diff options
author | Ted Lemon <source@isc.org> | 1996-02-26 09:37:16 +0000 |
---|---|---|
committer | Ted Lemon <source@isc.org> | 1996-02-26 09:37:16 +0000 |
commit | 05da297846b0e057cb52c1ef2bfd93d59e7090e4 (patch) | |
tree | 0f684597780164c6835a5cc6172261cff154c24c /doc | |
parent | 445b21f78cf3be4e87a2610e1aef3f2e308ffc99 (diff) | |
download | isc-dhcp-05da297846b0e057cb52c1ef2bfd93d59e7090e4.tar.gz |
New option docs; remove obsolete docs
Diffstat (limited to 'doc')
-rw-r--r-- | doc/dhc-minutes-94dec.txt | 188 | ||||
-rw-r--r-- | doc/dns-minutes-93nov.txt | 267 | ||||
-rw-r--r-- | doc/draft-ietf-dhc-new-options-00.txt | 110 | ||||
-rw-r--r-- | doc/draft-ietf-dhc-options-04.txt | 62 | ||||
-rw-r--r-- | doc/draft-ietf-dhc-options-opt127-01.txt | 111 | ||||
-rw-r--r-- | doc/draft-ietf-dnsind-dynDNS-00.txt | 1254 | ||||
-rw-r--r-- | doc/draft-ohta-dynamic-dns-00.txt | 5 | ||||
-rw-r--r-- | doc/rfc1533.txt | 1683 |
8 files changed, 283 insertions, 3397 deletions
diff --git a/doc/dhc-minutes-94dec.txt b/doc/dhc-minutes-94dec.txt deleted file mode 100644 index a1beb766..00000000 --- a/doc/dhc-minutes-94dec.txt +++ /dev/null @@ -1,188 +0,0 @@ - -CURRENT_MEETING_REPORT_ - -Reported by Walt Wimer/CMU - -Minutes of the Dynamic Host Configuration Working Group (DHC) - -The DHC Working Group met on 7 December and 9 December at the 31st IETF. - - -Document Status - -The most recent Internet-Draft of the DHCP specification includes -several changes based on the results of the latest interoperability -testing. Based on the results of that testing, and a review of the -Standards process RFC, the working group decided it would be appropriate -to ask that DHCP be considered for ``Draft Standard'' status. As soon -as a revision of the current Internet-Draft is completed, the -specification for DHCP will be submitted for review. - -A few, minor changes have been made to RFC 1541 based on questions -raised during the latest interoperability testing. Two new options have -been defined since RFC 1533: 62, NetWare/IP domain and 63, NetWare/IP -option. - -The working group agreed that the minimum lease requirement (one hour) -should be made advisory rather than mandatory. - - -Implementations - -The following list of implementations was compiled from information -given by working group attendees. - - _____________________________________________________________________ - || | | | || - || Vendor |Client |Server |Relay agent || - ||___________________|___________________|_______________|_____________|| - || FTP Software |DOS/Windows |Windows | || - ||___________________|___________________|NT_(beta)______|_____________|| - || SunSoft |DOS/Windows |Solaris 2.0 |in server || - ||___________________|Solaris_(beta?)____|_______________|_____________|| - || Microsoft |DOS/Windows |NT |in server || - || |NT | | || - ||___________________|Windows95_beta_____|_______________|_____________|| - || Competitive |??? |Solaris | || - ||_Automation________|___________________|_______________|_____________|| - || Apple |Newton | | || - ||___________________|Mac_(beta)_________|_______________|_____________|| - || WIDE project |Unix, BSD386 |Unix, BSD386 |Unix, BSD386 || - ||_(free,_avail_2/95)|News,_SunOS________|News,_SunOS____|News,_SunOS_ || - ||_Silicon_Graphics__|IRIX_(soon)________|IRIX___________|_____________|| - || Hewlett Packard |X-terminal |HP/UX (June 95)|in server || - ||___________________|___________________|_______________|HP_router____|| - || IBM |OS/2 (soon) |OS/2 (soon) | || - || |AIX (soon) |AIX (soon) | || - ||___________________|___________________|AS/400_(soon)__|_____________|| - || cisco Systems |Terminal server? | |routers || - || |(proxy for | | || - ||___________________|terminal_clients?)_|_______________|_____________|| - || Novell |NetWare/IP |NetWare/IP | || - ||___________________|(spring)___________|(later)________|_____________|| - || Shiva |Proxy for | | || - ||___________________|dial-in_clients____|_______________|_____________|| - - -Future Interoperability Test - -There was some discussion of a future interoperability test. Suggested -venues include Bucknell University (summer '95), CMU (no specific time), -next IETF (March '95) and remote via the Internet (?!?!). The working -group will hold a discussion about the next interoperability testing via -electronic mail. - - -Outstanding Issues - -The working group discussed some outstanding issues and generated some -solutions: - - - o New options: TFTP server address, bootfile name, to be registered - with IANA. - - o Some clients will already have an IP address, not otherwise - registered or managed by DHCP. Those clients will only want local - configuration parameters, not an address. A new DHCP message, - DHCPINFORM, will be defined for parameter requests. - - o There was some question about the definition and interpretation of - ``client identifiers.'' The working group confirmed that a - ``client identifier'' is an opaque, unique identifier. Text will - be added to the protocol specification to clarify this issue and to - advise that ``client identifiers'' must be unique. ``Client - identifier'' type 0 will indicate ``an opaque string of - characters.'' - - -The issue of security was discussed. The primary concern is to detect -and avoid spoof/unauthorized servers. Some sites are also concerned -about unauthorized clients. The consensus was that a public key -identification and authorization mechanism should be developed as an -optional DHCP service. - -Ralph Droms presented a preliminary proposal for a server-server -protocol to allow automatic management of DHCP bindings by multiple DHCP -servers at a single site. The goals are to increase availability and -reliability through redundancy of address allocation and binding -servers, and through load sharing. The basic model, based on a proposal -by Jeff Mogul, is to assign each allocatable address and allocated -binding to a specific ``owner'' server. That owner has modification -privileges, while all other servers have read-only privileges. Servers -use TCP connections and a simple protocol to replicate copies of new -bindings and transfer ownership of addresses to balance the pool of -available addresses. - -The hard part is bindings that are released early, prior to expiration. -Those released bindings must be reported to all other servers, so those -servers do not respond with stale data in the future. However, servers -may be inaccessible. The proposed solution was to add an ``owner'' -option; clients would select responses from the ``owner'' in favor of -all other responses. - -The suggestion was made that multiple DHCP servers might be able to use -an underlying distributed database like DNS, NIS+ or Oracle. Questions -were raised about the scalability of the proposed scheme -- suppose many -clients send simultaneous update requests, how often should updates be -replicated, what about combinatoric explosion with the number of -servers? - - -IPv6 Issues - -The second meeting began with a discussion of several IPv6 issues. IPv6 -address configuration has three basic forms: - - - 1. Intra-link scope address (client forms address all on its own) - - 2. ``Stateless'' servers (e.g., in routers using some simple - assignment algorithm) - 3. Stateful servers (`a la IPv4 DHCP) - - -Regardless of how addresses are managed, IPv6 will need some other -mechanism(s) to obtain other configuration parameters. Some members of -the IPv6 design team claim there will be no other parameters. - -The following action items were identified: - - - o Someone to enumerate all IPv6 network layer parameters. - Mike Carney volunteered. - - o Extensions/changes to DHCP protocol format for IPv6. - Walt Wimer volunteered. - - -Dynamic Addressing - -Next, the working group discussed the problem of dynamic updates to DNS -from DHCP information (dynamic addressing). For simple registration of -DNS hostnames for individual DHCP clients, what should we do? Should -client be responsible for contacting DNS server directly, or should DHCP -server contact DNS on behalf of client? It will be necessary to clarify -DNS configuration/update mechanism with DNS Working Group. One solution -to the question of who does the update would be to define a DHCP option -for client to say whether it will do the registration with DNS directly -or whether client wants DHCP server to take care of it. DHCP server may -need a way to veto the client's preference. This permits a simple -client (such as an embedded hub, probe, etc.) to let the DHCP server do -everything (DHCP server probably has necessary credentials to update DNS -while client probably does not). Or, a more sophisticated client can -update its ``home'' DNS directly (for example, a mobile notebook -computer belonging to XYZ, Inc. can be taken to an IETF get a local IP -address from the IETF DHCP server, but then directly update XYZ.COM's -DNS server in order to maintain an XYZ.COM name). The problem of name -collisions was unresolved - should the client or the server be -responsible? Masataka Ohta volunteered to do a DHCP-to-DNS interaction -proposal - - -DHCP and SNMP - -Finally, the working group considered DHCP and SNMP. The working group -chair asked if there were any MIB writers in the audience. The scribe -thought there was a volunteer but did not catch the name. - diff --git a/doc/dns-minutes-93nov.txt b/doc/dns-minutes-93nov.txt deleted file mode 100644 index aa028020..00000000 --- a/doc/dns-minutes-93nov.txt +++ /dev/null @@ -1,267 +0,0 @@ - -CURRENT_MEETING_REPORT_ - -Reported by Rob Austein/Epilogue Technology - -Minutes of the Domain Name System Working Group (DNS) - - -Documents - -Three new DNS-related Informational RFCs have come out recently. -RFC 1535 (also known as ``the EDU.COM emergency RFC'') details problems -with a widely-used but ill-advised DNS search heuristic, and proposes a -solution. RFC 1536 details common DNS implementation errors, with -proposed solutions; this document was accepted as a DNS Working Group -project at the 27th IETF (Amsterdam), completed, and accepted on the -mailing list. RFC 1537 details common DNS configuration errors; while -it was never formally accepted as a DNS Working Group document, it was -reviewed by the working group members. These three RFCs are closely -related and cross-reference each other, so, on advice of the RFC Editor, -the DNS Working Group Chair approved ``fast track'' publication of these -documents on behalf of the Working Group. If anybody has serious -problems with these documents, blame it on the Chair. - -Dave Perkins reported on the current status of the DNS MIB documents on -behalf of the Network Management Area Directorate (NMDIR). Basically, -there are no remaining hard problems, just some remaining detail work. -One of the authors, Rob Austein, has received a detailed list of -remaining concerns, none of which appear to be show-stoppers. It should -be possible to get these documents out the door before the 29th IETF in -Seattle. Dave pointed out two design issues that are not objections but -of which he thinks the DNS Working Group should be aware: - - - 1. Due to SNMP protocol limitations, the length limits on DNS names - used as indices to ``conceptual tables'' in the MIBs will be - shorter than the DNS name length limit of 255 octets. Based on - analysis of current usage, this should not be a problem, so we'll - flag it with a warning statement in the document but otherwise - leave it alone. - 2. The most recent versions of the documents (not yet released as - Internet-Drafts) use the SNMPv2 SMI rather than the SNMPv1 SMI, in - order to clear up some problems with unsigned 32-bit integers. - NMDIR wants to be sure that the DNS Working Group realizes that - this means only SNMPv2-capable implementations will be able to use - these MIBs. - - -DNS Security Sub-Group - -James Galvin gave a report on the meeting held by the DNS Security -``sub-group'' (a spin off from the DNS Working Group at the 26th IETF in -Columbus). - - - The DNS Security design team of the DNS Working Group met for - one morning at the Houston IETF. The discussion began with a - call for threats that the members of the group were most - concerned about. The list included the following: - - o disclosure of the data - some expressed a desire to be - able to encrypt the data in responses - - o modification of the data - - o masquerade of the origin of the data - - o masquerade of a secondary - some expressed a desire to be - able to reliably identify both peers in a zone transfer; - this would provide the basis for controlling access to - zone transfers - - During the discussion of these threats it was agreed to accept - the following assumptions: - - 1. DNS data is ``public'' - 2. backward/co-existence compatibility is required - - With respect to the first, accepting it set aside any further - discussion of the threat of disclosure of the data. The second - assumption is included explicitly to remind everyone that we do - not want parallel DNS systems in the Internet. - In addition, it was explicitly agreed that we would not address - authentication of secondaries or access control issues. Thus, - the current list of desired security services is: - - o data integrity - o data origin authentication - - It was noted that a digital signature mechanism would support - the desired services. - The meeting continued with a brainstorming period during which - the desired functional requirements of a secure DNS were - collected. This list does not represent mandatory - functionality but, rather, it is desired functionality. It was - agreed that this list was subject to discussion on the mailing - list for a period of time that would