Movatterモバイル変換


[0]ホーム

URL:


Wikipedia

Dynamic Host Configuration Protocol

"DHCP" redirects here. For other uses, seeDHCP (disambiguation).Not to be confused withHDCP.

TheDynamic Host Configuration Protocol (DHCP) is anetwork management protocol used onInternet Protocol (IP) networks for automatically assigningIP addresses and other communication parameters to devices connected to the network using aclient–server architecture.[1]: Introduction 

The technology eliminates the need for individually configuring network devices manually, and consists of two network components, a centrally installed network DHCPserver and client instances of theprotocol stack on each computer or device. When connected to the network, and periodically thereafter, a clientrequests a set of parameters from the server using DHCP.

DHCP can be implemented on networks ranging in size fromresidential networks to largecampus networks and regional ISP networks.[2] Manyrouters andresidential gateways have DHCP server capability. Most residential network routers receive aunique IP address within the ISP network. Within a local network, a DHCP server assigns a local IP address to each device.

DHCP services exist for networks runningInternet Protocol version 4 (IPv4), as well as version 6 (IPv6). The IPv6 version of the DHCP protocol is commonly calledDHCPv6.

History

edit

TheReverse Address Resolution Protocol (RARP) was defined in 1984 for the configuration of simple devices, such asdiskless workstations, with a suitable IP address.[3] Acting in thedata link layer, it made implementation difficult on many server platforms. It required that a server be present on each individual network link. RARP was superseded by theBootstrap Protocol (BOOTP) defined in September 1985.[4] This introduced the concept of a relay agent, which allowed the forwarding of BOOTP packets across networks, allowing one central BOOTP server to serve hosts on many IP subnets.

DHCP was first defined in October 1993.[5][6] It is based on BOOTP, but can dynamically allocate IP addresses from a pool and reclaim them when they are no longer in use. It can also be used to deliver a wide range of extra configuration parameters to IP clients, including platform-specific parameters.[7]

Four years later, the DHCPINFORM message type (used forWPAD) and other small changes were added. This definition, from 1997,[1] remains the core of the standard for IPv4 networks.

DHCPv6 was initially defined in 2003.[8] After updates by many subsequent RFCs, its definition was replaced in 2018,[9] whereprefix delegation andstateless address autoconfiguration were now merged.

Overview

edit

Internet Protocol (IP) defines how devices communicate within and across local networks on the Internet. A DHCP server can manage IP settings for devices on its local network, e.g., by assigning IP addresses to those devices automatically and dynamically.[10]

DHCP operates based on theclient–server model. When a computer or other device connects to a network, the DHCP client software sends a DHCPbroadcast query requesting the necessary information. Any DHCP server on the network may service the request. The DHCP server manages a pool of IP addresses and information about client configuration parameters such asdefault gateway,domain name, thename servers, andtime servers. On receiving a DHCP request, the DHCP server may respond with specific information for each client, as previously configured by an administrator, or with a specific address and any other information valid for the entire network and for the time period for which the allocation (lease) is valid. A DHCP client typically queries this information immediately afterbooting, and periodically thereafter before the expiration of the information. When a DHCP client refreshes an assignment, it initially requests the same parameter values, but the DHCP server may assign a new address based on the assignment policies set by administrators.

On large networks that consist of multiple links, a single DHCP server may service the entire network when aided by DHCP relay agents located on the interconnecting routers. Such agents relay messages between DHCP clients and DHCP servers located on different subnets.

Depending on implementation, the DHCP server may have three methods of allocating IP addresses:

Dynamic allocation
Anetwork administrator reserves a range of IP addresses for DHCP, and each DHCP client on theLAN is configured to request an IP address from the DHCPserver during network initialization. The request-and-grant process uses a lease concept with a controllable time period, allowing the DHCP server to reclaim and then reallocate IP addresses that are not renewed.
Automatic allocation
The DHCP server permanently assigns an IP address to a requesting client from a range defined by an administrator. This is like dynamic allocation, but the DHCP server keeps a table of past IP address assignments, so that it can preferentially assign to a client the same IP address that the client previously had.
Manual allocation
This method is also variously calledstatic DHCP allocation,fixed address allocation,reservation, andMAC/IP address binding. An administrator maps a unique identifier (aclient id orMAC address) for each client to an IP address, which is offered to the requesting client. DHCP servers may be configured to fall back to other methods if this fails.

DHCP services are used forInternet Protocol version 4 (IPv4) andIPv6. The details of the protocol for IPv4 and IPv6 differ sufficiently that they may be considered separate protocols.[11] For the IPv6 operation, devices may alternatively usestateless address autoconfiguration. IPv6 hosts may also uselink-local addressing to achieve operations restricted to the local network link.

Operation

edit
 
An illustration of a typical non-renewing DHCP session; each message may be either a broadcast or aunicast, depending on the DHCP client capabilities.[1]

The DHCP employs aconnectionless service model, using theUser Datagram Protocol (UDP). It is implemented with two UDP port numbers for its operations which are the same as for the bootstrap protocol (BOOTP). The server listens on UDP port number 67, and the client listens on UDP port number 68.

DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and acknowledgement.

The DHCP operation begins with clients broadcasting a request. If the client and server are in differentBroadcast Domains, aDHCP Helper or DHCP Relay Agent may be used. Clients requesting renewal of an existing lease may communicate directly via UDPunicast, since the client already has an established IP address at that point. Additionally, there is a BROADCAST flag (1 bit in 2 byte flags field, where all other bits are reserved and so are set to 0) the client can use to indicate in which way (broadcast or unicast) it can receive the DHCPOFFER: 0x8000 for broadcast, 0x0000 for unicast.[1] Usually, the DHCPOFFER is sent through unicast. For those hosts which cannot accept unicast packets before IP addresses are configured, this flag can be used to work around this issue.

