[dhcwg] *DRAFT* Minutes from dhc WG meeting at IETF 57

Ralph Droms <rdroms@cisco.com> Wed, 30 July 2003 10:32 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA26170; Wed, 30 Jul 2003 06:32:09 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19hoEY-0003tt-L5; Wed, 30 Jul 2003 06:31:02 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19hoEK-0003tJ-Gg for dhcwg@optimus.ietf.org; Wed, 30 Jul 2003 06:30:48 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA26121 for <dhcwg@ietf.org>; Wed, 30 Jul 2003 06:30:41 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19hoEF-0006dt-00 for dhcwg@ietf.org; Wed, 30 Jul 2003 06:30:43 -0400
Received: from sj-core-4.cisco.com ([171.68.223.138]) by ietf-mx with esmtp (Exim 4.12) id 19hoEA-0006dq-00 for dhcwg@ietf.org; Wed, 30 Jul 2003 06:30:42 -0400
Received: from flask.cisco.com (IDENT:mirapoint@flask.cisco.com [161.44.122.62]) by sj-core-4.cisco.com (8.12.6/8.12.6) with ESMTP id h6UAU8pp002531 for <dhcwg@ietf.org>; Wed, 30 Jul 2003 03:30:09 -0700 (PDT)
Received: from rdroms-w2k01.cisco.com (sjc-vpn1-155.cisco.com [10.21.96.155]) by flask.cisco.com (Mirapoint Messaging Server MOS 3.3.3-GR) with ESMTP id ABC21710; Wed, 30 Jul 2003 06:30:06 -0400 (EDT)
Message-Id: <4.3.2.7.2.20030730062737.04270d38@funnel.cisco.com>
X-Sender: rdroms@funnel.cisco.com
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2
Date: Wed, 30 Jul 2003 06:29:59 -0400
To: dhcwg@ietf.org
From: Ralph Droms <rdroms@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Subject: [dhcwg] *DRAFT* Minutes from dhc WG meeting at IETF 57
Sender: dhcwg-admin@ietf.org
Errors-To: dhcwg-admin@ietf.org
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Id: <dhcwg.ietf.org>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>

Here is a draft of minutes from the dhc WG meeting at IETF 57 in 
Vienna.  Please review and comment by 9AM EDT, Monday Aug 4.

- Ralph

=====

		       dhc WG minutes, IETF 57
			       (DRAFT)


DHCP PXE Suboptions                                Ralph Droms
<draft-johnston-pxe-options-00.txt>

    This document was prompted by the review of unused DHCP option
    codes.  It documents the three options Intel defined for use by the
    "Pre-Boot Execution" (PXE) protocols.  The history of these options
    is that they were brought to the dhc WG several years ago, but no
    specification was ever published.

    The WG agreed to take the document as a WG work item.  There was
    some discussion about whether to publish the document as standards
    track or informational.  After a review of the history of the
    document, the consensus was to publish the document as
    informational.

Site Specific Options for DHCP for IPv6            Ralph Droms
<draft-volz-dhc-dhcpv6-site-options-00.txt>

    Droms reviewed this document for the author, Bernie Volz.  The
    document reserves some DHCPv6 option codes for use as site-specific
    options (like option codes 128-254 in DHCPv4).  The WG agreed to
    take the document as a work item, for standards track publication.

Vendor-Identifying Vendor Options for DHCPv4       Ralph Droms
<draft-littlefield-dhcp-vendor-00.txt>

    Droms reviewed this document for the author, Josh Littlefield.  The
    document defines new vendor-specific options in which the vendor
    (the option namespace) is identified in the option itself, rather
    than implicitly from the vendor class option.  Droms cited DOCSIS
    devices, which need DOCSIS defined options as well as vendor
    defined options, as a use case.  The WG agreed to take the document
    as a work item, for standards track publication.

IPv4 Network Attachment Detection                  Bernard Aboba
<draft-aboba-dhc-nad-ipv4-00.txt>

    Based on research into problems related to recognition of network
    attachment and assignment of IPv4 link-local addresses (IPv4LL),
    Aboba published this document, which summarizes his findings about
    hints a host can use to determine network attachment and problems
    with current IPv4LL assignment mechanisms.  The document also
    points out some details in RFC 2131 that need clarification.  This
    presentation preceded the dna ("Detecting Network Attachment") BOF,
    where the document was also scheduled to be discussed.  There was
    consensus to work with the dna BOF (and WG, if one is formed) to
    develop input to the IPv4LL specification from the zeroconf WG.

DHCPv4 Threat Analysis                             Carl Smith
<draft-ietf-dhc-v4-threat-analysis-00.txt>

    Smith conducted a final review of this document; ready for WG last
    call.  The following three documents all address the requirements
    and issues from the threat analysis.

RFC3118 Delayed Authentication Using PANA          H. Tschofenig
<draft-tschofenig-pana-bootstrap-rfc3118-00.txt>

    This document describes a mechanism for establishing a DHCP SA
    (between client and server) through PANA (assuming PANA is invoked
    before DHCP).  The scenario is:

       * host establishes SA with PANA
       * PAA does key distribution to host and DHCP server
       * host and server use key for authenticated DHCP

    There was some discussion about the mechanism through which the PAA
    would get keying information to the DHCP participants.  The WG
    requested that the draft be revised to provide additional detail,
    and will reconsider the draft after the revisions are published.

DHCP RSA/DSA Authentication using DNS KEY records  Ted Lemon
<draft-ietf-dhc-auth-sigzero-00.txt>

    This document describes a mechanism for authentication of DHCP
    messages through public keys in SIG(0) RRs.  Olafur Gudmundsson (as
    chair of dnsext WG) opined that use of SIG(0) for DHCP
    authentication would be an acceptable use of the key in a SIG(0)
    RR.  It was noted that this mechanism would require the DHCP
    servers to have a SIG(0) RR, in addition to the hosts (which
    presumably would have a SIG(0) RR for DDNS).  There was a request
    for more detail about the protocol in the document, especially a
    sketch of the participants and message exchanges.  Also, this
    mechanism provides only authentication, not authorization.

Flexible Authentication for DHCP Messages          Ralph Droms
<draft-gupta-dhcp-auth-02.txt>

    Very few members of the WG had read this draft.  Discussion will be
    continued on the WG mailing list.

DHCP-DDNS interaction                              Ralph Droms
<draft-ietf-dhc-ddns-resolution-05.txt>
<draft-ietf-dhc-fqdn-option-05.txt>
<draft-ietf-dnsext-dhcid-rr-06.txt>

    The WG came to consensus on the resolutions in the following list
    of issues (which had been discussed in the dhc and dnsext WG
    mailing lists):

    * Reserve DHCID RR for DHCP participants (1, 2): yes, reserve for
      DHCP
    * Interaction between DHCPv4 and DHCPv6 needs to be defined (3):
      participant does lookup first to determine type of DHCID RR and
      then acts on that type
    * FQDN should carry 12 bit RCODES (4): no, for backward
      compatibility
    * Internationalization (5): no changes to protocol; add references
      to internationalization RFC
    * RR TTLs need careful attention (6): rationale and recommendations
      to be clarified and moved to appendix


_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www1.ietf.org/mailman/listinfo/dhcwg