Dynamic Host Configuration Working D. Hankins Group ISC Internet-Draft August 22, 2008 Updates: 2131 (if approved) Intended status: Standards Track Expires: February 23, 2009 Dynamic Host Configuration Protocol DHCPINFORM Message Clarifications draft-dhankins-dhcpinform-clarify-00 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on February 23, 2009. Abstract The DHCPINFORM message within the DHCPv4 protocol has in operation diverged incompatibly from the previously defined standard, and some questions about DHCPv4 server behaviour remain unclear. Hankins Expires February 23, 2009 [Page 1] Internet-Draft DHCPINFORM Clarify August 2008 Table of Contents 1. Requirements Language . . . . . . . . . . . . . . . . . . . . 3 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Client Behaviour . . . . . . . . . . . . . . . . . . . . . . . 4 4. Server Behaviour . . . . . . . . . . . . . . . . . . . . . . . 4 5. Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 6. Security Considerations . . . . . . . . . . . . . . . . . . . 8 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8 8.1. Normative References . . . . . . . . . . . . . . . . . . . 8 8.2. Informative References . . . . . . . . . . . . . . . . . . 9 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 9 Intellectual Property and Copyright Statements . . . . . . . . . . 10 Hankins Expires February 23, 2009 [Page 2] Internet-Draft DHCPINFORM Clarify August 2008 1. Requirements Language In this document, the key words "MAY", "MUST, "MUST NOT", "OPTIONAL", "RECOMMENDED", "SHOULD", and "SHOULD NOT", are to be interpreted as described in BCP 14, RFC 2119 [RFC2119]. 2. Introduction The most recent DHCPv4 Standard [RFC2131] added a new DHCPv4 message: DHCPINFORM. The intent of the DHCPINFORM message was for clients that used manually entered fixed IPv4 addresses to still be able to get some configuration state dynamically. Since that time, however, we have seen this message used by normal DHCPv4 dynamic addressing clients; clients that have previously succeeded in receiving configuration through DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, and finally DHCPACK messages. These clients are attempting DHCPINFORM messages in order to obtain additional configuration state that was not present in their lease binding. The discovery is that DHCPINFORM can be used to reach extra DHCP servers, other than the one that gave an address, which may have more configuration options available but isn't in a position to give addresses. Some of these DHCPINFORM clients have surfaced which run with stripped down user priveleges, but still performs some network related functions. This software does not have the capacity to determine its IPv4 address(es), nor does it know what interface(s) are present on the system, or their Hardware (MAC) addresses. But it can send and receive DHCP packets. Consequently, the 'ciaddr' and 'chaddr' fields have been witnessed to be empty, even though they are required to be filled by RFC2131. Another set of DHCP clients set the 'chaddr' field to a fixed magic value, rather than the client's MAC address, identifying them as part of a vendor's product. This is resulting from confusion about where a DHCPv4 server should source the destination MAC address in any replies it makes; from ARP [RFC0826], from the packet source field, or from the chaddr contents. We also wish to clarify the DHCPv4 server's behaviour when it receives a DHCPINFORM via a relay - when 'giaddr' is set nonzero, especially when the ciaddr and chaddr fields are zero or garbage. Hankins Expires February 23, 2009 [Page 3] Internet-Draft DHCPINFORM Clarify August 2008 3. Client Behaviour Clients are still required to fulfill DHCPv4 Requirements [RFC2131] for DHCPINFORM messages. But the following are clarified as in addition, or to overlay those requirements: o Clients SHOULD set 'ciaddr' to a working IPv4 address they can receive replies on. Having done so, the client WILL receive replies at this address. No other value is valid, but clients MAY set the field zero if their IPv4 address is unknown. o Clients SHOULD set 'chaddr', 'htype', and 'hlen' to the actual L2 address of the interface being used, and expect to receive replies to. No other value is valid, but clients MAY set the fields all zero if the hardware address is unknown. o Clients MUST NOT set the 'BROADCAST' flag, unless the client is not capable of receiving IPv4 unciasts, in which case it MUST set the 'BROADCAST' flag. o Clients SHOULD direct their DHCPINFORM via unicast UDP to the IPv4 address contained in the Server Identifier [RFC2132] option, if they have an active binding. 4. Server Behaviour DHCPv4 server behaviour in processing DHCPINFORM messages is a more difficult question to answer, due to inconsistent client behaviour, and conflicting directions in RFC2131. The following is intended to be a more complete reference. First, upon receiving a DHCPINFORM, a DHCPv4 Server MUST determine the client's "relevant IPv4 address" according to the following in order of priority: 1. The Subnet Selection Option [RFC3011], if it is present and supported. 