<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lear-teap-config-options-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="TEAP DHCPv6 TLV">New TEAP TLV for Encapsulating DHCPv6 Options</title>
    <seriesInfo name="Internet-Draft" value="draft-lear-teap-config-options-00"/>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <street>Richtistrasse 7</street>
          <city>Wallisellen</city>
          <code>8304</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 44 878 9200</phone>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <author initials="A." surname="Dekok" fullname="Alan Dekok">
      <organization>InkBridge Networks</organization>
      <address>
        <email>alan.dekok@inkbridge.io</email>
      </address>
    </author>
    <date year="2025" month="July" day="05"/>
    <area>Security</area>
    <workgroup>EMU Working Group</workgroup>
    <keyword>TEAP</keyword>
    <keyword>TLV</keyword>
    <keyword>DHCP</keyword>
    <keyword>Authentication</keyword>
    <abstract>
      <?line 51?>

<t>This document defines a new Tunneled Extensible Authentication
Protocol (TEAP) Type-Length-Value (TLV) to encapsulate DHCPv6 (Dynamic
Host Configuration Protocol Version 6) options within TEAP
authentication exchanges. This enhancement enables exchange of network
configuration parameters after the authentication phase.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://elear.github.io/teap-config-options/main/draft-lear-teap-config-options.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lear-teap-config-options/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EMU WG Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://example.com/WG"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/elear/draft-lear-teap-config-option"/>.</t>
    </note>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TEAP (Tunneled Extensible Authentication Protocol), defined in
<xref target="I-D.ietf-emu-rfc7170bis"/>, supports the use of Type-Length-Value (TLV) structures
to exchange additional data during the authentication process. DHCPv6
<xref target="RFC8415"/> is widely used for configuration of network
parameters. This document introduces a new TLV to encapsulate DHCPv6
options within TEAP messages.</t>
      <t><xref target="RFC9445"/> specifies a way to communicate DHCPv6 options to a RADIUS
client.  This memo specifies a means to communicate options end-to-end
between the authentication server and the peer.</t>
      <t>Not all DHCP communications will necessarily make sense in this
context.  For instance, an AAA server may only wish to send
non-topological options, such as a definitions for a print server, or next hop
configuration URL.  It might not send next-hop router or
IP address binding information.</t>
      <t>Sending options in a protected and authenticated TLS tunnel also
authenticates the options, and allows them to be transmitted securely
from the authentication server to the peer.  While <xref section="20" sectionFormat="comma" target="RFC8415"/> provides for authentication of DHCP messages, this feature is not
always used.  Even if the DHCP messages are authenticated, there are
still benefits to sending options inside of a protected TEAP session.</t>
      <section anchor="use-of-both-dhcpv6-and-teap-protocols">
        <name>Use of both DHCPv6 and TEAP protocols</name>
        <t>Because DHCPv6 is widely deployed, peers implementing this specification
can expect to receive information via both TEAP and DHCPv6.  Therefore, the
possibility of a conflict arises.  Clients are not in a good position to
determine on their own which information is correct.  Therefore, the
following strategy is RECOMMENDED:</t>
        <ol spacing="normal" type="1"><li>
            <t>Peers receiving information only via DHCP will use that information.</t>
          </li>
          <li>
            <t>Peers receiving DHCP information only via TEAP will use that information.</t>
          </li>
          <li>
            <t>Peers receiving overlapping DHCPv6 options SHOULD select TEAP information
since it is likely to be better authenticated and unchanged.</t>
          </li>
          <li>
            <t>If conflicting information is received by the peer it SHOULD log the
conflict as an error and MAY produce an exception.</t>
          </li>
        </ol>
        <t>In practice, these rules can be applied by a peer initializing a
result option list by using the options which are received from TEAP,
and then selectively adding options from DHCP.  Before adding a DHCP
option, the peer checks (by number) if the option already exists in
the result option list.  If no matching option exists, it is added.
If a matching option exists, the values are compared, and a log
message can be generated.</t>
        <t>It is RECOMMENDED that conflict be avoided by having the DHCP server
send options which control network behavior (address assignment,
routes, etc).  The TEAP server can then send options which require the
peer to follow a particular policy.  The detailed list of which
options fall into which category is site-specific, and out of scope
of this specification.</t>
      </section>
    </section>
    <section anchor="teap-tlv-for-dhcpv6-options">
      <name>TEAP TLV for DHCPv6 Options</name>
      <t>DHCPv6 options are carried within the DHCPv6-Options TLV.  The TLV
format is defined below.</t>
      <t>Both the TEAP server and TEAP client MAY transmit this TLV during
Phase 2, and it MAY be included in a Request Action frame.  The
Mandatory bit MUST not be set.  If either side sends this TLV prior
to Phase 2, an error TLV of 2002 (Unexpected TLVs Exchanged)
be returned with a Result of Status=Failure.  That is, the table
in Section 4.3.1 of <xref target="I-D.ietf-emu-rfc7170bis"/> remains unchanged.</t>
      <t>Thus this TLV MAY be used as follows:</t>
      <table anchor="tabAllowed">
        <name>When is this TLV Allowed</name>
        <thead>
          <tr>
            <th align="left">Request</th>
            <th align="left">Response</th>
            <th align="left">Success</th>
            <th align="left">Failure</th>
            <th align="left">TLV</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0-1</td>
            <td align="left">0-1</td>
            <td align="left">0-1</td>
            <td align="left">0</td>
            <td align="left">DHCPv6-Options</td>
          </tr>
        </tbody>
      </table>
      <t>A TEAP peer or server receiving this TLV SHOULD NOT act on it until
the other side has been sufficiently authenticated, but it is not an
error to send this TLV in advance of such authentication.  In this
way, the TLV can be conveniently piggybacked as part of the
authentication prior to a result or intermediate result being
generated.</t>
      <section anchor="tlv-format">
        <name>TLV Format</name>
        <t>The DHCPv6-Options TLV follows the TEAP TLV format from
<xref section="4.2.1" sectionFormat="comma" target="I-D.ietf-emu-rfc7170bis"/>, and is defined below:</t>
        <figure anchor="packetform">
          <name>DHCP options TLV format</name>
          <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |M|R|         TLV Type          |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           DHCPv6 options...
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