conclude on November 30. - The requirements are listed here in no particular order. - - o sites must be able to support at least their internal - users in the presence of external network failures - - o it should be possible for a site to pre-configure other - authoritative servers without having to query the - ``system'' to find the server - - o it should be possible to request services only from - security enhanced servers, only from non-security enhanced - servers, or to indicate that either is acceptable - - o it should be possible to recognize security enhanced - responses - - o it should be possible to assign cryptographic keys (make - use of the security services) to leaf nodes in the DNS - tree, i.e., fully qualified domain names - - o it should be possible to not trust secondary servers - - o a mechanism must exist for revoking cryptographic keys - that works within the DNS time-to-live framework - - o security services should be supported with no additional - DNS queries beyond what would be required if security was - not supported - - o it must be possible to ensure that cached data expires - according to its TTL - - The meeting concluded with agreement on the following three - milestones. - - 1. The desired functional requirements are to be reviewed and - agreed upon by November 30. - - 2. Strawman proposals that meet as many of the desired - requirements as possible are due by January 31, 1994. - - 3. The group would produce a single, draft proposal at the - next IETF meeting, March 1994. - - - -The DNS Security effort will be spun off as a separate working group in -the Service Applications Area (SAP), as soon as James can get the -charter approved. The DNS Security mailing list is -dns-security@tis.com; requests to subscribe should be sent to -dns-security-request@tis.com. - -Discussion of the incremental zone transfer protocol -(draft-ietf-dns-ixfr-00.txt) was deferred because none of the authors -were present at the meeting. Comments on this draft should be sent to -the authors and/or the Namedroppers mailing list. - - - -DNS Efforts to Support SIPP - -Sue Thomson gave a brief report on current DNS efforts to support SIPP -(the merger of the SIP and PIP proposals). See the latest version of -the Internet-Draft, draft-ietf-sip-sippdns-nn.txt, for details. - - -DNS Reliability Issues - Boeing - -Ed King gave a presentation on DNS reliability issues in Boeing's -production environment. Ed has to support DNS on a corporate network -with thousands of subnets and DNS software from many vendors in a -production environment that never shuts down and where an interruption -to DNS services due to a power hit can leave hundreds of engineers -sitting idle waiting for their workstations to finish booting. Much of -the problem is that each vendor has their own slightly different (and -often more than slightly broken) interface between DNS, local host -tables, and the vendor's own pet name resolution mechanism. Replacing -or repairing all the DNS software in an environment isn't economically -feasible, so the most constructive approach seems to be to write a ``DNS -Requirements'' document to use as a reference when pressuring vendors to -fix their DNS implementations. The DNS portion of the Host Requirements -documents (RFC 1123 section 6.1) and the newly published DNS ``Common -Errors'' Informational RFCs are good starting points, but companies like -Boeing need a document that has the force of a standard and that goes -into more detail on interface design issues than Host Requirements does. - -No definite decision was reached as a result of Ed's presentation, but -watch Namedroppers for further discussion and probably a call to form a -working group. - - -DNS Support for DHC and Mobile Hosts - -Masataka Ohta gave a presentation on a possible way to implement some of -the DNS support needed for dynamic host configuration and mobile hosts. -The presentation went into more detail than there is room for in these -minutes, so expect to see a summary of this on the Namedroppers list. - - -The Future of the DNS Working Group - -Dave Crocker spoke about the future of the DNS Working Group. As has -been discussed at previous meetings, the DNS Working Group as currently -organized doesn't really fit well into the current IETF organizational -framework. Accordingly, Dave asks that DNS reorganize itself more along -the current IETF pattern. The proposal is to move the ``permanent'' -functions of the DNS Working Group (DNS oversight within the IETF, -mostly) into the SAP Area Directorate, that Dave will be forming ``Real -Soon Now,'' while reincarnating specific closed-ended tasks as separate -working groups within the SAP Area. The SAP Area Directorate will hold -open meetings at regular intervals, so that there will still be a forum -for overall DNS design work. For formal purposes, the current DNS -Working Group will probably be retroactively construed as having been -the DNS MIB Working Group, and will be closed down as soon as the DNS -MIB documents hit the streets. As a practical matter, and in the -Chair's opinion, the current DNS Working Group will effectively -reconstitute itself as the attendees of the DNS portion of the SAP Area -Directorate open meetings. Dave expects to have the reorganization -completed by the 29th IETF in Seattle. - -The discussion that followed Dave's statement made it clear that there -are people with strong feelings on both sides of this issue (keep the -DNS Working Group as it is versus reorganize per Dave's plan). Unless -somebody feels strongly enough about this to make a formal appeal, the -reorganization will probably go through. - - -Attendees - -Steve Alexander stevea@lachman.com -Garrett Alexander gda@tycho.ncsc.mil -Robert Austein sra@epilogue.com -Anders Baardsgaad anders@cc.uit.no -Alireza Bahreman bahreman@bellcore.com -William Barns barns@gateway.mitre.org -Stephen Crocker crocker@tis.com -Donald Eastlake dee@skidrow.lkg.dec.com -Havard Eidnes havard.eidnes@runit.sintef.no -Erik Fair fair@apple.com -Roger Fajman raf@cu.nih.gov -Patrik Faltstrom paf@nada.kth.se -Antonio Fernandez afa@thumper.bellcore.com -James Fielding jamesf@arl.army.mil -James Galvin galvin@tis.com -Chris Gorsuch chrisg@lobby.ti.com -Ronald Jacoby rj@sgi.com -Rick Jones raj@cup.hp.com -Charlie Kaufman kaufman@zk3.dec.com -Elizabeth Kaufman kaufman@biomded.med.yale.edu -Stephen Kent kent@bbn.com -Edwin King eek@atc.boeing.com -Paul Lambert paul_lambert@email.mot.com -Walter Lazear lazear@gateway.mitre.org -Lars-Johan Liman liman@ebone.net -John Linn linn@security.ov.com -Jun Matsukata jm@eng.isas.ac.jp -Paul Mockapetris pvm@darpa.mil -Sath Nelakonda sath@lachman.com -Masataka Ohta mohta@cc.titech.ac.jp -Michael Patton map@bbn.com -Jon Postel postel@isi.edu -Jeffrey Schiller jis@mit.edu -Richard Schmalgemeier rgs@merit.edu -Michael St. Johns stjohns@arpa.mil -John Stewart jstewart@cnri.reston.va.us -Theodore Ts'o tytso@mit.edu -Walter Wimer walter.wimer@andrew.cmu.edu -David Woodgate David.Woodgate@its.csiro.au -Weiping Zhao zhao@nacsis.ac.jp - diff --git a/doc/draft-ietf-dhc-new-options-00.txt b/doc/draft-ietf-dhc-new-options-00.txt new file mode 100644 index 00000000..adf332a5 --- /dev/null +++ b/doc/draft-ietf-dhc-new-options-00.txt @@ -0,0 +1,110 @@ + +Network Working Group R. Droms +INTERNET DRAFT Bucknell University +Obsoletes: February 1996 + Expires August 1996 + + + Procedure for Defining New DHCP Options + <draft-ietf-dhc-new-options-00.txt> + +Status of this memo + + This document is an Internet-Draft. Internet-Drafts are working + documents of the Internet Engineering Task Force (IETF), its areas, + and its working groups. Note that other groups may also distribute + working documents as Internet-Drafts. + + Internet-Drafts are draft documents valid for a maximum of six months + and may be updated, replaced, or obsoleted by other documents at any + time. It is inappropriate to use Internet-Drafts as reference + material or to cite them other than as ``work in progress.'' + + To learn the current status of any Internet-Draft, please check the + ``1id-abstracts.txt'' listing contained in the Internet-Drafts Shadow + Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), + munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or + ftp.isi.edu (US West Coast). + +Abstract + + The Dynamic Host Configuration Protocol (DHCP) provides a + framework for passing configuration information to hosts on a TCP/IP + network. Configuration parameters and other control information are + carried in tagged data items that are stored in the 'options' field + of the DHCP message. The data items themselves are also called + "options." + + This document describes the procedure for defining new DHCP options. + The procedure will guarantee that: + + * allocation of new option numbers is coordinated from a single + authority, + * new options are reviewed for technical correctness and + appropriateness, and + * documentation for new options is complete and published. + + + + + + + +Droms [Page 1] + +DRAFT Procedure for Defining New DHCP Options February 1996 + + +Procedure + + The author of a new DHCP option will follow these steps to obtain + acceptance of the option as a part of the DHCP Internet Standard: + + 1. The author devises the new option. + 2. The author requests a number for the new option from IANA. + 3. The author documents the new option, using the newly obtained + option number, as an Internet Draft. + 4. The author submits the Internet Draft for review through the IETF + standards process as defined in "Internet Official Protocol + Standards" (STD 1). The new option will be submitted for eventual + acceptance as an Internet Standard. + 5. The new option progresses through the IETF standards process; the + new option will be reviewed by the Dynamic Host Configuration + Working Group (if that group still exists), or as an Internet + Draft not submitted by an IETF working group. + 6. If the new option fails to gain acceptance as an Internet + Standard, the assigned option number will be returned to IANA for + reassignment. + +Acceptance and publication + + If this procedure is accepted, it will be added to the DHCP options + specification as an Appendix. + +Security Considerations + + Security issues are not discussed in this memo. + +Author's Address + + Ralph Droms + Computer Science Department + 323 Dana Engineering + Bucknell University + Lewisburg, PA 17837 + + Phone: (717) 524-1145 + EMail: droms@bucknell.edu + + + + + + + + + + + +Droms [Page 2] + diff --git a/doc/draft-ietf-dhc-options-04.txt b/doc/draft-ietf-dhc-options-04.txt new file mode 100644 index 00000000..ad5937a4 --- /dev/null +++ b/doc/draft-ietf-dhc-options-04.txt @@ -0,0 +1,62 @@ + + +A new Request for Comments is now available in online RFC libraries. + + + RFC 1533: + + Title: DHCP Options and BOOTP Vendor Extensions + Author: S. Alexander & R. Droms + Mailbox: stevea@lachman.com, droms@bucknell.edu + Pages: 30 + Characters: 50,919 + Obsoletes: 1497, 1395, 1084, 1048 + + +The Dynamic Host Configuration Protocol (DHCP) provides a framework +for passing configuration information to hosts on a TCP/IP network. +Configuration parameters and other control information are carried in +tagged data items that are stored in the "options" field of the DHCP +message. The data items themselves are also called "options." This +RFC specifies the current set of DHCP options. This document will be +periodically updated as new options are defined. Each superseding +document will include the entire current list of valid options. This +RFC is the product of the Dynamic Host Configuration Working Group of +the IETF. + +This is now a Proposed Standard Protocol. + +This RFC specifies an Internet standards track protocol for the +Internet community, and requests discussion and suggestions for +improvements. Please refer to the current edition of the "Internet +Official Protocol Standards" for the standardization state and status +of this protocol. Distribution of this memo is unlimited. + +This announcement is sent to the IETF list and the RFC-DIST list. +Requests to be added to or deleted from the IETF distribution list +should be sent to IETF-REQUEST@CNRI.RESTON.VA.US. Requests to be added +to or deleted from the RFC-DIST distribution list should be sent to +RFC-REQUEST@NIC.DDN.MIL. + +Details on obtaining RFCs via FTP or EMAIL may be obtained by sending +an EMAIL message to "rfc-info@ISI.EDU" with the message body +"help: ways_to_get_rfcs". For example: + + To: rfc-info@ISI.EDU + Subject: getting rfcs + + help: ways_to_get_rfcs + +Requests for special distribution should be addressed to either the +author of the RFC in question, or to admin@DS.INTERNIC.NET. Unless +specifically noted otherwise on the RFC itself, all RFCs are for +unlimited distribution. + +Submissions for Requests for Comments should be sent to +RFC-EDITOR@ISI.EDU. Please consult RFC 1111, "Instructions to RFC +Authors", for further information. + + +Joyce K. Reynolds +USC/Information Sciences Institute + diff --git a/doc/draft-ietf-dhc-options-opt127-01.txt b/doc/draft-ietf-dhc-options-opt127-01.txt new file mode 100644 index 00000000..aaa90ad3 --- /dev/null +++ b/doc/draft-ietf-dhc-options-opt127-01.txt @@ -0,0 +1,111 @@ + + +Network Working Group R. Droms +INTERNET DRAFT Bucknell University +Obsoletes: draft-ietf-dhc-options-opt127-00.txt February 1996 + Expires August 1996 + + + An Extension to the DHCP Option Codes + <draft-ietf-dhc-options-opt127-01.txt> + +Status of this memo + + This document is an Internet-Draft. Internet-Drafts are working + documents of the Internet Engineering Task Force (IETF), its areas, + and its working groups. Note that other groups may