2. The 'ciaddr' field, if it is nonzero. 3. The Relay Agent Link Selection Sub-Option [RFC3046], if it is present in a Relay Agent Information Option [RFC3046] in the DHCPINFORM packet (never cached from a previous exchange). 4. The 'giaddr' field, if it is nonzero. Hankins Expires February 23, 2009 [Page 4] Internet-Draft DHCPINFORM Clarify August 2008 5. The IPv4 source address field, if it is nonzero. 6. The DHCPv4 Server's address on the interface the packet was received upon. The DHCPv4 server checks to see if the "relevant IPv4 address" is within a range or subnet over which it holds authority, and is configured to respond. It will manufacture a DHCPACK response with configuration values appropriate for the "relevant IPv4 address". In the manufactured response: o The 'htype', 'hlen', 'chaddr', 'ciaddr', 'xid', 'flags' (with the excpetion noted below), and 'giaddr' fields MUST be copied from the client's DHCPINFORM. o The 'hops' field MUST be zero. o The 'secs' field MUST be zero. o The 'yiaddr' field MUST be zero. o The 'siaddr' field MUST be zero. o The 'sname' field MUST be all-zeroes. o The 'file' field MUST be all-zeroes. o The 'options' field MUST be filled as described in RFC2131 Section 4.3.1. Next, the DHCPv4 server MUST determine the "reply IPv4 address and port" according to the following priority list: 1. The 'ciaddr' field and port 68 ('DHCP client'), if it is nonzero. 2. The 'giaddr' field and port 67 ('DHCP server'), if it is nonzero. 3. The IPv4 source address field and port 68 ('DHCP client'), if it is nonzero. 4. The limited broadcast address (all ones) and port 68 ('DHCP client'). Note very carefully that a DHCPv4 server will send replies directly to a DHCPv4 client by way of 'ciaddr' even if the message is relayed. Note that this means DHCPINFORM processing is intentionally broken in deployments where the client's address space is unreachable by the Hankins Expires February 23, 2009 [Page 5] Internet-Draft DHCPINFORM Clarify August 2008 DHCPv4 server. In such cases, the server should probably be configured not to reply to DHCPINFORMs. Now, the server performs an exception to assist in relay agents. If it selected the 'giaddr' as the destination address and port, then it MUST set the 'BROADCAST' bit in the flags field true, no matter what its value was in the client's DHCPINFORM message. Having selected a destination IPv4 address and port number, the last step is to select a destination link layer address. Here's where it gets hard to figure out what order to put things in, the following are what the author thinks needs to be covered. The server is going to use a BSD socket probably to send the unicast reply to any of the 'ciaddr', 'giaddr', or IP source address versions. But it's advantageous to permit a server to send to the chaddr contents or source MAC address when the client is directly attached to avoid ARP broadcasts (and on some IP stacks, the ARP table would have been filled on packet reception anyway). Obviously the server is going to use the broadcast (all ones) MAC address when the BROADCAST bit is set, or the limited broadcast address is selected. Under construction. 5. Notes This section will self-destruct as (if) we near last-call. It is a list of RFC2131 notations I've used as a guide to navigate this maze. o Section 4.1: "If the BROADCAST bit is cleared to 0, the message SHOULD be sent as an IP unicast to the IP address specified in the 'yiaddr' field and the link-layer address specified in the 'chaddr' field." But in other sections we say that 'yiaddr' is set zero. So any message via a relay has to be broadcast in response. I don't know if relays check for 'yiaddr' equal zero and downgrade to broadcast, so I think it's best to set this bit just to help them out (this is like DHCPNAK replies, where 'yiaddr' is also zero). o Section 4.4.1, Table 5, uses the same column for both DHCPINFORM and DHCPDISCOVER. It is clear that both DHCPINFORM and DHCPDISCOVER make the same use of chaddr/htype/hlen. It is also clear that 'ciaddr' is zero on DHCPDISCOVER - but very clearly nonzero ("the client's network address") on DHCPINFORM. Since this is in the same column, and uses a wording that is similar to Hankins Expires February 23, 2009 [Page 6] Internet-Draft DHCPINFORM Clarify August 2008 other columns (which have an "or" in them), it may be overlooked if you weren't looking closely enough. In any case, 'ciaddr' very clearly must not be zero as far as RFC2131 is concerned. o Section 3.4: "Servers receiving a DHCPINFORM message construct a DHCPACK message with any local configuration parameters appropriate for the client without: allocating a new address, checking for an existing binding, filling in 'yiaddr' or including lease time parameters." ...snip... "The