Discovery

edit

The DHCP clientbroadcasts a DHCPDISCOVER message on the network subnet using the destination address255.255.255.255 (limited broadcast) or the specific subnet broadcast address (directed broadcast). A DHCP client may also request an IP address in the DHCPDISCOVER, which the server may take into account when selecting an address to offer.

For example, if HTYPE is set to 1, to specify that the medium used isEthernet, HLEN is set to 6 because an Ethernet address (MAC address) is 6 octets long. The CHADDR is set to the MAC address used by the client. Some options are set as well.

Example Ethernet frame with a DHCPDISCOVER message
OffsetOctet0123
OctetBit012345678910111213141516171819202122232425262728293031
00Destination MAC (FF:FF:FF:FF:FF:FF)
432  
864Source MAC (00:05:3C:04:8D:59)
1296EtherType (0x0800) 
16128IPv4 packet, containing a UDP PDU with DHCP payload...
20160
Frame Check Sequence
IPv4 Header
OffsetOctet0123
OctetBit012345678910111213141516171819202122232425262728293031
00IPv4 header start
432
864TTLProtocol (17 UDP)Header Checksum
1296Source Address (0.0.0.0)
16128Destination Address
UDP Header
20160Source Port (68)Destination Port (67)
24192LengthChecksum
DHCP Payload: DHCPDISCOVER
28224OP (0x01)HTYPE (0x01)HLEN (0x06)HOPS (0x00)
32256XID (0x3903F326)
36288SECS (0x0000)FLAGS (0x0000)
40320CIADDR (Client IP address:0x00000000)
44352YIADDR (Your IP address:0x00000000)
48384SIADDR (Server IP address:0x00000000)
52416GIADDR (Gateway IP address:0x00000000)
56448CHADDR (Client Hardware address:0x00053C04
0x8D590000
0x00000000
0x00000000
)
60480
64512
68544
72576192 octets of 0s, or overflow space for additional options; BOOTP legacy.
2602080
2642112Magic Cookie (0x63825363)
DHCP Options (inTLV format)
2682144First option:0x350101: Option 53 (DHCP Message Type) 1 octet (containing DHCPDISCOVER)Second option:
27221760x3204c0a80164: Option 50 (Request IP address) 4 octets (containing192.168.1.100)
2762208Third option:0x370401030f06: Option: 55 (Parameter Request List) 4 octets
2802240PRL cont...ff

Offer

edit

When a DHCP server receives a DHCPDISCOVER message from a client, which is an IP address lease request, the DHCP server reserves an IP address for the client and makes a lease offer by sending a DHCPOFFER message to the client. This message may contain the client'sClient ID (Option 61, containing a unique value, traditionally a MAC address), the IP address that the server is offering, the subnet mask, the lease duration, and the IP address of the DHCP server making the offer. The DHCP server may also take notice of the hardware-level MAC address (as specified in the CHADDR field). This field must be used to identify the client, if no Client ID is provided in the DHCP packet.[1]: §4.2 

The DHCP server determines the configuration based on the client's hardware address as specified in the CHADDR (client hardware address) field. In the following example the server (192.168.1.1) specifies the client's IP address in the YIADDR (your IP address) field.

Example Ethernet frame with a DHCPOFFER message
OffsetOctet0123
OctetBit012345678910111213141516171819202122232425262728293031
00Destination MAC (00:05:3C:04:8D:59)
432  
864Source MAC (B4:0C:25:E3:7D:62)
1296EtherType (0x0800) 
16128IPv4 packet, containing a UDP PDU with DHCP payload...
20160
Frame Check Sequence
IPv4 Header
OffsetOctet0123
OctetBit012345678910111213141516171819202122232425262728293031
00IPv4 header start
432
864TTLProtocol (17 UDP)Header Checksum
UDP Header
1296Source Address (192.168.1.1)
16128Destination Address (192.168.1.100)
20160Source Port (67)Destination Port (68)
24192LengthChecksum
DHCP Payload: DHCPOFFER
28224OP (0x02)HTYPE (0x01)HLEN (0x06)HOPS (0x00)
32256XID (0x3903F326)
36288SECS (0x0000)FLAGS (0x0000)
40320CIADDR (Client IP address:0x00000000)
44352YIADDR (Your IP address:0xC0A80164 or192.168.1.100)
48384SIADDR (Server IP address:0xC0A80101 or192.168.1.1)
52416GIADDR (Gateway IP address:0x00000000)
56448CHADDR (Client Hardware address:0x00053C04
0x8D590000
0x00000000
0x00000000
)
60480
64512
68544
72576192 octets of 0s, or overflow space for additional options; BOOTP legacy.
2602080
2642112Magic Cookie (0x63825363)
DHCP Options (inTLV format)
2682144First option:0x350102: Option 53 (DHCP Message Type) 1 octet (containing DHCPOFFER)Second option:
27221760x0104ffffff00: Option 1 (Subnet mask) 4 octets (containing255.255.255.0)
2762208Third option:0x0304c0A80101: Option: 3 (Router) 4 octets (containing192.168.1.1)
2802240Router cont...Fourth option:0x330400015080: Option 51 (Address time) 4 octets (a 86400 second lease time)
2842272Address time cont...Fifth option:
28823040x060c09070a0f09070a1009070a13:
Option 6 (Domain Server) 14 octets (containing9.7.10.15,9.7.10.16,9.7.10.18)
2922336
2962368
3002400 ff

Request

edit

In response to the DHCP offer, the client replies with a DHCPREQUEST message, broadcast to the server,[a] requesting the offered address. A client can receive DHCP offers from multiple servers, but it will accept only one DHCP offer.