]]></artwork>
        </figure>
        <artwork><![CDATA[
   M

      0 - Optional TLV

   R

      Reserved, set to zero (0)

   TLV Type

      TBD - DHCPv6 options

   Length

      >=2 octets

   DHCPv6 options

      This field MUST contain DHCPv6 options, as defined in
      {{RFC8415, Section 21.1}}.
]]></artwork>
        <section anchor="dhcpv6-option-encapsulation">
          <name>DHCPv6 Option Encapsulation</name>
          <t>The TLV Value field encapsulates DHCPv6 options exactly as they appear
in DHCPv6 messages.  There MUST NOT be more than one DHCPv6-Options
TLV in a TEAP exchange.  The TEAP TLV format is sufficient to carry
any number of DHCPv6 options which may be needed.</t>
          <t>A party which receives multiple DHCPv6-Options TLVs during a TEAP
exchange SHOULD process only the first such option, and then ignore
all remaining ones.</t>
          <t>The format adheres to the standard DHCPv6 option encoding, ensuring
compatibility with existing DHCPv6 implementations.</t>
          <t>Encapsulating this option in the TLV would look as follows (in hexadecimal):</t>
          <artwork><![CDATA[
Type: 0xXXXX (TBD assigned by IANA)
Length: 0x0014
Value: 0x00170010FE8000000000000000000000000001
]]></artwork>
          <t>Where:</t>
          <ul spacing="normal">
            <li>
              <t><tt>Type = 0xXXXX</tt> (TBD assigned by IANA)</t>
            </li>
            <li>
              <t><tt>Length = 0x0014</tt> (20 bytes for the "Recursive DNS Servers" option, including addresses)</t>
            </li>
            <li>
              <t><tt>Value = 0x00170010FE8000000000000000000000000001</tt> (DHCPv6 Option 23 with an IPv6 address of <tt>FE80::1</tt>).</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Encapsulating DHCPv6 options within TEAP messages inherits the
security guarantees of the TEAP protocol. Further details on
mitigation strategies are discussed in <xref target="I-D.ietf-emu-rfc7170bis"/>.</t>
      <t>Sending DHCPv6 options withing a protected and authenticated TLS
tunnel provides for additional authentication of those options, and
for exchanging the options in a secure manner.  While DHCPv6 provides
for message authentication, that functionality is not always
available.</t>
      <t>This feature also enables better separation of responsibilities.  A
DHCPv6 server can simply manage address assignment and network
configuration.  The TEAP authentication server can then manage higher
level network policies.</t>
      <section anchor="additional-policy-decisions">
        <name>Additional Policy Decisions</name>
        <t>DHCP clients can send options which indicate their desired network
posture.  An authentication server can then make policy decisions
based on the options, such as placing the device into a different
VLAN.</t>
      </section>
      <section anchor="captive-portals-and-provisioning">
        <name>Captive Portals and Provisioning</name>
        <t>TEAP provides for unauthenticated access for provisioning.  The
DHCPv6-Options TLV can be used within a provisioning network without
issue.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new TEAP TLV type value for the DHCPv6
Options TLV from the TEAP TLV Type registry defined in <xref target="I-D.ietf-emu-rfc7170bis"/>.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors hope to thank the members of the IETF EMU Working Group
for their valuable input and contributions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-emu-rfc7170bis">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
         </author>
            <date day="28" month="May" year="2025"/>
            <abstract>
              <t>   This document defines the Tunnel Extensible Authentication Protocol
   (TEAP) version 1.  TEAP is a tunnel-based EAP method that enables
   secure communication between a peer and a server by using the
   Transport Layer Security (TLS) protocol to establish a mutually
   authenticated tunnel.  Within the tunnel, TLV objects are used to
   convey authentication-related data between the EAP peer and the EAP
   server.  This document obsoletes RFC 7170 and updates RFC 9427 by
   moving all TEAP specifications from those documents to this one.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-rfc7170bis-22"/>
        </reference>
        <reference anchor="RFC8415">
          <front>
            <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
            <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
            <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
            <author fullname="B. Volz" initials="B." surname="Volz"/>
            <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="T. Winters" initials="T." surname="Winters"/>
            <date month="November" year="2018"/>
            <abstract>
              <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
              <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8415"/>
          <seriesInfo name="DOI" value="10.17487/RFC8415"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
      </references>
    </references>
    <?line 253?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