server SHOULD check the network address in a DHCPINFORM message for consistency, but MUST NOT check for an existing lease. The server forms a DHCPACK message containing the configuration parameters for the requesting client and sends the DHCPACK message directly to the client." This is kind of problematic. Our DHCP software lets you scope configuration parameters in a tree hierarchy, and ths includes right on the lease itself. So the MUST NOT (and the non-normative language before) that keeps us from checking for an existing lease (very vague language) also means we may give different answers to the same client at DORA time versus DHCPINFORM time. The client actually over-writes its config with the DHCPINFORM values and becomes broken. I think these two validations in RFC2131 can be simplified to one validation, which is even simpler: The server validates that the client's address is one which it is responsible for configuring. o Again Section 3.4: "The servers SHOULD unicast the DHCPACK reply to the address given in the 'ciaddr' field of the DHCPINFORM message." That 'SHOULD' kind of makes you wonder what /else/ you would do. o Section 4.3.5: "The server responds to a DHCPINFORM message by sending a DHCPACK message directly to the address given in the 'ciaddr' field of the DHCPINFORM message. The server MUST NOT send a lease expiration time to the client and SHOULD NOT fill in 'yiaddr'." So, a non-normative indication for 'ciaddr', followed by a normative SHOULD NOT for 'yiaddr' (conflicts with non- normative language in 3.4 above which makes it sound like yiaddr is zeroed). Curious. Section 4.3.1 Table 3 seems to indicate 'yiaddr' is always set on DHCPACK to the "IP address assigned to client", with no reservation for message type (other fields in this table make distinctions for DHCPINFORM). o Section 4.3.1 Table 3 lists in the DHCPACK column a lot of strange values when processing a DHCPINFORM packet. Namely, "'xid' from client DHCPREQUEST message". That is a strange thing to hang on to from the previous DORA exchange, and it's supposed that a client might not even do the DORA exchange (or might do it with a different server). Obviously this was just overlooked, but it Hankins Expires February 23, 2009 [Page 7] Internet-Draft DHCPINFORM Clarify August 2008 brings everything in this table into question. We should remove those questions. 6. Security Considerations As with all DHCP messages, DHCPINFORM and DHCPACK replies contain no capacity for encryption, and all packet contents must be presumed readable in the clear. In particular, and as outlined above, in some circumstances the packets may be broadcast and so more easily intercepted than most other messges. Authentication for DHCPv4 Messages [RFC3118] does exist, but is not well deployed. Care should be taken in the degree to which configuration parameters provided by DHCPv4 are trusted, as the replies can be easily spoofed by any eavesdropper. Again noting that packets may be broadcast under some circumstances, the BOOTP header Transaction Id field ("XID") is insufficient protection from man in the middle attacks. A relay agent receives replies via unicast UDP messages from a DHCP server, and may broadcast these packets on the inside-facing network. If an outside attacker was aware of this relay agent and its unicast address, this facility could be used to produce broadcast storms on the network. Care should be taken to ensure that the relay agent is not open to this kind of attack, possibly making use of Relay Agent Authentication [RFC4030] to ensure that a DHCPv4 server can not be induced to sending bogus replies to the relay. 7. IANA Considerations This document has no action for IANA. 8. References 8.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC2131] Droms, R., "Dynamic Host Configuration Protocol", RFC 2131, March 1997. [RFC2132] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor Extensions", RFC 2132, March 1997. Hankins Expires February 23, 2009 [Page 8] Internet-Draft DHCPINFORM Clarify August 2008 [RFC3011] Waters, G., "The IPv4 Subnet Selection Option for DHCP", RFC 3011, November 2000. [RFC3046] Patrick, M., "DHCP Relay Agent Information Option", RFC 3046, January 2001. 8.2. Informative References [RFC0826] Plummer, D., "Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware", STD 37, RFC 826, November 1982. [RFC3118] Droms, R. and W. Arbaugh, "Authentication for DHCP Messages", RFC 3118, June 2001. [RFC4030] Stapp, M. and T. Lemon, "The Authentication Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Option", RFC 4030, March 2005. Author's Address David W. Hankins Internet Systems Consortium, Inc. 950 Charter Street Redwood City, CA 94063 US Phone: +1 650 423 1307 Email: David_Hankins@isc.org Hankins Expires February 23, 2009 [Page 9] Internet-Draft DHCPINFORM Clarify August 2008 Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Hankins Expires February 23, 2009 [Page 10]