The client must send theserver identification option in the DHCPREQUEST message, indicating the server whose offer the client has selected.[1]: Section 3.1, Item 3  When other DHCP servers receive this message, they withdraw any offers that they have made to the client and return their offered IP address to the pool of available addresses.

Example Ethernet frame with a DHCPREQUEST message
OffsetOctet0123
OctetBit012345678910111213141516171819202122232425262728293031
00Destination MAC (FF:FF:FF:FF:FF:FF)
432  
864Source MAC (00:05:3C:04:8D:59)
1296EtherType (0x0800) 
16128IPv4 packet, containing a UDP PDU with DHCP payload...
20160
Frame Check Sequence
IPv4 Header
OffsetOctet0123
OctetBit012345678910111213141516171819202122232425262728293031
00IPv4 header start
432
864TTLProtocol (17 UDP)Header Checksum
UDP Header
1296Source Address (0.0.0.0)
16128Destination Address (255.255.255.255)
20160Source Port (68)Destination Port (67)
24192LengthChecksum
DHCP Payload: DHCPREQUEST
28224OP (0x01)HTYPE (0x01)HLEN (0x06)HOPS (0x00)
32256XID (0x3903F326)
36288SECS (0x0000)FLAGS (0x0000)
40320CIADDR (Client IP address:0x00000000)
44352YIADDR (Your IP address:0x00000000)
48384SIADDR (Server IP address:0xc0a80101 or192.168.1.1)
52416GIADDR (Gateway IP address:0x00000000)
56448CHADDR (Client Hardware address:0x00053C04
0x8D590000
0x00000000
0x00000000
)
60480
64512
68544
72576192 octets of 0s, or overflow space for additional options; BOOTP legacy.
2602080
2642112Magic Cookie (0x63825363)
DHCP Options (inTLV format)
2682144First option:0x350103: Option 53 (DHCP Message Type) 1 octet (containing DHCPREQUEST)Second option:
27221760x3204c0a80164: Option 50 (Request IP address) 4 octets (containing192.168.1.100)
2762208Third option:0x3604c0a801601: Option: 54 (DHCP Server) 4 octets (containing192.168.1.1)
2802240DHCP Server cont...ff

Acknowledgement

edit

When the DHCP server receives the DHCPREQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a DHCPACK packet to the client. This packet includes the lease duration and any other configuration information that the client might have requested. At this point, the IP configuration process is completed.

The protocol expects the DHCP client to configure its network interface with the negotiated parameters.

Example Ethernet frame with a DHCPACK message
OffsetOctet0123
OctetBit012345678910111213141516171819202122232425262728293031
00Destination MAC (00:05:3C:04:8D:59)
432  
864Source MAC (B4:0C:25:E3:7D:62)
1296EtherType (0x0800) 
16128IPv4 packet, containing a UDP PDU with DHCP payload...
20160
Frame Check Sequence
IPv4 Header
OffsetOctet0123
OctetBit012345678910111213141516171819202122232425262728293031
00IPv4 header start
432
864TTLProtocol (17 UDP)Header Checksum
UDP Header
1296Source Address (192.168.1.1)
16128Destination Address (192.168.1.100)
20160Source Port (67)Destination Port (68)
24192LengthChecksum
DHCP Payload: DHCPACK
28224OP (0x02)HTYPE (0x01)HLEN (0x06)HOPS (0x00)
32256XID (0x3903F326)
36288SECS (0x0000)FLAGS (0x0000)
40320CIADDR (Client IP address:0x00000000)
44352YIADDR (Your IP address:0xC0A80164 or192.168.1.100)
48384SIADDR (Server IP address:0xC0A80101 or192.168.1.1)
52416GIADDR (Gateway IP address:0x00000000)
56448CHADDR (Client Hardware address:0x00053C04
0x8D590000
0x00000000
0x00000000
)
60480
64512
68544
72576192 octets of 0s, or overflow space for additional options; BOOTP legacy.
2602080
2642112Magic Cookie (0x63825363)
DHCP Options (inTLV format)
2682144First option:0x350105: Option 53 (DHCP Message Type) 1 octet (containing DHCPACK)Second option:
27221760x0104ffffff00: Option 1 (Subnet mask) 4 octets (containing255.255.255.0)
2762208Third option:0x0304c0A80101: Option: 3 (Router) 4 octets (containing192.168.1.1)
2802240Router cont...Fourth option:0x330400015080: Option 51 (Address time) 4 octets (a 86400 second lease time)
2842272Address time cont...Fifth option:
28823040x060c09070a0f09070a1009070a13:
Option 6 (Domain Server) 14 octets (containing9.7.10.15,9.7.10.16,9.7.10.18)
2922336
2962368
3002400 ff

Selecting and configuring IP addresses

edit

When the server is reusing an IP address from its pool, it may first check (usingping) to see if it is not taken already.[1]: sec. 2.2  This may happen if a host is configured manually with an IP address that lies within the DHCP scope.

Before claiming an IP address, the client should probe the newly received address (e.g. withARP), in order to find if there is another host present in the network with the proposed IP address.[1]: sec. 2.2  If there is no reply, this address does not conflict with that of another host, so it is free to be used. If this probe finds another computer using that address, the client should broadcast a DHCPDECLINE to the DHCP server(s).

Information

edit

A DHCP client may request more information than the server sent with the original DHCPOFFER. The client may also request repeat data for a particular application. For example, browsers useDHCP Inform to obtain web proxy settings viaWPAD.

Releasing

edit

The client sends a request to the DHCP server to release the DHCP information and the client deactivates its IP address. As client devices usually do not know when users may unplug them from the network, the protocol does not mandate the sending ofDHCP Release.

Client configuration parameters

edit

A DHCP server can provide optional configuration parameters to the client. RFC 2132 describes the available DHCP options defined byInternet Assigned Numbers Authority (IANA) - DHCP and BOOTP PARAMETERS.[12]

A DHCP client can select, manipulate and overwrite parameters provided by a DHCP server. In Unix-like systems this client-level refinement typically takes place according to the values in the configuration file/etc/dhclient.conf.