also distribute + working documents as Internet-Drafts. + + Internet-Drafts are draft documents valid for a maximum of six months + and may be updated, replaced, or obsoleted by other documents at any + time. It is inappropriate to use Internet-Drafts as reference + material or to cite them other than as ``work in progress.'' + + To learn the current status of any Internet-Draft, please check the + ``1id-abstracts.txt'' listing contained in the Internet-Drafts Shadow + Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), + munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or + ftp.isi.edu (US West Coast). + +Abstract + + The Dynamic Host Configuration Protocol (DHCP) provides a framework + for passing configuration information to hosts on a TCP/IP network. + This document defines a new option to extend the available option + codes. + +Introduction + + The Dynamic Host Configuration Protocol (DHCP) [1] provides a + framework for passing configuration information to hosts on a TCP/IP + network. Configuration parameters and other control information are + carried in tagged data items that are stored in the 'options' field + of the DHCP message. The data items themselves are also called + "options." + + Each option is assigned a one-octet option code. Options 128-254 are + reserved for local use and at this time over half of the available + options in the range 0-127 and option 255 have been assigned. This + document defines a new option to extend the available option codes. + + + + +Droms [Page 1] + +DRAFT An extension to the DHCP Option Codes February 1996 + + +Definition of option 127 + + Option code 127 indicates that the DHCP option has a two-octet + extended option code. The format of these options is: + + Extended + Code Len option code Data... + +-----+-----+-----+-----+-----+-----+---- + | 127 | XXX | oh | ol | d1 | d2 | ... + +-----+-----+-----+-----+-----+-----+---- + + Other than the two-octet extended option code, these options are + encoded and carried in DHCP messages identically to the options + defined in RFC 1533 [2]. The high-order and low-order octets of the + extended option code are stored in 'oh' and 'ol', respectively. The + number of octets given in the 'len' field includes the two-octet + extended option code. + + The two-octet extended option codes will be assigned through the + mechanisms defined for the assignment of new options [3] after the + current one-octet option codes have been exhausted. + +References + + [1] Droms, R., "Dynamic Host Configuration Protocol", RFC 1531, + Bucknell University, October 1993. + + [2] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor + Extensions", RFC 1533, Lachman Associates, October 1993. + + [3] Droms, R., "Procedure for Defining New DHCP Options", Work in + progress, February, 1996. + +Security Considerations + + Security issues are not discussed in this document. + +Author's Address + + Ralph Droms + Computer Science Department + 323 Dana Engineering + Bucknell University + Lewisburg, PA 17837 + + Phone: (717) 524-1145 + EMail: droms@bucknell.edu + + + + +Droms [Page 2] + diff --git a/doc/draft-ietf-dnsind-dynDNS-00.txt b/doc/draft-ietf-dnsind-dynDNS-00.txt deleted file mode 100644 index 1bbfdad8..00000000 --- a/doc/draft-ietf-dnsind-dynDNS-00.txt +++ /dev/null @@ -1,1254 +0,0 @@ - - - - - - -DNSIND Working Group Susan Thomson (Bellcore) -INTERNET-DRAFT Yakov Rekhter (IBM) -<draft-ietf-dnsind-dynDNS-00.txt> Jim Bound (DEC) - January 31, 1995 - - - Extending the Domain Name System (DNS) to Perform Dynamic Updates - - -Status of this Memo - - This document is an Internet Draft. Internet Drafts are working - documents of the Internet Engineering Task Force (IETF), its Areas, - and its Working Groups. Note that other groups may also distribute - working documents as Internet Drafts. - - Internet Drafts are draft documents valid for a maximum of six - months. Internet Drafts may be updated, replaced, or obsoleted by - other documents at any time. It is not appropriate to use Internet - Drafts as reference material or to cite them other than as a "working - draft" or "work in progress." - - To learn the current status of any Internet Draft. please check the - 1id-abstracts.txt listing contained in the Internet Drafts Shadow - Directories on ds.internic.net, nic.nordu.net, ftp.nisc.sri.com or - munnari.oz.au. - - -Abstract - - The Domain Name System currently only supports queries on a - statically configured database. This document describes extensions to - the Domain Name System to enable name servers to accept requests to - update the database dynamically. Extensions include support for - adding and deleting a set of names and associated resource records - within a zone atomically and the definition of a new resource record - that enables update requests to be serialized. - - - - - - - - - - - -Expires July 31, 1995 [Page 1] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -1. INTRODUCTION - - - The Domain Name System currently only supports queries on a stati- - cally configured database. This document describes extensions to the - Domain Name System to enable name servers to accept requests to - update the database dynamically. - - Section 2 provides an overview of the update function. Section 3 - describes the update message format and Sections 4 and 5 describe - name server and resolver behavior when processing dynamic updates in - more detail. Examples of usage are described in Section 6. A new - resource record useful for serializing update requests is defined in - Section 7 and security considerations are discussed in Section 8. - - - -2. OVERVIEW - - A domain name identifies a node within the domain name space tree - structure. Each node has a set of Resource Records (RRs). - - The extensions to the DNS protocol enable name servers to accept - requests to update the names space and RRs associated with nodes in - the name space dynamically. An update request is an atomic transac- - tion consisting of a set of operations on names and RRs in a zone. - The operations may be one of four types: - - 1. Add new name and associated with it a set of records to zone - (ADDNEW) - - This operation is only successful if the name of the records - does not already exist in the zone. The effect of the operation - is to create a new node in the name space and add records to - this node. - - 2. Add records associated with an existing name to zone (ADDEXIST) - - This operation is only successful if the name the records are - associated with exists in the zone. The effect of the operation - is to update records that belong to an existing node in the name - space. - - 3. Add name and associated with it a set of records to zone, - whether name exists or not (ADD) - - - -Expires July 31, 1995 [Page 2] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - If the name already exists, then the semantics of this operation - is the same as ADDEXIST. If the name doesn't exist, then the - semantics of this operation is the same as ADDNEW. - - 4. Delete records from zone (DELETE) - - This operation is only successful if the specified records - exist. However, it is possible to specify that all resource - records associated with a name, class and type must be deleted - without explicitly deleting each and every one of them. This is - done using a wildcard data field in the resource record. - - - The update protocol allows several operations to be performed on sets - of records with different owner names and record types, provided all - names are contained within a single zone. The effect of an update - transaction is to perform all of the operations in the transaction, - if all can be performed successfully, or none at all. If the zone - serial number in the SOA RR is not explicitly updated in an update - request, a side-effect of a successful update transaction may be to - update the zone serial number. A successful update is applied syn- - chronously to the database by the primary name server for the zone, - and the updates are transferred to secondary name servers asynchro- - nously. - - Some of the operations depend on comparing an existing record with a - record specified in an update. Two records are considered to be the - same if their name, class, type, data length and value are the same. - The time-to-live field is specifically excluded from comparison. The - effect of wildcard names and data fields are discussed in Section 3. - - The message format used to implement an atomic transaction has a - similar structure to that of a query, but the contents of some of the - fields differ. An entity that initiates an update indicates in an - update message the update operations to be performed along with the - records to be updated. A name server responds to an update request - by (a) indicating that the update has been successfully applied to - the database at the primary name server, (b) indicating that the name - server is not authoritative for the records specified, or (c) indi- - cating an error. - - An update may be carried in a UDP datagram or a TCP connection. - - - - - - -Expires July 31, 1995 [Page 3] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -3. UPDATE MESSAGE FORMAT - - - The message format has the following structure: the message header, - which is similar to that of the query, and the message body, which - consists of four sections, one per operation type. The four sections - are in the order listed: the delete section, the add new record sec- - tion, the add existing record section and the plain add secion. Each - section contains the records that need to have the associated opera- - tion applied. - - - -3.1. Header Section - - - - - 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - | ID | - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - |QR| Opcode |AA|TC|RD|RA| Z | RCODE | - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - | DELCOUNT | - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - | ANCOUNT | - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - | AECOUNT | - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - | ACOUNT | - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - - - - The differences between the query header and the update header are in - the values that certain fields can assume, and in the semantics of - certain fields. - - There is a new operation code (value to be defined) to specify an - update request in the Opcode field. - - - UPDATE TBD - - - - -Expires July 31, 1995 [Page 4] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - This Opcode distinguishes the update header from the query header. - This document specifies the semantics of the fields in the update - header only. - - Besides a new operation code, there are also new return codes. The - four count fields have different semantics: they contain the number - of records in the DELETE section, the number of records in the ADDNEW - section, the number of records in the ADDEXIST section and the number - of records in the ADD section, respectively. - - The other fields remain the same, except that they apply to update - requests rather than queries. Note the AA bit is set in a response if - and only if a server is authoritative for ALL nodes specified in the - request. Also, the TC bit is not applicable to updates. - - The fields are set as follows in update requests and responses: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Expires July 31, 1995 [Page 5] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - ID A 16 bit identifier assigned by the entity that - generates any kind of request. This identifier is - copied in the corresponding reply and can be used by the - requestor to match up replies to outstanding requests. - - QR A one bit field that specifies whether this message is a - request (0), or a response (1). - - OPCODE A four bit field that specifies the kind of request in - this message. This value is set by the originator of a - request and copied into the response. In addition to - the values defined in RFC1034, this document defines the - following value: - - TBD an update request (UPDATE) - - - AA Authoritative Answer - this bit is valid in responses, - and specifies that the responding name server is an - authority for all domain names in the message body. - - TC Bit is set to zero in an update request and copied into - the response. The TC bit is ignored on receipt of a - request or response. - - - RD Recursion Desired - this bit may be set in a request and - is copied into the response. If RD is set, it directs - the name server to pursue the request recursively. - Recursive update support is optional. - - RA Recursion Available - this be is set or cleared in a - response, and denotes whether recursive update support is - available in the name server. - - Z Reserved for future use. Must be zero in all requests - and responses. - - RCODE Response code - this 4 bit field is set as part of - responses. The values and semantics of update responses - are as follows: - - 0 No error condition - - 1 Format error - The name server was - - - -Expires July 31, 1995 [Page 6] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - unable to interpret the request. - - 2 Server failure - The name server was - unable to process this request due to a - problem with the name server. - - 3 Name Error - Meaningful only for - responses from an authoritative name - server, this code signifies that one or - more of the domain names referenced in - the update request does not exist. - - 4 Not Implemented - The name server does - not support the specified operation. - - 5 Refused - The name server refuses to - perform the specified operation for - policy reasons. - - 6 Alias Error - This code indicates