<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.1 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY I-D.ietf-homenet-front-end-naming-delegation SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-homenet-front-end-naming-delegation.xml">
<!ENTITY RFC8415 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8415.xml">
<!ENTITY RFC7858 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8126 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY RFC7368 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7368.xml">
<!ENTITY RFC7227 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7227.xml">
<!ENTITY RFC9103 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9103.xml">
<!ENTITY I-D.andrews-dnsop-pd-reverse SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.andrews-dnsop-pd-reverse.xml">
<!ENTITY RFC2181 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC1034 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC6672 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6672.xml">
<!ENTITY I-D.sury-dnsext-cname-dname SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.sury-dnsext-cname-dname.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-homenet-naming-architecture-dhc-options-22" category="std">

  <front>
    <title abbrev="DHCPv6 Options for HNA">DHCPv6 Options for Home Network Naming Authority</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai</organization>
      <address>
        <email>ralf.weber@akamai.com</email>
      </address>
    </author>
    <author initials="T." surname="Mrugalski" fullname="Tomek Mrugalski">
      <organization>Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>950 Charter Street</street>
          <city>Redwood City</city>
          <code>94063</code>
          <country>US</country>
        </postal>
        <email>tomasz.mrugalski@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="October" day="20"/>

    <area>Internet</area>
    <workgroup>Homenet</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines DHCPv6 options so an Homenet Naming Authority (HNA) can automatically proceed to the appropriate configuration and outsource the authoritative naming service for the home network.
In most cases, the outsourcing mechanism is transparent for the end user.</t>



    </abstract>


  </front>

  <middle>


<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader should be familiar with <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="introduction" title="Introduction">

<t><xref target="I-D.ietf-homenet-front-end-naming-delegation"/> specifies how an entity designated as the Homenet Naming Authority (HNA) outsources a Public Homenet Zone to an DNS Outsourcing Infrastructure (DOI).</t>

<t>This document describes how a network can provision the HNA with a specific DOI.
This could be particularly useful for a DOI partly managed by an ISP, or to make home networks resilient to HNA replacement. 
The ISP delegates an IP prefix to the home network as well as the associated reverse zone.
The ISP is thus aware of the owner of that IP prefix, and as such becomes a natural candidate for hosting the Homenet Reverse Zone - that is the Reverse Distribution Manager (RDM) and potentially the Reverse Public Authoritative Servers.</t>

<t>In addition, ISPs often identify the line of the home network with a name. 
Such name is used for their internal network management operations and is not a name the home network owner has registered to.
ISPs may leverage such infrastructure and provide the homenet with a specific domain name designated as per <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> a Homenet Registered Domain.
Similarly to the reverse zone, ISPs are aware of who owns that domain name and may become a natural candidate for hosting the Homenet Zone - that is the Distribution Manager (DM) and the Public Authoritative Servers.</t>

<t>This document describes DHCPv6 options that enable an ISP to provide the necessary parameters to the HNA, to proceed.
More specifically, the ISP provides the Registered Homenet Domain, necessary information on the DM and the RDM so the HNA can manage and upload the Public Homenet Zone and the Reverse Public Homenet Zone as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

<t>The use of DHCPv6 options may make the configuration completely transparent to the end user and provides a similar level of trust as the one used to provide the IP prefix - when provisioned via DHCP.</t>

</section>
<section anchor="sec-overview" title="Procedure Overview">

<t>This section illustrates how a HNA receives the necessary information via DHCPv6 options to outsource its authoritative naming service to the DOI.
For the sake of simplicity, and similarly to <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, this section assumes that the HNA and the home network DHCPv6 client are colocated on the  Customer Edge (CPE) router <xref target="RFC7368"/>.
Note also that this is not mandatory and the DHCPv6 client may instruct remotely the  HNA with a protocol that will be standardized in the future.
In addition, this section assumes the responsible entity for the DHCPv6 server is provisioned with the DM and RDM information - associated with the requested Registered Homenet Domain .
This means a Registered Homenet Domain can be associated with the DHCPv6 client.</t>

<t>This scenario is believed to be the most popular scenario. 
This document does not ignore scenarios where the DHCPv6 server does not have privileged relations with the DM or RDM.
These cases are discussed in <xref target="sec-scenario"/>.
Such scenarios do not necessarily require configuration for the end user and can also be zero-config.</t>