Options

edit

Options are octet strings of varying length. This is calledType–length–value encoding. The first octet is the option code, the second octet is the number of following octets and the remaining octets are code dependent.For example, the DHCP message-type option for an offer would appear as 0x35, 0x01, 0x02, where 0x35 is code 53 for "DHCP message type", 0x01 means one octet follows and 0x02 is the value of "offer".

The following tables list the available DHCP options.[13][12]

RFC 1497 (BOOTP Vendor Information Extensions) vendor extensions[13]: Section 3 
CodeNameLengthNotes
0Pad0octetsCan be used to pad other options so that they are aligned to the word boundary; is not followed by length byte
1Subnet mask4 octetsClient's subnet mask as perRFC 950. If both the subnet mask and the router option (option 3) are included, the subnet mask option must be first.
2Time offset4 octetsOffset of the client's subnet in seconds from Coordinated Universal Time (UTC). The offset is expressed as a two's complement 32-bit integer. A positive offset indicates a location east of the zero meridian and a negative offset indicates a location west of the zero meridian.
3RouterMultiples of 4 octetsAvailable routers, should be listed in order of preference
4Time serverMultiples of 4 octetsAvailableTime Protocol servers to synchronise with, should be listed in order of preference
5Name serverMultiples of 4 octetsAvailableIEN 116 name servers, should be listed in order of preference
6Domain name serverMultiples of 4 octetsAvailableDNS servers, should be listed in order of preference
7Log serverMultiples of 4 octetsAvailable log servers, should be listed in order of preference
8Cookie serverMultiples of 4 octetsCookiein this case means "fortune cookie" or "quote of the day", a pithy or humorous anecdote often sent as part of a logon process on large computers; it has nothing to do withcookies sent by websites.
9LPR ServerMultiples of 4 octetsA list ofLine Printer Daemon protocol servers available to the client, should be listed in order of preference
10Impress serverMultiples of 4 octetsA list of Imagen Impress servers available to the client, should be listed in order of preference
11Resource location serverMultiples of 4 octetsA list ofResource Location Protocol servers available to the client, should be listed in order of preference
12Host nameMinimum of 1 octetName of the client. The name may be qualified with the local domain name.
13Boot file size2 octetsLength of the boot image in 512B blocks
14Merit dump fileMinimum of 1 octetPath where crash dumps should be stored
15Domain nameMinimum of 1 octet
16Swap server4 octets
17Root pathMinimum of 1 octet
18Extensions pathMinimum of 1 octet
255End0 octetsUsed to mark the end of the vendor option field
IP layer parameters per host[13]: Section 4 
CodeNameLengthNotes
19IP forwarding enable/disable1 octet
20Non-local source routing enable/disable1 octet
21Policy filterMultiples of 8 octets
22Maximum datagram reassembly size2 octets
23Default IP time-to-live1 octet
24Path MTU aging timeout4 octets
25Path MTU plateau tableMultiples of 2 octets
IP Layer Parameters per Interface[13]: Section 5 
CodeNameLengthNotes
26Interface MTU2 octets
27All subnets are local1 octet
28Broadcast address4 octets
29Perform mask discovery1 octet
30Mask supplier1 octet
31Perform router discovery1 octet
32Router solicitation address4 octets
33Static routeMultiples of 8 octetsA list of destination/router pairs
Link layer parameters per interface[13]: Section 6 
CodeNameLengthNotes
34Trailer encapsulation option1 octet
35ARP cache timeout4 octets
36Ethernet encapsulation1 octet
TCP parameters[13]: Section 7 
CodeNameLengthNotes
37TCP default TTL1 octet
38TCP keepalive interval4 octets
39TCP keepalive garbage1 octet
Application and service parameters[13]: Section 8 
CodeNameLengthNotes
40Network information service domainMinimum of 1 octet
41Network information serversMultiples of 4 octets
42Network Time Protocol (NTP) serversMultiples of 4 octets
43Vendor-specific informationMinimum of 1 octets
44NetBIOS over TCP/IP name serverMultiples of 4 octets
45NetBIOS over TCP/IP datagram Distribution ServerMultiples of 4 octets
46NetBIOS over TCP/IP node type1 octet
47NetBIOS over TCP/IP scopeMinimum of 1 octet
48X Window System font serverMultiples of 4 octets
49X Window System display managerMultiples of 4 octets
64Network Information Service+ domainMinimum of 1 octet
65Network Information Service+ serversMultiples of 4 octets
68Mobile IP home agentMultiples of 4 octets
69Simple Mail Transfer Protocol (SMTP) serverMultiples of 4 octets
70Post Office Protocol (POP3) serverMultiples of 4 octets
71Network News Transfer Protocol (NNTP) serverMultiples of 4 octets
72DefaultWorld Wide Web (WWW) serverMultiples of 4 octets
73DefaultFinger protocol serverMultiples of 4 octets
74DefaultInternet Relay Chat (IRC) serverMultiples of 4 octets
75StreetTalk serverMultiples of 4 octets
76StreetTalk Directory Assistance (STDA) serverMultiples of 4 octets
DHCP extensions[13]: Section 9 
CodeNameLengthNotes
50Requested IP address4 octets
51IP address lease time4 octets
52Option overload1 octet
53DHCP message type1 octet
54Server identifier4 octets
55Parameter request listMinimum of 1 octet
56MessageMinimum of 1 octet
57Maximum DHCP message size2 octets
58Renewal (T1) time value4 octets
59Rebinding (T2) time value4 octets
60Vendor class identifierMinimum of 1 octet
61Client identifierMinimum of 2 octets
66TFTP server nameMinimum of 1 octet
67Bootfile nameMinimum of 1 octet

DHCP message types

edit

This table lists the DHCP message types.These codes are the value in the DHCP extension 53, shown in the table above.