that the - domain name specified in an update is an - alias. - - 7 Name Exists Error - This code indicates - the name already exists. This return code - is only meaningful from a server - in response to an ADDNEW operation. - - 8 Record Not Exist Error - This code - indicates that the resource record does - not exist. - This return code is only meaningful from a - server in response to a DELETE operation. - - 9 Too many Zones Error - This code - indicates that the records to be - updated exist in more than one zone. - - 10 SERIAL RR Error - This code - indicates that an operation on the - SERIAL record is in error. - - 11 Permission Denied - This code indicates - that the client has insufficient authority - to perform the update. - - - -Expires July 31, 1995 [Page 7] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - DELCOUNT an unsigned 16 bit integer specifying the number of - resource records in the DELETE section. Always zero in a - response. - - ANCOUNT an unsigned 16 bit integer specifying the number of - resource records in the ADDNEW section. Always zero - in a response. - - AECOUNT an unsigned 16 bit integer specifying the number of - resource records in the ADDEXIST section. - Always zero in a response. - - ACOUNT an unsigned 16 bit integer specifying the number of - resource records in the ADD section. - Always zero in a response. - - - -3.2. Testing for Resource Record Equality - - - The update operations require that records be compared. In particu- - lar, the DELETE operation requires that the records to be deleted - must exist. It has already been stated that records are tested for - equality by comparing their name, class, type, data length and data - values. The time-to-live value is excluded from the comparison. - - The comparison of character strings in names and in data fields is - case-insensitive. For two names to match, they must match label by - label. A non-wildcard label never matches the '*' label, i.e. names - must exist explicitly in a zone to be matched by a record specified - in an update; the use of a wildcard name in a zone does not imply - existence for updates. - - In a DELETE operation, it is sometimes convenient to specify that all - records associated with a certain name that are of a given class and - type be deleted without specifying all existing records explicitly. A - record with a data field containing the '*' character and a data - length field of one is defined to match data in any other record. - - DISCUSSION: I believe the '*' data value does not match existing - legal data values, expect for the NULL record, which is experimental - and not supported by BIND. - - - - - -Expires July 31, 1995 [Page 8] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -4. NAME SERVER BEHAVIOR - - - From a client's perspective, any authoritative server can process an - update request. Non-authoritative name servers forward the request to - an authoritative name server if recursive service is specified or - indicate to the client that the server is not authoritative for the - records to be updated. - - From a server's perspective, only the primary authoritative name - server actually performs the update request. A secondary name server - is responsible for forwarding the request to the primary name server - for the zone. As mentioned above, a non-authoritative name server is - also responsible for forwarding the update request to the primary, if - recursive service is desired by the client and it is available. - Unlike a secondary, however, a non-authoritative name server will - need to determine the name servers authoritative for the domain names - to be updated by asking other names servers for referrals if the - information is not cached locally. A secondary name server will have - this information preconfigured. Note that the forwarding of an update - message is done synchronously on an update request, whether it is - performed by a secondary name server or a non-authoritative server - that provides recursive service. That is, a name server will wait - for a response to a forwarded update request before returning the - response to the client. - - - -4.1. Maintaining Internal Consistency - - - Zone consistency between primary and secondaries is achieved through - asynchronous zone transfer. Either full zone transfer as currently - defined can be used, or incremental zone transfer when it becomes - available[IXFR]. The proposed Notify mechanism[NOTIFY] may also be - used to cause zone transfers to happen earlier than would otherwise - be determined by the zone refresh time. - - - -4.2. Algorithm - - - On receiving an update request, the server's behavior will depend on - whether recursive service is requested and available. If recursive - - - -Expires July 31, 1995 [Page 9] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - service is requested and available, the server determines the set of - authoritative name servers for the nodes specified in the transac- - tion. The server sends the update to the set of name servers, waits - for the response, and returns the response to the resolver. - - If recursive service is not requested or is not available, then the - name server checks to see whether the update is in a zone for which - it is authoritative. If so, the server attempts to perform the update - if the name server is primary for the zone. If the name server is - secondary for the zone, the server forwards the update to the pri- - mary name server, waits for the response and returns the response to - the resolver. Otherwise, if the name server is not authoritative for - the zone to be updated, an error is returned. - - The algorithm for name server behavior is explained in more detail - below (adapted from [RFC1034]): - - 1. Indicate in the response whether update recursion is available - or not. If recursive service is available and requested, then - the server uses the local resolver or a copy of its algorithm - (Section 4) to perform the update operation. Otherwise, go to - step 2. - - 2 Determine the names (RRNAMEs) associated with all records to be - updated in the transaction. For each RRNAME, search the avail- - able zones for the zone which is the nearest to RRNAME. - - a) If no zone is found, return a non-authoritative response - indicating no error. Exit. - - b) If more than one zone is found, return a response indicat- - ing that the update request is not restricted to a single - zone. Exit. - - Otherwise, go to step 3. - - 3. If this is a secondary name server for the zone, forward the - request to the primary and wait for the response. Send the - response to the resolver. Exit. (A secondary may do further - checking of the update request before sending to the primary for - processing, if desired.) Otherwise, go to step 4. - - 4. Start the transaction - - 5. For each RRNAME in the update request, start matching down, - - - -Expires July 31, 1995 [Page 10] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - label by label, in the zone (found in step 2). For each label, - test for the following cases: - - a) If the whole RRNAME is matched, we have found the node to - be updated. - - If the record at the node is a CNAME, and RRTYPE does not - match CNAME, abort the transaction and return an authorita- - tive response indicating an alias error. - - If the operation is ADDNEW, abort the transaction and - return an authoritative response indicating that the name - already exists. - - If the operation is ADDEXIST or ADD, check if the specified - record already exists. If so, ignore. - - If the operation is DELETE, check if the specified record - exists in the zone. If not, abort the transaction and - return an authoritative response indicating that the record - does not exist. - - Otherwise, perform the update operation tentatively. - - b) If we have a referral, abort the transaction. Return a - non-authoritative response indicating no error. Exit. - - c) If at some label, a match is impossible (i.e. the label - does not exist), and the operation is ADDEXIST or DELETE, - abort the transaction and return an authoritative response - indicating that the name does not exist. - - Otherwise, perform the update operation tentatively. - - 6 Commit the transaction. If the zone serial number has not been - explicitly updated as part of the transaction, the zone serial - number may or may not be incremented at this time. Indicate in - the response that the server is authoritative and return a suc- - cessful response. Exit. - - At the start of a transaction, the zone must be locked to prevent - concurrent interleaving of concurrent update requests. The zone is - unlocked at the end of a (successful or unsuccessful) transaction. - Aborting a transaction requires that any changes made so far must be - rolled back. Committing a transaction means that the changes are - - - -Expires July 31, 1995 [Page 11] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - applied to the zone and are visible to subsequent queries to the pri- - mary. (It is an implementation matter whether the master file is - updated at this time or later. The point is that the changes are made - persistent, e.g. in a log on stable storage, and are added to the - cached copy of the zone.) If the zone serial number is not explicitly - updated in a request, a primary name server may update the zone - serial number when committing each transaction, or periodically, - after some number of transactions or time has passed, depending on - policy. The effect of incrementing the serial number periodically - rather than on each transaction means that a secondary may not detect - that a zone has been updated as quickly as it otherwise would do. On - the other hand, updating the serial number periodically makes it pos- - sible to slow incrementing of the serial number in situations where - many updates occur close together in time. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Expires July 31, 1995 [Page 12] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -5. RESOLVER BEHAVIOR - - - A resolver provides the application interface to name servers. A - resolver must enable applications to perform both standard queries - and updates. - - A stub resolver performs no resolution function itself, but must - either be configured with a list of name servers that provide recur- - sive service, i.e. name servers that can perform requests on the - resolver's behalf, or be configured with the names of authoritative - servers of zones that this resolver is known to be responsible for - updating. - - A full-service resolver traverses the domain name space itself, pos- - sibly querying several name servers to find the name servers authori- - tative for the zone to be updated. A full-service resolver performs - an update operation as follows (adapted from [RFC1034]): - - 1. If a resolver has direct access to a name server's authoritative - data, determine the names (RRNAMEs) associated with all records - to be updated in the transaction. For each RRNAME, search the - available zones for the zone which is authoritative for RRNAME. - - a) If more than one zone is found, return a response indicat- - ing that the update request is not restricted to a single - zone. Exit. - - b) If a single authoritative zone is found, perform the update - transaction in the relevant zone as outlined in Section - 4.2. Exit. - - 2. If the zone is non-local, find the best servers to ask for any - or all RRNAMEs. If the resolver finds that the RRNAMEs cannot be - in the same zone, it returns a response indicating that the - update is not constrained to a single zone and exits. - - 3. Send a query to one of the servers for any RRNAME, RRCLASS and - RRTYPE to be updated in the zone. - - 4. Analyze the response: - - a) If the response is authoritative, go to step 5 - - b) If the response contains better delegation information, - - - -Expires July 31, 1995 [Page 13] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - cache the delegation information and go to step 2. - - c) If the response shows a server failure or other bizarre - contents, delete the server from the list of servers and go - back to step 3. - - 5. Send an update to an authoritative name server. - - 6. Analyze the response: - - a) If the response shows a server failure or other bizarre - contents, delete the server from the list of servers and go - back to step 5. - - b) Otherwise, return the response to the client. - - The data structures used to represent the state of a query in pro- - gress in the resolver are the same as that specified in RFC1034, - except that the list that represents the resolver's best guess about - which name servers to ask may include additional information per- - tinent to updates, e.g. which in a set of authoritative name servers - accept update requests for a given zone (some name servers may refuse - to accept update requests) and the relative performance of the name - servers (primary may provide better performance than secondaries). - - - - - - - - - - - - - - - - - - - - - - - - -Expires July 31, 1995 [Page 14] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -6. EXAMPLES - - A wide range of update functions can be achieved using a combination - of the four update operations. To illustrate this, we use a simple - zone consisting of the following records: - - - xyz.com. SOA ns.xyz.com sysadm.xyz.com - ( ... ) - NS ns.xyz.com. - - ns.xyz.com. A 128.96.33.22 - - foo.xyz.com. A 128.96.33.33 - A 128.96.34.34 - - - For example, one of the A records belonging to foo.xyz.com can be - modified by first deleting it and adding the new. - - - DELETE foo.xyz.com A 128.96.33.33 - - ADD foo.xyz.com A 128.96.44.44 - - - Both ADD or ADDEXIST would work in the above example to add the - replacement record. - - The canonical name of a host can be changed from "foo" to "bar" and - the old name "foo" made an alias, by sending an update transaction - consisting of the following three operations: - - - DELETE foo.xyz.com A 128.96.33.33 - foo.xyz.com A 128.96.34.34 - - ADDEXIST foo.xyz.com CNAME bar.xyz.com - - ADDNEW bar.xyz.com A 128.61.44.33 - - - - Alternatively, the A records belonging to "foo" need not be individu- - ally deleted. The wildcard data field can be used to delete all - - - -Expires July 31, 1995 [Page 15] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - records associated with "foo" as follows: - - - DELETE foo.xyz.com A * - - - Also, both of the above add operations could be replaced by ADD. - However, the existence checks would not then be applied. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Expires July 31, 1995 [Page 16] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -7. SERIAL RESOURCE RECORD - - - A new resource record is defined that can be used to serialize update - requests. Serialization is needed if updates can be concurrent or the - update is dependent on the database being in a certain state. In - particular, serialisation may be necessary to protect against dupli- - cate messages. Duplicate messages arise when the transport protocol - used does not guarantee otherwise, or when resolvers retransmit mes- - sages because the transport protocol is unreliable. Also, malicious - clients may deliberately replay old update requests. - - In general, to serialize requests, a token needs to be associated - with the set of records to be updated. This token must be set to a - different value on each update. The SERIAL resource record is defined - to hold this token and to indicate the set of records associated with - the token. The SERIAL record has the same name, class, and TTL - values as the records to be protected. The name may contain the wild- - card label in which case the SERIAL record covers all records in the - zone (of the type specified in the data field), and can be used to - serialize updates at the granularity of a zone. The data field of - the record contains the type of the records protected and the token - itself. The type may be any valid record type, or it may contain type - ANY which means that the token covers all records associated with the - name specified. The token is a 64-bit number (the exact definition of - which is to be discussed below). - - The data field of the record is as follows: - - - - 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - | RR type covered | - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - | | - | token | - | | - | | - +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ - - - - To update the SERIAL record, a client MUST delete the current record - explicitly and then add the new record with the new token value. The - - - -Expires July 31, 1995 [Page 17] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - SERIAL record is the only record where the use of the wildcard data - field when deleting records is invalid. This restriction ensures - that the update of the token is itself serialized, by making sure - that the change from the current token value to the new token value - is done in a mutually exclusive manner. - - For example, given a zone containing a SERIAL RR as follows: - - - xyz.com. SOA ns.xyz.com sysadm.xyz.com - ( ... ) - NS ns.xyz.com. - - ns.xyz.com. A 128.96.33.22 - - foo.xyz.com. SERIAL A 2157449756503 - A 128.96.33.33 - A 128.96.34.34 - - - Updates to the A records would be serialized by using the following - operations: - - - DELETE foo.xyz.com SERIAL A 2157449756503 - foo.xyz.com A * - - ADD foo.xyz.com SERIAL A 7575470909833451 - foo.xyz.com A 128.96.44.44 - foo.xyz.com A 128.96.55.55 - - - FOR DISCUSSION: One approach would be to define the token as a random - number. However, update serialization is only as good as the random - numbers generated. If clients cannot be trusted to generate unique - random numbers or it is too expensive to do so, an alternative - approach is to define the token as a sequence number. This approach - is cheap to implement, but does require that the name server inter- - pret the value of the data field of the SERIAL RR added to determine - that it is appropriately set. Another approach is to have the server - responsible for generating the next token (in any way it liked). This - also requires the server to interpret the data field of the SERIAL - RR. - - - - - -Expires July 31, 1995 [Page 18] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -8. SECURITY CONSIDERATIONS - - - DNS updates must be able to be made secure. The security mechanism - must provide data origin authentication, data integrity and protec- - tion against replay. Data confidentiality is not required. - - The signature records defined in [DNSSEC] can be used to ensure that - each set of records of a particular name, type and class are updated - by an entity that has the appropriate authority. The signature - record is updated along with the associated records in an update - transaction. The SIG RR must sign all records associated with a name, - class and type, not only those updated in the request. The "time - signed" timestamp in the SIG record may be used to protect against - replay if it is defined that, when updated, it must have a value - greater than the current value and be set to a time not too far in - the future. - - Note that a signature record only covers records of a particular - name, class and type. Thus, while the integrity of each set of - records of the same name, class and type updated in a transaction can - be assured, the integrity of a set of updates records with different - names or types is not. To ensure integrity of the entire message, a - network layer security protocol should be used if available. Alterna- - tively, a SIG RR signing the entire message can be placed at the end - of the last section of a message as explained in [DNSSEC]. If SIG - records are not used to authenticate individual updates, the SERIAL - record will need to be used to ensure against replay. - - Note that a SIG RR is not only used to authenticate an update - request, but is stored along with the authenticated data in DNS to - authenticate subsequent queries for the data. - - - - - - - - - - - - - - - - -Expires July 31, 1995 [Page 19] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -9. OPEN ISSUES - - - - 1. Should non-recursive updates perform referrals when an update is - sent to a non-authoritative server? - - - This is a bit less clean for updates than for queries, since - multiple nodes can be specified in an atomic transaction. (A - referral need only be to one of the nodes specified - any one - will do. - - On the other hand, using queries to locate authoritative servers - before sending an update is likely to be less efficient than - using updates only. However, caching of queries should alleviate - this. - - The usefulness of having updates perform referrals is not clear: - - a) While updates need to be reliable and hence might be car- - ried using TCP, the recommended approach to get referrals - is UDP. - - b) As a practical matter, it cannot be required that all name - servers in DNS support dynamic updates. Thus, queries will - always have to be used as the fallback mechanism for locat- - ing the authoritative name servers for a dynamic zone. - - This document as it stands does not specify referrals. - - - -10. ACKNOWLEDGEMENTS - - - We would like to thank the DNSIND working group for their valuable - input, in particular, Donald Eastlake. - - - -11. REFERENCES - - - - - - -Expires July 31, 1995 [Page 20] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - - [RFC1034] - P. Mockapetris, "Domain Names - Concepts and Facilities", RFC - 1034, USC/Information Sciences Institute, November 1987. - - [RFC1035] - P. Mockapetris, "Domain Names - Implementation and Specifica- - tion", RFC 1035, USC/Information Sciences Institute, November - 1987. - - [DNSSEC] - Donald E. Eastlake and Charles W. Kaufman, "Domain Name System - Protocol Security Extensions", Internet Draft, March 1994, - <draft-ietf-dnssec-secext-03.txt>. - - [IXFR]M. Ohta, "Incremental Zone Transfer", Internet Draft, November - 1994. - - [NOTIFY] - P. Vixie, "Notify: a mechanism for prompt notification of - authority zone changes", Internet Draft, November 1994, <draft- - ietf-dnsind-notify-00.txt>. - - - - - - - - - - - - - - - - - - - - - - - - - - - -Expires July 31, 1995 [Page 21] - - - - - -INTERNET-DRAFT Dynamic DNS Updates January 1995 - - -Authors' Addresses - - - Susan Thomson - Bellcore - 445 South Street - Morristown, NJ 07960 - Phone: (201) 829-4514 - email: set@thumper.bellcore.com - - Yakov Rekhter - T.J. Watson Research Center IBM Corporation - P.O. Box 740, H3-D40, - Yorktown Heights, NY 10598 - Phone: (914) 784-7361 - email: yakov@watson.ibm.com - - Jim Bound - Digital Equipment Corporation - 110 Spitbrook Road ZK3-3/U14 - Nashua, NH 03062-2698 - Phone: (603) 881-0400 - email: bound@zk3.dec.com - - - - - - - - - - - - - - - - - - - - - - - - - -Expires July 31, 1995 [Page 22] - - diff --git a/doc/draft-ohta-dynamic-dns-00.txt b/doc/draft-ohta-dynamic-dns-00.txt deleted file mode 100644 index f361d776..00000000 --- a/doc/draft-ohta-dynamic-dns-00.txt +++ /dev/null @@ -1,5 +0,0 @@ - -This Internet-Draft was deleted. For more information, send a message to - - Internet-Drafts@cnri.reston.va.us - diff --git a/doc/rfc1533.txt b/doc/rfc1533.txt deleted file mode 100644 index 39677787..00000000 --- a/doc/rfc1533.txt +++ /dev/null @@ -1,1683 +0,0 @@ - - - - - - -Network Working Group S. Alexander -Request for Comments: 1533 Lachman Technology, Inc. -Obsoletes: 1497, 1395, 1084, 1048 R. Droms -Category: Standards Track Bucknell University - October 1993 - - - DHCP Options and BOOTP Vendor Extensions - -Status of this Memo - - This RFC specifies an Internet standards track protocol for the - Internet community, and requests discussion and suggestions for - improvements. Please refer to the current edition of the "Internet - Official Protocol Standards" for the standardization state and status - of this protocol. Distribution of this memo is unlimited. - -Abstract - - The Dynamic Host Configuration Protocol (DHCP) [1] provides a - framework for passing configuration information to hosts on a TCP/IP - network. Configuration parameters and other control information are - carried in tagged data items that are stored in the "options" field - of the DHCP message. The data items themselves are also called - "options." - - This document specifies the current set of DHCP options. This - document will be periodically updated as new options are defined. - Each superseding document will include the entire current list of - valid options. - - All of the vendor information extensions defined in RFC 1497 [2] may - be used as DHCP options. The definitions given in RFC 1497 are - included in this document, which supersedes RFC 1497. All of the - DHCP options defined in this document, except for those specific to - DHCP as defined in section 9, may be used as BOOTP vendor information - extensions. - -Table of Contents - - 1. Introduction .............................................. 2 - 2. BOOTP Extension/DHCP Option Field Format .................. 2 - 3. RFC 1497 Vendor Extensions ................................ 3 - 4. IP Layer Parameters per Host .............................. 10 - 5. IP Layer Parameters per Interface ........................ 13 - 6. Link Layer Parameters per Interface ....................... 16 - 7. TCP Parameters ............................................ 17 - 8. Application and Service Parameters ........................ 18 - - - -Alexander & Droms [Page 1] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - - 9. DHCP Extensions ........................................... 23 - 10. Extensions ................................................ 27 - 11. Acknowledgements .......................................... 28 - 12. References ................................................ 28 - 13. Security Considerations ................................... 19 - 14. Authors' Addresses ........................................ 30 - -1. Introduction - - This document specifies options for use with both the Dynamic Host - Configuration Protocol and the Bootstrap Protocol. - - The full description of DHCP packet formats may be found in the DHCP - specification document [1], and the full description of BOOTP packet - formats may be found in the BOOTP specification document [3]. This - document defines the format of information in the last field of DHCP - packets ('options') and of BOOTP packets ('vend'). The remainder of - this section defines a generalized use of this area for giving - information useful to a wide class of machines, operating systems and - configurations. Sites with a single DHCP or BOOTP server that is - shared among heterogeneous clients may choose to define other, site- - specific formats for the use of the 'options' field. - - Section 2 of this memo describes the formats of DHCP options and - BOOTP vendor extensions. Section 3 describes options defined in - previous documents for use with BOOTP (all may also be used with - DHCP). Sections 4-8 define new options intended for use with both - DHCP and BOOTP. Section 9 defines options used only in DHCP. - - References further describing most of the options defined in sections - 2-6 can be found in section 12. The use of the options defined in - section 9 is described in the DHCP specification [1]. - - Information on registering new options is contained in section 10. - -2. BOOTP Extension/DHCP Option Field Format - - DHCP options have the same format as the BOOTP "vendor extensions" - defined in RFC 1497 [2]. Options may be fixed length or variable - length. All options begin with a tag octet, which uniquely - identifies the option. Fixed-length options without data consist of - only a tag octet. Only options 0 and 255 are fixed length. All - other options are variable-length with a length octet following the - tag octet. The value of the length octet does not include the two - octets specifying the tag and length. The length octet is followed - by "length" octets of data. In the case of some variable-length - options the length field is a constant but must still be specified. - - - - -Alexander & Droms [Page 2] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - - Any options defined subsequent to this document should contain a - length octet even if the length is fixed or zero. - - All multi-octet quantities are in network byte-order. - - When used with BOOTP, the first four octets of the vendor information - field have been assigned to the "magic cookie" (as suggested in RFC - 951). This field identifies the mode in which the succeeding data is - to be interpreted. The value of the magic cookie is the 4 octet - dotted decimal 99.130.83.99 (or hexadecimal number 63.82.53.63) in - network byte order. - - All of the "vendor extensions" defined in RFC 1497 are also DHCP - options. - - Option codes 128 to 254 (decimal) are reserved for site-specific - options. - - Except for the options in section 9, all options may be used with - either DHCP or BOOTP. - - Many of these options have their default values specified in other - documents. In particular, RFC 1122 [4] specifies default values for - most IP and TCP configuration parameters. - -3. RFC 1497 Vendor Extensions - - This section lists the vendor extensions as defined in RFC 1497. - They are defined here for completeness. - -3.1. Pad Option - - The pad option can be used to cause subsequent fields to align on - word boundaries. - - The code for the pad option is 0, and its length is 1 octet. - - Code - +-----+ - | 0 | - +-----+ - - - - - - - - - - -Alexander & Droms [Page 3] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -3.2. End Option - - The end option marks the end of valid information in the vendor - field. Subsequent octets should be filled with pad options. - - The code for the end option is 255, and its length is 1 octet. - - Code - +-----+ - | 255 | - +-----+ - -3.3. Subnet Mask - - The subnet mask option specifies the client's subnet mask as per RFC - 950 [5]. - - If both the subnet mask and the router option are specified in a DHCP - reply, the subnet mask option MUST be first. - - The code for the subnet mask option is 1, and its length is 4 octets. - - Code Len Subnet Mask - +-----+-----+-----+-----+-----+-----+ - | 1 | 4 | m1 | m2 | m3 | m4 | - +-----+-----+-----+-----+-----+-----+ - -3.4. Time Offset - - The time offset field specifies the offset of the client's subnet in - seconds from Coordinated Universal Time (UTC). The offset is - expressed as a signed 32-bit integer. - - The code for the time offset option is 2, and its length is 4 octets. - - Code Len Time Offset - +-----+-----+-----+-----+-----+-----+ - | 2 | 4 | n1 | n2 | n3 | n4 | - +-----+-----+-----+-----+-----+-----+ - - - - - - - - - - - - -Alexander & Droms [Page 4] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -3.5. Router Option - - The router option specifies a list of IP addresses for routers on the - client's subnet. Routers SHOULD be listed in order of preference. - - The code for the router option is 3. The minimum length for the - router option is 4 octets, and the length MUST always be a multiple - of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 3 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -3.6. Time Server Option - - The time server option specifies a list of RFC 868 [6] time servers - available to the client. Servers SHOULD be listed in order of - preference. - - The code for the time server option is 4. The minimum length for - this option is 4 octets, and the length MUST always be a multiple of - 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 4 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -3.7. Name Server Option - - The name server option specifies a list of IEN 116 [7] name servers - available to the client. Servers SHOULD be listed in order of - preference. - - The code for the name server option is 5. The minimum length for - this option is 4 octets, and the length MUST always be a multiple of - 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 5 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - - - - - - - - -Alexander & Droms [Page 5] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -3.8. Domain Name Server Option - - The domain name server option specifies a list of Domain Name System - (STD 13, RFC 1035 [8]) name servers available to the client. Servers - SHOULD be listed in order of preference. - - The code for the domain name server option is 6. The minimum length - for this option is 4 octets, and the length MUST always be a multiple - of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 6 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -3.9. Log Server Option - - The log server option specifies a list of MIT-LCS UDP log servers - available to the client. Servers SHOULD be listed in order of - preference. - - The code for the log server option is 7. The minimum length for this - option is 4 octets, and the length MUST always be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 7 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -3.10. Cookie Server Option - - The cookie server option specifies a list of RFC 865 [9] cookie - servers available to the client. Servers SHOULD be listed in order - of preference. - - The code for the log server option is 8. The minimum length for this - option is 4 octets, and the length MUST always be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 8 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - - - - - - - - - -Alexander & Droms [Page 6] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -3.11. LPR Server Option - - The LPR server option specifies a list of RFC 1179 [10] line printer - servers available to the client. Servers SHOULD be listed in order - of preference. - - The code for the LPR server option is 9. The minimum length for this - option is 4 octets, and the length MUST always be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 9 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -3.12. Impress Server Option - - The Impress server option specifies a list of Imagen Impress servers - available to the client. Servers SHOULD be listed in order of - preference. - - The code for the Impress server option is 10. The minimum length for - this option is 4 octets, and the length MUST always be a multiple of - 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 10 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -3.13. Resource Location Server Option - - This option specifies a list of RFC 887 [11] Resource Location - servers available to the client. Servers SHOULD be listed in order - of preference. - - The code for this option is 11. The minimum length for this option - is 4 octets, and the length MUST always be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 11 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - - - - - - - - - -Alexander & Droms [Page 7] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -3.14. Host Name Option - - This option specifies the name of the client. The name may or may - not be qualified with the local domain name (see section 3.17 for the - preferred way to retrieve the domain name). See RFC 1035 for - character set restrictions. - - The code for this option is 12, and its minimum length is 1. - - Code Len Host Name - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 12 | n | h1 | h2 | h3 | h4 | h5 | h6 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -3.15. Boot File Size Option - - This option specifies the length in 512-octet blocks of the default - boot image for the client. The file length is specified as an - unsigned 16-bit integer. - - The code for this option is 13, and its length is 2. - - Code Len File Size - +-----+-----+-----+-----+ - | 13 | 2 | l1 | l2 | - +-----+-----+-----+-----+ - -3.16. Merit Dump File - - This option specifies the path-name of a file to which the client's - core image should be dumped in the event the client crashes. The - path is formatted as a character string consisting of characters from - the NVT ASCII character set. - - The code for this option is 14. Its minimum length is 1. - - Code Len Dump File Pathname - +-----+-----+-----+-----+-----+-----+--- - | 14 | n | n1 | n2 | n3 | n4 | ... - +-----+-----+-----+-----+-----+-----+--- - - - - - - - - - - - -Alexander & Droms [Page 8] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -3.17. Domain Name - - This option specifies the domain name that client should use when - resolving hostnames via the Domain Name System. - - The code for this option is 15. Its minimum length is 1. - - Code Len Domain Name - +-----+-----+-----+-----+-----+-----+-- - | 15 | n | d1 | d2 | d3 | d4 | ... - +-----+-----+-----+-----+-----+-----+-- - -3.18. Swap Server - - This specifies the IP address of the client's swap server. - - The code for this option is 16 and its length is 4. - - Code Len Swap Server Address - +-----+-----+-----+-----+-----+-----+ - | 16 | n | a1 | a2 | a3 | a4 | - +-----+-----+-----+-----+-----+-----+ - -3.19. Root Path - - This option specifies the path-name that contains the client's root - disk. The path is formatted as a character string consisting of - characters from the NVT ASCII character set. - - The code for this option is 17. Its minimum length is 1. - - Code Len Root Disk Pathname - +-----+-----+-----+-----+-----+-----+--- - | 17 | n | n1 | n2 | n3 | n4 | ... - +-----+-----+-----+-----+-----+-----+--- - - - - - - - - - - - - - - - - -Alexander & Droms [Page 9] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -3.20. Extensions Path - - A string to specify a file, retrievable via TFTP, which contains - information which can be interpreted in the same way as the 64-octet - vendor-extension field within the BOOTP response, with the following - exceptions: - - - the length of the file is unconstrained; - - all references to Tag 18 (i.e., instances of the - BOOTP Extensions Path field) within the file are - ignored. - - The code for this option is 18. Its minimum length is 1. - - Code Len Extensions Pathname - +-----+-----+-----+-----+-----+-----+--- - | 18 | n | n1 | n2 | n3 | n4 | ... - +-----+-----+-----+-----+-----+-----+--- - -4. IP Layer Parameters per Host - - This section details the options that affect the operation of the IP - layer on a per-host basis. - -4.1. IP Forwarding Enable/Disable Option - - This option specifies whether the client should configure its IP - layer for packet forwarding. A value of 0 means disable IP - forwarding, and a value of 1 means enable IP forwarding. - - The code for this option is 19, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 19 | 1 | 0/1 | - +-----+-----+-----+ - - - - - - - - - - - - - - - -Alexander & Droms [Page 10] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -4.2. Non-Local Source Routing Enable/Disable Option - - This option specifies whether the client should configure its IP - layer to allow forwarding of datagrams with non-local source routes - (see Section 3.3.5 of [4] for a discussion of this topic). A value - of 0 means disallow forwarding of such datagrams, and a value of 1 - means allow forwarding. - - The code for this option is 20, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 20 | 1 | 0/1 | - +-----+-----+-----+ - -4.3. Policy Filter Option - - This option specifies policy filters for non-local source routing. - The filters consist of a list of IP addresses and masks which specify - destination/mask pairs with which to filter incoming source routes. - - Any source routed datagram whose next-hop address does not match one - of the filters should be discarded by the client. - - See [4] for further information. - - The code for this option is 21. The minimum length of this option is - 8, and the length MUST be a multiple of 8. - - Code Len Address 1 Mask 1 - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+ - | 21 | n | a1 | a2 | a3 | a4 | m1 | m2 | m3 | m4 | - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+ - Address 2 Mask 2 - +-----+-----+-----+-----+-----+-----+-----+-----+--- - | a1 | a2 | a3 | a4 | m1 | m2 | m3 | m4 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+--- - - - - - - - - - - - - - - -Alexander & Droms [Page 11] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -4.4. Maximum Datagram Reassembly Size - - This option specifies the maximum size datagram that the client - should be prepared to reassemble. The size is specified as a 16-bit - unsigned integer. The minimum value legal value is 576. - - The code for this option is 22, and its length is 2. - - Code Len Size - +-----+-----+-----+-----+ - | 22 | 2 | s1 | s2 | - +-----+-----+-----+-----+ - -4.5. Default IP Time-to-live - - This option specifies the default time-to-live that the client should - use on outgoing datagrams. The TTL is specified as an octet with a - value between 1 and 255. - - The code for this option is 23, and its length is 1. - - Code Len TTL - +-----+-----+-----+ - | 23 | 1 | ttl | - +-----+-----+-----+ - -4.6. Path MTU Aging Timeout Option - - This option specifies the timeout (in seconds) to use when aging Path - MTU values discovered by the mechanism defined