<t>The scenario considered in this section is as follows:</t>

<t><list style="numbers">
  <t>The HNA is willing to outsource the Public Homenet Zone or Homenet Reverse Zone. 
The DHCPv6 client is configured to include in its Option Request Option (ORO) the Registered Homenet Domain Option (OPTION_REGISTERED_DOMAIN), the Forward Distribution Manager Option (OPTION_FORWARD_DIST_MANAGER) and the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option codes.</t>
  <t>The DHCPv6 server responds to the DHCPv6 client with the requested DHCPv6 options based on the identified homenet.
The DHCPv6 client passes the information to the HNA.</t>
  <t>The HNA is authenticated (see Section “Securing the Control Channel” of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>) by the DM and the RDM. 
The HNA builds the Homenet Zone (or the Homenet Reverse Zone) and proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The DHCPv6 options provide the necessary non optional parameters described in Appendix B of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The HNA may complement the configurations with additional parameters via means not yet defined.
Appendix B of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> describes such parameters that may take some specific non default value.</t>
</list></t>

</section>
<section anchor="sec-format" title="DHCPv6 Option">

<t>This section details the payload of the DHCPv6 options following the guidelines of <xref target="RFC7227"/>.</t>

<section anchor="o_rd" title="Registered Homenet Domain Option">

<t>The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the FQDN associated with the home network.</t>

<figure title="Registered Domain Option" anchor="fig-rhd"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   OPTION_REGISTERED_DOMAIN    |         option-len            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                   Registered Homenet Domain                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REGISTERED_DOMAIN, the option code for the Registered Homenet Domain  (TBD1).</t>
  <t>option-len (16 bits): length in octets of the Registered Homenet Domain field as described in <xref target="RFC8415"/>.</t>
  <t>Registered Homenet Domain (variable): the FQDN registered for the homenet encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="o_dm" title="Forward Distribution Manager Option">

<t>The Forward Distributed Manager Option (OPTION_FORWARD_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.
As opposed to IP addresses, the FQDN requires a DNS resolution before establishing the communication between the HNA and the DM. 
However, the use of a FQDN provides multiple advantages over IP addresses.
Firstly, it makes the DHCPv6 Option easier to parse and smaller - especially when IPv4 and IPv6  addresses are expected to be provided. 
Then the FQDN can reasonably be seen as a more stable identifier than IP addresses, as well as a pointer to additional information that may be useful, in the future, to establish the communication between the HNA and the DM.</t>

<figure title="Forward Distribution Manager Option" anchor="fig-dm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPTION_FORWARD_DIST_MANAGER  |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/                  Distribution Manager  FQDN                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_FORWARD_DIST_MANAGER, the option code for the Forward Distribution Manager Option (TBD2).</t>
  <t>option-len (16 bits): length in octets of the enclosed data as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the DM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a DM MAY indicate the support of multiple modes.
The left most bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Distribution Manager FQDN (variable): the FQDN of the DM encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

<t>It is worth noticing that the Supported Transport field does not enable to specify a port and the used port is defined by a standard. 
In the case of DNS over TLS <xref target="RFC7858"/>, the port is defined by <xref target="RFC7858"/> to be 853. 
The need for such flexibility has been balanced with the difficulty of handling a list of tuples ( transport, port ) as well as the possibility to use a dedicated IP address for the DM.</t>

</section>
<section anchor="reverse-distribution-manager-server-option" title="Reverse Distribution Manager Server Option">

<t>The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.</t>

<figure title="Reverse Distribution Manager Option" anchor="fig-rdm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_REVERSE_DIST_MANAGER   |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/              Reverse Distribution Manager FQDN                /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REVERSE_DIST_MANAGER, the option code for the Reverse Distribution Manager Option (TBD3).</t>
  <t>option-len (16 bits): length in octets of the option-data field as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the RDM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a RDM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Reverse Distribution Manager FQDN (variable): the FQDN of the RDM encoded as described in section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="sec-st" title="Supported Transport">

<t>The Supported Transport field of the DHCPv6 option indicates the supported transport protocols.
Each bit represents a specific transport mechanism. 
A bit sets to 1 indicates the associated transport protocol is supported.
The corresponding bits are assigned as described in <xref target="tab-st"/> and <xref target="sec-iana"/>.</t>

<figure title="Supported Transport" anchor="tab-st"><artwork><![CDATA[
Bit Position | Transport Protocol |  Mnemonic | Reference
left to right| Description        |           |
-------------+--------------------+-----------+-----------
      0      | DNS over TLS       | DoT       | This-RFC
     1-15    | unallocated        |  -        |  -
]]></artwork></figure>

<t>DNS over TLS: indicates the support of DNS over TLS as described in <xref target="RFC7858"/> and <xref target="RFC9103"/>.</t>

</section>
</section>
<section anchor="sec-dhcp-behavior" title="DHCPv6 Behavior">

<section anchor="dhcpv6-server-behavior" title="DHCPv6 Server Behavior">

<t>Sections 17.2.2 and 18.2 of <xref target="RFC8415"/> govern server operation in regards to option assignment.
As a convenience to the reader, we mention here that the server will send option foo only if configured with specific values for foo and if the client requested it.
In particular, when configured the DHCPv6 server sends the Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option when requested by the DHCPv6 client by including necessary option codes in its ORO.</t>