DHCP message types
CodeNameLengthRFC
1DHCPDISCOVER1 octet2132[13]: §9.6 
2DHCPOFFER1 octet2132
3DHCPREQUEST1 octet2132
4DHCPDECLINE1 octet2132
5DHCPACK1 octet2132
6DHCPNAK1 octet2132
7DHCPRELEASE1 octet2132
8DHCPINFORM1 octet2132
9DHCPFORCERENEW1 octet3203[14]: §4 
10DHCPLEASEQUERY1 octet4388[15]: §6.1 
11DHCPLEASEUNASSIGNED1 octet4388
12DHCPLEASEUNKNOWN1 octet4388
13DHCPLEASEACTIVE1 octet4388
14DHCPBULKLEASEQUERY1 octet6926[16]: §6.2.1 
15DHCPLEASEQUERYDONE1 octet6926
16DHCPACTIVELEASEQUERY1 octet7724[17]: §5.2.1 
17DHCPLEASEQUERYSTATUS1 octet7724
18DHCPTLS1 octet7724

Client vendor identification

edit

An option exists to identify the vendor and functionality of a DHCP client. The information is avariable-length string of characters or octets which has a meaning specified by the vendor of the DHCP client. One method by which a DHCP client can communicate to the server that it is using a certain type of hardware or firmware is to set a value in its DHCP requests called the Vendor Class Identifier (VCI) (Option 60).

The value to which this option is set gives the DHCP server a hint about any required extra information that this client needs in a DHCP response. Some types ofset-top boxes set the VCI to inform the DHCP server about the hardware type and functionality of the device. AnAruba campuswireless access point, for example, supplies value 'ArubaAP' as option 60 in its DHCPDISCOVER message.[18] The DHCP server can then augment its DHCPOFFER with an IP address of an Arubawireless controller in option 43, so the access point knows where to register itself.

Setting a VCI by the client allows a DHCP server to differentiate between client machines and process the requests from them appropriately.

Other extensions

edit
Documented DHCP options
CodeNameLengthRFC
77User ClassMinimum of 2 octets3004[19]
82Relay agent informationMinimum of 2 octets3046[20]
85Novell Directory Service (NDS) serversMinimum of 4 octets, multiple of 4 octets2241[21]: §2 
86NDS tree nameVariable2241[21]: §3 
87NDS contextVariable2241[21]: §4 
100Time zone, POSIX styleVariable4833[22]
101Time zone,tz database styleVariable4833
114DHCP Captive-PortalVariable8910[23]
119Domain searchVariable3397[24]
121Classless static routeVariable3442[25]
209Configuration FileVariable5071[26]
210Path PrefixVariable5071
211Reboot TimeVariable5071

Relay agent information sub-options

edit

The relay agent information option (option 82) specifies container for attaching sub-options to DHCP requests transmitted between a DHCP relay and a DHCP server.[27]

Relay agent sub-options
CodeNameLengthRFC
1Agent Circuit IDMinimum of 1 octet3046[20]
2Agent Remote IDMinimum of 1 octet3046
4Data-Over-Cable Service Interface Specifications (DOCSIS) device class4 octets3256[28]

Relaying

edit

In small networks, where only one IP subnet is being managed, DHCP clients communicate directly with DHCP servers. However, DHCP servers can also provide IP addresses for multiple subnets. In this case, a DHCP client that has not yet acquired an IP address cannot communicate directly with a DHCP server not on the same subnet, as the client's broadcast can only be received on its own subnet.

In order to allow DHCP clients on subnets not directly served by DHCP servers to communicate with DHCP servers, DHCP relay agents can be installed on these subnets. A DHCP relay agent runs on a network device, capable ofrouting between the client's subnet and the subnet of the DHCP server. The DHCP client broadcasts on the local link; the relay agent receives the broadcast and transmits it to one or more DHCP servers usingunicast. The IP addresses of the DHCP servers are manually configured in the relay agent.The relay agent stores its own IP address, from the interface on which it has received the client's broadcast, in theGIADDR field of the DHCP packet.The DHCP server uses the GIADDR-value to determine the subnet, and subsequently the corresponding address pool, from which to allocate an IP address.When the DHCP server replies to the client, it sends the reply to the GIADDR-address, again using unicast.The relay agent then retransmits the response on the local network, using unicast (in most cases) to the newly reserved IP address, in anEthernet frame directed to the client's MAC address.The client should accept the packet as its own, even when that IP address is not yet set on the interface.[1]: 25 Directly after processing the packet, the client sets the IP address on its interface and is ready for regular IP communication, directly thereafter.

If the client's implementation of the IP stack does not accept unicast packets when it has no IP address yet, the client may set thebroadcast bit in the FLAGS field when sending a DHCPDISCOVER packet.The relay agent will use the255.255.255.255 broadcast IP address (and the clients MAC address) to inform the client of the server's DHCPOFFER.

The communication between the relay agent and the DHCP server typically uses both a source and destination UDP port of 67.

Client states

edit
 
A simplified DHCP client state-transition diagram based on figure 5 of RFC 2131

A DHCP client can receive these messages from a server:[1]: §4.4 

  • DHCPOFFER
  • DHCPACK
  • DHCPNAK

The client moves through DHCP states depending on how the server responds to the messages that the client sends.

