[OPSEC] BCP 199, RFC 7610 on DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers

rfc-editor@rfc-editor.org Thu, 20 August 2015 22:34 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A99C11B2C7C; Thu, 20 Aug 2015 15:34:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.912
X-Spam-Level:
X-Spam-Status: No, score=-106.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rM2hAeS8qgqs; Thu, 20 Aug 2015 15:34:51 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) by ietfa.amsl.com (Postfix) with ESMTP id CC53C1B2C97; Thu, 20 Aug 2015 15:34:48 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id AC6CA180207; Thu, 20 Aug 2015 15:34:20 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
X-PHP-Originating-Script: 1005:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Message-Id: <20150820223420.AC6CA180207@rfc-editor.org>
Date: Thu, 20 Aug 2015 15:34:20 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/opsec/JZiRecJ3PfiXrIpGTmPb_dVrnhA>
Cc: opsec@ietf.org, rfc-editor@rfc-editor.org
Subject: [OPSEC] BCP 199, RFC 7610 on DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Aug 2015 22:34:52 -0000

A new Request for Comments is now available in online RFC libraries.

        BCP 199        
        RFC 7610

        Title:      DHCPv6-Shield: Protecting against Rogue DHCPv6 
                    Servers 
        Author:     F. Gont, W. Liu, G. Van de Velde
        Status:     Best Current Practice
        Stream:     IETF
        Date:       August 2015
        Mailbox:    fgont@si6networks.com, 
                    liushucheng@huawei.com, 
                    gunter.van_de_velde@alcatel-lucent.com
        Pages:      12
        Characters: 26119
        See Also:   BCP 199

        I-D Tag:    draft-ietf-opsec-dhcpv6-shield-08.txt

        URL:        https://www.rfc-editor.org/info/rfc7610

        DOI:        http://dx.doi.org/10.17487/RFC7610

This document specifies a mechanism for protecting hosts connected to
a switched network against rogue DHCPv6 servers.  It is based on
DHCPv6 packet filtering at the layer 2 device at which the packets
are received.  A similar mechanism has been widely deployed in IPv4
networks ('DHCP snooping'); hence, it is desirable that similar
functionality be provided for IPv6 networks.  This document specifies
a Best Current Practice for the implementation of DHCPv6-Shield.

This document is a product of the Operational Security Capabilities for IP Network Infrastructure Working Group of the IETF.


BCP: This document specifies an Internet Best Current Practices for the
Internet Community, and requests discussion and suggestions for 
improvements. Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/rfc.html

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC