[rfc-dist] RFC 8910 on Captive-Portal Identification in DHCP and Router Advertisements (RAs)

rfc-editor@rfc-editor.org Tue, 22 September 2020 04:03 UTC

Return-Path: <rfc-dist-bounces@rfc-editor.org>
X-Original-To: ietfarch-rfc-dist-archive@ietfa.amsl.com
Delivered-To: ietfarch-rfc-dist-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 655373A12A9 for <ietfarch-rfc-dist-archive@ietfa.amsl.com>; Mon, 21 Sep 2020 21:03:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.9
X-Spam-Level:
X-Spam-Status: No, score=-2.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MAILING_LIST_MULTI=-1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0m-9iWcmRefX for <ietfarch-rfc-dist-archive@ietfa.amsl.com>; Mon, 21 Sep 2020 21:03:54 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D773C3A12F3 for <rfc-dist-archive-yuw6Xa6hiena@ietf.org>; Mon, 21 Sep 2020 21:03:52 -0700 (PDT)
Received: from rfcpa.amsl.com (localhost [IPv6:::1]) by rfc-editor.org (Postfix) with ESMTP id 8AEF9F4077E; Mon, 21 Sep 2020 21:03:34 -0700 (PDT)
X-Original-To: rfc-dist@rfc-editor.org
Delivered-To: rfc-dist@rfc-editor.org
Received: by rfc-editor.org (Postfix, from userid 30) id 011E9F4077C; Mon, 21 Sep 2020 21:03:33 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
X-PHP-Originating-Script: 1005:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Message-Id: <20200922040333.011E9F4077C@rfc-editor.org>
Date: Mon, 21 Sep 2020 21:03:33 -0700
Subject: [rfc-dist] RFC 8910 on Captive-Portal Identification in DHCP and Router Advertisements (RAs)
X-BeenThere: rfc-dist@rfc-editor.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: RFC Announcements <rfc-dist.rfc-editor.org>
List-Unsubscribe: <https://www.rfc-editor.org/mailman/options/rfc-dist>, <mailto:rfc-dist-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <http://www.rfc-editor.org/pipermail/rfc-dist/>
List-Post: <mailto:rfc-dist@rfc-editor.org>
List-Help: <mailto:rfc-dist-request@rfc-editor.org?subject=help>
List-Subscribe: <https://www.rfc-editor.org/mailman/listinfo/rfc-dist>, <mailto:rfc-dist-request@rfc-editor.org?subject=subscribe>
Cc: drafts-update-ref@iana.org, captive-portals@ietf.org, rfc-editor@rfc-editor.org
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: rfc-dist-bounces@rfc-editor.org
Sender: rfc-dist <rfc-dist-bounces@rfc-editor.org>

A new Request for Comments is now available in online RFC libraries.

        
        RFC 8910

        Title:      Captive-Portal Identification in DHCP and 
                    Router Advertisements (RAs) 
        Author:     W. Kumari,
                    E. Kline
        Status:     Standards Track
        Stream:     IETF
        Date:       September 2020
        Mailbox:    warren@kumari.net, 
                    ek@loon.com
        Pages:      11
        Obsoletes:  RFC 7710
        Updates:    RFC 3679

        I-D Tag:    draft-ietf-capport-rfc7710bis-10.txt

        URL:        https://www.rfc-editor.org/info/rfc8910

        DOI:        10.17487/RFC8910

In many environments offering short-term or temporary Internet access
(such as coffee shops), it is common to start new connections in a
captive portal mode. This highly restricts what the user can do until
the user has satisfied the captive portal conditions.

This document describes a DHCPv4 and DHCPv6 option and a Router
Advertisement (RA) option to inform clients that they are behind some
sort of captive portal enforcement device, and that they will need to
satisfy the Captive Portal conditions to get Internet access. It is
not a full solution to address all of the issues that clients may
have with captive portals; it is designed to be one component of a
standardized approach for hosts to interact with such portals. While
this document defines how the network operator may convey the captive
portal API endpoint to hosts, the specific methods of satisfying and
interacting with the captive portal are out of scope of this
document.

This document replaces RFC 7710, which used DHCP code point 160. Due
to a conflict, this document specifies 114.  Consequently, this
document also updates RFC 3679.

This document is a product of the Captive Portal Interaction Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC
_______________________________________________
rfc-dist mailing list
rfc-dist@rfc-editor.org
https://www.rfc-editor.org/mailman/listinfo/rfc-dist
http://www.rfc-editor.org