Reliability

edit

The DHCP ensures reliability in several ways: periodic renewal, rebinding,[1]: §4.4.5  and failover. DHCP clients are allocated leases that last for some period of time. Clients begin to attempt to renew their leases once half the lease interval has expired.[1]: §4.4.5 Paragraph 3  They do this by sending a unicastDHCPREQUEST message to the DHCP server that granted the original lease. If that server is down or unreachable, it will fail to respond to theDHCPREQUEST. However, in that case the client repeats theDHCPREQUEST from time to time,[1]: §4.4.5 Paragraph 8 [b] so if the DHCP server comes back up or becomes reachable again, the DHCP client will succeed in contacting it and renew the lease.

If the DHCP server is unreachable for an extended period of time,[1]: §4.4.5 Paragraph 5  the DHCP client will attempt to rebind, by broadcasting itsDHCPREQUEST rather than unicasting it. Because it isbroadcast, theDHCPREQUEST message will reach all available DHCP servers. If some other DHCP server is able to renew the lease, it will do so at this time.

In order for rebinding to work, when the client successfully contacts a backup DHCP server, that server must have accurate information about the client's binding. Maintaining accurate binding information between two servers is a complicated problem; if both servers are able to update the same lease database, there must be a mechanism to avoid conflicts between updates on the independent servers. A proposal for implementingfault-tolerant DHCP servers was submitted to the Internet Engineering Task Force, but never formalized.[29][c]

If rebinding fails, the lease will eventually expire. When the lease expires, the client must stop using the IP address granted to it in its lease.[1]: §4.4.5 Paragraph 9  At that time it will restart the DHCP process from the beginning by broadcasting aDHCPDISCOVER message. Since its lease has expired, it will accept any IP address offered to it. Once it has a new IP address (presumably from a different DHCP server) it will once again be able to use the network. However, since its IP address has changed, any ongoing connections will be broken.

IPv6 networks

edit

The basic methodology of DHCP was developed for networks based onInternet Protocol version 4 (IPv4). Since the development and deployment ofIPv6 networks, DHCP has also been used for assigning parameters in such networks, despite the inherent features of IPv6 forstateless address autoconfiguration. The IPv6 version of the protocol is designated asDHCPv6.[30]

Security

edit
See also:DHCP snooping

The base DHCP does not include any mechanism for authentication.[20]: §7 Because of this, it is vulnerable to a variety of attacks. These attacks fall into three main categories:[1]: sec. 7 

  • Unauthorized DHCP servers providing false information to clients.
  • Unauthorized clients gaining access to resources.
  • Resource exhaustion attacks from malicious DHCP clients.

Because the client has no way to validate the identity of a DHCP server, unauthorized DHCP servers (commonly called "rogue DHCP") can be operated on networks, providing incorrect information to DHCP clients.[31] This can serve either as a denial-of-service attack, preventing the client from gaining access to network connectivity,[32] or as aman-in-the-middle attack.[33] Because the DHCP server provides the DHCP client with server IP addresses, such as the IP address of one or more DNS servers,[1]: sec. 7  an attacker can convince a DHCP client to do its DNS lookups through its own DNS server, and can therefore provide its own answers to DNS queries from the client.[34] This in turn allows the attacker to redirect network traffic through itself, allowing it to eavesdrop on connections between the client and network servers it contacts, or to simply replace those network servers with its own.[34]

Because the DHCP server has no secure mechanism for authenticating the client, clients can gain unauthorized access to IP addresses by presenting credentials, such as client identifiers, that belong to other DHCP clients.[31] This also allows DHCP clients to exhaust the DHCP server's store of IP addresses—by presenting new credentials each time it asks for an address, the client can consume all the available IP addresses on a particular network link, preventing other DHCP clients from getting service.[31]

DHCP does provide some mechanisms for mitigating these problems. TheRelay Agent Information Option protocol extension[20] (usually referred to in the industry by its actual number asOption 82[35][36]) allows network operators to attach tags to DHCP messages as these messages arrive on the network operator's trusted network. This tag is then used as an authorization token to control the client's access to network resources. Because the client has no access to the network upstream of the relay agent, the lack of authentication does not prevent the DHCP server operator from relying on the authorization token.[20]: sec. 7 

Another extension, Authentication for DHCP Messages[37] (RFC 3118), provides a mechanism for authenticating DHCP messages. As of 2002, this extension had not seen widespread adoption because of the problems of managing keys for large numbers of DHCP clients.[38] A 2007 book about DSL technologies remarked that:

[T]here were numerous security vulnerabilities identified against the security measures proposed by RFC 3118. This fact, combined with the introduction of802.1X, slowed the deployment and take-rate of authenticated DHCP, and it has never been widely deployed.[39]

A 2010 book notes that:

[T]here have been very few implementations of DHCP Authentication. The challenges of key management and processing delays due to hash computation have been deemed too heavy a price to pay for the perceived benefits.[40]

Architectural proposals from 2008 involve authenticating DHCP requests using802.1X orPANA (both of which transportEAP).[41] An IETF proposal was made for including EAP in DHCP itself, the so-calledEAPoDHCP;[42] this does not appear to have progressed beyond IETF draft level, the last of which dates to 2010.[43]

IETF standards documents

edit
  • RFC 2131 – Dynamic Host Configuration Protocol,[1]Draft Standard.
  • RFC 2132 – DHCP Options and BOOTP Vendor Extensions,[13]Draft Standard.
  • RFC 3046 – DHCP Relay Agent Information Option,[20]Proposed Standard.
  • RFC 3203 – DHCP reconfigure extension,[14]Proposed Standard.
  • RFC 3397 – Dynamic Host Configuration Protocol (DHCP) Domain Search Option,[24]Proposed Standard.
  • RFC 3442 – The Classless Static Route Option for Dynamic Host Configuration Protocol (DHCP) version 4,[25]Proposed Standard.
  • RFC 3942 – Reclassifying Dynamic Host Configuration Protocol version 4 (DHCPv4) Options,[44]Proposed Standard.
  • RFC 4361 – Node-specific Client Identifiers for Dynamic Host Configuration Protocol Version Four (DHCPv4),[45]Proposed Standard.
  • RFC 4388 – Dynamic Host Configuration Protocol (DHCP) Leasequery,[15]Proposed Standard.
  • RFC 4436 – Detecting Network Attachment in IPv4 (DNAv4),[46]Proposed Standard.
  • RFC 6926 – DHCPv4 Bulk Leasequery,[16]Proposed Standard.
  • RFC 7724 – Active DHCPv4 Lease Query,[17]Proposed Standard.
  • RFC 8415 – Dynamic Host Configuration Protocol for IPv6 (DHCPv6),[9]Proposed Standard.