</section>
<section anchor="dhcpv6-client-behavior" title="DHCPv6 Client Behavior">

<t>The DHCPv6 client includes Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option in an ORO as specified in Sections 18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of <xref target="RFC8415"/>.</t>

<t>Upon receiving a DHCPv6 option described in this document in the Reply
message, the HNA SHOULD proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="sec-dhcp-relay" title="DHCPv6 Relay Agent Behavior">

<t>There are no additional requirements for the DHCPv6 Relay agents.</t>

</section>
</section>
<section anchor="sec-iana" title="IANA Considerations">

<section anchor="dhcpv6-option-codes" title="DHCPv6 Option Codes">

<t>IANA is requested to assign the following new DHCPv6 Option Codes in the registry maintained in: https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<figure><artwork><![CDATA[
Value Description                   Client ORO     Singleton Option  Reference
TBD1  OPTION_REGISTERED_DOMAIN       Yes            No               [This-RFC] Section 4.1
TBD2  OPTION_FORWARD_DIST_MANAGER    Yes            Yes              [This-RFC] Section 4.2
TBD3  OPTION_REVERSE_DIST_MANAGER    Yes            Yes              [This-RFC] Section 4.3
]]></artwork></figure>

</section>
<section anchor="supported-transport-parameter" title="Supported Transport parameter">

<t>IANA is requested to maintain a new registry of Supported Transport parameter in the Distributed Manager Option (OPTION_FORWARD_DIST_MANAGER) or the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are defined in <xref target="tab-st"/> in <xref target="sec-st"/>.</t>

<t>The Name of the registry is: Supported Transport parameter</t>

<t>The registry description is:  The Supported Transport field of the DHCPv6 option is a two octet field that indicates the supported transport protocols. 
Each bit represents a specific transport mechanism.</t>

<t>The parent grouping is Dynamic Host Configuration Protocol for IPv6 (DHCPv6) at https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<t>New entry MUST specify the bit position, the Transport Protocol Description a Mnemonic and a Reference as defined in <xref target="tab-iana"/>.</t>

<t>The initial registry is as specified in <xref target="tab-iana"/>.</t>

<t>Changes of the  format or policies of the registry is left to the IETF via the IESG.</t>

<t>Future code points are assigned under RFC Required as per <xref target="RFC8126"/>.</t>

<figure title="Supported Transport" anchor="tab-iana"><artwork><![CDATA[
Bit Position | Transport Protocol |  Mnemonic | Reference
left to right| Description        |           |  
-------------+--------------------+-----------+-----------
      0      | DNS over TLS       | DoT       | This-RFC
     1-15    | unallocated        |  -        |  -
]]></artwork></figure>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The security considerations in <xref target="RFC8415"/> are to be considered.
The trust associated with the information carried by the DHCPv6 Options described in this document is similar to the one associated with the IP prefix - when configured via DHCPv6.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank Marcin Siodelski, Bernie Volz and Ted Lemon for their comments on the design of the DHCPv6 options.
We would also like to thank Mark Andrews, Andrew Sullivan and Lorenzo Colliti for their remarks on the architecture design. The designed solution has been largely been inspired by Mark Andrews’s document <xref target="I-D.andrews-dnsop-pd-reverse"/> as well as discussions with Mark.
We also thank Ray Hunter and Michael Richardson for its reviews, its comments and for suggesting an appropriated terminology.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The co-authors would like to thank Chris Griffiths and Wouter Cloetens that provided a significant contribution in the early versions of the document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8174;
&I-D.ietf-homenet-front-end-naming-delegation;
&RFC8415;
&RFC7858;
&RFC8126;


    </references>

    <references title='Informative References'>

&RFC7368;
&RFC7227;
&RFC9103;
&I-D.andrews-dnsop-pd-reverse;
&RFC2181;
&RFC1034;
&RFC6672;
&I-D.sury-dnsext-cname-dname;


    </references>


<section anchor="sec-scenario" title="Scenarios and impact on the End User">

<t>This appendix details various scenarios and discuss their impact on the end user.
This appendix is not normative and limits the description of a limited scope of scenarios that are assumed to be representative. Many other scenarios may be derived from these.</t>

<section anchor="sec-scenario-1" title="Base Scenario">

<t>The base scenario is the one described in <xref target="sec-overview"/> in which an ISP manages the DHCPv6 server, the DM and RDM.</t>

<t>The end user subscribes to the ISP (foo), and at subscription time registers for foo.example as its Registered Homenet Domain foo.example.</t>

