsec (RA-IPsec) [draft-droms-dhcp-relay-agent-ipsec-00.txt] and (2) including a message authentication sub-option (AuthSO) [draft-ietf-dhc-auth-suboption-01.txt] similar to the authentication option for protecting options between clients and servers [RFC 3118]. Which method is suitable depends on different circumstances.

Both methods employ keyed message authentication codes, and require distribution of key material. Both methods must also support the separate insertion of RAIO by a "trusted" device closer to the client and GIADDR by a subsequent relay agent, specified in section 2.1 of RFC 3046. AuthSO accommodates this separation the same way that RFC 3118 does, by excluding mutable fields from the integrity computation. Because RA-IPsec necessarily covers the entire message, it must establish IPsec security associations (SA) between each pair of relay agents in the path as well as the SA between the last relay agent and the DHC server. In circumstances where the deployment of DHCP involves this separation of relay-agent function, the RA-IPsec method would entail more configuration of these SAs than the equivalent key management for AuthSO.

In circumstances where the "trusted" device requires protection for RAIO, and does not already have the machinery for IPsec Encapsulating Security Payload the AuthSO method might entail less implementation than RA-IPsec. Where IPsec is already in all relay agents, the IPsec method would avoid implementing AuthSO.

IPsec is based on existing protocols and technology, and can leverage key distribution mechanisms and other future improvements.


_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www1.ietf.org/mailman/listinfo/dhcwg