See also

edit

Notes

edit
  1. ^As an optional client behavior, some broadcasts, such as those carrying DHCP discovery and request messages, may be replaced with unicasts in case the DHCP client already knows the DHCP server's IP address.[1]
  2. ^The RFC calls for the client to wait one half of the remaining time until T2 before it retransmits theDHCPREQUEST packet
  3. ^The proposal provided a mechanism whereby two servers could remain loosely in sync with each other in such a way that even in the event of a total failure of one server, the other server could recover the lease database and continue operating. Due to the length and complexity of the specification, it was never published as a standard; however, the techniques described in the proposal are in wide use, with open-source and several commercial implementations.

References

edit
  1. ^abcdefghijklmnopqrsR. Droms (March 1997).Dynamic Host Configuration Protocol.IETF Network Working Group.doi:10.17487/RFC2131.RFC2131.Draft Standard. ObsoletesRFC 1541. Updated byRFC 3396,4361,5494 and6842.
  2. ^Peterson, Larry L.; Davie, Bruce S. (2011).Computer Networks: A Systems Approach (5th ed.). Elsevier.ISBN 978-0-12-385060-7. RetrievedMarch 21, 2019.
  3. ^R. Finlayson; T. Mann; J. Mogul; M. Theimer (June 1984).A Reverse Address Resolution Protocol. Network Working Group.doi:10.17487/RFC0903. STD 38.RFC903.Internet Standard 38.
  4. ^Bill Croft; John Gilmore (September 1985).BOOTSTRAP PROTOCOL (BOOTP). Network Working Group.doi:10.17487/RFC0951.RFC951.Draft Standard. Updated byRFC 1395,1497,1532,1542 and5494.
  5. ^R. Droms (October 1993).Dynamic Host Configuration Protocol. Network Working Group.doi:10.17487/RFC1531.RFC1531.Obsolete. Obsoleted byRFC 1541, due to errors in the editorial process.
  6. ^R. Droms (October 1993).Dynamic Host Configuration Protocol. Network Working Group.doi:10.17487/RFC1541.RFC1541.Obsolete. Obsoleted byRFC 2131. ObsoletesRFC 1531.
  7. ^Network+ Certification 2006 Published By Microsoft Press.
  8. ^J. Bound; B. Volz; T. Lemon; C. Perkins; M. Carney (July 2002). R. Droms (ed.).Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Network Working Group.doi:10.17487/RFC3315.RFC3315.Obsolete. Obsoleted byRFC 8415. Updated byRFC 4361,5494,6221,6422,6644,7083,7283,7227 and7550.
  9. ^abT. Mrugalski; M. Siodelski; B. Volz; A. Yourtchenko; M. Richardson; S. Jiang; T. Lemon; T. Winters (November 2018).Dynamic Host Configuration Protocol for IPv6 (DHCPv6).Internet Engineering Task Force.doi:10.17487/RFC8415.ISSN 2070-1721.RFC8415.Proposed Standard. ObsoletesRFC 3315,3633,3736,4242,7083,7283 and7550.
  10. ^"DHCP - Dynamic Host Configuration Protocol".
  11. ^Droms, Ralph; Lemon, Ted (2003).The DHCP Handbook.SAMS Publishing. p. 436.ISBN 978-0-672-32327-0.
  12. ^ab"Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) Parameters". iana.org. Retrieved2018-10-16.
  13. ^abcdefghijS. Alexander; R. Droms (March 1997).DHCP Options and BOOTP Vendor Extensions.IETF Network Working Group.doi:10.17487/RFC2132.RFC2132.Draft Standard. ObsoletesRFC 1533. Updated byRFC 3442,3942,4361,4833 and5494.
  14. ^abY. T'Joens; C. Hublet; P. De Schrijver (December 2001).DHCP reconfigure extension. Network Working Group.doi:10.17487/RFC3203.RFC3203.Proposed Standard. Updated byRFC 6704.
  15. ^abR. Woundy; K. Kinnear (February 2006).Dynamic Host Configuration Protocol (DHCP) Leasequery. Network Working Group.doi:10.17487/RFC4388.RFC4388.Proposed Standard. Updated byRFC 6148.
  16. ^abK. Kinnear; M. Stapp; R. Desetti; B. Joshi; N. Russell; P. Kurapati; B. Volz (April 2013).DHCPv4 Bulk Leasequery.Internet Engineering Task Force.doi:10.17487/RFC6926.ISSN 2070-1721.RFC6926.Proposed Standard. Updated byRFC 7724.
  17. ^abK. Kinnear; M. Stapp; B. Volz; N. Russell (December 2015).Active DHCPv4 Lease Query.Internet Engineering Task Force.doi:10.17487/RFC7724.ISSN 2070-1721.RFC7724.Proposed Standard. UpdatesRFC 6926.
  18. ^"Aruba DHCP Option 60". 7 October 2020.
  19. ^G. Stump; R. Droms; Y. Gu; R. Vyaghrapuri; A. Demirtjis; B. Beser; J. Privat (November 2000).The User Class Option for DHCP. Network Working Group.doi:10.17487/RFC3004.RFC3004.Proposed Standard.
  20. ^abcdefM. Patrick (January 2001).DHCP Relay Agent Information Option. Network Working Group.doi:10.17487/RFC3046.RFC3046.Proposed Standard. Updated byRFC 6607.