<t>In this scenario, the DHCPv6 server, DM and RDM are managed by the ISP so the DHCPv6 server and as such can provide authentication credentials of the HNA to enable secure authenticated transaction with the DM and the Reverse DM.</t>

<t>The main advantage of this scenario is that the naming architecture is configured automatically and transparently for the end user.
The drawbacks are that the end user uses a Registered Homenet Domain managed by the ISP and that it relies on the ISP naming infrastructure.</t>

</section>
<section anchor="scenario-2" title="Third Party Registered Homenet Domain">

<t>This appendix considers the case when the end user wants its home network to use example.com not managed by her ISP (foo) as a Registered Homenet Domain.
This appendix still considers the ISP manages the home network and still provides foo.example as a Registered Homenet Domain.</t>

<t>When the end user buys the domain name example.com, it may request to redirect the name example.com to foo.example using static redirection with CNAME <xref target="RFC2181"/>, <xref target="RFC1034"/>, DNAME <xref target="RFC6672"/> or CNAME+DNAME <xref target="I-D.sury-dnsext-cname-dname"/>.
The only information the end user needs to know is the domain name assigned by the ISP.
Once the redirection has been configured, the HNA may be changed, the zone can be updated as in <xref target="sec-scenario-1"/> without any additional configuration from the end user.</t>

<t>The main advantage of this scenario is that the end user benefits from the Zero Configuration of the Base Scenario <xref target="sec-scenario-1"/>.
Then, the end user is able to register for its home network an unlimited number of domain names provided by an unlimited number of different third party providers.
The drawback of this scenario may be that the end user still rely on the ISP naming infrastructure.
Note that the only case this may be inconvenient is when the DNS servers provided by the ISPs results in high latency.</t>

</section>
<section anchor="scenario-3" title="Third Party DNS Infrastructure">

<t>This scenario considers that the end user uses example.com as a Registered Homenet Domain, and does not want to rely on the authoritative servers provided by the ISP.</t>

<t>In this appendix we limit the outsourcing to the DM and Public Authoritative Server(s) to a third party.
The Reverse Public Authoritative Server(s) and the RDM remain managed by the ISP as the IP prefix is managed by the ISP.</t>

<t>Outsourcing to a third party DM can be performed in the following ways:</t>

<t><list style="numbers">
  <t>Updating the DHCPv6 server Information. One can imagine a GUI interface that enables the end user to modify its profile parameters. Again, this configuration update is done once-for-ever.</t>
  <t>Upload the configuration of the DM to the HNA. In some cases, the provider of the CPE router hosting the HNA may be the registrar and provide the CPE router already configured. In other cases, the CPE router may request the end user to log into the registrar to validate the ownership of the Registered Homenet Domain and agree on the necessary credentials to secure the communication between the HNA and the DM. As described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, such settings could be performed in an almost automatic way as to limit the necessary interactions with the end user.</t>
</list></t>

</section>
<section anchor="scenario-4" title="Multiple ISPs">

<t>This scenario considers a HNA connected to multiple ISPs.</t>

<t>Suppose the HNA has been configured each of its interfaces independently with each ISPS as described in <xref target="sec-scenario-1"/>.
Each ISP provides a different Registered Homenet Domain.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs with multiple Registered Homenet Domains.
However, the HNA should be able to handle different Registered Homenet Domains.
This is an implementation issue which is outside the scope of the current document.</t>

<t>If a HNA is not able to handle multiple Registered Homenet Domains, the HNA may remain connected to multiple ISP with a single Registered Homenet Domain.
In this case, one entity is chosen to host the Registered Homenet Domain.
This entity may be one of the ISP or a third party.
Note that having multiple ISPs can be motivated for bandwidth aggregation, or connectivity fail-over.
In the case of connectivity fail-over, the fail-over concerns the access network and a failure of the access network may not impact the core network where the DM and Public Authoritative Primaries are hosted.
In that sense, choosing one of the ISP even in a scenario of multiple ISPs may make sense.
However, for sake of simplicity, this scenario assumes that a third party has been chosen to host the Registered Homenet Domain.
Configuration is performed as described in <xref target="scenario-2"/> and <xref target="scenario-3"/>.</t>

<t>With the configuration described in <xref target="scenario-2"/>,  the HNA is expect to be able to handle multiple Homenet Registered Domain, as the third party redirect to one of the ISPs servers.
With the configuration described in <xref target="scenario-3"/>, DNS zone are hosted and maintained by the third party.
A single DNS(SEC) Homenet Zone is built and maintained by the HNA.
This latter configuration is likely to match most HNA implementations.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs.
To configure or not and how to configure the HNA depends on the HNA facilities.
<xref target="sec-scenario-1"/> and  <xref target="scenario-2"/> require the HNA to handle multiple Registered Homenet Domain, whereas <xref target="scenario-3"/> does not have such requirement.</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