in RFC 1191 [12]. The - timeout is specified as a 32-bit unsigned integer. - - The code for this option is 24, and its length is 4. - - Code Len Timeout - +-----+-----+-----+-----+-----+-----+ - | 24 | 4 | t1 | t2 | t3 | t4 | - +-----+-----+-----+-----+-----+-----+ - - - - - - - - - - - - - -Alexander & Droms [Page 12] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -4.7. Path MTU Plateau Table Option - - This option specifies a table of MTU sizes to use when performing - Path MTU Discovery as defined in RFC 1191. The table is formatted as - a list of 16-bit unsigned integers, ordered from smallest to largest. - The minimum MTU value cannot be smaller than 68. - - The code for this option is 25. Its minimum length is 2, and the - length MUST be a multiple of 2. - - Code Len Size 1 Size 2 - +-----+-----+-----+-----+-----+-----+--- - | 25 | n | s1 | s2 | s1 | s2 | ... - +-----+-----+-----+-----+-----+-----+--- - -5. IP Layer Parameters per Interface - - This section details the options that affect the operation of the IP - layer on a per-interface basis. It is expected that a client can - issue multiple requests, one per interface, in order to configure - interfaces with their specific parameters. - -5.1. Interface MTU Option - - This option specifies the MTU to use on this interface. The MTU is - specified as a 16-bit unsigned integer. The minimum legal value for - the MTU is 68. - - The code for this option is 26, and its length is 2. - - Code Len MTU - +-----+-----+-----+-----+ - | 26 | 2 | m1 | m2 | - +-----+-----+-----+-----+ - - - - - - - - - - - - - - - - - -Alexander & Droms [Page 13] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -5.2. All Subnets are Local Option - - This option specifies whether or not the client may assume that all - subnets of the IP network to which the client is connected use the - same MTU as the subnet of that network to which the client is - directly connected. A value of 1 indicates that all subnets share - the same MTU. A value of 0 means that the client should assume that - some subnets of the directly connected network may have smaller MTUs. - - The code for this option is 27, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 27 | 1 | 0/1 | - +-----+-----+-----+ - -5.3. Broadcast Address Option - - This option specifies the broadcast address in use on the client's - subnet. Legal values for broadcast addresses are specified in - section 3.2.1.3 of [4]. - - The code for this option is 28, and its length is 4. - - Code Len Broadcast Address - +-----+-----+-----+-----+-----+-----+ - | 28 | 4 | b1 | b2 | b3 | b4 | - +-----+-----+-----+-----+-----+-----+ - -5.4. Perform Mask Discovery Option - - This option specifies whether or not the client should perform subnet - mask discovery using ICMP. A value of 0 indicates that the client - should not perform mask discovery. A value of 1 means that the - client should perform mask discovery. - - The code for this option is 29, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 29 | 1 | 0/1 | - +-----+-----+-----+ - - - - - - - - - -Alexander & Droms [Page 14] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -5.5. Mask Supplier Option - - This option specifies whether or not the client should respond to - subnet mask requests using ICMP. A value of 0 indicates that the - client should not respond. A value of 1 means that the client should - respond. - - The code for this option is 30, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 30 | 1 | 0/1 | - +-----+-----+-----+ - -5.6. Perform Router Discovery Option - - This option specifies whether or not the client should solicit - routers using the Router Discovery mechanism defined in RFC 1256 - [13]. A value of 0 indicates that the client should not perform - router discovery. A value of 1 means that the client should perform - router discovery. - - The code for this option is 31, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 31 | 1 | 0/1 | - +-----+-----+-----+ - -5.7. Router Solicitation Address Option - - This option specifies the address to which the client should transmit - router solicitation requests. - - The code for this option is 32, and its length is 4. - - Code Len Address - +-----+-----+-----+-----+-----+-----+ - | 32 | 4 | a1 | a2 | a3 | a4 | - +-----+-----+-----+-----+-----+-----+ - - - - - - - - - - - -Alexander & Droms [Page 15] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -5.8. Static Route Option - - This option specifies a list of static routes that the client should - install in its routing cache. If multiple routes to the same - destination are specified, they are listed in descending order of - priority. - - The routes consist of a list of IP address pairs. The first address - is the destination address, and the second address is the router for - the destination. - - The default route (0.0.0.0) is an illegal destination for a static - route. See section 3.5 for information about the router option. - - The code for this option is 33. The minimum length of this option is - 8, and the length MUST be a multiple of 8. - - Code Len Destination 1 Router 1 - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+ - | 33 | n | d1 | d2 | d3 | d4 | r1 | r2 | r3 | r4 | - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+ - Destination 2 Router 2 - +-----+-----+-----+-----+-----+-----+-----+-----+--- - | d1 | d2 | d3 | d4 | r1 | r2 | r3 | r4 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+--- - -6. Link Layer Parameters per Interface - - This section lists the options that affect the operation of the data - link layer on a per-interface basis. - -6.1. Trailer Encapsulation Option - - This option specifies whether or not the client should negotiate the - use of trailers (RFC 893 [14]) when using the ARP protocol. A value - of 0 indicates that the client should not attempt to use trailers. A - value of 1 means that the client should attempt to use trailers. - - The code for this option is 34, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 34 | 1 | 0/1 | - +-----+-----+-----+ - - - - - - - -Alexander & Droms [Page 16] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -6.2. ARP Cache Timeout Option - - This option specifies the timeout in seconds for ARP cache entries. - The time is specified as a 32-bit unsigned integer. - - The code for this option is 35, and its length is 4. - - Code Len Time - +-----+-----+-----+-----+-----+-----+ - | 35 | 4 | t1 | t2 | t3 | t4 | - +-----+-----+-----+-----+-----+-----+ - -6.3. Ethernet Encapsulation Option - - This option specifies whether or not the client should use Ethernet - Version 2 (RFC 894 [15]) or IEEE 802.3 (RFC 1042 [16]) encapsulation - if the interface is an Ethernet. A value of 0 indicates that the - client should use RFC 894 encapsulation. A value of 1 means that the - client should use RFC 1042 encapsulation. - - The code for this option is 36, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 36 | 1 | 0/1 | - +-----+-----+-----+ - -7. TCP Parameters - - This section lists the options that affect the operation of the TCP - layer on a per-interface basis. - -7.1. TCP Default TTL Option - - This option specifies the default TTL that the client should use when - sending TCP segments. The value is represented as an 8-bit unsigned - integer. The minimum value is 1. - - The code for this option is 37, and its length is 1. - - Code Len TTL - +-----+-----+-----+ - | 37 | 1 | n | - +-----+-----+-----+ - - - - - - - -Alexander & Droms [Page 17] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -7.2. TCP Keepalive Interval Option - - This option specifies the interval (in seconds) that the client TCP - should wait before sending a keepalive message on a TCP connection. - The time is specified as a 32-bit unsigned integer. A value of zero - indicates that the client should not generate keepalive messages on - connections unless specifically requested by an application. - - The code for this option is 38, and its length is 4. - - Code Len Time - +-----+-----+-----+-----+-----+-----+ - | 38 | 4 | t1 | t2 | t3 | t4 | - +-----+-----+-----+-----+-----+-----+ - -7.3. TCP Keepalive Garbage Option - - This option specifies the whether or not the client should send TCP - keepalive messages with a octet of garbage for compatibility with - older implementations. A value of 0 indicates that a garbage octet - should not be sent. A value of 1 indicates that a garbage octet - should be sent. - - The code for this option is 39, and its length is 1. - - Code Len Value - +-----+-----+-----+ - | 39 | 1 | 0/1 | - +-----+-----+-----+ - -8. Application and Service Parameters - - This section details some miscellaneous options used to configure - miscellaneous applications and services. - -8.1. Network Information Service Domain Option - - This option specifies the name of the client's NIS [17] domain. The - domain is formatted as a character string consisting of characters - from the NVT ASCII character set. - - The code for this option is 40. Its minimum length is 1. - - Code Len NIS Domain Name - +-----+-----+-----+-----+-----+-----+--- - | 40 | n | n1 | n2 | n3 | n4 | ... - +-----+-----+-----+-----+-----+-----+--- - - - - -Alexander & Droms [Page 18] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -8.2. Network Information Servers Option - - This option specifies a list of IP addresses indicating NIS servers - available to the client. Servers SHOULD be listed in order of - preference. - - The code for this option is 41. Its minimum length is 4, and the - length MUST be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 41 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -8.3. Network Time Protocol Servers Option - - This option specifies a list of IP addresses indicating NTP [18] - servers available to the client. Servers SHOULD be listed in order - of preference. - - The code for this option is 42. Its minimum length is 4, and the - length MUST be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-- - | 42 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-- - -8.4. Vendor Specific Information - - This option is used by clients and servers to exchange vendor- - specific information. The information is an opaque object of n - octets, presumably interpreted by vendor-specific code on the clients - and servers. The definition of this information is vendor specific. - The vendor is indicated in the class-identifier option. Servers not - equipped to interpret the vendor-specific information sent by a - client MUST ignore it (although it may be reported). Clients which - do not receive desired vendor-specific information SHOULD make an - attempt to operate without it, although they may do so (and announce - they are doing so) in a degraded mode. - - If a vendor potentially encodes more than one item of information in - this option, then the vendor SHOULD encode the option using - "Encapsulated vendor-specific options" as described below: - - The Encapsulated vendor-specific options field SHOULD be encoded as a - sequence of code/length/value fields of identical syntax to the DHCP - options field with the following exceptions: - - - -Alexander & Droms [Page 19] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - - 1) There SHOULD NOT be a "magic cookie" field in the encapsulated - vendor-specific extensions field. - - 2) Codes other than 0 or 255 MAY be redefined by the vendor within - the encapsulated vendor-specific extensions field, but SHOULD - conform to the tag-length-value syntax defined in section 2. - - 3) Code 255 (END), if present, signifies the end of the - encapsulated vendor extensions, not the end of the vendor - extensions field. If no code 255 is present, then the end of - the enclosing vendor-specific information field is taken as the - end of the encapsulated vendor-specific extensions field. - - The code for this option is 43 and its minimum length is 1. - - Code Len Vendor-specific information - +-----+-----+-----+-----+--- - | 43 | n | i1 | i2 | ... - +-----+-----+-----+-----+--- - - When encapsulated vendor-specific extensions are used, the - information bytes 1-n have the following format: - - Code Len Data item Code Len Data item Code - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+ - | T1 | n | d1 | d2 | ... | T2 | n | D1 | D2 | ... | ... | - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+ - -8.5. NetBIOS over TCP/IP Name Server Option - - The NetBIOS name server (NBNS) option specifies a list of RFC - 1001/1002 [19] [20] NBNS name servers listed in order of preference. - - The code for this option is 44. The minimum length of the option is - 4 octets, and the length must always be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+---- - | 44 | n | a1 | a2 | a3 | a4 | b1 | b2 | b3 | b4 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+---- - - - - - - - - - - - -Alexander & Droms [Page 20] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -8.6. NetBIOS over TCP/IP Datagram Distribution Server Option - - The NetBIOS datagram distribution server (NBDD) option specifies a - list of RFC 1001/1002 NBDD servers listed in order of preference. The - code for this option is 45. The minimum length of the option is 4 - octets, and the length must always be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+---- - | 45 | n | a1 | a2 | a3 | a4 | b1 | b2 | b3 | b4 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+---- - -8.7. NetBIOS over TCP/IP Node Type Option - - The NetBIOS node type option allows NetBIOS over TCP/IP clients which - are configurable to be configured as described in RFC 1001/1002. The - value is specified as a single octet which identifies the client type - as follows: - - Value Node Type - ----- --------- - 0x1 