  21. ^abcD. Provan (November 1997).DHCP Options for Novell Directory Services. Network Working Group.doi:10.17487/RFC2241.RFC2241.Proposed Standard.
  22. ^E. Lear; P. Eggert (April 2007).Timezone Options for DHCP. Network Working Group.doi:10.17487/RFC4833.RFC4833.Proposed Standard. UpdatesRFC 2132.
  23. ^W. Kumari; E. Kline (September 2020).Captive-Portal Identification in DHCP and Router Advertisements (RAs).Internet Engineering Task Force.doi:10.17487/RFC8910.ISSN 2070-1721.RFC8910.Proposed Standard. ObsoletesRFC 7710. UpdatesRFC 3679.
  24. ^abB. Aboba;S. Cheshire (November 2002).Dynamic Host Configuration Protocol (DHCP) Domain Search Option. Network Working Group.doi:10.17487/RFC3397.RFC3397.Proposed Standard.
  25. ^abT. Lemon;S. Cheshire; B. Volz (December 2002).The Classless Static Route Option for Dynamic Host Configuration Protocol (DHCP) version 4. Network Working Group.doi:10.17487/RFC3442.RFC3442.Proposed Standard. UpdatesRFC 2132.
  26. ^D. Hankins (December 2007).Dynamic Host Configuration Protocol Options Used by PXELINUX. Network Working Group.doi:10.17487/RFC5071.RFC5071.Informational.
  27. ^Patrick, Michael (January 2001)."DHCP Relay Agent Information Option".IETF Documents.IETF.doi:10.17487/RFC3046. Retrieved22 July 2017.
  28. ^D. Jones; R. Woundy (April 2002).The DOCSIS (Data-Over-Cable Service Interface Specifications) Device Class DHCP (Dynamic Host Configuration Protocol) Relay Agent Information Sub-option. Network Working Group.doi:10.17487/RFC3256.RFC3256.Proposed Standard.
  29. ^Droms, Ralph; Kinnear, Kim; Stapp, Mark; Volz, Bernie; Gonczi, Steve; Rabil, Greg; Dooley, Michael; Kapur, Arun (March 2003).DHCP Failover Protocol.IETF. I-D draft-ietf-dhc-failover-12. RetrievedMay 9, 2010.
  30. ^Weinberg, Neal (2018-08-14)."Why DHCP's days might be numbered".Network World. Retrieved2019-08-07.
  31. ^abcStapko, Timothy (2011).Practical Embedded Security: Building Secure Resource-Constrained Systems. Newnes. p. 39.ISBN 978-0-08-055131-9.
  32. ^Rountree, Derrick (2013).Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure. Newnes. p. 22.ISBN 978-1-59749-965-1.
  33. ^Rooney, Timothy (2010).Introduction to IP Address Management. John Wiley & Sons. p. 180.ISBN 978-1-118-07380-3.
  34. ^abGolovanov (Kaspersky Labs), Sergey (June 2011)."TDSS loader now got "legs"". Archived fromthe original on 25 January 2021.
  35. ^Hens, Francisco J.; Caballero, José M. (2008).Triple Play: Building the converged network for IP, VoIP and IPTV. John Wiley & Sons. p. 239.ISBN 978-0-470-75439-9.
  36. ^Ramirez, David H. (2008).IPTV Security: Protecting High-Value Digital Contents. John Wiley & Sons. p. 55.ISBN 978-0-470-72719-5.
  37. ^R. Droms; W. Arbaugh, eds. (June 2001).Authentication for DHCP Messages. Network Working Group.doi:10.17487/RFC3118.RFC3118.Proposed Standard.
  38. ^Lemon, Ted (April 2002)."Implementation of RFC 3118".
  39. ^Golden, Philip; Dedieu, Hervé; Jacobsen, Krista S. (2007).Implementation and Applications of DSL Technology. Taylor & Francis. p. 484.ISBN 978-1-4200-1307-8.
  40. ^Rooney, Timothy (2010).Introduction to IP Address Management. John Wiley & Sons. pp. 181–182.ISBN 978-1-118-07380-3.
  41. ^Copeland, Rebecca (2008).Converging NGN Wireline and Mobile 3G Networks with IMS. Taylor & Francis. pp. 142–143.ISBN 978-1-4200-1378-8.
  42. ^Prasad, Ramjee; Mihovska, Albena (2009).New Horizons in Mobile and Wireless Communications: Networks, services, and applications. Vol. 2. Artech House. p. 339.ISBN 978-1-60783-970-5.
  43. ^"Draft-pruss-DHCP-auth-DSL-07 - EAP Authentication Extensions for the Dynamic Host Configuration Protocol for Broadband". Archived fromthe original on 2015-04-03. Retrieved2013-12-12.
  44. ^B. Volz (November 2004).Reclassifying Dynamic Host Configuration Protocol version 4 (DHCPv4) Options. Network Working Group.doi:10.17487/RFC3942.RFC3942.Proposed Standard. UpdatesRFC 2132.
  45. ^T. Lemon; B. Sommerfield (February 2006).Node-specific Client Identifiers for Dynamic Host Configuration Protocol Version Four (DHCPv4). Network Working Group.doi:10.17487/RFC4361.RFC4361.Proposed Standard. Updated byRFC 5494. UpdatesRFC 2131,3315 and2132.
  46. ^B. Aboba; J. Carlson;S. Cheshire (March 2006).Detecting Network Attachment in IPv4 (DNAv4). Network Working Group.doi:10.17487/RFC4436.RFC4436.Proposed Standard.

External links

edit

[8]ページ先頭

©2009-2025 Movatter.jp