B-node - 0x2 P-node - 0x4 M-node - 0x8 H-node - - In the above chart, the notation '0x' indicates a number in base-16 - (hexadecimal). - - The code for this option is 46. The length of this option is always - 1. - - Code Len Node Type - +-----+-----+-----------+ - | 46 | 1 | see above | - +-----+-----+-----------+ - - - - - - - - - - - - - - - -Alexander & Droms [Page 21] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -8.8. NetBIOS over TCP/IP Scope Option - - The NetBIOS scope option specifies the NetBIOS over TCP/IP scope - parameter for the client as specified in RFC 1001/1002. See [19], - [20], and [8] for character-set restrictions. - - The code for this option is 47. The minimum length of this option is - 1. - - Code Len NetBIOS Scope - +-----+-----+-----+-----+-----+-----+---- - | 47 | n | s1 | s2 | s3 | s4 | ... - +-----+-----+-----+-----+-----+-----+---- - -8.9. X Window System Font Server Option - - This option specifies a list of X Window System [21] Font servers - available to the client. Servers SHOULD be listed in order of - preference. - - The code for this option is 48. The minimum length of this option is - 4 octets, and the length MUST be a multiple of 4. - - Code Len Address 1 Address 2 - +-----+-----+-----+-----+-----+-----+-----+-----+--- - | 48 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+--- - -8.10. X Window System Display Manager Option - - This option specifies a list of IP addresses of systems that are - running the X Window System Display Manager and are available to the - client. - - Addresses SHOULD be listed in order of preference. - - The code for the this option is 49. The minimum length of this option - is 4, and the length MUST be a multiple of 4. - - Code Len Address 1 Address 2 - - +-----+-----+-----+-----+-----+-----+-----+-----+--- - | 49 | n | a1 | a2 | a3 | a4 | a1 | a2 | ... - +-----+-----+-----+-----+-----+-----+-----+-----+--- - - - - - - - -Alexander & Droms [Page 22] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -9. DHCP Extensions - - This section details the options that are specific to DHCP. - -9.1. Requested IP Address - - This option is used in a client request (DHCPDISCOVER) to allow the - client to request that a particular IP address be assigned. - - The code for this option is 50, and its length is 4. - - Code Len Address - +-----+-----+-----+-----+-----+-----+ - | 50 | 4 | a1 | a2 | a3 | a4 | - +-----+-----+-----+-----+-----+-----+ - -9.2. IP Address Lease Time - - This option is used in a client request (DHCPDISCOVER or DHCPREQUEST) - to allow the client to request a lease time for the IP address. In a - server reply (DHCPOFFER), a DHCP server uses this option to specify - the lease time it is willing to offer. - - The time is in units of seconds, and is specified as a 32-bit - unsigned integer. - - The code for this option is 51, and its length is 4. - - Code Len Lease Time - +-----+-----+-----+-----+-----+-----+ - | 51 | 4 | t1 | t2 | t3 | t4 | - +-----+-----+-----+-----+-----+-----+ - -9.3. Option Overload - - This option is used to indicate that the DHCP "sname" or "file" - fields are being overloaded by using them to carry DHCP options. A - DHCP server inserts this option if the returned parameters will - exceed the usual space allotted for options. - - If this option is present, the client interprets the specified - additional fields after it concludes interpretation of the standard - option fields. - - The code for this option is 52, and its length is 1. Legal values - for this option are: - - - - - -Alexander & Droms [Page 23] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - - Value Meaning - ----- -------- - 1 the "file" field is used to hold options - 2 the "sname" field is used to hold options - 3 both fields are used to hold options - - Code Len Value - +-----+-----+-----+ - | 52 | 1 |1/2/3| - +-----+-----+-----+ - -9.4. DHCP Message Type - - This option is used to convey the type of the DHCP message. The code - for this option is 53, and its length is 1. Legal values for this - option are: - - Value Message Type - ----- ------------ - 1 DHCPDISCOVER - 2 DHCPOFFER - 3 DHCPREQUEST - 4 DHCPDECLINE - 5 DHCPACK - 6 DHCPNAK - 7 DHCPRELEASE - - Code Len Type - +-----+-----+-----+ - | 53 | 1 | 1-7 | - +-----+-----+-----+ - -9.5. Server Identifier - - This option is used in DHCPOFFER and DHCPREQUEST messages, and may - optionally be included in the DHCPACK and DHCPNAK messages. DHCP - servers include this option in the DHCPOFFER in order to allow the - client to distinguish between lease offers. DHCP clients indicate - which of several lease offers is being accepted by including this - option in a DHCPREQUEST message. - - The identifier is the IP address of the selected server. - - - - - - - - - -Alexander & Droms [Page 24] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - - The code for this option is 54, and its length is 4. - - Code Len Address - +-----+-----+-----+-----+-----+-----+ - | 54 | 4 | a1 | a2 | a3 | a4 | - +-----+-----+-----+-----+-----+-----+ - -9.6. Parameter Request List - - This option is used by a DHCP client to request values for specified - configuration parameters. The list of requested parameters is - specified as n octets, where each octet is a valid DHCP option code - as defined in this document. - - The client MAY list the options in order of preference. The DHCP - server is not required to return the options in the requested order, - but MUST try to insert the requested options in the order requested - by the client. - - The code for this option is 55. Its minimum length is 1. - - Code Len Option Codes - +-----+-----+-----+-----+--- - | 55 | n | c1 | c2 | ... - +-----+-----+-----+-----+--- - -9.7. Message - - This option is used by a DHCP server to provide an error message to a - DHCP client in a DHCPNAK message in the event of a failure. A client - may use this option in a DHCPDECLINE message to indicate the why the - client declined the offered parameters. The message consists of n - octets of NVT ASCII text, which the client may display on an - available output device. - - The code for this option is 56 and its minimum length is 1. - - Code Len Text - +-----+-----+-----+-----+--- - | 56 | n | c1 | c2 | ... - +-----+-----+-----+-----+--- - - - - - - - - - - -Alexander & Droms [Page 25] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -9.8. Maximum DHCP Message Size - - This option specifies the maximum length DHCP message that it is - willing to accept. The length is specified as an unsigned 16-bit - integer. A client may use the maximum DHCP message size option in - DHCPDISCOVER or DHCPREQUEST messages, but should not use the option - in DHCPDECLINE messages. - - The code for this option is 57, and its length is 2. The minimum - legal value is 576 octets. - - Code Len Length - +-----+-----+-----+-----+ - | 57 | 2 | l1 | l2 | - +-----+-----+-----+-----+ - -9.9. Renewal (T1) Time Value - - This option specifies the time interval from address assignment until - the client transitions to the RENEWING state. - - The value is in units of seconds, and is specified as a 32-bit - unsigned integer. - - The code for this option is 58, and its length is 4. - - Code Len T1 Interval - +-----+-----+-----+-----+-----+-----+ - | 58 | 4 | t1 | t2 | t3 | t4 | - +-----+-----+-----+-----+-----+-----+ - -9.10. Rebinding (T2) Time Value - - This option specifies the time interval from address assignment until - the client transitions to the REBINDING state. - - The value is in units of seconds, and is specified as a 32-bit - unsigned integer. - - The code for this option is 59, and its length is 4. - - Code Len T2 Interval - +-----+-----+-----+-----+-----+-----+ - | 59 | 4 | t1 | t2 | t3 | t4 | - +-----+-----+-----+-----+-----+-----+ - - - - - - -Alexander & Droms [Page 26] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -9.11. Class-identifier - - This option is used by DHCP clients to optionally identify the type - and configuration of a DHCP client. The information is a string of n - octets, interpreted by servers. Vendors and sites may choose to - define specific class identifiers to convey particular configuration - or other identification information about a client. For example, the - identifier may encode the client's hardware configuration. Servers - not equipped to interpret the class-specific information sent by a - client MUST ignore it (although it may be reported). - - The code for this option is 60, and its minimum length is 1. - - Code Len Class-Identifier - +-----+-----+-----+-----+--- - | 60 | n | i1 | i2 | ... - +-----+-----+-----+-----+--- - -9.12. Client-identifier - - This option is used by DHCP clients to specify their unique - identifier. DHCP servers use this value to index their database of - address bindings. This value is expected to be unique for all - clients in an administrative domain. - - Identifiers consist of a type-value pair, similar to the - - It is expected that this field will typically contain a hardware type - and hardware address, but this is not required. Current legal values - for hardware types are defined in [22]. - - The code for this option is 61, and its minimum length is 2. - - Code Len Type Client-Identifier - +-----+-----+-----+-----+-----+--- - | 61 | n | t1 | i1 | i2 | ... - +-----+-----+-----+-----+-----+--- - -10. Extensions - - Additional generic data fields may be registered by contacting: - - Internet Assigned Numbers Authority (IANA) - USC/Information Sciences Institute - 4676 Admiralty Way - Marina del Rey, California 90292-6695 - - or by email as: iana@isi.edu - - - -Alexander & Droms [Page 27] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - - Implementation specific use of undefined generic types (those in the - range 61-127) may conflict with other implementations, and - registration is required. - -11. Acknowledgements - - The authors would like to thank Philip Almquist for his feedback on - this document. The comments of the DHCP Working Group are also - gratefully acknowledged. In particular, Mike Carney and Jon Dreyer - from SunSelect suggested the current format of the Vendor-specific - Information option. - - RFC 1497 is based on earlier work by Philip Prindeville, with help - from Drew Perkins, Bill Croft, and Steve Deering. - -12. References - - [1] Droms, R., "Dynamic Host Configuration Protocol", RFC 1531, - Bucknell University, October 1993. - - [2] Reynolds, J., "BOOTP Vendor Information Extensions", RFC 1497, - USC/Information Sciences Institute, August 1993. - - [3] Croft, W., and J. Gilmore, "Bootstrap Protocol", RFC 951, - Stanford University and Sun Microsystems, September 1985. - - [4] Braden, R., Editor, "Requirements for Internet Hosts - - Communication Layers", STD 3, RFC 1122, USC/Information Sciences - Institute, October 1989. - - [5] Mogul, J., and J. Postel, "Internet Standard Subnetting - Procedure", STD 5, RFC 950, USC/Information Sciences Institute, - August 1985. - - [6] Postel, J., and K. Harrenstien, "Time Protocol", STD 26, RFC - 868, USC/Information Sciences Institute, SRI, May 1983. - - [7] Postel, J., "Name Server", IEN 116, USC/Information Sciences - Institute, August 1979. - - [8] Mockapetris, P., "Domain Names - Implementation and - Specification", STD 13, RFC 1035, USC/Information Sciences - Institute, November 1987. - - [9] Postel, J., "Quote of the Day Protocol", STD 23, RFC 865, - USC/Information Sciences Institute, May 1983. - - - - - -Alexander & Droms [Page 28] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - - [10] McLaughlin, L., "Line Printer Daemon Protocol", RFC 1179, The - Wollongong Group, August 1990. - - [11] Accetta, M., "Resource Location Protocol", RFC 887, CMU, - December 1983. - - [12] Mogul, J. and S. Deering, "Path MTU Discovery", RFC 1191, - DECWRL, Stanford University, November 1990. - - [13] Deering, S., "ICMP Router Discovery Messages", RFC 1256, - Xerox PARC, September 1991. - - [14] Leffler, S. and M. Karels, "Trailer Encapsulations", RFC 893, - U. C. Berkeley, April 1984. - - [15] Hornig, C., "Standard for the Transmission of IP Datagrams over - Ethernet Networks", RFC 894, Symbolics, April 1984. - - [16] Postel, J. and J. Reynolds, "Standard for the Transmission of - IP Datagrams Over IEEE 802 Networks", RFC 1042, USC/Information - Sciences Institute, February 1988. - - [17] Sun Microsystems, "System and Network Administration", March - 1990. - - [18] Mills, D., "Internet Time Synchronization: The Network Time - Protocol", RFC 1305, UDEL, March 1992. - - [19] NetBIOS Working Group, "Protocol Standard for a NetBIOS Service - on a TCP/UDP transport: Concepts and Methods", STD 19, RFC 1001, - March 1987. - - [20] NetBIOS Working Group, "Protocol Standard for a NetBIOS Service - on a TCP/UDP transport: Detailed Specifications", STD 19, RFC - 1002, March 1987. - - [21] Scheifler, R., "FYI On the X Window System", FYI 6, RFC 1198, - MIT Laboratory for Computer Science, January 1991. - - [22] Reynolds, J., and J. Postel, "Assigned Numbers", STD 2, RFC 1340, - USC/Information Sciences Institute, July 1992. - -13. Security Considerations - - Security issues are not discussed in this memo. - - - - - - -Alexander & Droms [Page 29] - -RFC 1533 DHCP Options and BOOTP Vendor Extensions October 1993 - - -14. Authors' Addresses - - Steve Alexander - Lachman Technology, Inc. - 1901 North Naper Boulevard - Naperville, IL 60563-8895 - - Phone: (708) 505-9555 x256 - EMail: stevea@lachman.com - - - Ralph Droms - Computer Science Department - 323 Dana Engineering - Bucknell University - Lewisburg, PA 17837 - - Phone: (717) 524-1145 - EMail: droms@bucknell.edu - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Alexander & Droms [Page 30] -
\ No newline at end of file |